WO2003024020A1 - Procede et systeme informatique de filigranage au vol de contenu de donnees media - Google Patents

Procede et systeme informatique de filigranage au vol de contenu de donnees media Download PDF

Info

Publication number
WO2003024020A1
WO2003024020A1 PCT/US2001/029031 US0129031W WO03024020A1 WO 2003024020 A1 WO2003024020 A1 WO 2003024020A1 US 0129031 W US0129031 W US 0129031W WO 03024020 A1 WO03024020 A1 WO 03024020A1
Authority
WO
WIPO (PCT)
Prior art keywords
content
identifiers
watermark
sequence
content frame
Prior art date
Application number
PCT/US2001/029031
Other languages
English (en)
Inventor
Ivan Mclean
Original Assignee
Entriq Limited Bvi
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Entriq Limited Bvi filed Critical Entriq Limited Bvi
Priority to PCT/US2001/029031 priority Critical patent/WO2003024020A1/fr
Publication of WO2003024020A1 publication Critical patent/WO2003024020A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/0085Time domain based watermarking, e.g. watermarks spread over several images
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/238Interfacing the downstream path of the transmission network, e.g. adapting the transmission rate of a video stream to network bandwidth; Processing of multiplex streams
    • H04N21/2389Multiplex stream processing, e.g. multiplex stream encrypting
    • H04N21/23895Multiplex stream processing, e.g. multiplex stream encrypting involving multiplex stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/4405Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/835Generation of protective data, e.g. certificates
    • H04N21/8358Generation of protective data, e.g. certificates involving watermark
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/16Analogue secrecy systems; Analogue subscription systems
    • H04N7/167Systems rendering the television signal unintelligible and subsequently intelligible
    • H04N7/1675Providing digital key or authorisation information for generation or regeneration of the scrambling sequence

