The invention relates to the distribution of music and other material in digital form, with particular reference to downloads.
Music distribution is now increasingly by streaming or download, but often at less-than-CD quality using a lossy compression system such as MP3. The music may be stored on the purchaser's computer or on portable playback devices as files in a lossy format, or as binary PCM (Pulse Code Modulation), usually encapsulated in a file format such as as WAV or AIFF, or in a losslessly compressed format such as FLAC.
A pure PCM file contains no information, or “metadata”, other than the digital audio signal itself. Encapsulation as WAV or AIFF provides the possibility of identification in a header at the start of the file, e.g. as an Ogg, ID3 or UITS header, but this is easily stripped off by a technically-aware person's software tool without any modification to the audio content, which can then be passed on to another person, possibly in breach of copyright, in which case the rights owner has no means to trace the source of the unauthorised copy.
Various schemes for “Digital Rights Management” have been proposed to make it technically less easy for a purchaser of a song to pass a copy to another person, however these schemes have tended to inconvenience or restrict the legitimate user, and have not gained widespread market acceptance. Other schemes have been proposed to make it possible for a rights holder to identify the original purchaser of a copy, however these either degrade the audio content through watermarking or rely on file headers which can be removed by a technically-aware person.
More fundamentally, a culture of obtaining music without payment has developed in some quarters, and it can be difficult to persuade people to pay for something that they have previously had for free. However, the culture of free music is generally in the context of MP3 quality. An opportunity exists to build a market for better-than-MP3 sound quality, especially if the purchaser of the better version can be given assurance that it really is better, even though he or she may or may not be able to reliably appreciate the difference on casual listening or on inferior reproduction equipment.
These ideas have been explored in the prior art, wherein “superdistribution” refers to the provision of a song file that can be freely disseminated on a peer-to-peer basis, but will not provide full quality reproduction until a suitable key, which may be unique to each user, has been acquired. “Perceptual encryption” is the process of deliberately degrading a song in a manner that is reversible or substantially reversible by a person in possession of a suitable decryption key.
Thus a free but lower quality version of a song may be regarded as a highly effective advertisement, familiarising the listener with the musical intent and giving him a clearer basis to spend money on a higher quality version. However prior art methods (described for example in “Device and method for producing an encoded audio and/or video data stream” by E. Allemanche et al., U.S. Pat. No. 7,308,099, December 2007) have tended to rely on specific container file formats rather than allowing dissemination as an ordinary PCM file, and some prior proposals have also not had the ability to recover a truly lossless version of the original signal even when the appropriate key has been acquired.
The methods of the current invention can support several commercial models for distributing audio in which the delivered file can convey a compatible but reduced quality but whose full quality can be decoded and confirmed by methods which combine Song and Device and User keys. The distribution methods may be: “Informative” where the decoder confirms that a legitimate stream is decoded by a legitimate decoder; “Restrictive” where the transaction server can limit the full quality playback to combinations of Users and Devices; “Trace” wherein songs contain embedded information which may displayed in whole or in part during playback or forensically, the removal of which prevents subsequent lossless recovery; “Positive” where the previous methods can provide an enhanced yet restricted distribution wherein the server permits copies to be gifted from one User to another.
The invention provides a method of creating a streamable PCM signal allowing conditional access to a lossless presentation of an original PCM signal, where the streamable PCM signal has the same sample rate and bit-depth as the original PCM signal. Thus, the streamable PCM signal can be played on the existing ‘infrastructure’ of players including personal players, many of which are restricted to a sample rate of 44.1 khz or 48 kHz, and to a bit-depth of 16 bits or 24 bits. The invention allows the quality of the playback on such existing devices to be adjusted over a range from, ideally, an imperceptible impairment relative to the lossless presentation to a distinctly audible impairment, whilst allowing conditional access to a lossless presentation of an original PCM signal with the suitable equipment.
In a first aspect, the method comprises the steps of:
Necessarily a lossless watermarking method reduces the quality of playback on existing devices but the intention is to choose a watermarking method that imposes minimal quality reduction so that the final quality can be controlled over a wide range from an imperceptible impairment to a significant impairment, by adjusting the severity of the degradation introduced by the step of reversibly degrading.
The additional information may take several forms and may include: a song key as described below, verification information, a digital signature, transaction tracing information, or copyright or ownership information such as in an “ISRC” code, or a combination of these.
