USRE46918E1 - Program encoding and counterfeit tracking system and method - Google Patents
Program encoding and counterfeit tracking system and method Download PDFInfo
- Publication number
- USRE46918E1 USRE46918E1 US14/608,117 US201514608117A USRE46918E US RE46918 E1 USRE46918 E1 US RE46918E1 US 201514608117 A US201514608117 A US 201514608117A US RE46918 E USRE46918 E US RE46918E
- Authority
- US
- United States
- Prior art keywords
- frames
- audio
- copy
- visual program
- locations
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0028—Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
- G06T1/0085—Time domain based watermarking, e.g. watermarks spread over several images
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/442—Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed, the storage space available from the internal hard disk
- H04N21/44236—Monitoring of piracy processes or activities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/83—Generation or processing of protective or descriptive data associated with content; Content structuring
- H04N21/835—Generation of protective data, e.g. certificates
- H04N21/8358—Generation of protective data, e.g. certificates involving watermark
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0064—Image watermarking for copy protection or copy management, e.g. CGMS, copy only once, one-time copy
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T2201/00—General purpose image data processing
- G06T2201/005—Image watermarking
- G06T2201/0081—Image watermarking whereby both original and watermarked images are required at decoder, e.g. destination-based, non-blind, non-oblivious
Definitions
- This invention relates to the encoding of audio-visual programs such as motion pictures and the tracking of counterfeit program copies, particularly counterfeit copies made from releases of a motion picture in video form.
- “Motion picture”, as that term is used herein, includes any type of program material using moving images as a medium of expression. It can include episodes of broadcast television programs, corporate events, as well as “movies”, etc.
- both film and video copies When a new movie is released, it usually is released in both film and video versions.
- a particularly crude but effective type of counterfeiting of film version of movies is the use of a video camera to copy a motion picture from a movie screen.
- the copy made by this technique then is converted to video tape or DVD records, and the records are sold to the public and otherwise distributed, such as by way of the internet.
- Video program counterfeiting usually is done by obtaining a legitimate copy of the program and copying it with the use of video capture cards or use of means known for the purpose.
- the method described in that patent application uses coded arrays of artifacts to uniquely identify each copy distributed. Detection of the coded identification numbers from the counterfeit copies aids in tracking the source of the counterfeits. As successful as that method is, it is desired to improve on it, especially when detecting the sources of counterfeits of video distribution copies of a new motion picture.
- noise has been embedded in the video signals in particular patterns to use in identifying the source. This has certain disadvantages, such as by requiring a substantial amount of extra hardware for use in recording the protected video copies.
- the images appearing in specific pre-selected places in the video program are slightly altered so as to be essentially unnoticeable to the viewer.
- the presence or absence of an altered picture at each of a number of pre-selected locations forms a code which represents a unique number applied to that copy of the motion picture.
- the unique number then is recorded and stored, together with an identification of the person or entity who receives the copy when it is distributed, so as to enable law enforcement personnel to review suspected counterfeit copies of the motion picture to read the code number and identify the recipient of the copy and thereby track down the source of the counterfeit copies.
- the alteration of the images consists of slightly shifting an image such as by changing the aspect ratio of the image. It is preferred to do this by enlarging an image slightly so that one or more edges of the image is moved relative to the same edge in the video master. Sometimes an image boundary overlaps a boundary of the frame and becomes invisible.
- This alteration procedure helps enforcement personnel to compare the frame of a suspected counterfeit copy with an unaltered frame from an unaltered master copy of the motion picture to determine which of the images has been altered. When the pattern of alterations is detected, this will indicate the number of the copy which has been counterfeited and will lead to the possible source of the counterfeit.
- the alteration of images is applied to each frame of a complete scene. This makes the alteration very difficult to detect without access to the unaltered master video.
- each of the pre-determined locations for alterations consisted of a plurality of successive or separated scenes in order to ensure detectability of the alterations by enforcement personnel.
- the code recorded by image alteration is combined with the separate code provided by the invention of the above-identified co-pending U.S. patent application so that enforcement personnel have two different codes to look for in identifying the source of a counterfeit and confirming the number of the copy which has been counterfeited.
- a video copy with images altered at pre-determined locations is prepared. Then, the master video which has not been altered is played back in one playback device, such as a video server, while the altered version is played back on another playback device such as a second video server.
- the output of both servers is delivered to a video router which controls a large number of different video recorders to simultaneously prepare copies in relatively large quantities.
- a random number generator is employed to generate an identification number for each copy, and the number so generated is used to control one output channel of the router so as to alternatingly deliver the master video signal and the altered video signal and thereby record the altered images in a particular pattern which gives that copy a unique identification number.
- the code made of artifacts is added by modifying the output signals of the second video server, in copies using both forms of coding.
- FIG. 1 is a schematic view of several unaltered frames of video programs
- FIG. 2 is a schematic view of the same frames as those shown in FIG. 1 , after alteration;
- FIG. 3 is a schematic view of a system used to perform the encoding and prepare uniquely encoded video distribution copies of a motion picture or other program.
- FIG. 4 is a schematic view of another encoding method used in tandem with the method illustrated in FIGS. 1 and 2 .