Definitions

  • the present invention relates generally to the fields of data processing and fingerprinting. Specifically, the present invention relates to a method and a computer system to perform on the fly fingerprinting for media content.
  • Fingerprinting is the process of inserting an identifier in text, audio and video content.
  • the identifier can uniquely identify the source (server) of the content or the recipient (client) of the content. Fingerprinting can prevent illegal copying and distribution of the content.
  • a good application for fingerprinting is in the area of multicasting.
  • Multicasting is the process in which a single server transports content to multiple clients at the same time. Illegal copying and distribution of the transported content during multicasting is a disturbing worldwide problem. For example, copies of video content, e.g., Hollywood blockbusters, are routinely made using devices such as the videocassette recorder (VCR) and pirated to foreign countries. This results in an enormous loss of revenues to the companies that hold the licensing rights to the multicast content.
  • VCR videocassette recorder
  • Fingerprinting is an expensive process because of the high central processing unit (CPU) time that is required to compute every fingerprint.
  • CPU central processing unit
  • Fingerprinting at the media server end can increase the workload of the already busy server.
  • the processing overhead can introduce a bottleneck and the media server can become paralyzed during the spikes in demand, (e.g. when transporting a live sports event).
  • Fingerprinting at the client end is not desirable for at least two reasons.
  • clients such as the set top box (STB), personal digital assistant (PDA) and cell phone may not be able to provide the processing power necessary to do the fingerprint computation and insertion.
  • PDA personal digital assistant
  • PC personal computers
  • Two, a hacker can disable the client fingerprinting module.
  • a computer-implemented method to fingerprint content including a plurality of content frames is disclosed.
  • a sequence of identifiers is generated by associating either a first or a second identifier with each content frame of at least a portion of the plurality of content frames.
  • the plurality of content frames and the sequence of identifiers are transmitted to a client.
  • Each identifier of the sequence of identifiers is inserted into an associated content frame of the plurality of content frames at the client.
  • the sequence of identifiers is generated in a manner that it is unique for the client.
  • a computer- implemented method to fingerprint a content frame is disclosed.
  • the content frame is corrupted by removing a noise signal from the content frame.
  • a watermark delta is computed by adding an identifier to the noise signal.
  • the corrupt content frame and the watermark delta are transmitted to a client.
  • the watermark delta is inserted into the corrupt content frame by the client.
  • Figure 1 illustrates an exemplary embodiment of the media network to perform on the fly fingerprinting for media content
  • Figure 2 illustrates one embodiment of the author module
  • Figure 3 illustrates an alternate embodiment of the author module
  • Figure 4 illustrates an exemplary embodiment of the media server
  • Figure 5 illustrated an exemplary embodiment of the client machine
  • Figure 6 illustrates exemplary embodiments of the data streams to perform client side fingerprinting (or watermarking) for multicast data
  • Figure 7 illustrates one embodiment of a method to perform on the fly fingerprinting for media content
  • Figures 8A and 8B illustrate an alternate embodiment of the method to perform on the fly fingerprinting for media content
  • Figure 9 illustrates a computer in block diagram form, which may be representative of any author module, media server or client machine.
  • a method and a computer system to perform on the fly fingerprinting for media content are described.
  • a media network is described including an author module, a media server, and a client machine.
  • the author module transmits an encrypted content frame, an encrypted first identifier and an encrypted second identifier to the media server.
  • the content can be audio, video, or data content.
  • the content frame can be an audio, video or data frame.
  • the first and second identifiers can be watermarks.
  • transmit and transport are used interchangeably.
  • the content and the first and second identifiers can be transmitted as three different data streams. It will be appreciated that several technologies and methods exist to transmit the content and the identifiers. For example, for the author module, media server and client machine that are moving pictures expert group (MPEG) standard 4 (MPEG-4) compatible, the content can be streamed through the base layer, and the first and second identifiers can be streamed through the first and second enhancement layers, respectively. For another example, for the author module, media server and client machine that are MPEG standard 2 (MPEG-2) compatible, the content and the identifiers can be streamed as Intellectual Property Management & Protection (IPMP) message streams, key streams, protection streams or a combination thereof. It will be appreciated that the method and computer system of the present invention are applicable to any open standard such as MPEG-2 or QuickTimeTM.
  • MPEG moving pictures expert group
  • MPEG-4 MPEG-4
  • IPMP Intellectual Property Management & Protection
  • the media server selects either the first or the second identifier to associate with the content frame.
  • the media server acts as a switch in selecting between the first and second identifiers for every content frame that is transmitted to the client.
  • the media server thus generates a sequence of identifiers for the particular client.
  • the media server can select the series of identifiers in a manner such that the sequence is unique to the particular client. The following example illustrates the point.
  • the media server is requested to transmit a video clip. For the purposes of illustration, we consider five image frames of this video clip.
  • the media server is requested to transport the video clip to three different clients.
  • the media server can select the sequence of identifiers to include the first, first, second, first and second (11212) identifiers to be associated with frames one through five, respectively.
  • the media server can select the sequence of identifiers to include the second, first, second, second and second (21222) identifiers to be associated with the frames one through five, respectively.
  • the media server can select the sequence of identifiers to include the second, second, first, second and first (22121) identifiers to be associated with the frames one through five, respectively.