The step of inserting the token will normally be performed periodically so that the information contained therein will be available even if the stream is not played from the beginning; insertion at regular intervals generally being helpful to a decoder.
The degrading and embedding steps may be performed in either order or conceptually within a single step.
Preferably, the degradation information comprises degradation instructions, which allow control over the form and degree of degradation.
In some preferred embodiments, the method further comprises the step of receiving a song key, wherein at least one of the reversibly degrading step and the embedding step is performed in dependence on the song key, and wherein the token is created in dependence on the song key.
In such embodiments, the method may further comprise the steps of:
According to the method of the first aspect, a mutable digital representation of the song or of part of the song, for example a digital copy, is processed as specified by the steps. If it is a copy, it need not be a copy of the whole song, since it would be normal to process a song in segments stored temporarily in the memory of a computer. The representation is deliberately degraded in a reversible manner, for example by applying a time-varying gain as described in published International patent application WO2013/061062, incorporated herein by reference, so as to provide a lower sound quality when the song is played by an unaware player as if it were a standard PCM signal.
The degradation is not arbitrary but is controlled by degradation information which has two purposes. The first purpose is to allow the degradation to be reversed on playback; the second is to allow the degradation to be selected on artistic, aesthetic or commercial grounds by the artist or his representative and to be consistent for all account-holders who may purchase the song.
To facilitate the first purpose, the degradation information is embedded into the representation using a method of lossless watermarking, also known as lossless buried data, for example as described in published International patent application WO2013/061062. To facilitate the second purpose, the method may be enhanced by extending the step of receiving to include receiving degradation information so that the artist can specify the degree of degradation he or she desires.
A playback device may retrieve the degradation information by decoding the lossless watermark and thus reverse the degradation. However, in order that the reversal may be conditional on appropriate authorisation, the reversible degradation may be performed in dependence on a song key so that only a player that has been provided with the song key will be able to reverse the degradation. Alternatively, the embedding step may be performed in dependence on the song key so that only players with the song key will be able to retrieve the degradation instructions that are contained within the watermark. For still greater security, both the reversible degradation and the embedding may be performed in dependence on the song key.
Here the song key is a secret key unique to the song, while the user key is unique to an account-holder who is registered with a central repository which manages registration and other transactions, typically via the Internet. Conceptually, the method is performed independently for each transaction, though in practice some steps may be common to all transactions and thereby be performed just once per song.
It is assumed that the account holder will possess one or more players, each of which is able to decrypt an item that has been encrypted with a user key specific to the account holder, and also possibly with shared user keys or a universal user key that is common to everyone. The method encrypts the song key with an appropriate user key so that only players that know that user key may retrieve the song key, which is generally common between performances of the method on a given song. This feature allows the steps of reversibly degrading and embedding to be performed once and the result stored in a server, only the remaining steps being repeated for each transaction relating to a given song.
The resulting user-encrypted song key (UESK) is then optionally combined with other items to form a token that is periodically inserted into the degraded representation to furnish the streamable PCM signal. Because the insertion is periodic, a player that does not receive the beginning of a streamed song is nevertheless able to retrieve the UESK and thus, if it knows the correct user key, decrypt the song key and play the remainder of the song with the degradation reversed.
If no other item is required, the token may consist of the UESK alone. Conversely, in order to address the technical requirements needed to support a range of business models known as Positive Rights Management, the UESK may consist of the Song Key encrypted with a combination of the User Key and other relevant information such as User Identifier. The User Identifier or other information may be also be placed in the stream in unencrypted form so that it may be retrieved without keys; moreover said information cannot be removed from the stream without preventing a standard player from decrypting the Song Key. Another possibility is a User Key which describes a set of two or more Users, for example where a family may reasonably share playback devices, while a yet further possibility is a generic key which allows unrestricted decoding of the song at high quality.
In general, degradation will be governed by instructions or parameters, which specify such things as the amount or quality of the modification introduced and are therefore comprised within the degradation information. There will also advantageously be a pseudorandom element to the degradation, for which a source of pseudorandom numbers, synchronised between an encoder and a decoder, is required. If a cryptographically secure random number generator is used, keyed by the song key, the degradation will thereby depend on the song key independently of whether parameters are encrypted.
According to the precise nature of the lossless watermarking process used, it may be convenient to encrypt degradation information either before or after the embedding has taken place.