- FIG. 1 shows a series 10 of three successive frames 12 , 14 and 16 from a single scene of a video program such as a motion picture.
- Each frame contains an image of a square or block 26 . It is moving from left to right and thus is shown progressively closer to the right edge of the frame as one moves from frame 12 to frame 16 .
- FIG. 2 shows the same three frames of the video program shown in FIG. 1 after alteration, in accordance with the present invention.
- the alteration in this example, is an enlargement of the image by a relatively small amount, e.g., from less than 4% to 10%.
- the enlargement of the object 26 to form the image 20 shown in the drawings is greater than that so as to more clearly illustrate the principle of the process.
- the right edge 20 of the enlarged object 28 is closer to the right-hand border of the frame than the unaltered object 26 in the corresponding frame of FIG. 1 .
- the right edge 30 extends beyond the right edge of the frame and thus is not visible.
- the same alteration of the images is applied to all frames of each scene in which alteration is applied.
- a variety of coding schemes can be used to encode a unique identification in each video distribution copy of a program.
- the master can be run to each code location and still-framed when the code location is reached. When the corresponding portion of the copy is found and still-framed, frames in the master can be compared with corresponding frames of the copy.
- a random number generator is used to generate a unique combination of signals forming a digital one or zero at each of the 64 locations. If the images are unaltered at a location, that is taken to be a digital zero. If the images are altered, that is taken to be a digital one.
- the alterations preferably are repeated in each of a plurality of scenes at each of the 64 locations in order to avoid the loss of code due to cuts or deletions made in the copy by the counterfeiter, either deliberately or accidentally. Also, it facilitates detection of alterations by enforcement personnel because the alterations may be more visible in some scenes than others.
- FIG. 3 is a schematic diagram of an encoding and video program duplication system 32 .
- the system includes a first video server 34 , a second video server 36 , a video router 40 , a computer 42 with an input keyboard and screen 60 , with a storage unit 44 , and a plurality of video recorders 50 , 52 , 54 , 56 , etc., for making distribution video copies.
- an image processor 48 which is used to alter the images output from the server 36 in accordance with instructions received from the computer 42 .
- the unaltered master video is stored in the first or “master” server 34
- the altered video is stored in the second or “modification” server 36 .
- the altered video preferably has altered scenes at each of the 64 locations selected randomly by the computer 42 .
- Signals from the unaltered master video are sent from the master server 34 to the router 40 while altered video signals are sent from the modification server 36 to the router 40 in synchronism with the master video signals.
- the video router 40 has the ability to switch rapidly back and forth between two input video signals to produce on each of a large number of output terminals 58 a unique video signal which is made up of signals from each source alternating with signals from the other source.
- the computer 42 contains a random number generator which is used to generate a unique 64-digit random number which is assigned to and stored for each of the output terminals of the router.
- Each of the recorders 50 , 52 , etc. has a unique bar code identifying it.
- Each blank DVD or tape on which the program is recorded also has a bar-code identifying it.
- These bar codes are read by the use of bar code readers 62 , 64 , 66 and 68 , and associated with one another and stored in memory (e.g., a disk file) 44 .
- the random number code also is stored and associated with the bar codes for the recorder and the record. Similarly, the identification for the recipient of each copy is stored and associated with the copy identification.
- the time codes for the 64 locations are stored once for each program and made available to enforcement personnel in order to check a suspected counterfeit.
- the alterations to the images can take forms other than enlargements.
- the images can be enlarged in one dimension only instead of in both height and width, images can be slightly reduced in size in both or only one dimension, etc.
- FIG. 4 shows a segment 70 of a motion picture video master in which one frame bears an image, represented by the line 78 , and a coded pattern 80 represents an alphanumeric character.
- a coded pattern 80 represents an alphanumeric character.
- One full frame 72 and parts of two adjacent frames 74 and 76 are shown in FIG. 4 .
- the pattern is made of a plurality of very small dots 82 , 84 , 86 and 88 in a 3 ⁇ 3 dot matrix, although patterns and code elements other than those described can be used instead, as it will be explained in detail below.
- the pattern represent one of the digits of an identification number which is assigned to each video copy. Preferably, this is a 5 digit number starting with 00001 and increasing by one for each additional copy made.
- the numbers used will be 00001 to 00128.
- the numbers assigned will be 00129 to 00257, etc.
- the dot pattern shown may represent the first digit “0” of the number “01736” which has been given to the copy.
- a different dot pattern is used to represent the “1”, the “7”, and each other digit in the number.
- the modification server 36 begins by generating the pattern for the number “0” in the first “placeholder” location. This pattern will appear for two film frames, immediately following an edit.
- the patterns can be generated at any edit point throughout the program with the exception of edits within modified scenes; that is, within scenes in which the images have been altered as described above.
- Each of the specific locations is selected by the computer, and its time code is stored. Thus, if a pattern is found at a particular time code position in a suspected counterfeit program, it will not be necessary to be able to read the pattern; it will be known what the number is simply by its location. Of course, its place in the identification number (that is, whether it is the first, second, third, fourth or fifth digit) also is known, from the stored time codes.
