Abstract:
Methods, devices, and computer program products facilitate the application of content usage rules based on watermarks that are embedded in a content. The required content screening operations, including watermark extraction and the application of content usage enforcement actions, are organized as separate tasks. These tasks can be conducted at different times by different devices. The watermark extraction results are stored in a secure location and can be accessed by other devices at different times. These operations can be conducted by one or more trusted devices that reside in a home network. The trustworthiness of the devices can be ascertained during a device authentication process. Further, certain device capabilities can be ascertained either as part of the device authentication process, or through additional communications between the devices.
Abstract:
Methods are provided for embedding auxiliary information in a host content signal which reduces the memory, bandwidth and computational complexity of the embedding and transmission systems, m one embodiment, a first reduced-scale signal is produced [figure 2, ref. Num "230"] which corresponds to the host content embedded with a first logical value [figure 2, ref. Num "220"] and producing a second reduced-scale signal [figure 2, ref. Num "235"] corresponding to the host content embedded with a second logical value [figure 2, ref. Num "225"]. A first set of segments from the first reduced-scale signal may be combined with a second set of segments from the second reduced-scale signal in a pre-defined manner to produce a composite embedded host content [figure 2, ref. Num "230"]. Thus the storage and transmission requirements of the watermarking system are reduced to having to deal with only the original content plus two reduced-scale signals.
Abstract:
Methods, apparatus, and systems for signal continuity assessment using embedded watermarks are provided. The embedded watermarks are recovered from the content and one or more attributes associated with the recovered watermarks are identified. A continuity of th content can then be assessed in accordance with the one or more attributes. The continuity assessment may be based on a variety of factors, including but not limited to a determined heartbeat of the recovered watermarks, a density, separation, location, or extent, of the recovered watermarks, as well as information associated with the watermarks, such as a stego key, channel bits, packet numbers, a fingerprint, or the like.
Abstract:
Systems and methods are provided for monitoring transmissions of media content (such as audio and audiovisual content) in order to obtain independent and objective data regarding the use of specific media content recordings or works within the transmissions. Processing and reporting of such data is provided in various ways to serve a variety of business needs. Methods for employing content identification technology to efficiently and automatically obtain reliable, accurate, and precise monitoring data are also disclosed. Various information products and services based on such monitoring systems are proposed.
Abstract:
Methods, devices, and computer program products facilitate the application of content usage rules based on watermarks that are embedded in a content. The required content screening operations, including watermark extraction and the application of content usage enforcement actions, are organized as separate tasks. These tasks can be conducted at different times by different devices. The watermark extraction results are stored in a secure location and can be accessed by other devices at different times. These operations can be conducted by one or more trusted devices that reside in a home network. The trustworthiness of the devices can be ascertained during a device authentication process. Further, certain device capabilities can be ascertained either as part of the device authentication process, or through additional communications between the devices.
Abstract:
Methods for adapting the operation of a system in response to the detection of embedded watermarks from a digital host content are provided. A digital host content is received and examined for the presence of watermarks. In response to the detection of embedded watermarks and in accordance with the value, type, density or spacing of the detected watermarks, one or more system reactions may take place. These reactions include conditionally allowing the system to resume its normal operation, prohibiting the system from resuming its normal operation, degrading the quality of the digital host content or changing the security status of the digital host content. In response to the extraction of weak watermarks that do not meet the desired system requirements, the extraction operation may be modified or extended to enable the detection of strong watermarks.
Abstract:
A system for using a watermark embedded in an audio signal to remotely control a device (290). Various devices such as toys, computers, and appliances, equipped with an appropriate detector (292), detect the hidden signals, which can trigger an action, or change a state of the device. The watermarks can be used with a "time gate" device, where detection of the watermark opens a time interval within which a user is allowed to perform an action, such as pressing a button, typing in an answer, turning a key in a lock, etc. To prevent fraudulent activation of a time gate, the time gate device can be configured to react only to watermarks coming from live broadcasts, and not from replays from tapes or other storage devices. In another feature, robustness of the watermark is improved, e.g., for acoustic propagation channels, by shifting the detection time of the watermark based on a measured bit error count of the watermark. Furthermore, the watermark may be inserted before the desired action along with corresponding offset information if the audio signal is not suitable at the time of the action.
Abstract:
Methods, apparatus, and systems for signal continuity assessment using embedded watermarks are provided. The embedded watermarks are recovered from the content and one or more attributes associated with the recovered watermarks are identified. A continuity of th content can then be assessed in accordance with the one or more attributes. The continuity assessment may be based on a variety of factors, including but not limited to a determined heartbeat of the recovered watermarks, a density, separation, location, or extent, of the recovered watermarks, as well as information associated with the watermarks, such as a stego key, channel bits, packet numbers, a fingerprint, or the like.
Abstract:
Methods are provided for embedding auxiliary information in a host content signal which reduce the memory, bandwidth and computational complexity of the embedding and transmission systems. In one embodiment, a first reduced-scale signal is produced which corresponds to the host content embedded with a first logical value and producing a second reduced-scale signal corresponding to the host content embedded with a second logical value. A first set of segments from the first reduced-scale signal may be combined with a second set of segments from the second reduced-scale signal in a pre-defined manner to produce a composite embedded host content. Thus the storage and transmission requirements of the watermarking system are reduced to having to deal with only the original content plus two reduced-scale signals.
Abstract:
Systems and methods are provided for monitoring transmissions of media content (such as audio and audiovisual content) in order to obtain independent and objective data regarding the use of specific media content recordings or works within the transmissions. Processing and reporting of such data is provided in various ways to serve a variety of business needs. Methods for employing content identification technology to efficiently and automatically obtain reliable, accurate, and precise monitoring data are also disclosed. Various information products and services based on such monitoring systems are proposed.