  • the media server can thus generate a unique sequence of identifiers for every one of the three clients. It will be appreciated that for a Hollywood blockbuster that includes countless image and audio frames, the media server can generate unique sequences of identifiers for thousands or even millions of different clients. It will be appreciated that embodiments in which the media server generates the sequences only for a portion of the content frames of the content are possible. For example, the media server can generate the sequences for the first one hundred content frames that are multicast.
  • the media server can generate the sequences by associating the identifiers with every alternate content frame of the content instead of every content frame that is transported. It will be appreciated that for real word presentations with a high number of frames, the unique sequence can be repeated ad infinitum for a particular client. For example, if the video clip mentioned above has more than five frames, the sequence 11212 can be repeated ad infinitum for the first client.
  • the media server transmits the selected identifier and the content frame to the client machine.
  • the client machine decrypts the selected identifier and content frame and inserts the selected identifier into the content frame.
  • the client machine can perform the decryption operation in real time or at a later time by storing the encrypted identifier and content frame.
  • the processing overhead for the client machine is extremely low because the client machine effectively performs an exclusive OR (XOR) operation to insert the selected identifier into the content frame.
  • XOR exclusive OR
  • the fingerprinting technique described above can be referred to as being performed on the fly.
  • a concern regarding client side fingerprinting is that it allows the hacker to intercept the content before the fingerprinting operation takes place. The hacker can also disable the fingerprinting capabilities of the client machine altogether.
  • the second aspect of the present invention addresses this concern.
  • the author module removes a noise signal from a content frame such that the content frame is corrupted.
  • the noise signal can be a low bandwidth random noise signal.
  • the author module selects the noise signal such that the commercial value of the corrupt content frame is effectively destroyed.
  • the author module can also select the noise signal such that the amount of data that is removed from the content frame is small.
  • the author module adds the noise signal to a first identifier and to a second identifier.
  • the first and second identifiers can be watermarks.
  • the resultant signal of the addition of the noise signal and first identifier is referred to as the first watermark delta.
  • watermark delta is defined to include a watermark, the delta between an original content frame and a watermarked content frame, or the resultant signal of the addition of the noise signal and an identifier.
  • content is defined to include both original uncorrupt content and corrupt content to avoid undue repetition and complexity.
  • the resultant of the addition of the noise signal and the second identifier is referred to as the second watermark delta.
  • the author module encrypts the corrupt content frame and the first and second watermark deltas.
  • the author module transmits the encrypted corrupt content frame and the first and second watermark deltas to the media server.
  • the media server selects either the first watermark delta or the second watermark delta to associate with the corrupt content frame.
  • the media server transmits the corrupt content frame and the selected watermark delta to the client.
  • the client machine decrypts the corrupt content frame and the selected watermark delta and inserts the selected watermark delta into the corrupt content frame.
  • the second aspect of the present invention provides robust security from the hacker because the content frame itself is worthless without the insertion of the selected watermark delta.
  • the second aspect of the present invention can significantly lower the bandwidth requirement to perform client side fingerprinting because the removal of the noise signal from the content frame reduces the content frame size.
  • the noise signal and the watermarks can be selected intelligently such that they are very good candidates for data
  • Figure 1 illustrates an exemplary embodiment of the media network 100 to perform on the fly fingerprinting for media content.
  • the media network 100 is shown including the author module 110, the media server 120 and the client machine 130.
  • the media server 120 interfaces to the author module 110 and the client machine 130.
  • Each of these modules can be a separate processing device or hardware and/or software modules operating within the media network 100 to process instructions or code for performing the operations described herein.
  • the media network 100 is the Internet.
  • the Internet is a worldwide system of interconnected networks that runs the Internet Protocol (IP) to transfer data (e.g., packets).
  • IP Internet Protocol
  • the media network 100 can be other types of networks such as, for example, a token ring network, a local area network (LAN), a wide area network (WAN), or a MPEG-2 compatible broadcast network.
  • the media network 100 can also be implemented in a wired or wireless environment.
  • the author module 110 provides the media server 120 with an original uncorrupt content frame.
  • the author module 110 provides the media server 120 with a corrupt content frame.
  • the content can be multimedia content including audio, video and data.
  • the author module 110 also provides the media server 120 with first and second identifiers.
  • the author module 110 can be programmed to provide a varying number of different identifiers.
  • the identifiers can be watermarks. A watermark is a very small modification to the content frame that is not noticeable by the user. For example, a twenty byte watermark can be inserted into a four thousand byte image frame.
  • the watermarks can be audio, video or data watermarks.
  • the author module 110 provides the content and watermarks in an encrypted format.
  • the author module 110 also provides the keys to decrypt the content and watermarks.
  • the author module 110 may be a server executing on a general purpose computer.
  • the author module 110 can be compatible with the Moving Picture Experts Group 4 (MPEG-4) standard.
  • MPEG-4 Moving Picture Experts Group 4
  • the media server 120 can be a multimedia server.
  • the media server 120 receives the encrypted content and watermarks streams from the author module 110.
  • the media server 120 can multicast the content to various clients. For every client, the media server 120 selects either the first or second watermark to associate with every content frame of the content.
  • the media server 120 can randomly select the watermark by using a random number generator.