In the case of a song streamed to a player but not from the beginning, it may be difficult for a decoder to know how to start. It is thus helpful to be able to look for regular patterns in the stream, and to this end the method preferably extracts signal information from a set of predetermined bit positions within the representation so that the token containing the UESK and possibly also an identifiable synchronisation pattern can be periodically inserted into the said predetermined bit positions. The signal information that was extracted from those bit positions is then embedded into the remainder of the representation; that is excluding the bit positions in the predetermined set.
In order that the listener may receive confirmation that the degradation has indeed been reversed losslessly, the method is preferably enhanced to comprise the further step of embedding verification information into the degraded representation and thereby also into the streamable PCM signal. For the purpose of verification the signals will generally be considered as consisting of segments and verification information computed for each segment in dependence on the segment of the original PCM signal. To discourage forgery, the verification information preferably comprises a digital signature.
To assist some models of rights management, it is sometimes desirable for the song to contain tracing information, which may relate to the account holder or to a transaction. To this end, the method may be enhanced to comprise the further step of receiving the tracing information relating to the user or transaction, this tracing information then being combined with the UESK and possibly other items to form the token. Since an attacker could then attempt to remove the tracing information by altering the token, preferably the verification information should also be computed in dependence on the token, so that the tracing information cannot easily be tampered with without causing the verification to fail.
In some embodiments, the steps of the method are all performed within a server and the streamable PCM signal then streamed directly to a player via the Internet, possibly in a losslessly compressed format, either for simultaneous playback or for later playback via local storage. In other embodiments, the account holder has a computer that acts as a client and is able to receive the degraded representation and the token separately, and then periodically insert the token into predetermined bit positions within the representation, a process we shall call “sprinkling”. Thus the method is enhanced to comprise the further step of transmitting the degraded representation and the token to a client prior to the step of inserting. This enhancement potentially transfers some computational load or temporary storage from the server to the client, since the degraded representation prior to transmission can be identical for all instances of the same song, and creation of the token can be a lightweight operation.
To ensure the correct conditional access, a mechanism is needed to ensure that each playback device contains an appropriate set of user keys, where such are required. To this end, the method may enhanced to comprise the further steps of:
The second of these steps, that of encrypting the user key, furnishes a device-encrypted user key (DEUK). These further steps would normally be performed by a server, which will have knowledge of the user key that is relevant to each transaction. The user key will be used by authorised devices, but will be stored securely within those devices and known only to the devices and secure servers. Thus, communication of the user key requires encryption thereof and normally this will be done with a unique device key that is specific to a single playback device.
In some embodiments, a device may have both a unique identifier and a device key possibly allocated at manufacture, the identifier being public and linked to the device key in a secure database held by the server. In this case the step of establishing a secret device key will preferably comprise the steps of:
This enhancement to the method supports embodiments in which only unidirectional communication is possible from server to device, as is the case for example when the communication is via portable storage or player and the decoder device is not connected to the Internet, such as a dock. In this case the device identifier may be communicated manually using an Internet application.
Once the server has produced the device-encrypted user key, this may be communicated to a playback device by any available method. However for user-convenience, the method is preferably enhanced so that the step of communicating the device-encrypted user key comprises the steps of:
Thus, the step of communicating the device-encrypted user key appears to the user as if a special song has been streamed.
In a second aspect, the method of the present invention provides a streamable PCM signal allowing conditional access to a lossless presentation of an original PCM signal and to additional information, the streamable PCM signal having the same sample rate and bit-depth as the original PCM signal and providing a controlled audio quality when played on standard players, wherein the method comprises the steps of:
In this way, degradation information and additional information is losslessly buried in the representation and conditional access is provided to the lossless presentation of an original PCM signal and to the additional information.
The additional information may take many forms, including one or more of verification information, digital signature, received tracing information relating to a user or transaction, file source or copyright declaration.
In a third aspect, a streamable PCM signal is produced by any of the aformementioned methods
In a fourth aspect, a non-transitory computer readable medium comprises a streamable PCM signal produced by any of the aformementioned methods.
In a fifth aspect, a computer program product comprises executable instructions which, when executed by one or more processors of one or more electronic devices, cause said one or more electronic devices to perform any of the aformementioned methods
In a sixth aspect, an electronic device comprising:
In a seventh aspect, a system comprises two or more electronic device, wherein each device comprises:
A will be appreciated, the invention provides methods and devices whereby a representation of an original PCM signal may be reversibly degraded and information embedded losslessly to produce a streamable PCM signal, which provides a controlled audio quality when played on standard players and conditional access to a lossless presentation of the original PCM signal. Using such techniques allows control over the level of degradation of the signal and also flexibility in the type information of information embedded.