- the modification server 36 In the production of a batch of copies (e.g., 128 copies), the modification server 36 first generates the pattern for the number “0” in the first placeholder position. All recorders that have been assigned the number “0” in the first placeholder position will now be switched by the router to receive an input feed from the modification server 36 .
- the modification server 36 will generate the number “1” for the first placeholder. Once again, any recorders requiring the number “1” in the first placeholder will now be switched to the output of the server 36 .
- the numbers generated for each placeholder will not exceed what is required before moving on to the next placeholder. In the example “01736”, there is no need to generate anything higher than a “1” in the second placeholder.
- This process is repeated anywhere from 5 to 10 times throughout the duration of the program, depending on the run time of the program.
- the coded copy number is repeated 5 to 10 times during the program. This protects against destruction of the code patterns which frequently occurs due to data compression or deliberate destruction by the counterfeiter.
- the artifacts forming each code are formed by altering specific pixels of the video picture signals being transmitted from the second server 36 ( FIG. 3 ). This can be done by simply reducing the luminance level to zero in a few pixels to form small dark dots, by controlling the video color level of the pixels on the video card's output board in the server 36 . Preferably, this is done by programming the server 36 .
- Pixel luminance and chroma values may be brought to zero or any other level greater than zero. For example, it can be desirable to subtract a predetermined luminance value from the existing luminance value of the pixel. The amount to be subtracted is the minimum amount required to enable enforcement personnel to see the dots in a pirated copy. In this method, no more pixel level change is used than is necessary, and this makes the pixels less obvious. Similarly, colors can be used to create the necessary marks. For example, a combination of luminance and color can be used to create the color brown, which is less obvious than black.
- the contrast between the artifact and the program material is made just high enough to make the artifacts visible to enforcement personnel who know where to look.
- the dots 82 , 84 , 86 , 88 are visible to the naked eye. Therefore, the print copy number can be read without any special equipment. However, reading is greatly aided by use of a stored record of where the codes are recorded in the film. With the aid of a time code reader and a video display unit, enforcement personnel can fast-forward to the locations in the program wherein the coded frames are located, and still-frame the codes frames for reading.
- the dots need not be circular. However, it is preferred that they look like specks of dirt. This prevents them from being too evident to ordinary movie patrons, and makes them harder to find by people who do not know where to look.
- small marks other than dots can be used as code elements.
- Small marks which look like small scratches, elongated spots or color artifacts can be used
- enforcement personnel can use one method to check the accuracy of the other, or can select which one is easiest to read in a given counterfeit copy.
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Virology (AREA)
- Computer Networks & Wireless Communication (AREA)
- Databases & Information Systems (AREA)
- General Health & Medical Sciences (AREA)
- General Engineering & Computer Science (AREA)
- Signal Processing For Digital Recording And Reproducing (AREA)
- Editing Of Facsimile Originals (AREA)
- Television Signal Processing For Recording (AREA)
Abstract
Description
Claims (25)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/608,117 USRE46918E1 (en) | 2004-07-16 | 2015-01-28 | Program encoding and counterfeit tracking system and method |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/893,508 US7818257B2 (en) | 2004-07-16 | 2004-07-16 | Program encoding and counterfeit tracking system and method |
US13/655,229 USRE45406E1 (en) | 2003-09-08 | 2012-10-18 | Program encoding and counterfeit tracking system and method |
US14/608,117 USRE46918E1 (en) | 2004-07-16 | 2015-01-28 | Program encoding and counterfeit tracking system and method |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/893,508 Reissue US7818257B2 (en) | 2003-09-08 | 2004-07-16 | Program encoding and counterfeit tracking system and method |
Publications (1)
Publication Number | Publication Date |
---|---|
USRE46918E1 true USRE46918E1 (en) | 2018-06-26 |
Family
ID=35600658
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/893,508 Ceased US7818257B2 (en) | 2003-09-08 | 2004-07-16 | Program encoding and counterfeit tracking system and method |