  • the first watermark can be selected if the random number generator generates an even number and the second watermark can be selected if the random number generator generates an odd number, or vice versa.
  • the series of watermarks thus generated is unique for every client.
  • the media server 120 thus serves as a toggle switch between the first and second watermarks.
  • the media server 120 transmits every content frame and the corresponding selected watermark to the client 130.
  • the media server 120 transmits selected content frames and corresponding selected watermarks to the client 130.
  • the media server 120 is an Internet server.
  • the media server can be a LAN, WAN, or a MPEG-2 compatible broadcast network.
  • the client machine 130 receives the content frame and the corresponding selected watermark from the media server 130.
  • the client machine 130 decrypts the content and the selected watermark.
  • the client machine 130 inserts the selected watermark into the original, uncorrupt content frame.
  • the client machine 130 inserts the selected watermark delta into the corrupt content.
  • the client machine 130 can be a set top box (STB), personal computer, workstation, laptop computer, or other like computing device.
  • the client machine 130 can also be an electronic portable device such as, for example, a personal data assistant (PDA), wireless telephone, or other like devices, which can communicate with the media server 120 over a wired or wireless medium.
  • PDA personal data assistant
  • the client machine 130 can include applications to view and display the content received from the media server 120.
  • the client machine 130 can include applications such as, for example, QuickTimeTM to play back video data.
  • the client machine 130 can be compatible with the Moving Pictures Expert Group 4 (MPEG-4) standard.
  • MPEG-4 Moving Pictures Expert Group 4
  • FIG. 2 illustrates one embodiment of the author module 110.
  • the author module 110 is shown including the content storage module 210, the first identifier generation module 220, the second identifier generation module 230, and the delta modules 225 and 235.
  • the author module 110 also includes the encryption modules 240, 260 and 280, the key management modules 250, 270 and 290, and the compression module 275.
  • the content storage module 210 is coupled to the encryption module 240 and the delta modules 225 and 235.
  • the first and second identifier generation modules 220 and 230 are coupled to the delta modules 225 and 235, respectively.
  • the delta modules 225 and 235 are coupled to the encryption modules 260 and 280, respectively.
  • the delta modules 225 and 235 are also coupled to the compression module 275.
  • the key management modules 250, 270 and 290 are coupled to the encryption modules 240, 260 and 280, respectively.
  • Each of these modules can be a separate processing device or hardware and/or software modules operating within the media network 100 to process instructions or code for performing the operations described herein.
  • the content storage module 210 includes the content to be multicast across the media network 100.
  • the content can be audio, video, data, or a combination of them.
  • the content storage module 210 can be a storage device such as, for example, a hard disk, compact disk (CD), digital video disk (DVD), random access memory (RAM), dynamic random access memory (DRAM), or other like memory devices to store content for distribution.
  • the first and second identifier generation modules 220 and 230 generate the first and second watermarks respectively.
  • the watermarks size is small as compared to the content frame size.
  • the video content frame may include four thousand bytes of information and the watermarks may include twenty bytes of information.
  • the delta module 225 watermarks the content stored in the content storage 210 with the first watermark and computes the delta between the watermarked content and the original content for every frame. The computed delta is referred to as the first watermark delta.
  • the delta module 235 watermarks the content stored in the content storage module 210 with the second watermark and computes the delta between the watermarked content and the original content for every frame.
  • the computed delta is referred to as the second watermark delta.
  • the run length encode module 275 performs compression, for example, run length encoding on the first and second watermark deltas.
  • the encryption modules 240, 260 and 280 encrypt the content frames and the first and second watermark deltas, respectively.
  • the encryption modules 240, 260 and 280 use the keys provided by the key management modules 250, 270, and 290, respectively.
  • the keys are transmitted to the client machine 130 in a predetermined manner.
  • the client machine 130 uses the keys to decrypt the content frames and the first and second watermark deltas.
  • the key management modules 240, 260 and 290 can include one or more storage devices to store a number of keys to encrypt the content frames and the first and second watermarks, respectively.
  • the author module streams the encrypted content, deltas
  • Figure 3 illustrates an alternate embodiment of the author module 110.
  • the author module 110 has all the components of the author module 110 of Figure 2 and three additional components including the noise removal module 315 and the noise addition modules 385 and 395.
  • the noise removal module 315 interfaces to the content storage module 210 and the encryption module 240.
  • the noise addition module 385 interfaces to the delta module 225 and the encryption module 260.
  • the noise addition module 395 interfaces to the delta module 235 and the encryption module 280.
  • the noise removal module 315 is coupled to the noise addition modules 385 and 395.
  • Each of these modules can be a separate processing device or hardware and/or software modules operating within the media network 100 to process instructions or code for performing the operations described herein.
  • the noise removal module 315 removes a noise signal from the original content frames stored in the content storage module 210.
  • the noise signal can be a low bandwidth or a low frequency noise signal.
  • the resultant content frames are referred to as the corrupted content frames.
  • the noise removal module 315 selects the noise signal such that it is a very good candidate for run length encoding and thus can be highly compressed during transmission. Also, the noise removal module 315 selects the noise signal such that the commercial value of the corrupted content is effectively destroyed.
  • the noise addition module 385 adds the noise signal to the first watermark delta.
  • the noise addition module 395 adds the noise signal to the second watermark delta.
  • the resultant signals following the noise addition modules 385 and 395 operations are also referred to as the first and second watermark deltas, respectively.
