The invention relates to a method of extracting a watermark which is embedded in an information signal, representing media content.
The invention further relates to a method of monitoring distribution of media content, the monitoring on basis of a watermark.
The invention further relates to a monitoring station for monitoring distribution of media content, the monitoring on basis of a watermark.
The invention further relates to a monitoring system for monitoring distribution of media content, the monitoring on basis of a watermark, comprising the monitoring station and a storage.
Watermarking is a technique for imperceptibly hiding auxiliary data in a multimedia signal, such as still images, audio and video. For a number of applications the security of a watermarking system is of prime importance. Examples are copy protection for DVD-Video and copy protection for music on portable devices. The ease (or difficulty) by which an unauthorized user is able to read, write or modify the watermark channel defines the security of a watermarking method. In order to prevent or at least limit the possibility for security breaches, the watermark, carrying some information, is preferably embedded with a very low signal-to-noise-ratio (SNR). This helps in reducing the risk of watermark estimation attacks. See the article “Removing Spatial Spread-Spectrum Watermarks by non-linear Filtering”, by G. Langelaar et al., in Proceedings of European Signal Processing Conference (EUSIPCO-98), Rhodes, September 1998.
Besides that, many watermarking methods employ secret pseudo-random sequences, usually dependent on some secret key as an input parameter for a pseudo-random noise generator. Without knowledge of the secret key it is difficult to establish the presence of a watermark channel. It is recognized in the watermarking community that a watermarking method can be made more secure by having this secret noise sequence not fixed, but dependent on the content that is being watermarked. This increases the difficulty of applying a successful hack of the watermark of one particular media object to other media objects, e.g. a song to other songs. See for instance the article “Watermark Copy Attack”, by M. Kutter et al. in SPIE Proceedings 3971 on Security and Watermarking of Multimedia Content II, San Jose, January 2000.
However, the disadvantage of this latter approach is the increased difficulty and complexity to detect watermarks and reliably read the information carried with the watermark.
It is an object of the invention to provide a method of extracting a watermark, from a watermark channel, in a relatively easy way.
This object of the invention is achieved in that the method comprises:
In an embodiment of the method of extracting a watermark according to the invention, the supporting signal comprises a part of an original signal on which the information signal is based. The advantage of this embodiment is that it enables a robust watermark channel. By using the original signal on which the information signal is based the detection of the watermark is relatively easy. Typically a subtraction of a resynchronized version of the original signal from the information signal is performed to find an estimate of the embedded watermark.
In another embodiment of the method of extracting a watermark according to the invention, the supporting signal is derived from the original signal on which the information signal is based. For example the average luminance values of the pixels per frame of a video sequence, in the case that the information signal represents a video sequence as described in European patent application number 01202460.0. The advantage of this embodiment is data reduction, because a relatively little amount of data is required to store and transmit average luminance values. Hence, the amount of data to be returned as a result of a query on the basis of the perceptual features, is limited.
In another embodiment of the method of extracting a watermark according to the invention, the supporting signal comprises watermark parameters which are appropriate for the information signal. With watermark parameters is meant e.g. pseudo-random sequences and secret keys. As described above, such content based watermarking results in a more secure watermark channel.
In another embodiment of the method of extracting a watermark according to the invention, the watermark is representative for an originator of an original signal on which the information signal is based. In this way it is possible to discover the originator of the original signal. This is especially of interest in the case of monitoring distribution of media content. Other type of information for that purpose is e.g. the purchaser or owner of a copy of the original signal.
It is a further object of the invention to provide a method of monitoring distribution of media content, of the kind described in the opening paragraph wherein the watermark is extracted from a watermark channel, in a relatively easy way.
This object of the invention is achieved in that the method of monitoring comprises:
It is a further object of the invention to provide a monitoring station of the kind described in the opening paragraph, being arranged to extract the watermark from a watermark channel, in a relatively easy way.
This object of the invention is achieved in that the monitoring station comprises:
It is a further object of the invention to provide a monitoring system of the kind described in the opening paragraph being arranged to extract the watermark from a watermark channel, in a relatively easy way.
This object of the invention is achieved in that the monitoring system comprises:
Modifications of the method of extracting a watermark and variations thereof may correspond to modifications and variations thereof of the method of, the station for and system for monitoring distribution of media content, described.
These and other aspects of the method of extracting a watermark and of the method of, the station for and system for monitoring distribution of media content according to the invention will become apparent from and will be elucidated with respect to the implementations and embodiments described hereinafter and with reference to the accompanying drawings, wherein:
Corresponding reference numerals have same or like meaning in all of the Figs.
In order to enforce this private-use rule, company E operates a web spider service, i.e. system for monitoring distribution of media content. The web spider service continuously scans the Internet 106 for copies of S that violate the private-use rule. Typically, if multiple copies of a song S′ are found on a file-sharing network, each copy identifying E as the copyright owner and P as the original buyer, person P will be informed that he/she is in violation, and appropriate action will be undertaken.
The system 100 for monitoring distribution of media content may comprise a number of stations 200 for monitoring distribution of media content and a storage. In
In
What has been presented above is a system for monitoring distribution of media content based on informed watermark detection in a connected environment. In a non-connected environment a similar monitoring is also required. Producers or broadcasters of audiovisual content, such as movie-companies, television broadcasters or advertisers, are often interested in having knowledge as to whether, where and when their work is distributed. Also the duration of the broadcasts might be of interest. It will be clear that a system according to the invention can also be applied for “broadcast monitoring”.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be constructed as limiting the claim. The word ‘comprising’ does not exclude the presence of elements or steps not listed in a claim. The word “a” or “an” preceding an element does not exclude the presence of a plurality of such elements. The invention can be implemented by means of hardware comprising several distinct elements and by means of a suitable programmed computer. In the unit claims enumerating several means, several of these means can be embodied by one and the same item of hardware.
Number | Date | Country | Kind |
---|---|---|---|
02077021 | May 2002 | EP | regional |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/IB03/01850 | 4/25/2003 | WO | 00 | 11/17/2004 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO03/098936 | 11/27/2003 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
6430301 | Petrovic | Aug 2002 | B1 |
6647128 | Rhoads | Nov 2003 | B1 |
6771794 | Osaka | Aug 2004 | B1 |
7010144 | Davis et al. | Mar 2006 | B1 |
7363278 | Schmelzer et al. | Apr 2008 | B2 |
7519819 | Bradley et al. | Apr 2009 | B2 |
7593576 | Meyer et al. | Sep 2009 | B2 |
20020126872 | Brunk et al. | Sep 2002 | A1 |
20020168082 | Razdan | Nov 2002 | A1 |
20030026422 | Gerheim et al. | Feb 2003 | A1 |
20030088774 | Hars | May 2003 | A1 |
Number | Date | Country |
---|---|---|
11-288217 | Oct 1999 | JP |
2000-215238 | Aug 2000 | JP |
0237331 | May 2002 | WO |
WO02065782 | Aug 2002 | WO |
WO03096337 | Nov 2003 | WO |
Number | Date | Country | |
---|---|---|---|
20060117180 A1 | Jun 2006 | US |