US14/608,117 Active 2026-12-06 USRE46918E1 (en) | 2004-07-16 | 2015-01-28 | Program encoding and counterfeit tracking system and method |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/893,508 Ceased US7818257B2 (en) | 2003-09-08 | 2004-07-16 | Program encoding and counterfeit tracking system and method |
Country Status (1)
Country | Link |
---|---|
US (2) | US7818257B2 (en) |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040125125A1 (en) * | 2002-06-29 | 2004-07-01 | Levy Kenneth L. | Embedded data windows in audio sequences and video frames |
US7694318B2 (en) | 2003-03-07 | 2010-04-06 | Technology, Patents & Licensing, Inc. | Video detection and insertion |
US7809154B2 (en) | 2003-03-07 | 2010-10-05 | Technology, Patents & Licensing, Inc. | Video entity recognition in compressed digital video streams |
US7738704B2 (en) | 2003-03-07 | 2010-06-15 | Technology, Patents And Licensing, Inc. | Detecting known video entities utilizing fingerprints |
US7690011B2 (en) * | 2005-05-02 | 2010-03-30 | Technology, Patents & Licensing, Inc. | Video stream modification to defeat detection |
US7394519B1 (en) * | 2007-02-08 | 2008-07-01 | Deluxe Laboratories, Inc. | System and method for audio encoding and counterfeit tracking a motion picture |
US8625027B2 (en) * | 2011-12-27 | 2014-01-07 | Home Box Office, Inc. | System and method for verification of media content synchronization |
US9948626B2 (en) * | 2013-03-15 | 2018-04-17 | Aerohive Networks, Inc. | Split authentication network systems and methods |
ES2682198T3 (en) | 2013-11-04 | 2018-09-19 | Nagravision S.A. | Device and method for marking digital audio or audio and / or video content |
WO2016085018A1 (en) * | 2014-11-27 | 2016-06-02 | 엘지전자 주식회사 | Display device |
CN112101155B (en) * | 2020-09-02 | 2024-04-26 | 北京博睿维讯科技有限公司 | Display content verification method, device, system and storage medium |
Citations (56)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB1235765A (en) | 1967-10-25 | 1971-06-16 | Micro Mega Sa | Holder for tools, particularly dental tools |
US5080479A (en) * | 1990-07-30 | 1992-01-14 | Rosenberg Stanley L | Automatic implanting of identification data in any recorded medium |
US5251041A (en) * | 1991-06-21 | 1993-10-05 | Young Philip L | Method and apparatus for modifying a video signal to inhibit unauthorized videotape recording and subsequent reproduction thereof |
US5303294A (en) * | 1991-06-18 | 1994-04-12 | Matsushita Electric Industrial Co., Ltd. | Video theater system and copy preventive method |
US5315448A (en) * | 1993-03-18 | 1994-05-24 | Macrovision Corporation | Copy protection for hybrid digital video tape recording and unprotected source material |
US5636292A (en) * | 1995-05-08 | 1997-06-03 | Digimarc Corporation | Steganography methods employing embedded calibration data |
US5680454A (en) * | 1995-08-04 | 1997-10-21 | Hughes Electronics | Method and system for anti-piracy using frame rate dithering |
US5699427A (en) * | 1995-06-23 | 1997-12-16 | International Business Machines Corporation | Method to deter document and intellectual property piracy through individualization |
US5710834A (en) * | 1995-05-08 | 1998-01-20 | Digimarc Corporation | Method and apparatus responsive to a code signal conveyed through a graphic image |
US5743615A (en) * | 1996-12-31 | 1998-04-28 | Eastman Kodak Company | Film slides having encoded data and methods for preparing film slides |
US5751368A (en) * | 1994-10-11 | 1998-05-12 | Pixel Instruments Corp. | Delay detector apparatus and method for multiple video sources |
US5809160A (en) * | 1992-07-31 | 1998-09-15 | Digimarc Corporation | Method for encoding auxiliary data within a source signal |
GB2325765A (en) | 1997-04-07 | 1998-12-02 | Ibm | Data hiding and detection |
US5850481A (en) * | 1993-11-18 | 1998-12-15 | Digimarc Corporation | Steganographic system |
US5859920A (en) * | 1995-11-30 | 1999-01-12 | Eastman Kodak Company | Method for embedding digital information in an image |
EP0899688A2 (en) | 1997-08-29 | 1999-03-03 | Fujitsu Limited | Device for generating, detecting, recording, and reproducing a watermarked moving image |
US5959717A (en) * | 1997-12-12 | 1999-09-28 | Chaum; Jerry | Motion picture copy prevention, monitoring, and interactivity system |
US6005643A (en) * | 1996-10-15 | 1999-12-21 | International Business Machines Corporation | Data hiding and extraction methods |
US6018374A (en) * | 1996-06-25 | 2000-01-25 | Macrovision Corporation | Method and system for preventing the off screen copying of a video or film presentation |
US6044156A (en) * | 1997-04-28 | 2000-03-28 | Eastman Kodak Company | Method for generating an improved carrier for use in an image data embedding application |
US6122392A (en) * | 1993-11-18 | 2000-09-19 | Digimarc Corporation | Signal processing to hide plural-bit information in image, video, and audio data |