  • the encryption modules 240, 260 and 280 encrypt the corrupt content frames and the first and second watermark deltas, respectively.
  • the author module 110 streams the encrypted content, deltas and keys to the media server 120.
  • FIG. 4 illustrates an exemplary embodiment of the media server 120.
  • the media server 120 is shown including the content receiver module 440, first and second watermark delta receiver modules 460 and 480, switch module 410, and key receiver modules 450, 470 and 490.
  • the first and second watermark delta receiver modules 460 and 480 and the key receiver modules 470 and 490 are coupled to the switch module 410.
  • Each of these modules can be a separate processing device or hardware and/or software modules operating within the media network 100 to process instructions or code for performing the operations described herein.
  • the content receiver 440 receives the content frames from the author module 110.
  • the first and second watermark delta receiver modules 460 and 480 receive the first and second watermark deltas, respectively, from the author module 110.
  • the key receiver modules 450, 470 and 490 receive the decryption keys for the content frames and the first and second watermark deltas, respectively, from the author module 110.
  • the switch module 410 includes the random number generator to select either the first or second watermark delta to associate with every content frame.
  • the random number generator can randomly generate either 0 or 1. 0 can correspond to the first watermark and 1 can correspond to the second watermark, or vice versa.
  • the switch module 410 thus acts as a toggle switch between the first and second watermark deltas and selects a sequence of watermark deltas.
  • the switch module 410 selects the sequence in a manner that is unique to the particular client to whom the content is broadcast.
  • the switch module 410 can be implemented in hardware, software, or firmware.
  • the media server 120 streams the content, selected deltas and corresponding keys to the client machine 130.
  • FIG. 5 illustrated an exemplary embodiment of the client machine 130.
  • the client machine 130 is shown including the content receiver module 540, selected watermark delta receiver module 560, key management modules 550 and 570, decryption modules 520 and 530, the decompression module 575 and the combine module 580.
  • the content receiver module 540 and the key management module 550 are coupled to the decryption module 520.
  • the selected watermark delta receiver module 560 and the key management module 570 are coupled to the decryption module 530.
  • the decryption module 520 is coupled to the combine module 580.
  • the decompression module 575 interfaces to the decryption module 530 and the combine module 580.
  • the content receiver module 540 receives the content frames from the media server 120.
  • the selected watermark delta receiver module receives the watermark deltas selected by the switch module 410 of the media server 120.
  • the key management modules 550 and 570 receive the decryption keys for the content frames and the selected watermark deltas, respectively, from the media server 120.
  • the decryption modules 520 and 530 use the keys provided by the key management modules 520 and 530 to decrypt the content frames and the selected watermark delta, respectively.
  • the content frames include the original uncorrupt content frames.
  • the content frames includes the corrupt content frames and the selected watermark deltas include the low bandwidth noise signal added to the watermark deltas.
  • the decompression module 575 performs decompression, for example, run length decoding, on the selected watermark deltas.
  • the combine module 580 inserts the selected watermark deltas into the content frames.
  • the combine module operation can include an exclusive or (XOR) logic operation between the content frames and the selected watermark deltas.
  • the XOR logic operation can be performed for audio, video or data frames and deltas.
  • FIG. 6 illustrates exemplary embodiments of the data streams to perform client side fingerprinting (or watermarking) for multicast data.
  • Three data streams 610, 620 and 630 are shown.
  • the content data stream 610 includes the four content frames 650, 652, 654 and 656. In other embodiments, different numbers of content frames 650-656 are possible.
  • the first watermark delta stream 620 includes the four first watermark delta packets 660, 662, 664 and 666. Every first watermark delta packet 660-666 includes the same first watermark delta.
  • the second watermark delta stream 630 includes the four second-watermark delta packets 670, 672, 674 and 676. Every second watermark delta packet 670-676 includes the same second watermark delta.
  • Every content frame 650-656 is associated with the first and second watermark delta packets shown directly above it.
  • the content frame 650 is associated with the first watermark delta packet 660 and the second watermark delta packet 670.
  • the switch module 410 can selects either the first watermark delta packet 660 or the second watermark delta packet 670 to be associated with the content frame 650. If the switch module 410 selects the first watermark delta packet 660, for example, the client machine 130 inserts the watermark included in the first watermark delta packet 660 into the content frame 650.
  • the switch module 410 generates a sequence of the watermark delta packets by associating every content frame 650-656 with either the first watermark delta packet 660-666 or the second watermark delta packet 670- 676.
  • the .switch module 410 can generate a unique sequence for every client to whom the content stream is broadcast. The following example illustrates the point. Suppose the media server 130 is requested to multicast the content stream 610 to Tom, Bill and John.
  • the switch module 410 can generate a sequence for Tom including the first, second, first and second watermark delta packets.
  • the switch module 410 can generate a sequence for Bill including the second, first, second and first watermark delta packets.
  • the switch module 410 can generate a sequence for John including the second, second, first and second watermark delta packets.
  • the sequences uniquely identify the recipients of the content stream 610 as Tom, Bill or John.
  • the content frame stream 610 can be placed in the MPEG-4 standard compatible base layer.
  • the first watermark delta stream 620 can be placed in the MPEG-4 standard compatible enhancement layer one.
  • the second watermark delta stream 630 can be placed in the MPEG-4 standard compatible enhancement layer two.
  • Figure 7 illustrates one embodiment of a method to perform on the fly fingerprinting for media content.
  • the first and second watermark deltas are computed.
  • the first watermark delta represents the delta between the original uncorrupt content frame and the original uncorrupt content frame watermarked with the first watermark.