Examples of the present invention will be described in detail with reference to the accompanying drawings, in which:
Central to the invention is the idea that a signal may be modified reversibly, so that the original signal may be recovered given knowledge of the modification process.
In the case of an audio signal, one such reversible modification method is to adjust the gain in a time-varying manner, the original signal then being recovered by applying the inverse gain. In other words, the audio signal may be multiplied by a constant plus another signal which may be chosen to have noiselike qualities, for example pink noise which will result in a modification akin to the addition of “modulation noise”, an artefact well known to the users of analogue magnetic recording tape.
Other modification methods include use of time-varying filters, the introduction of reversible nonlinearities and the introduction of pre- and/or post-echoes. However, a number of modification algorithms that might otherwise seem attractive are excluded by the desire to enable lossless bit-for-bit reconstruction of an original digital signal.
A simple unvarying signal modification, such as a filter or a nonlinear process, will not provide security against an unlicensed person who has only to determine the process or a small number of configuration parameters for the process in order to reverse the degradation and reconstruct an entire song. Hence a time-varying modification that depends on a stream of parameters, co-temporal with the signal, is preferred. The unlicensed person must then repeat the determination separately for each segment of the stream on order to reverse the modification; moreover the determination is more difficult since it has to be based on analysis of a shorter segment of the signal.
Thus a time-varying reversible modification allows the song to be distributed freely in a degraded form, while licensed listeners may be provided with a file containing instructions from which their playback devices are able to regenerate the stream of modification parameters and so are able to reverse the modification and thereby reconstruct the undegraded version of the song. The instructions may include seeds from which streams of pseudorandom numbers may be generated in a cryptographically secure manner, thus allowing a rich complexity of modifications to be described in a compact manner.
As a “key” to the song, the file of modification parameters can be much smaller than the song itself, but may still be inconveniently large. Moreover, a requirement to keep together two files, the song file and the parameter file, is in practice irksome to the user. This problem can be partially solved by burying the stream of modification parameters within the song file. In the context that lossless reconstruction is required, the burying must be done losslessly, using a method of lossless buried data, also known as lossless watermarking or invertible watermarking. In this document, references to “watermarking” and “watermarked audio” refer to invertible watermarking.
One method of losslessly burying data was described in published UK patent application GB2495918 and in published International patent application WO2013/061062, the content of which is incorporated by reference. Another embodiment of the same method will be discussed later with reference to
Another method is apparently disclosed in “Watermarking-Based Digital Audio Data Authentication” by Martin Steinbach and Janna Dittman, EURASIP Journal on Applied Signal Processing 2003:10, pp. 1001-1015 with particular reference to Section 3: “Invertible Audio Watermarking”. However, it appears unlikely that the algorithm described therein would provide the imperceptible impairment that is required, except in special situations. In several of the examples given in table 4 and table 5, Steinbach and Dittman claim that a bit compression algorithm was able to bury sufficient data by considering only the least significant bit, identified as bit #0. However, it is well known that dither should be used to produce a high quality recording, in which case the least significant bit has little or no redundancy to support the lossless burying of data. Conversely, in other examples where it is found necessary to operate on bit #8, it is inevitable that bit compression will produce an audible result that is at best hissy and at worst gritty and unpleasant. The bit-compression algorithm is not disclosed.
Time-varying modification parameters can be generated by suitable processing of a stream of pseudorandom numbers. A pair of pseudorandom number generators, one in an encoder and one in the corresponding decoder, identical and seeded identically, can be used to provide the encoder and decoder with identical streams of modification parameters and thus obviate the need to communicate a stream of parameters, whether buried or carried separately. In a possible embodiment, a seed and other configuration variables are stored at the beginning of the degraded file as a short preamble to the audio information, encrypted with a “song key” so that only licensed decoders may recover the seed and configuration variables and hence generate the entire stream of modification parameters.
However, such a preamble does not allow the configuration parameters to be adjusted partway through a song. Moreover, a decoder may not be able to access the beginning of an encoded stream if the decoder is a contained in a “dock” receiving a PCM stream from a personal player such as an iPod, and the user has started playback partway through the original song. To support this mode of operation, the information required to start lossless reconstruction must be repeated frequently through the stream, for example once per second. To provide a fast response for the user, a decoder can route the undecoded audio signal to its output to provide a degraded output until full reconstruction can be established.