US6285774B1 (en) * | 1998-06-08 | 2001-09-04 | Digital Video Express, L.P. | System and methodology for tracing to a source of unauthorized copying of prerecorded proprietary material, such as movies |
US6325420B1 (en) * | 1998-08-17 | 2001-12-04 | Inspectron Corporation | Method for embedding non-intrusive encoded data in printed matter and system for reading same |
US6396594B1 (en) * | 1999-03-31 | 2002-05-28 | International Business Machines Corporation | Method for providing flexible and secure administrator-controlled watermarks |
EP1217840A2 (en) | 2000-12-13 | 2002-06-26 | Eastman Kodak Company | System and method for embedding a watermark in digital image sequences |
US20020097870A1 (en) | 2001-01-23 | 2002-07-25 | Nelson Terence J. | Method and system for tracing an analog copy of a digital work to a unique digital copy and a particular digital player |
US20020168069A1 (en) * | 2001-02-28 | 2002-11-14 | Babak Tehranchi | Copy protection for digital motion picture image data |
US6529600B1 (en) * | 1998-06-25 | 2003-03-04 | Koninklijke Philips Electronics N.V. | Method and device for preventing piracy of video material from theater screens |
US6542618B1 (en) * | 1993-11-18 | 2003-04-01 | Digimarc Corporation | Methods for watermark decoding |
US6556273B1 (en) | 1999-11-12 | 2003-04-29 | Eastman Kodak Company | System for providing pre-processing machine readable encoded information markings in a motion picture film |
US6558273B2 (en) * | 1999-06-08 | 2003-05-06 | K. K. Endo Seisakusho | Method for manufacturing a golf club |
US20030091189A1 (en) * | 1993-11-18 | 2003-05-15 | Rhoads Geoffrey B. | Arrangement for embedding subliminal data in imaging |
US20030174769A1 (en) * | 2001-05-10 | 2003-09-18 | Takefumi Nagumo | Motion picture encoding apparatus |
US6624874B2 (en) * | 2001-12-21 | 2003-09-23 | Eastman Kodak Company | Apparatus and method for inserting an updateable hidden image into an optical path |
US20030187674A1 (en) * | 2002-04-02 | 2003-10-02 | Odgers Chris R. | Methods and apparatus for uniquely identifying a large number of film prints |
US20030187679A1 (en) * | 2002-04-02 | 2003-10-02 | Odgers Chris R. | Methods and apparatus for uniquely identifying a large number of film prints |
US20030202679A1 (en) | 2002-04-29 | 2003-10-30 | The Boeing Company | Watermarks for secure distribution of digital data |
US6681029B1 (en) * | 1993-11-18 | 2004-01-20 | Digimarc Corporation | Decoding steganographic messages embedded in media signals |
US20040033060A1 (en) * | 2002-08-14 | 2004-02-19 | Qdesign Corporation | Modulation of a video signal with an impairment signal to increase the video signal masked threshold |
US20040033051A1 (en) * | 2002-08-16 | 2004-02-19 | Ip Kiril Kun Wan | Method and system for producing and displaying visual presentations which inhibit off-screen duplication |
WO2004030339A2 (en) | 2002-09-27 | 2004-04-08 | Technicolor, Inc. | Motion picture anti-piracy coding |
US6735776B1 (en) * | 1999-02-01 | 2004-05-11 | Kim R. Legate | Motion picture editing and distribution |
US20040103293A1 (en) * | 1999-08-06 | 2004-05-27 | Ryan John O. | Scaling independent technique for watermarking images |
US20040109016A1 (en) | 2002-09-27 | 2004-06-10 | Darcy Antonellis | Motion picture anti-piracy coding |
US6757406B2 (en) * | 1993-11-18 | 2004-06-29 | Digimarc Corporation | Steganographic image processing |
US6760463B2 (en) * | 1995-05-08 | 2004-07-06 | Digimarc Corporation | Watermarking methods and media |
US6778682B2 (en) * | 1994-10-21 | 2004-08-17 | Digimarc Corporation | Redundantly embedding auxiliary data in source signals |
US6845170B2 (en) | 2001-01-11 | 2005-01-18 | Sony Corporation | Watermark resistant to resizing and rotation |
US6920232B2 (en) | 1996-05-07 | 2005-07-19 | Digimarc Corporation | Watermark encoding using arbitrary features |
US20050273698A1 (en) | 2004-05-19 | 2005-12-08 | Bentley System, Inc. | Document genealogy |
US20060026431A1 (en) | 2004-07-30 | 2006-02-02 | Hitachi Global Storage Technologies B.V. | Cryptographic letterheads |
US7007167B2 (en) * | 2000-11-22 | 2006-02-28 | Nec Corporation | Watermarking technique for scaled image |
US7116781B2 (en) * | 1993-11-18 | 2006-10-03 | Digimarc Corporation | Counteracting geometric distortions in watermarking |
US7184570B2 (en) * | 1994-10-21 | 2007-02-27 | Digimarc Corporation | Methods and systems for steganographic processing |
US7295677B2 (en) * | 2002-03-01 | 2007-11-13 | Hewlett-Packard Development Company, L.P. | Systems and methods for adding watermarks using network-based imaging techniques |
USRE45406E1 (en) | 2003-09-08 | 2015-03-03 | Deluxe Laboratories, Inc. | Program encoding and counterfeit tracking system and method |
-
2004
- 2004-07-16 US US10/893,508 patent/US7818257B2/en not_active Ceased
-
2015
