The present invention relates to methods and systems for the protection of digital content through the use of watermark techniques, and more particularly, for encoding, detecting and verifying watermarks that include biometric information.
Watermarks are embedded signatures in content (e.g., video and audio content) to verify the source of the material. This enables the owners and distributors of content to control and protect their copyrights and other ownership interests, and to control the distribution of the content. The goal of a digital watermark system is to embed an information signal or signals in the content such that there are few or no artifacts in the underlying content signal, while maximizing the encoding level and location sensitivity such that any attempt to remove the watermark will cause damage to the content signal. Generally, a digital watermark is difficult to remove because it shares many of the characteristics of random or pseudo-random noise within the digital content.
Watermarked digital content is typically embedded with a payload of information within the watermark, such as the names of the content author and content distributor. When the watermarked content is accessed by a device that has a watermark detection capability, such as a DVD player, a search for the watermark and evaluation of the watermark payload information is typically performed utilizing a watermark detection technique that is associated with that type of watermark. If the proper watermark is found, the device will permit play-out of the content. If the watermark is not detected or a corrupted watermark is detected, however, the device will not permit access to the watermarked content. Thus, the illegal reproduction and distribution of content will be prohibited.
The widespread use of the Internet has provided an additional outlet for the purchasing and downloading of multimedia content. However, peer-to-peer file sharing causes additional problems, such as content piracy. Digital watermarking and encryption techniques have been used to protect content and reduce piracy attributed to peer-to-peer file sharing. For example, if a first user legally, obtains an encrypted file, the user has the key for decoding the content. To prevent the first user plans from sharing the content and associated key with a second user, the content is typically encoded with additional information, such as attributes of the system used by the first user, such as a serial number uniquely identifying the processor or operating system (or both). Unfortunately, however, the first user can no longer access the content on another system.
A need therefore exists for a method and apparatus for limiting access to content to an authorized user on a number of systems. A further need exists for a digital watermarking technique that allows an authorized user to be uniquely identified.
Generally, a method and apparatus are that restrict access to digital content to an authorized user on one or more systems using biometric watermarks. The disclosed biometric watermarking techniques allow an authorized user to be uniquely identified. Access to digital content is restricted to digital content in accordance with the present invention by embedding a biometric watermark, such as a biometric image, in the content. Thereafter, a user can only access the content if a biometric sample of the user matches the embedded biometric watermark. In one variation, the user can only access the content if the biometric sample is a live biometric sample.
The embedded biometric watermark optionally includes information describing a system employed by the user to obtain the content. The user can optionally be permitted to access the content, without a biometric evaluation, if the content is on a system that has been previously authorized for the user using a biometric evaluation.
A more complete understanding of the present invention, as well as further features and advantages of the present invention, will be obtained by reference to the following detailed description and drawings.
According to one aspect of the present invention, access to multimedia content is restricted using biometric watermarks. For example, when a first user legally obtains a copy of the content from a service provider, a biometric associated with the first user is embedded into the content. The biometric watermark may include, for example, a finger print, speech pattern, iris pattern, or facial image. Since biometrics taken from the same user at different times vary and their recognition is not guaranteed, multiple instances of the biometric can be taken and embedded into the content.
In one exemplary implementation, when a user obtains content, a biometric identifier is obtained from the user, as well as one or more parameters identifying a system of the user. Each time the biometric is embedded into the content, the system information can also be embedded. Thereafter, whenever the user attempts to access the content, the user is requested to provide a biometric identifier. The provided biometric information is compared to the biometric information embedded in the content. If the provided biometric information matches the embedded biometric information, the user will be allowed to access the content. In this manner, the authorized user cannot share the content with another user, since the second user generally would not have the biometric or system information of the authorized user.
According to a further aspect of the present invention, the user can transfer the downloaded content to a different system, by satisfying a biometric evaluation on the new machine. In one variation of the invention, once the content is authorized for the user on a given system, further biometric comparisons can optionally be suspended whenever the same content is played on the same system. The present invention provides a mechanism for identifying the user that has been the source of pirated content.
In yet another variation, the authorized user can be required to provide a “live” biometric. In other words, the present invention can ensure that the authorized user is providing a live biometric and not a biometric that has been previously stored. For a discussion of suitable techniques for detecting if a biometric is live, see, for example, R. Derakhshani et al. “Determination of Vitality from a Non-Invasive Biomedical Measurement for use in Fingerprint Scanners,” Pattern Recognition, vol. 17, no. 2, (2003), or S. A. C. Schuckers, “Spoofing and Anti-Spoofing Measures,” http://www.citer.wvu.edu/members/publications/files/15-SSchuckers-Elsevior02.pdf (Dec. 20, 2002) (and references cited therein), each incorporated by reference herein.
If, however, it is determined during step 420 that the content has not previously been authorized on the current system, then a live biometric is obtained from the user during step 440. A further test is performed during step 450 to determine if the live biometric matches the biometric that was embedded in the content as a biometric watermark. If it is determined during step 450 that the live biometric matches the biometric that was embedded in the content as a biometric watermark, then the user is allowed to access the content during step 460. In addition, the system parameters for the new system can optionally be embedded in a new biometric watermark in the content. If, however, it is determined during step 330 that the live biometric does not match the biometric that was embedded in the content as a biometric watermark, then the user is not allowed to access the content and program control terminates during step 470.
It is to be understood that the embodiments and variations shown and described herein are merely illustrative of the principles of this invention and that various modifications may be implemented by those skilled in the art without departing from the scope and spirit of the invention.
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/IB2005/050192 | 1/17/2005 | WO | 00 | 7/14/2006 |
Number | Date | Country | |
---|---|---|---|
60537807 | Jan 2004 | US |