We now describe how the invention may be used in rights management systems, some of which have features in common with those described in “Analysis And Enhancement of Apple's Fairplay Digital Rights Management” by R. Venkataramu, MSc thesis, San Jose State University, May 2007, accessible as http://www.cs.sjsu.edu/faculty/stamp/students/RamyaVenkataramu_CS298Repor t.pdf. In the following, the term “user” refers to the “account holder” or to some other person who is authorised to play a song at high quality.
The user may register one or more playback devices 3 by typing a device identifier unique to each device into a computer 2 which connects to the server 1 via the Internet. Each playback device contains a “device key” 4 which is an encryption key stored in secure memory in the device and otherwise secret except for an entry in a secure look-up table 12 in the server. On receiving the device identifier, the server retrieves a copy 4′ of device key from the look-up table and uses it to encrypt the user key, to furnish a Device Encrypted User Key (DEUK) which can be stored 7″ for transmission at some convenient time to the device 3 where it can be stored 7.
On purchase of the song 14, the server encrypts the song key 8 with the user key 6 to furnish the User Encrypted Song Key (UESK) 9 which can then be transferred to the playback device 3 and stored 9′. To play the song, the encrypted song 10′ is streamed to the playback device 3 via the Internet. The device 3 then retrieves the song 14′ by means of a triple decryption: using its device key 4 it unlocks the DEUK 7′ to furnish the user key which now unlocks the UESK 9′ to furnish the song key which now unlocks the encrypted song 10″.
It is to be noted that the decrypted device key and the decrypted song key are stored transiently in secure RAM during this playback process. The decrypted song 14′ is likewise preferably not made available to the outside world until converted to analogue form in a digital-to-analogue converter (DAC).
The separation of a user key from a device key in this manner allows a user to register several devices to his account: a new device can be added and will be able to play all songs that the user has already purchased as soon as it has been registered and has received a DEUK 7. It is also possible for a single device to be registered to more than one user account: in that case the device must store a DEUK for each such user.
Degradation with Buried Data
Subsequently, within the playback device 3 a replica 25′, 25″ of the encrypted instructions 25 will be retrieved 24 from the watermarked stream 21′. The player 3 obtains the UESK 9′ by a method to be described and so is able to decrypt the encrypted instructions 25′ to furnish replica instructions 15′ and so to reconstruct 26 the song 14′. That is, reconstruction 26 reverses the degradation process 16. As noted, it is preferred that the device 3 incorporate a digital-to-analogue converter (DAC) so that the reconstructed song 14′ is available externally only in analogue form.
In
Such a playback device 3 needs to have access to the UESK. It is most convenient if the UESK is repeatedly buried within the stream 21 or 21′, for example once per second so that the playback device 3 may retrieve it even if the user requests the player 12 to begin the streaming from partway through the song. The watermarking process 17 could bury the UESK repeatedly, but this process has a computational cost and it is therefore preferred to perform it only once for the song rather than separately within the server 3 for each purchase transaction. Accordingly, it is arranged that the watermarking process 17 creates ‘holes’ in the stream: these are uncommitted bit positions whose values do not affect the output 28′ of the retrieval process 24. Typically the holes are placed in the least significant bit positions of the degraded stream (for example, the 16th bit) so that information such as the UESK may be ‘sprinkled’ 20 into them with minimal audible effect if the stream is auditioned 22 without a special playback device 3. The sprinkled information could alternatively or additionally include verification information, a digital signature, transaction tracing information, or copyright or ownership information such as in an “ISRC” code.
Following the watermarking process, the degraded song 18 and the song key 8′ are stored in the server 1 awaiting a purchase transaction.
Under the download model,
Alternatively, under the streaming model,
For the purpose of explanation we shall assume that original source material has been presented with a bit depth of 16 bits since that is typical of current commercial practice, though the invention is clearly applicable also to sources having bit depths greater than or less than 16 bits. Neither the degradation process 16 nor the watermarking process 17 increases the bit depth, which remains at 16 bits and can be handled losslessly by existing players such as the iPod.