  • the second watermark delta represents the delta between the original uncorrupt content frame and the original uncorrupt content frame watermarked with the second watermark.
  • the first and second watermark deltas are compressed.
  • the first and second watermark deltas and the original uncorrupt content frame is encrypted.
  • either the first or second watermark delta is selected to be associated with the original uncorrupt content frame. This process of block 730 is repeated for every original uncorrupt content frame in a manner that generates a unique sequence of watermark deltas for a particular client.
  • the operations of the blocks 710, 715, 720 and 730 are performed on the server side by the author and server modules.
  • the watermark delta selected at block 730 and original uncorrupt content frame are transmitted to the client machine 130 as two different data streams.
  • the client machine 130 decrypts the selected watermark delta and the original uncorrupt content frame.
  • the client machine 130 decompresses the selected watermark delta.
  • the client machine inserts the selected watermark delta into the original uncorrupt content frame.
  • the process at block 760 can be performed through an exclusive OR (XOR) operation.
  • FIGs 8A and 8B illustrate an alternate embodiment of the method to perform on the fly fingerprinting for media content.
  • the method is illustrated by the way of an example for the original content frame data shown in block 810.
  • the low bandwidth noise signal shown in block 815 is removed from the original content frame data shown in block 810.
  • the corrupt content frame data that results is shown in block 820.
  • a first watermark is inserted into the original content frame data shown in block 810.
  • the resultant data is shown in block 825.
  • the delta between the data shown in block 825 and the data shown in block 810 is computed. This delta is referred to as the first watermark delta and is shown in block 830.
  • the low bandwidth noise signal shown in block 815 is added to the first watermark delta.
  • the resultant data is also referred to as the first watermark delta and is shown in block 835.
  • the first watermark delta shown in block 835 is compressed.
  • the result is shown in block 840.
  • the processes performed with respect to the first watermark are also performed with respect to a second watermark such that a run length encoded second watermark delta is generated (not shown).
  • Either the first or the second watermark delta is associated with every corrupt content frame of the content.
  • a sequence of watermark deltas is thus generated.
  • the sequence is generated in a manner that is unique for a particular client.
  • An exemplary sequence is shown in block 845 where 1 can represent the first watermark delta and 0 can represent the second watermark delta.
  • the selected watermark delta and the corrupt content frame data shown in block 820 is transmitted to the client machine.
  • the client machine decompresses the selected watermark delta.
  • block 850 shows the decompressed first watermark delta.
  • the client machine inserts the selected watermark delta into the corrupt content shown in block 820. If the selected watermark delta is the first watermark delta, the resultant data includes the original content shown in block 810 and the first watermark delta shown in block 830. The resultant data is shown in block 855.
  • Figure 9 illustrates a computer in block diagram form, which may be representative of any author module, media server or client machine.
  • the block diagram is a high level conceptual representation and may be implemented in a variety of ways and by various architectures.
  • the bus system 902 interconnects a Central Processing Unit (CPU) 904, a ROM 906, a RAM 908, storage 910, a display 920, an audio 922, a keyboard 924, a pointer 926, miscellaneous input/output (I/O) devices 928, and communications 930.
  • the bus system 902 may be for example, one or more of such buses as a system bus, a Peripheral Component Interconnect (PCI), an Advanced Graphics Port (AGP), a Small Computer System Interface (SCSI), and an Institute of Electrical and Electronics Engineers (IEEE) standard number 1394 (Fire Wire).
  • the CPU 904 may be a single, multiple, or even a distributed computing resource.
  • the ROM 906 may be any type of non-volatile memory that may be programmable such as mask programmable and flash.
  • the RAM 908 may be, for example, static, dynamic, synchronous, asynchronous, or any combination.
  • the storage 910 may be a Compact Disc (CD), a Digital Versatile Disk (DVD), a hard disk, an optical disk, a tape, a flash, a memory stick or a video recorder.
  • the display 920 might be, for example, a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), a projection system or a Television (TV).
  • the audio 922 may be a monophonic, a stereo, or a three dimensional sound card.
  • the keyboard 924 may be a keyboard, a musical keyboard, a keypad, or a series of switches.
  • the pointer 926 may be, for example, a mouse, a touch pad, a trackball, or a joystick.
  • the I/O device 928 might be a voice command input device, a thumbprint input device, a smart card slot, a Personal Computer Card (PC Card) interface, or a virtual reality accessory.
  • the I/O device 928 can be connected via an input /output port 929 to other devices or systems.
  • An example of a miscellaneous I/O device 928 would be a Musical Instrument Digital Interface (MIDI) card with the I/O port 929 connected to the musical instrument(s).
  • MIDI Musical Instrument Digital Interface
  • the communications device 930 might be, for example, an Ethernet adapter for a local area network (LAN) connection, a satellite connection, a set-top box adapter, a Digital Subscriber Line (xDSL) adapter, a wireless modem, a conventional telephone modem, a direct telephone connection, a Hybrid-Fiber Coax (HFC) connection, or a cable modem.
  • the external connection port 932 may provide for any interconnection, as needed, between a remote device and the bus system 902 through the communications device 330.
  • the communications device 930 might be an IEEE 802.3 (Ethernet) adapter that is connected via the connection port 932 to, for example, an external DSL modem.
  • a computer system may include some, all, more, or a rearrangement of components in the block diagram.
  • a thin client might consist of a wireless hand held device that lacks, for example, a traditional keyboard.
  • the methods as described above can be stored in memory of a computer system as a set of instructions to be executed.
  • the instructions to perform the methods as described above could alternatively be stored on other forms of computer-readable mediums, including magnetic and optical disks.
  • the method of the present invention can be stored on computer-readable mediums, such as magnetic disks or optical disks that are accessible via a disk drive (or computer- readable medium drive).