- 2015-01-28 US US14/608,117 patent/USRE46918E1/en active Active
Patent Citations (69)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB1235765A (en) | 1967-10-25 | 1971-06-16 | Micro Mega Sa | Holder for tools, particularly dental tools |
US5080479A (en) * | 1990-07-30 | 1992-01-14 | Rosenberg Stanley L | Automatic implanting of identification data in any recorded medium |
US5303294A (en) * | 1991-06-18 | 1994-04-12 | Matsushita Electric Industrial Co., Ltd. | Video theater system and copy preventive method |
US5251041A (en) * | 1991-06-21 | 1993-10-05 | Young Philip L | Method and apparatus for modifying a video signal to inhibit unauthorized videotape recording and subsequent reproduction thereof |
US6072888A (en) * | 1992-07-31 | 2000-06-06 | Digimarc Corporation | Method for image encoding |
US6628801B2 (en) * | 1992-07-31 | 2003-09-30 | Digimarc Corporation | Image marking with pixel modification |
US6459803B1 (en) * | 1992-07-31 | 2002-10-01 | Digimarc Corporation | Method for encoding auxiliary data within a source signal |
US6678392B2 (en) * | 1992-07-31 | 2004-01-13 | Digimarc Corporation | Method for encoding auxiliary data within a source signal |
US7062070B2 (en) * | 1992-07-31 | 2006-06-13 | Digimarc Corporation | Image marking adapted to the image |
US7068811B2 (en) * | 1992-07-31 | 2006-06-27 | Digimarc Corporation | Protecting images with image markings |
US5809160A (en) * | 1992-07-31 | 1998-09-15 | Digimarc Corporation | Method for encoding auxiliary data within a source signal |
US5315448A (en) * | 1993-03-18 | 1994-05-24 | Macrovision Corporation | Copy protection for hybrid digital video tape recording and unprotected source material |
US7003132B2 (en) * | 1993-11-18 | 2006-02-21 | Digimarc Corporation | Embedding hidden auxiliary code signals in media |
US6681029B1 (en) * | 1993-11-18 | 2004-01-20 | Digimarc Corporation | Decoding steganographic messages embedded in media signals |
US6757406B2 (en) * | 1993-11-18 | 2004-06-29 | Digimarc Corporation | Steganographic image processing |
US20030091189A1 (en) * | 1993-11-18 | 2003-05-15 | Rhoads Geoffrey B. | Arrangement for embedding subliminal data in imaging |
US6542618B1 (en) * | 1993-11-18 | 2003-04-01 | Digimarc Corporation | Methods for watermark decoding |
US5850481C1 (en) * | 1993-11-18 | 2002-07-16 | Digimarc Corp | Steganographic system |
US5850481A (en) * | 1993-11-18 | 1998-12-15 | Digimarc Corporation | Steganographic system |
US6122392A (en) * | 1993-11-18 | 2000-09-19 | Digimarc Corporation | Signal processing to hide plural-bit information in image, video, and audio data |
US7116781B2 (en) * | 1993-11-18 | 2006-10-03 | Digimarc Corporation | Counteracting geometric distortions in watermarking |
US5751368A (en) * | 1994-10-11 | 1998-05-12 | Pixel Instruments Corp. | Delay detector apparatus and method for multiple video sources |
US7184570B2 (en) * | 1994-10-21 | 2007-02-27 | Digimarc Corporation | Methods and systems for steganographic processing |
US6778682B2 (en) * | 1994-10-21 | 2004-08-17 | Digimarc Corporation | Redundantly embedding auxiliary data in source signals |
US5636292C1 (en) * | 1995-05-08 | 2002-06-18 | Digimarc Corp | Steganography methods employing embedded calibration data |
US6760463B2 (en) * | 1995-05-08 | 2004-07-06 | Digimarc Corporation | Watermarking methods and media |
US5636292A (en) * | 1995-05-08 | 1997-06-03 | Digimarc Corporation | Steganography methods employing embedded calibration data |
US5710834A (en) * | 1995-05-08 | 1998-01-20 | Digimarc Corporation | Method and apparatus responsive to a code signal conveyed through a graphic image |
US5699427A (en) * | 1995-06-23 | 1997-12-16 | International Business Machines Corporation | Method to deter document and intellectual property piracy through individualization |
US5680454A (en) * | 1995-08-04 | 1997-10-21 | Hughes Electronics | Method and system for anti-piracy using frame rate dithering |
US5859920A (en) * | 1995-11-30 | 1999-01-12 | Eastman Kodak Company | Method for embedding digital information in an image |
US6920232B2 (en) | 1996-05-07 | 2005-07-19 | Digimarc Corporation | Watermark encoding using arbitrary features |
US6018374A (en) * | 1996-06-25 | 2000-01-25 | Macrovision Corporation | Method and system for preventing the off screen copying of a video or film presentation |
US6005643A (en) * | 1996-10-15 | 1999-12-21 | International Business Machines Corporation | Data hiding and extraction methods |
US5743615A (en) * | 1996-12-31 | 1998-04-28 | Eastman Kodak Company | Film slides having encoded data and methods for preparing film slides |
GB2325765A (en) | 1997-04-07 | 1998-12-02 | Ibm | Data hiding and detection |
US6044156A (en) * | 1997-04-28 | 2000-03-28 | Eastman Kodak Company | Method for generating an improved carrier for use in an image data embedding application |
EP0899688A2 (en) | 1997-08-29 | 1999-03-03 | Fujitsu Limited | Device for generating, detecting, recording, and reproducing a watermarked moving image |
EP0899688A3 (en) | 1997-08-29 | 2001-01-24 | Fujitsu Limited | Device for generating, detecting, recording, and reproducing a watermarked moving image |
US5959717A (en) * | 1997-12-12 | 1999-09-28 | Chaum; Jerry | Motion picture copy prevention, monitoring, and interactivity system |
US6285774B1 (en) * | 1998-06-08 | 2001-09-04 | Digital Video Express, L.P. | System and methodology for tracing to a source of unauthorized copying of prerecorded proprietary material, such as movies |
US6529600B1 (en) * | 1998-06-25 | 2003-03-04 | Koninklijke Philips Electronics N.V. | Method and device for preventing piracy of video material from theater screens |
US6325420B1 (en) * | 1998-08-17 | 2001-12-04 | Inspectron Corporation | Method for embedding non-intrusive encoded data in printed matter and system for reading same |
US6354630B1 (en) * | 1998-08-17 | 2002-03-12 | Inspectron Corporation | Method for embedding non-intrusive encoded data in printed matter |
US6735776B1 (en) * | 1999-02-01 | 2004-05-11 | Kim R. Legate | Motion picture editing and distribution |
US6396594B1 (en) * | 1999-03-31 | 2002-05-28 | International Business Machines Corporation | Method for providing flexible and secure administrator-controlled watermarks |
US6558273B2 (en) * | 1999-06-08 | 2003-05-06 | K. K. Endo Seisakusho | Method for manufacturing a golf club |
US20040103293A1 (en) * | 1999-08-06 | 2004-05-27 | Ryan John O. | Scaling independent technique for watermarking images |
US6556273B1 (en) | 1999-11-12 | 2003-04-29 | Eastman Kodak Company | System for providing pre-processing machine readable encoded information markings in a motion picture film |
US7007167B2 (en) * | 2000-11-22 | 2006-02-28 | Nec Corporation | Watermarking technique for scaled image |
EP1217840A2 (en) | 2000-12-13 | 2002-06-26 | Eastman Kodak Company | System and method for embedding a watermark in digital image sequences |
US6845170B2 (en) | 2001-01-11 | 2005-01-18 | Sony Corporation | Watermark resistant to resizing and rotation |
US20020097870A1 (en) | 2001-01-23 | 2002-07-25 | Nelson Terence J. | Method and system for tracing an analog copy of a digital work to a unique digital copy and a particular digital player |
US20020168069A1 (en) * | 2001-02-28 | 2002-11-14 | Babak Tehranchi | Copy protection for digital motion picture image data |
US20030174769A1 (en) * | 2001-05-10 | 2003-09-18 | Takefumi Nagumo | Motion picture encoding apparatus |
US6624874B2 (en) * | 2001-12-21 | 2003-09-23 | Eastman Kodak Company | Apparatus and method for inserting an updateable hidden image into an optical path |
US7295677B2 (en) * | 2002-03-01 | 2007-11-13 | Hewlett-Packard Development Company, L.P. | Systems and methods for adding watermarks using network-based imaging techniques |
US20030187679A1 (en) * | 2002-04-02 | 2003-10-02 | Odgers Chris R. | Methods and apparatus for uniquely identifying a large number of film prints |
US20030187674A1 (en) * | 2002-04-02 | 2003-10-02 | Odgers Chris R. | Methods and apparatus for uniquely identifying a large number of film prints |
US20030202679A1 (en) | 2002-04-29 | 2003-10-30 | The Boeing Company | Watermarks for secure distribution of digital data |
US20040033060A1 (en) * | 2002-08-14 | 2004-02-19 | Qdesign Corporation | Modulation of a video signal with an impairment signal to increase the video signal masked threshold |
US20040033051A1 (en) * | 2002-08-16 | 2004-02-19 | Ip Kiril Kun Wan | Method and system for producing and displaying visual presentations which inhibit off-screen duplication |
WO2004030339A2 (en) | 2002-09-27 | 2004-04-08 | Technicolor, Inc. | Motion picture anti-piracy coding |
US7206409B2 (en) * | 2002-09-27 | 2007-04-17 | Technicolor, Inc. | Motion picture anti-piracy coding |
US20040109016A1 (en) | 2002-09-27 | 2004-06-10 | Darcy Antonellis | Motion picture anti-piracy coding |
USRE45406E1 (en) | 2003-09-08 | 2015-03-03 | Deluxe Laboratories, Inc. | Program encoding and counterfeit tracking system and method |
US20050273698A1 (en) | 2004-05-19 | 2005-12-08 | Bentley System, Inc. | Document genealogy |
US7742617B2 (en) * | 2004-05-19 | 2010-06-22 | Bentley Systems, Inc. | Document genealogy |
US20060026431A1 (en) | 2004-07-30 | 2006-02-02 | Hitachi Global Storage Technologies B.V. | Cryptographic letterheads |
Non-Patent Citations (1)
Title |
---|
Neil F. Johnson, Information Hiding, Kluwer Academic Publishers pp. 28-29. |
Also Published As
Publication number | Publication date |
---|---|
US20060015464A1 (en) | 2006-01-19 |
US7818257B2 (en) | 2010-10-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
USRE46918E1 (en) | Program encoding and counterfeit tracking system and method | |
USRE45406E1 (en) | Program encoding and counterfeit tracking system and method | |
CN101273367B (en) | Covert and robust mark for media identification | |
EP2036035B1 (en) | System and method for object oreinted fingerprinting of digital videos | |
US7394519B1 (en) | System and method for audio encoding and counterfeit tracking a motion picture | |
US7295281B2 (en) | System and method for adaptive marking and coding of film prints | |
CN101558645B (en) | Text-based anti-piracy system and method for digital cinema | |
EP1741057A1 (en) | Watermarking of motion picture prints | |
US8171294B2 (en) | Additional-information detection processing apparatus and method, content playback processing apparatus and method, and computer program | |
US7574004B2 (en) | Image display method and image display processor | |
US20190051328A1 (en) | Method and apparatus for tracking pirated media | |
JP2005122694A (en) | Data content identification | |
CA2480487C (en) | Program encoding and counterfeit tracking system and method | |
US20090123022A1 (en) | Digital cinema projector watermarking system and method | |
US20100158308A1 (en) | Digital Cinema Projector Watermarking System and Method | |
US7308430B2 (en) | Methods and apparatus for uniquely identifying a large number of film prints | |
US7289644B2 (en) | Anti-piracy coding of motion pictures | |
GB2415853A (en) | Recording a coded identification number in frames of a moving picture | |
Kojima et al. | Visible video data hiding techniques based on visual effects utilizing barcodes | |
JP2014512755A (en) | How to hide and restore data in video stream | |
US20090161908A1 (en) | Recoverable Marks for Films | |
WO2007142639A1 (en) | Method and apparatus for tracking pirated media |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: DELUXE LABORATORIES, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:DEWOLDE, JEFFREY H.;REEL/FRAME:034978/0445 Effective date: 20040619 |
|
AS | Assignment |
Owner name: DELUXE LABORATORIES LLC, DELAWARE Free format text: CHANGE OF NAME;ASSIGNOR:DELUXE LABORATORIES, INC.;REEL/FRAME:035230/0067 Effective date: 20141222 |
|
AS | Assignment |
Owner name: PNC BANK, NATIONAL ASSOCIATION, PENNSYLVANIA Free format text: SECURITY INTEREST;ASSIGNORS:DELUXE 3D LLC;DELUXE CREATIVE SERVICES INC.;DELUXE MEDIA INC.;AND OTHERS;REEL/FRAME:051521/0411 Effective date: 20200106 |
|
AS | Assignment |
Owner name: DELUXE ONE LLC, CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:PNC BANK, NATIONAL ASSOCIATION;REEL/FRAME:053102/0558 Effective date: 20200630 Owner name: DELUXE LABORATORIES LLC, CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:PNC BANK, NATIONAL ASSOCIATION;REEL/FRAME:053102/0558 Effective date: 20200630 Owner name: SOFTITLER NET, INC., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:PNC BANK, NATIONAL ASSOCIATION;REEL/FRAME:053102/0558 Effective date: 20200630 Owner name: DELUXE MEDIA INC., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:PNC BANK, NATIONAL ASSOCIATION;REEL/FRAME:053102/0558 Effective date: 20200630 |
|
AS | Assignment |
Owner name: PNC BANK, NATIONAL ASSOCIATION, PENNSYLVANIA Free format text: INTELLECTUAL PROPERTY SECURITY AGREEMENT;ASSIGNORS:DELUXE MEDIA INC.;SOFTITLER NET, INC.;DELUXE LABORATORIES LLC;AND OTHERS;REEL/FRAME:053265/0329 Effective date: 20200630 |
|
AS | Assignment |
Owner name: LOAN ADMIN CO LLC, CONNECTICUT Free format text: GRANT OF SECURITY INTEREST IN UNTED STATES PATENTS;ASSIGNORS:DELUXE MEDIA INC.;SOFTITLER NET, INC.;DELUXE ONE LLC;REEL/FRAME:054153/0001 Effective date: 20200820 |
|
CC | Certificate of correction | ||
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 12 |
|
AS | Assignment |
Owner name: DELUXE ONE LLC, CALIFORNIA Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:LOAN ADMIN CO LLC, AS COLLATERAL AGENT;REEL/FRAME:063237/0243 Effective date: 20230331 Owner name: SOFTITLER NET, INC., CALIFORNIA Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:LOAN ADMIN CO LLC, AS COLLATERAL AGENT;REEL/FRAME:063237/0243 Effective date: 20230331 Owner name: DELUXE MEDIA INC., CALIFORNIA Free format text: RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:LOAN ADMIN CO LLC, AS COLLATERAL AGENT;REEL/FRAME:063237/0243 Effective date: 20230331 |
|
AS | Assignment |
Owner name: DELUXE ONE LLC, CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:PNC BANK, NATIONAL ASSOCIATION;REEL/FRAME:063213/0909 Effective date: 20230331 Owner name: DELUXE LABORATORIES LLC, CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:PNC BANK, NATIONAL ASSOCIATION;REEL/FRAME:063213/0909 Effective date: 20230331 Owner name: SOFTITLER NET, INC., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:PNC BANK, NATIONAL ASSOCIATION;REEL/FRAME:063213/0909 Effective date: 20230331 Owner name: DELUXE MEDIA INC., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:PNC BANK, NATIONAL ASSOCIATION;REEL/FRAME:063213/0909 Effective date: 20230331 |