A further variant is to combine the degradation and burying into a single operation. This can be done for example using the burying method described later, in particular making use of the lossless pre-emphasis methods shown in FIG. 13 and FIG. 14 of published International patent application WO2013/061062, which is hereby incorporated by reference. One degradation method consists of generating white pseudorandom noise, lowpass filtering the noise with for example four cascaded first-order filters each with a −3 dB point of 700 Hz, thus providing a combined ultimate slope of 24 dB/8 ve. The filtered noise signal may now be added to a constant slightly less than unity to provide the multiplier h shown in FIGS. 13 and 14 in published International patent application WO2013/061062. If the noise has suitable amplitude, the resulting degradation may be perceptually similar to that produced by lossy compression algorithms such as MP3.
Another way in which degradation and burying may be combined is explained later with reference to
The processes of reversibly degrading a stream or file and then encrypting the instructions required to reverse the degradation are together known as ‘perceptual encryption’. The practical differences from the plain encryption of
Although the degraded versions 21, 18 and 28 of the song are not precisely the same as each other, the audible effects of the burying unit 17 and the sprinkling unit 20 can be made small so that the three versions sound similar or identical to each other. Thus the degradation unit 16 is primarily responsible for the audible difference between the degraded signal 21, 21′ and the original song 14, 14′. Assuming suitable design of unit 16, the choice of instructions 15 can be made under artistic control and can be adapted to fulfil the commercial aim of allowing free distribution of a credible version 21 of the song while retaining an incentive to purchase a user-encrypted song key 9 so that the original song 14 may be reconstructed losslessly.
Thus the degraded song 18 in
The original PCM audio file or stream 14 is divided up into segments for the convenience of processing, three segments numbered n, n+1 and n+2 being shown. Each segment is degraded by a reversible algorithm 16, the nature and extent of degradation being controlled by the supplied degradation instructions 15 corresponding to that segment.
The degraded audio 28 is then operated on, segment by segment, by a lossless watermark process 17 which embeds into each audio segment data describing the degradation instructions 15 applied to that segment. The resultant watermarked PCM audio 18 has specified bit positions, termed holes and normally chosen from the least significant bit positions, which have the property that any data can be inserted there without upsetting the lossless invertibility of the watermarking process. One method of creating these holes will be described shortly with reference to
A song key 8 will often be used to modify the above process at some point chosen to impede inversion of the process by an adversary who is not in possession of the song key. In
One method of modifying the reversible degradation makes use of a cryptographic random number generator such as the stream cipher 97 shown in
For computational efficiency of the server 1, the above processing can be performed once on a song 14 and the result 18 stored. Then at the point of delivery of the song to a user, the user key 6 is used to encrypt the song key 8 and thus furnish the User Encrypted Song Key (UESK) 9. Extra information 99 may optionally be added to this UESK 9 to form a token 93. Copies of this token are then placed into the holes to create the file which may be streamed to the user. The token copies may of course differ in the extra information 99 that has been added; moreover although
The corresponding decoder,
The bit positions comprising the hole 33 are preferably chosen from the least significant bits (Isbs) of the audio stream to minimise the audible effect of replacing their original content. Lossless watermarking 17 is used to embed the extracted original content 27 into the remainder of the audio. To avoid filling in the hole, the lossless watermarking process may conveniently be applied to the top 15 bits only of the 16-bit signal, so leaving the Isbs untouched including the hole.
The token 93 is thus inserted into the hole 33′ in the segment of watermarked audio 18 to furnish a segment 21 of PCM audio that can then be streamed.
The corresponding decoder of
It will also be apparent to those skilled in the art that there are many variations of the above operations that would achieve a similar effect and still be invertible in a corresponding decoder. For example, since neither the degradation nor the watermarking modify the Isbs, the bits could be extracted later in the process. Or, the reversible degradation could operate on all 16 bits of the audio if it is performed prior to the extraction of bits. Or the watermarking could operate on all 16 bits if it operates before the extraction and instead of burying the extracted bits from the current segment of audio it buries those from a prior segment.
Further Details of a Packet that May be Inserted According to the Invention
A recognisable syncword 90 allows the decoder to search for the start of a data packet and thus synchronise itself to the stream, even if started partway through a song. A sequence number 91 identifies the segment 21 of audio associated with the data packet to allow synchronisation of pseudorandom number generator seeds between encoder and decoder. Data packets may contain optional fields, the flags 92 indicating which fields are present in a particular packet.
The token 93 and the signed verification information follow. Both are potentially large, so may not be present in every data packet, as indicated in the flags field. A further occasional field might be metadata 94 containing information about a track, such as the artist's name.
The fields mentioned so far are accessible “in the clear” but now may follow protected fields, such as the degradation instructions 95. This completes the data packet which may be assumed to occupy fully the hole 33′ and so for the rest of the audio segment 21, 21′ the least significant bit positions of the streamable audio will be occupied by the least significant bits 96 of the original audio segment 14. After that is the next segment, starting with its syncword 90′.
A decoder can recover the song key from the UESK in the token 93, and pass it along with the sequence number 91 to another instance of the stream cipher 97 to replicate the stream cipher output 98. The decoder can thus repeat the exclusive-OR operation to recover the original unencrypted instructions 95. In the example shown in
The invention admits of several different methods to prevent unauthorised reversal of the degradation:
These methods may of course also be used in combination. We refer to the information required to reverse the degradation as “degradation information”, comprising at least the degradation instructions but also the song key if the degradation makes use of pseudorandom numbers derived in dependence on the song key. “Embedding” information means incorporating the information into an audio stream, for example by burying the information directly using a method such as that described in published International patent application WO2013/061062, or alternatively by inserting the information into a hole 33′ as already described.
Not discussed so far is the communication path shown in
It will be appreciated that the above procedure could also be performed using a symmetric key making it a message authentication code instead of a digital signature. However use of a digital signature is advantageous so that compromise of a decoder does not compromise the signing key and allow an adversary to forge streamable audio without being detected as counterfeit by a decoder that checks the signature.
In the encoder of
In the decoder of
Returning to the encoder,
Thus units 124 and 125 simulate the decoding of signal 112, while units 114 and 115 simulate the decoding of signal 113. Comparator 126 tests whether these two decodings produce the same result. If not, the logic value 128 is false, so the output 129 of AND gate 127 is also false. Multiplexer 119 is configured to interpret a false value of control signal 129 as an instruction to pass signal 112, thus ensuring that the reconstructed output 102 is equal to the original signal 100 as discussed above.
If the two simulated decodings of 114, 115 on the one hand and 124, 125 on the other do produce the same result then encoder has choice of which of signals 112 and 113 should be passed as the composite signal 101, such that the decoder of
Since the reconstructed signal 102 is equal to the original signal 100, it follows that units 120, 121, 136, 134, 135, 144, 145 and 146 in the decoder will duplicate exactly the actions of corresponding units 104, 105, 106, 114, 115, 124, 125 and 126 in the encoder. Thus logic signal 148 in the decoder is true if and only if logic signal 128 in the encoder was true, implying that a bit had been clocked out of buffer 103. Since signal 133 in the decoder is a replica of signal 113 in the encoder, the output of comparator 149 indicates whether signal 113 is equal to the composite signal 101, and hence, since the signal 112 is always different from signal 113, the value of the control signal 129. Thus, the comparator 149 furnishes a bit that is a replica of the bit that was clocked out of buffer 103; this bit is now clocked into the buffer 143.
Thus data is conveyed from buffer 103 to buffer 143 at a varying rate, one bit being conveyed each time the outputs of quantisers 115 and 125 are equal.
The architectures of
Another possibility is to use the signal r to inject deliberate degradation to the signal composite signal, for example if the signal r is “modulation noise” as mentioned earlier and possibly derived by multiplying the audio signal by a pink noise. In this case, the operations of degradation and burying are merged, and the “degraded signal” of the current application may be identified with the “composite signal” of published International patent application WO2013/061062. Alternatively, noting that the gain g may be varied from sample to sample if desired, the operations of degradation and burying may be combined by deriving g from a noise-like signal such as a pink noise.
To improve the perceived quality of the composite signal prior to degradation, the signal r may be the sum of a dither signal and a degradation signal.
Number | Date | Country | Kind |
---|---|---|---|
1302547.3 | Feb 2013 | GB | national |
1307795.3 | Apr 2013 | GB | national |
This application is a U.S. National Stage filing under 35 U.S.C. §371 and 35 U.S.C. §119, based on and claiming benefit of and priority to PCT/GB2014/050423 for “VERSATILE MUSIC DISTRIBUTION” filed Feb. 13, 2014, and further claiming benefit of and priorities to GB patent application no. 1302547.3 filed Feb. 13, 2013 and GB patent application no. 1307795.3 filed Apr. 30, 2013.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/GB2014/050423 | 2/13/2014 | WO | 00 |