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

L'invention concerne un procédé et un système de filigranage au vol de contenu de données média (210). Dans ce système, un serveur auteur (110) transmet (275) un contenu de données (210), tel qu'un clip vidéo, à un client. Ce contenu de données (210) comprend une série d'images. Le serveur auteur (110) transmet également un filigrane (225, 235) au client pour chaque image. Un filigrane (225) est généré à partir d'un premier identificateur (220) et l'autre filigrane (235) est généré à partir d'un second identificateur (230). Le serveur auteur (110) génère une séquence de filigranes (225, 235) de façon unique pour chaque client. Cette séquence unique constitue l'empreinte digitale du contenu pour le client. Le client insère chaque filigrane (225, 235) de la séquence dans son image associée.
PCT/US2001/029031 2001-09-10 2001-09-10 Procede et systeme informatique de filigranage au vol de contenu de donnees media WO2003024020A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/US2001/029031 WO2003024020A1 (fr) 2001-09-10 2001-09-10 Procede et systeme informatique de filigranage au vol de contenu de donnees media

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/US2001/029031 WO2003024020A1 (fr) 2001-09-10 2001-09-10 Procede et systeme informatique de filigranage au vol de contenu de donnees media

Publications (1)

Publication Number Publication Date
WO2003024020A1 true WO2003024020A1 (fr) 2003-03-20

Family

ID=21742848

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2001/029031 WO2003024020A1 (fr) 2001-09-10 2001-09-10 Procede et systeme informatique de filigranage au vol de contenu de donnees media

Country Status (1)

Country Link
WO (1) WO2003024020A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2770695A4 (fr) * 2011-12-31 2014-08-27 Huawei Tech Co Ltd Procédé, serveur et terminal d'utilisateur permettant de fournir et d'acquérir un contenu multimédia
US8885818B2 (en) 2009-08-07 2014-11-11 Dolby International Ab Authentication of data streams

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5915027A (en) * 1996-11-05 1999-06-22 Nec Research Institute Digital watermarking
US6208745B1 (en) * 1997-12-30 2001-03-27 Sarnoff Corporation Method and apparatus for imbedding a watermark into a bitstream representation of a digital image sequence
US6209094B1 (en) * 1998-10-14 2001-03-27 Liquid Audio Inc. Robust watermark method and apparatus for digital signals

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5915027A (en) * 1996-11-05 1999-06-22 Nec Research Institute Digital watermarking
US6208745B1 (en) * 1997-12-30 2001-03-27 Sarnoff Corporation Method and apparatus for imbedding a watermark into a bitstream representation of a digital image sequence
US6209094B1 (en) * 1998-10-14 2001-03-27 Liquid Audio Inc. Robust watermark method and apparatus for digital signals

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8885818B2 (en) 2009-08-07 2014-11-11 Dolby International Ab Authentication of data streams
EP2770695A4 (fr) * 2011-12-31 2014-08-27 Huawei Tech Co Ltd Procédé, serveur et terminal d'utilisateur permettant de fournir et d'acquérir un contenu multimédia
EP2770695A1 (fr) * 2011-12-31 2014-08-27 Huawei Technologies Co., Ltd. Procédé, serveur et terminal d'utilisateur permettant de fournir et d'acquérir un contenu multimédia
US9633029B2 (en) 2011-12-31 2017-04-25 Huawei Technologies Co., Ltd. Method, server, and user terminal for providing and acquiring media content

Similar Documents

Publication Publication Date Title
Liu et al. Selective encryption of multimedia content in distribution networks: Challenges and new directions
US7958369B2 (en) Systems and methods for multiple level control of access of privileges to protected media content
KR100736080B1 (ko) 다 계층으로 구성된 멀티미디어 스트림의 저작권을 계층별로 관리하는 방법 및 장치
US6460137B1 (en) Encryption processing system
KR101026609B1 (ko) 스케일 가능한 미디어를 위한 스케일 가능하고 에러 탄력적인 drm을 위한 방법, 장치 및 키 관리 방법
US8781967B2 (en) Watermarking in an encrypted domain
US7773752B2 (en) Circuits, apparatus, methods and computer program products for providing conditional access and copy protection schemes for digital broadcast data
US20020018565A1 (en) Configurable encryption for access control of digital content
Zhu et al. Encryption and authentication for scalable multimedia: Current state of the art and challenges
US20050193206A1 (en) Digital watermarking system using a cryptographic key
US20090245509A1 (en) Transmitting apparatus, receiving apparatus, and data transmitting system
Chang et al. Layered access control schemes on watermarked scalable media
Sadourny et al. A proposal for supporting selective encryption in JPSEC
EP4027646A1 (fr) Lecteur multimédia distribué de cinéma numérique
Ilasariya et al. Image steganography using Blowfish algorithm and transmission via apache kafka
Obaida Combining audio samples and image frames for enhancing video security
EP1499061A1 (fr) Système et méthode de criptage video individuel
Aly et al. A light-weight encrypting for real time video transmission
WO2003024020A1 (fr) Procede et systeme informatique de filigranage au vol de contenu de donnees media
Varalakshmi et al. An enhanced encryption algorithm for video based on multiple Huffman tables
Wu et al. Run-time Performance Evaluation for a secure MPEG System Supporting Both Selective Watermarking and Encryption
JP2008546263A (ja) ファイル共有環境における知覚暗号のためのコンピュータ実装方法およびシステム
Ravishankar et al. Selective Encryption of the Audio Extracted from the Video Streamed Over the Content Delivery Network
EP1499062B1 (fr) Système et méthode de criptage video individuel
Hou et al. Integrating fingerprint with cryptosystem for internet‐based live pay‐TV system

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BY BZ CA CH CN CO CR CU CZ DE DM DZ EC EE ES FI GB GD GE GH HR HU ID IL IN IS JP KE KG KP KR LC LK LR LS LT LU LV MA MD MG MN MW MX MZ NO NZ PH PL PT RO SD SE SG SI SK SL TJ TM TR TT TZ UG US UZ VN YU ZA

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ UG ZW AM AZ BY KG KZ MD TJ TM AT BE CH CY DE DK ES FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP