Watermark-based dynamic ad insertion

Information

  • Patent Grant
  • 12342040
  • Patent Number
    12,342,040
  • Date Filed
    Wednesday, September 27, 2023
    2 years ago
  • Date Issued
    Tuesday, June 24, 2025
    8 months ago
Abstract
A watermark-based dynamic ad insertion (DAI) technique for presenting different users of content different advertisements based on the user's profile for content viewed on broadcast channels or in multichannel video programming distributor (MVPD) channels. A number of solutions issues with watermark-based DAI are presented. Interoperability is addressed by providing a multiplexing technique so that the DAI watermarks do not interfere with other watermarks, such as ATSC 3.0 watermarks. Reliability is addressed by providing a matched filtering technique. Security is addressed by providing a mutual authentication technique.
Description
FIELD OF INVENTION

The present invention generally relates to the field of content distribution. More particularly, the disclosed embodiments relate to dynamic ad insertion in broadcast content.


BACKGROUND

This section is intended to provide a background or context to the disclosed embodiments that are recited in the claims. The description herein may include concepts that could be pursued but are not necessarily ones that have been previously conceived or pursued. Therefore, unless otherwise indicated herein, what is described in this section is not prior art to the description and claims in this application and is not admitted to be prior art by inclusion in this section.


Dynamic ad insertion (DAI) is a technique for presenting different users of content different advertisements based on the user's profile for content. DAI has been widely adopted in Over-the-Top (OTT) media consumption. For content viewed on broadcast channels or in multichannel video programming distributor (MVPD) channels DAI has not been generally available.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 shows test results indicating reliability for embodiments of the invention.



FIG. 2 illustrating the swapping of publisher data paths in accordance with an embodiment of the invention.



FIG. 3 illustrates the watermark payload in accordance with an embodiment of the invention.



FIG. 4 illustrates a block diagram of a device that can be used for implementing various disclosed embodiments.





SUMMARY OF THE INVENTION

This section is intended to provide a summary of certain exemplary embodiments and is not intended to limit the scope of the embodiments that are disclosed in this application.


Disclosed embodiments relate to a method of facilitating dynamic ad insertion in content. The method includes assigning a default ad an identifying number, wherein the default ad is inserted into programming content at a splicing location in the programming content and linking the identifying number to a replacement ad. A watermark payload is generated which includes the identifying number. The watermark payload is embedded in the content and the content is broadcast to a client device. The client device detects the embedded watermark payload in the content and a replacement ad associated with the identifying number is inserted at the splicing location in the programming content.


These and other advantages and features of disclosed embodiments, together with the organization and manner of operation thereof, will become apparent from the following detailed description when taken in conjunction with the accompanying drawings.


DETAILED DESCRIPTION OF CERTAIN EMBODIMENTS

In the following description, for purposes of explanation and not limitation, details and descriptions are set forth in order to provide a thorough understanding of the disclosed embodiments. However, it will be apparent to those skilled in the art that the present invention may be practiced in other embodiments that depart from these details and descriptions.


Additionally, in the subject description, the word “exemplary” is used to mean serving as an example, instance, or illustration. Any embodiment or design described herein as “exemplary” is not necessarily to be construed as preferred or advantageous over other embodiments or designs. Rather, use of the word exemplary is intended to present concepts in a concrete manner.


BACKGROUND

Dynamic Ad Insertion (DAI), also known as Targeted Advertisement (TA), is the technique where different users see different ads based on their interests, location, age, gender, etc. or generally based on profile created in view of user's input to a device over time and other data in public domain. DAI is expected to increase likelihood that the user will engage with the message and ultimately make the purchase. DAI is well established in Over-The-Top (OTT) media consumption, but it is not yet available on broadcast channels or in multichannel video programming distributor (MVPD) channels. It should be noted that there are techniques that allow ad insertion by different participants in content distribution chain, such as that described in SCTE 35 standard (https://www.scte.org/SCTEDocs/Standards/ANSI_SCTE%2035%202019r1.pdf), but it requires delivery of metadata used to identify advertisement breaks, advertising content, and programing content, and this metadata is currently not delivered to the end user, in particular if end user receives the content over HDMI link.


In order to enable delivery of metadata to the end user ATSC 3.0 standard has introduced digital watermarks in both audio (https://www.atsc.org/atsc-30-standard/a3342016-audio-watermark-emission/) and video (https://www.atsc.org/wp-content/uploads/2016/09/A335-2016-Video-Watermark-Emission-4.pdf) component of multimedia broadcasts. This disclosure addresses issues related to DAI based on watermarks and proposes solutions to those issues. For additional details related to the use of watermarks for DAI see: U.S. Pat. Nos. 9,602,891; 9,942,602; and 10,354,354; as well as US patent applications US 20140074855 and 20190132652. The contents of the above patents and patent applications are hereby incorporated by reference.


Constraints


Typically, advertisement slots in broadcast content are all filled in, even if some of them are replaceable. Replaceable ads are usually called “default ads” and they are shown to the user if DAI fails to activate. However, if DAI is active it is important that there is no bleeding through of default ad to the end user (partial presentation of the default ad), which would be confusing and perhaps annoying. It is also important that replacement ad ends in time and does not step on programing content.


One particular concern is that during live broadcasts the timing of advertising breaks is not known in advance and can be triggered at any time. However, even in distribution channels with full metadata available it may not be possible to splice in an ad instantaneously. For example, SCTE 35 standard recommends that the splicing points are announced at least 4 seconds in advance in live broadcasts (for both network-out and network-in splice points).


It is desirable that most of default ads are replaced with a targeted ad, but failure to activate DAI is not considered confusing or annoying to end user.


On the other hand, if user initiates an action on an upstream device from the TV set, e.g. on a Set Top Box (STB) or Digital Video Recorder (DVR), such as channel change, pause, speed change (forward/back, fast/slow), skip (forward/back), volume change, user guide or other user interface overlay display, etc. it is important that user sees an effect of his action. It is unacceptable to leave user thinking that STB is malfunctioning or even that it is too slow to react to users' input.


Once the DAI technique is in place it is desirable that ad replacement is done in controlled manner, in agreement with content publisher and content distributors. Rogue players may try to replace default ads with their own targeted ads which would deny ad revenue to content owners and/or content distributors. So, it is desirable to prevent unlicensed users to access the metadata, and in particular to access the timing of ad breaks. It is well known to those skilled in the art that the encryption can be used to prevent unauthorized access to information. Yet in the case of DAI the encryption alone may not be enough, and in some scenarios simply detection of the placement of encrypted messages may be used to thwart the system. Also, proper encryption of short messages is not trivial, and it is desirable to use well tested encryption systems.


It should be also noted that watermarking has been proposed and used for many other purposes besides DAI, such as usage measurement, second screen communication etc. In particular ATSC 3.0 watermarking has been introduced for interactivity such as audio replacement, emergency alert, dynamic events etc. It is therefore important that watermarks used for DAI do not interfere with other watermark uses. In particular if DAI uses the watermarks specified by ATSC 3.0, they need to be multiplexed in a controlled manner with other watermarks. For procedural simplicity it would be preferred, if possible, to achieve coexistence of DAI watermarks with other ATSC watermarks without changing ATSC specifications.


Proposed Solutions


In this disclosure we will consider ATSC watermark-based DAI, because ATSC watermarks are public, well tested and available under RAND conditions. However, the proposed solutions could be used with other watermarking systems as well. We will consider usage of either audio or video watermarks, or both of them simultaneously. It is well known that ATSC audio watermarks have much smaller throughput (amount of information per unit time) than video watermarks, while video watermarks have disadvantage of being perceptible on some TV sets, and they are easier to remove or forge.


In order to execute DAI, the receiver needs first to identify the channel that is presented as well as the address of a server associated with the detected channel, which supports DAI. Those objectives can be achieved with either audio or video ATSC watermarks, as specified by ATSC, and it will not be explained here. Typically, this is achieved well ahead of moment of ad replacement, with enough time to communicate user profile, device capabilities such as support for various video resolution, audio and video compression techniques, file formats, available memory, availability of multiple decoders, latency involved when repurposing decoders etc. Based on this information the DAI decisioning server would select appropriate replacement ads, perhaps concatenate them and deliver them to TV set, or generally to the terminal device.


What is left to do is to inform device about exact timing of the ad insertion for each replacement ad. In some scenarios, when ad insertion point is known well in advance, it could be also communicated over the broadband, and the device could be instructed to use one of many timing systems to time ad insertion precisely. It is desirable for DAI system to work also in time-shift scenarios, when the broadcast is recorded for later viewing. So, the first step is to establish the media time and then to specify the insertion moment on the media timeline. The media time can be established using either fingerprinting or watermarking, which is well known to those skilled in the art, and thus will not be described here.


Watermark Payload Considerations


In the case of live broadcast, the timing of ad insertion is known only a short time before the DAI execution, and device may not be able to get this information over the broadband quickly enough. Furthermore, having a large number of devices attempting to get timing information simultaneously would increase web congestion and increase likelihood of failing to get the information in time. One possible solution is to use video watermarks to mark default ads. In the case of multiple default ads each one should be marked differently in order to find proper replacement ads for them, e.g. to match them by duration. For example, each instance of a default ad can be assigned a different identifying number (e.g. random, sequential or otherwise determined) and this number can be included as part of the watermark payload. Those identifying numbers can be linked to replacement ads when the replacement ads are fetched to device memory. When a watermark carrying a particular identifying number is detected the replacement ad associated with this number should be inserted into the presentation.


It should be noted that video watermarks can get distorted in distribution channel or video recording devices due to transcoding, picture resolution reduction, frame rate changes, high motion and/or high entropy content, etc. In the case where video watermark is distorted the video watermark detector can choose to link the detected watermark with a particular ad even if the extracted identifying number doesn't match perfectly the identifying number received over the broadband. The detector can count the bit mismatches between the extracted identifying number and the expected identifying number, and if the count is below a threshold it could initiate the DAI. This approach is similar to adding error correction to the watermark payload. It is particularly effective—offering lower likelihood of false, erroneous and missed detections than other error correction techniques—if the identifying numbers are determined such that each instance is statistically independent and uncorrelated from others; e.g. via a random, pseudorandom, or cryptographic techniques.


For example, the embedded watermark can contain owner ID, channel ID, and/or non-random ad ID, which are encrypted and placed as portion or as entire watermark payload. If this identifier is pre-fetched over broadband or if the unencrypted data fields are delivered to the TV and encrypted using the same key used for encrypting them in the watermark payload, the detector can similarly do bit mismatch counting, and initiate DAI if the count is below a threshold. In the above scenario it is important that the watermark in the first frame of the default ad is detected. If the replace ad is not started with the first frame the default ad would bleed through creating significant artefact. The first frame watermark could be lost because of various processing in the distribution channel as discussed above. Besides, if ATSC 3.0 video watermarks are inserted by the broadcast station they could interfere with watermarks that are inserted upstream from the station. Note that some ATSC 3.0 video watermarks have very precise timing requirement, which may make them interfere exactly with the first frame watermarks.


One way to mitigate issues listed above is to put a few black frames at the beginning of the default ad. If the first frame watermark is missed for whatever reason, this would cause black frames to bleed through, which is not going to surprise users as even now many transitions from one ad to another are including a few black frames in between. We have found also experimentally that ATSC video watermarks embedded in black frames are more robust to various distortions than those embedded in regular content, in view that black frames have a very low entropy.


The information about the count of black frames that are leading into default ad can also be pre-fetched, so that the terminal device has advanced knowledge how long is the time interval where the starting DAI is safe. In the case when DAI is started later than ideal it is important to finish inserted ad on time, and not to step on programing content. To prevent this, the default ads should carry watermarks with information when the programing content will return (network-in information). Note that if inserted ad is slightly shorter than the default ad, the terminal device should pad inserted ad with black frames to prevent bleed through of the default ad.


Another way to mitigate issues listed above is to send multiple video watermarks ahead of the splicing point, each of them carrying information about timing of the splice point, in addition to the ad ID. For example, the timing of the splicing point can be expressed as number of video frames between the marked frame and the start of the default ad. Alternatively the timing information could be expressed as a count of a predefined timing unit, say as a number of 10 ms intervals, from the watermarked frame to the insertion point. Alternately, the timing information could be expressed as a time value on a reference timeline that is known by other means, such as through other video watermark messages, audio watermark messages, audio or video fingerprinting systems, or metadata transmitted together with the programming content. Redundant watermarking reduces the risk that the mark will be missed, and allows a flexible selection of which frame needs to carry the timing information. Furthermore, the timing information can be protected using error correction codes that are well known to those skilled in the art.


One way to insert advanced information about pending default ads is to put non-replaceable ads in front of default ads, and during non-replaceable ads send the timing info and replacement ad ID for all default ads. Of course, it is possible to insert advanced information about pending default ad in the program content itself. The 4 second lead time between the decision to allow DAI and the start of the DAI slot, as specified in SCTE 35 standard, leaves plenty of room for redundant delivery of multiple replacement ad IDs and their timing information.


It should be noted that the an ad ID and timing information represent relatively small payload which could easily fit the user_private_message( ) specified by ATSC in https://www.atsc.org/wp-content/uploads/2017/03/A336-2017-Content-Recovery-in-Redistribution-Scenarios-1.pdf. For example, ad ID can be 72 bit long and timing info in the form of 10 ms counts can be 16 bit long, but protected using error correction code BCH(63,16,11) with one bit reserved. This could be placed into 136-bit payload of user_private_message( ).


As mentioned above the ATSC audio watermarks have much smaller throughput than video watermarks, and they don't have specified general-purpose payloads. Yet they can also be used as a vehicle to carry replacement ad IDs and their timing information for the advanced notification about pending default ads. A possible approach is to allow audio watermark embedder to modify scramble sequence used in standard ATSC payloads so that standard audio watermark detector would fail to extract embedded payload. Modified scramble sequence should be delivered over the broadband together with other DAI related information according to standard web protocols. Once this modified scramble sequence is received the audio watermark detector should attempt decoding subsequent payloads with both standard and modified sequence for a predefined period of time, or until detection of watermark segment end. When a payload is detected with the modified scramble sequence, the detector will understand that it contains replacement ad ID and time to default ad start. For example, the replacement ad ID can be 34-bit ad ID and time to default ad start can be 16-bit counter of 10 ms intervals.


Having in mind relative strengths and weaknesses of audio and video watermarking technologies it is possible to combine them so that audio watermarks are used to identify the broadcast channel and address of the server associated with broadcast channel which is designated to support DAI, while video watermarks are used to carry replacement ad ID and timing information.


Security Considerations


The main security objective is to prevent a foreign ad replacement application to read embedded watermarks and discover start time and duration of replaceable ads. In order to achieve this, it is desirable that DAI client in the terminal device and DAI decisioning servers should perform mutual authentication based on Transport Layer Security (TLS) protocol. The DAI clients should receive DAI instructions only from authenticated DAI decisioning servers, and DAI decisioning servers should provide DAI instructions only to authenticated DAI clients. Compromised certificates could be revoked using Online Certificate Status Protocol (OCSP)


Clearly if only default ads are marked with video watermarks it would be easy to identify marked frames and replace them. Similarly, if default ads are marked with video watermarks with distinct properties, such as distinct frame structure, it would be unsecure. Therefore, it is desirable to embed watermarks in advance of default ads, as proposed above.


It is important that the proposed 16-bit timer is not easy to extract and use to identify the start time of the default ad. For example, in the case of video watermarks based on the user_private_message( ) specified by ATSC described above, this timer is protected by BCH(63,16,11) with one bit reserved. After that it can be scrambled with one-time scrambling pattern 64-bit long, that is securely delivered to an authenticated DAI app during delivery of other DAI related information over the broadband. Since this is one-time pattern associated with a particular replacement ad, reverse engineering of (e.g. by measuring actual time between the watermark and the replacement start) it is not going to help with other DAI instances. Similarly, the audio watermarks are scrambled with 127-bit long modified scramble sequence that is unique for a particular default ad.


The insertion end point, or default ad duration, could be specified with respect to the default ad start and pre-fetched over the broadband. Presumably the inventory decisioning logic will select replacement ads that closely fit the duration of the default ads. Alternatively, the end of the default ad could be specified using a timer embedded during the default ad in a manner similar to that described for the timer used to specify the start of the default ad as descried above.


In order to further frustrate a determined attacker, it is possible to introduce a decoy watermark messages that would use ad IDs and time stamps that are actually not associated with any replacement ads, and approved DAI app will simply discard those because the ad ID will not match any of the replacement ads that are pre-fetched.


Upstream User Action Detection


One of the issues listed above is to detect user action on a device upstream from TV set, such as STB or DVR and act accordingly. One of the objectives could be that DAI application matches the user selection, such as pause, speed change, skip, or volume change. Another option is to abandon DAI whenever upstream user action is detected, and to return to default ad. Presumably the default ad will exhibit results of the user action too. The third option is to make user aware that the current presentation is coming from DAI app, and if user want to execute action on an upstream device it is necessary to first exit the current presentation. Any of these options would prevent user to suspect a malfunctioning of the upstream device.


Detection of many common changes to the presentation of the default ad by the upstream device can be determined using “loss of continued watermark detection” as an indicator. For this reason, it is beneficial that the default ad contains watermarks throughout their duration and that the TV use their continued detection (or lack thereof) as an indicator of continued receipt. For this reason, continued application of the watermark transmission and detection techniques described above for the duration of the default ad presentation is beneficial.


Our research shows that ATSC video watermarks can reliably detect upstream pause, speed change, or skip and could approximately determine speed change or skip size as long as the default ads are embedded with a string of video watermarks with a payload that includes timing information, say time from the beginning of the default ad. Therefore, the ATSC video watermarks can be used to adjust the timing of the DAI presentation in correspondence to timing changes in the upstream content. If the adjustments of DAI presentation are made it would be desirable to inform user of the adjustment made using a partial overlay message. For example, if fast-forward is detected at 2× rate the replacement ad should be fast forwarded at 2× and an overlay should inform user that 2× playback is executed.


Our research also shows that certain upstream user actions, such as channel changes, pause, speed change and skip can be identified by a brief digital silence interval. Note that audio watermarks can cover digital silence intervals preexisting in native audio as disclosed in U.S. Pat. No. 9,805,434. Therefore, digital silence gaps can be used to trigger the end of DAI and return to default ad or whatever new channel user is selecting.


Our research further shows that volume change request sent to STB or DVR is most of time not actually executed on upstream device, but rather it is communicated to the actual audio rendering device such as TV set. In this case the TV set will get audio volume information and could pass it to DAI ap. However, it is also possible to do a real time audio loudness measurement and adjust DAI loudness accordingly.


Some user actions may cause partial screen overlay that could be masked in the case of DAI. For example, the user may expect volume control overlay when trying to adjust volume. Similarly, menu selection on upstream device may trigger picture-in-picture with menu options. Even external event such as a phone call may create an overlay with the caller ID, which could be masked in the case of DAI. One of the solutions for those cases is, of course, to have user be aware that they are watching web-based content, and that it needs to exit it in order to return to desired screen. Examples of such solutions include display of a graphic icon or informative text superimposed on the inserted advertisement by the TV or illumination of an indicator on another visible location (e.g. TV frame or remote control).


Yet another solution is to have a screen state detection logic that would detect such overlays and terminate DAI automatically. Our research shows that every device, such as STB or DVR, has a limited set of display overlay options, and that they can be identified in advance and that their templates can be stored on the web servers. Any device could download those templates and try to detect them on the screen by correlating specific portions of the screen with the templates. If the correlation is above a threshold, the overlay detection is declared and DAI can be modified (e.g. by conforming, skipping, or terminating the presentation).


Yet another solution is to compare video fingerprints which are extracted upstream of the STB to video fingerprints extracted in the TV. Differences between the two fingerprints can be attributed to video modification by the STB and overlay detection is declared and the DAI can be modified (e.g. by conforming, skipping, or terminating the presentation).


The above proposed solutions can be combined in various ways. For example, if audio gap is detected, the device may delay taking down the replacement ad while video watermark detector tries to interpret user action and adjust DAI accordingly. But if those attempts fail within a predefined time interval, the replacement ad should be taken down.


Similarly, the user should be informed that the current presentation is coming from a DAI app in parallel with attempts to detect screen overlays and automatic DAI termination, so that if screen overlay detection fails the user has the option of manually exiting the replacement ad.


Watermarking Approach


The watermarking approach disclosed herein emphasizes three capabilities: 1) ATSC Interoperability; 2) reliability; and 3) security. Interoperability means that there is interoperability with other uses of the ATSC A/335 and A/336 specifications, including the use of A/336 framing including message header and CRC. This approach also permits multiplexing of Project OAR (OAR) (https://projectoar.org/) and ATSC messages. Thus, ATSC and OAR watermark message protocols will be non-interfering and broadcasters will be able to send watermark messages to both OAR and ATSC clients at the same time. Likewise, OAR TVs and ATSC TVs will both be able to receive the broadcast and operate correctly. This approach enables the option of cleartext transmission of timestamps in OAR payloads.


In more detail, OAR messages use the extensibility method defined in A/336 for introducing new watermark message formats. OAR defines a message format using the A/336 extensibility approach and requests that ATSC add it to their registry. This allows any TV to distinguish OAR and ATSC messages.


It is also desirable for OAR to: (a) permit safe launch frames to be announced/identified so that launch success is not dependent on a single frame (also providing a reliability benefit); (b) allow multiplexing OAR with other messages during default ads; and (c) enable joint ATSC/OAR usage of timestamps.


Regarding reliability, it is noted that a weak error correction/detection scheme will cause watermark failures. Low-bitrate coding and high motion video will cause intermittent watermark loss and high motion video can cause continuous watermark degradation (not just sporadic). This will cause insertion opportunities to be missed, failed timeline tracking, or erroneous DAI termination. To address these issues, the present disclosure enables matched filtering of payloads with advanced error correction and supports marked pre-roll. The present disclosure recognizes that matched filtering is far superior to Single Error Correction Double Error Detection (SECDED). Matched filtering is a provably optimal method for detecting a known signal and is guaranteed to outperform error correction/detection schemes like SECDED/BCH/Reed-Solomon, while also being much simpler. These other techniques are only needed when the reader doesn't know the message being transmitted


Also, matched filtering is easily introduced into the OAR architecture via decision server response. It is sufficient to include the watermark message in the decision server response (or enough info for client to synthesize it). Separation of static (avail description) and dynamic (timecode) data may be beneficial. Note that most “watermark fields” don't have to be in the watermark; avail ID and timecode are the only essential ones.


To illustrate how payload architecture impacts reliability, FIG. 1 shows comparative testing of different approaches. During these tests, performance of a sample implementation was measured across a variety of payload encoding methods. Scene Change frames are typically encoded as I-frames and enable more reliable watermark recovery. Reliable recovery of all frames is necessary for low-latency trick-play tracking.


Regarding security, it is desirable that security is preserved by ensuring that a watermark cannot be interpreted without decision response and decryption keys. Since key management is complex and costly, the present disclosure uses mutual authentication as an alternative to KMS. In more detail, TVs are provisioned by OAR operator with a unique client certificate tied into OAR PKI. Decisioning servers provide decisioning responses only to authenticated TVs. Decision responses contain all watermark fields; watermarks carry very limited information. Compromised certificates can be revoked using Online Certificate Status Protocol (OCSP). This eliminates the need for symmetric key distribution (requires certificate distribution only). It is noted that mutual authentication protocol impacts decisioning server operation and that certificate management and device provisioning are still required. Process development and effort is required to detect, revoke compromised certificates.


In accordance with one embodiment of the present disclosure, an important feature is to swap the publisher data paths. See FIG. 2. This involves swapping the publisher outputs, so the encrypted message is in the Decision Response and the payload is in the watermark message. The encrypted message is sent in the Decision Response. Payload in encrypted message has increased size and can be a list (wildcard support not recommended), and run-in and timestamp are not carried in the encrypted message. The watermark carries only: A/336 run_in and header; payload (with increased size); timestamp (encryption optional) with BCH error correction. This yields 400% bit error tolerance vs. SECDED. To enable ATSC compatibility, two watermark payloads should be defined; one with an encrypted timestamp and one cleartext.


Decision Response


“Watermark payload to match to (may include wildcards)” is replaced by: 1) Header (unencrypted): watermark_version; consortium_key_id; and random_number; 2) Consortium encrypted block: validation; publisher_id; publisher_key_id; and random_number; 3) Publisher encrypted block: validation; ad_duration; and one or more payloads to match to.


The watermark payload is described in FIG. 3.


OAR participant features relate to both publishers and the TV. For publishers, the payload must be selected randomly to ensure low probability of collisions. Also, decisions applicable to multiple avails must be specified via payload list rather than wildcard. Timestamp encryption is optional. For the TV, decryption is applied to the encrypted message in the decision response instead of an encrypted watermark payload. Also, matched filtering is used for watermark payload detection. BCH error correction is used for timestamp payload detection.


It is understood that the various embodiments of the present invention may be implemented individually, or collectively, in devices comprised of various hardware and/or software modules and components. These devices, for example, may comprise a processor, a memory unit, an interface that are communicatively connected to each other, and may range from desktop and/or laptop computers, to consumer electronic devices such as media players, mobile devices and the like. For example, FIG. 4 illustrates a block diagram of a device 1000 within which the various disclosed embodiments may be implemented. The device 1000 comprises at least one processor 1002 and/or controller, at least one memory 1004 unit that is in communication with the processor 1002, and at least one communication unit 1006 that enables the exchange of data and information, directly or indirectly, through the communication link 1008 with other entities, devices and networks. The communication unit 1006 may provide wired and/or wireless communication capabilities in accordance with one or more communication protocols, and therefore it may comprise the proper transmitter/receiver antennas, circuitry and ports, as well as the encoding/decoding capabilities that may be necessary for proper transmission and/or reception of data and other information.


Referring back to FIG. 4 the device 1000 and the like may be implemented in software, hardware, firmware, or combinations thereof. Similarly, the various components or sub-components within each module may be implemented in software, hardware or firmware. The connectivity between the modules and/or components within the modules may be provided using any one of the connectivity methods and media that is known in the art, including, but not limited to, communications over the Internet, wired, or wireless networks using the appropriate protocols.


Various embodiments described herein are described in the general context of methods or processes, which may be implemented in one embodiment by a computer program product, embodied in a computer-readable medium, including computer-executable instructions, such as program code, executed by computers in networked environments. A computer-readable medium may include removable and non-removable storage devices including, but not limited to, Read Only Memory (ROM), Random Access Memory (RAM), compact discs (CDs), digital versatile discs (DVD), etc. Therefore, the computer-readable media that is described in the present application comprises non-transitory storage media. Generally, program modules may include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. Computer-executable instructions, associated data structures, and program modules represent examples of program code for executing steps of the methods disclosed herein. The particular sequence of such executable instructions or associated data structures represents examples of corresponding acts for implementing the functions described in such steps or processes.


The foregoing description of embodiments has been presented for purposes of illustration and description. The foregoing description is not intended to be exhaustive or to limit embodiments of the present invention to the precise form disclosed, and modifications and variations are possible in light of the above teachings or may be acquired from practice of various embodiments. The embodiments discussed herein were chosen and described in order to explain the principles and the nature of various embodiments and its practical application to enable one skilled in the art to utilize the present invention in various embodiments and with various modifications as are suited to the particular use contemplated. The features of the embodiments described herein may be combined in all possible combinations of methods, apparatus, modules, systems, and computer program products.

Claims
  • 1. A method of facilitating dynamic content replacement in content comprising: identifying an input video stream at a receiver, the input video stream including nonreplaceable and replaceable content;contacting an ad decisioning server associated with the input video streamthe ad decisioning server identifying a replaceable content identifying number contained in a watermark payload in the replaceable content, wherein the replaceable content identifying number is linked to a replacement content;the ad decisioning server selecting one or more replacement contents based on the identified replaceable content identifying number;the ad decisioning server transmitting the one or more identified replaceable content identifying numbers to the receiver;receiving the one or more replacement contents linked to the identified replaceable content identifying number at the receiver;analyzing the input video stream at the receiver to detect the presence of a watermark payload containing a replacement content identifying number embedded in the replaceable content; andwhen a watermark payload embedded in particular replaceable content in the input video stream contains a particular replaceable content identifying number, replacing the particular replaceable content in the input video stream with the replacement content linked to the particular replaceable content identifying number.
  • 2. The method of claim 1 wherein the step of identifying the input video stream further comprises retrieving metadata using ATSC 3.0 watermarks in the input video stream to identify a broadcast channel.
  • 3. The method of claim 1 wherein the step of contacting an ad decisioning server comprises using a watermark to identify an address of the ad decisioning server.
  • 4. The method of claim 1 wherein the ad decisioning server is identified using metadata retrieved using an ATSC watermark.
  • 5. The method of claim 1 wherein the replacement content ad is identified by an ad ID carried by the watermark payload.
  • 6. The method of claim 1 wherein the ad decisioning server performs mutual authentication with a device and delivers an ad decision only if the device is authenticated.
  • 7. The method of claim 1 wherein the step of analyzing comprises using matched filtering/prediction.
  • 8. The method of claim 1 wherein the replacement content is synchronized to a replaceable ad using timecodes carried in the watermark payload.
  • 9. The method of claim 1 further comprising the steps of: detecting when a watermark payload in the input video stream contains a particular replaceable content identifying number and timing information about the particular replaceable content; andreplacing the particular replaceable content in the input video stream with replacement content linked to that identifying number; andadjusting a timing of the replacement content that replaced the particular replaceable content in correspondence to the timing information about the replaceable content.
  • 10. The method of claim 9 further comprising: using the adjusted timing information of the replacement content that replaced the particular replaceable content to detect upstream operations performed on the particular replaceable content including at least one of: pause, speed change, or skip operations.
  • 11. The method of claim 9 further comprising the step of: displaying to a user information related to the adjustment of the timing of the replacement content by means of a partial overlay message.
  • 12. The method of claim 1 further comprising; when the analyzing detects a replaceable content identifying number that does not match a particular identified replaceable content identifying number, counting the number of mismatches between the detected replaceable content identifying number and the particular identified an expected replaceable content identifying number; andif the number of mismatches is below a threshold, replacing the particular replaceable content with a replacement ad linked to the particular identified replacement content identifying number.
  • 13. The method of claim 12 wherein the ad decisioning server provides an encrypted replaceable content identifying number to the receiver and the receiver performs decryption on the encrypted replaceable content identifying number to obtain a replaceable content identifying number that is carried in the watermark payload.
  • 14. The method of claim 1 wherein the watermark is a video watermark.
  • 15. A device comprising: a processor; anda memory including processor executable code, the processor executable code, when executed by the processor, causes the device to;identify an input video stream at a receiver, the input video stream including nonreplaceable and replaceable content;contact an ad decisioning server associated with the input video stream, the ad decisioning server identifying a replaceable content identifying number contained in a watermark payload in the replaceable content, wherein the replaceable content identifying number is linked to a replacement content;the ad decisioning server selecting one or more replacement contents based on the identified replaceable content identifying number;the ad decisioning server transmitting the one or more identified replaceable content identifying numbers to the receiver;receive the one or more replacement contents linked to the identified replaceable content identifying number at the receiver;analyze the input video stream at the receiver to detect the presence of a watermark payload containing a replacement content identifying number embedded in the replaceable content; andwhen a watermark payload embedded in particular replaceable content in the input video stream contains a particular replaceable content identifying number, replacing the particular replaceable content in the input video stream with the replacement content linked to the particular replaceable content identifying number.
  • 16. A computer program product, embodied on a non-transitory computer readable medium for facilitating dynamic content replacement in content, comprising: program code for identifying an input video stream at a receiver, the input video stream including nonreplaceable and replaceable content;contacting an ad decisioning server associated with the input video stream, the ad decisioning server identifying a replaceable content identifying number contained in a watermark payload in the replaceable content, wherein the replaceable content identifying number is linked to a replacement content;the ad decisioning server selecting one or more replacement contents based on the identified replaceable content identifying number;the ad decisioning server transmitting the one or more identified replaceable content identifying numbers to the receiver;receiving the one or more replacement contents linked to the identified replaceable content identifying number at the receiver;analyzing the input video stream at the receiver to detect the presence of a watermark payload containing a replacement content identifying number embedded in the replaceable content; andwhen a watermark payload embedded in particular replaceable content in the input video stream contains a particular replaceable content identifying number, replacing the particular replaceable content in the input video stream with the replacement content linked to the particular replaceable content identifying number.
US Referenced Citations (237)
Number Name Date Kind
6122610 Isabelle Sep 2000 A
6145081 Winograd et al. Nov 2000 A
6175627 Petrovic et al. Jan 2001 B1
6411725 Rhoads Jun 2002 B1
6427012 Petrovic Jul 2002 B1
6430301 Petrovic Aug 2002 B1
6490579 Gao et al. Dec 2002 B1
6577747 Kalker et al. Jun 2003 B1
6683958 Petrovic Jan 2004 B2
6721439 Levy et al. Apr 2004 B1
6792542 Lee et al. Sep 2004 B1
6839673 Choi et al. Jan 2005 B1
6888943 Lam et al. May 2005 B1
6931536 Hollar Aug 2005 B2
7024018 Petrovic Apr 2006 B2
7140043 Choi et al. Nov 2006 B2
7159118 Petrovic Jan 2007 B2
7224819 Levy et al. May 2007 B2
7343397 Kochanski Mar 2008 B2
7460667 Lee et al. Dec 2008 B2
7533266 Bruekers et al. May 2009 B2
7548565 Sull et al. Jun 2009 B2
7689532 Levy Mar 2010 B1
7707422 Shin et al. Apr 2010 B2
7774834 Chauhan et al. Aug 2010 B1
7779271 Langelaar Aug 2010 B2
7983922 Neusinger et al. Jul 2011 B2
7986806 Rhoads Jul 2011 B2
7991995 Rabin et al. Aug 2011 B2
8005258 Petrovic et al. Aug 2011 B2
8015410 Pelly et al. Sep 2011 B2
8055013 Levy et al. Nov 2011 B2
8059815 Lofgren et al. Nov 2011 B2
8059858 Brundage et al. Nov 2011 B2
8081757 Voessing et al. Dec 2011 B2
8085935 Petrovic Dec 2011 B2
8103049 Petrovic et al. Jan 2012 B2
8138930 Heath Mar 2012 B1
8151113 Rhoads Apr 2012 B2
8181262 Cooper et al. May 2012 B2
8189861 Rucklidge May 2012 B1
8194803 Baum et al. Jun 2012 B2
8249992 Harkness et al. Aug 2012 B2
8259873 Baum et al. Sep 2012 B2
8280103 Petrovic et al. Oct 2012 B2
8301893 Brundage Oct 2012 B2
8315835 Tian et al. Nov 2012 B2
8321679 Petrovic et al. Nov 2012 B2
8340348 Petrovic et al. Dec 2012 B2
8346532 Chakra et al. Jan 2013 B2
8346567 Petrovic et al. Jan 2013 B2
8467717 Croy et al. Jun 2013 B2
8479225 Covell et al. Jul 2013 B2
8483136 Yuk et al. Jul 2013 B2
8533481 Petrovic et al. Sep 2013 B2
8538066 Petrovic et al. Sep 2013 B2
8560604 Shribman et al. Oct 2013 B2
8588459 Bloom et al. Nov 2013 B2
8589969 Falcon Nov 2013 B2
8601504 Stone et al. Dec 2013 B2
8615104 Petrovic et al. Dec 2013 B2
8666528 Harkness et al. Mar 2014 B2
8682026 Petrovic et al. Mar 2014 B2
8726304 Petrovic et al. May 2014 B2
8745403 Petrovic Jun 2014 B2
8768714 Blesser Jul 2014 B1
8781967 Tehranchi et al. Jul 2014 B2
8791789 Petrovic et al. Jul 2014 B2
8806517 Petrovic et al. Aug 2014 B2
8811655 Petrovic et al. Aug 2014 B2
8825518 Levy Sep 2014 B2
8838977 Winograd et al. Sep 2014 B2
8838978 Winograd et al. Sep 2014 B2
8869222 Winograd et al. Oct 2014 B2
8898720 Eyer Nov 2014 B2
8923548 Petrovic et al. Dec 2014 B2
8959202 Haitsma et al. Feb 2015 B2
8990663 Liu et al. Mar 2015 B2
9009482 Winograd Apr 2015 B2
9042598 Ramaswamy et al. May 2015 B2
9055239 Tehranchi et al. Jun 2015 B2
9106964 Zhao Aug 2015 B2
9117270 Wong et al. Aug 2015 B2
9147402 Chen et al. Sep 2015 B2
9277183 Eyer Mar 2016 B2
9596521 Winograd et al. Mar 2017 B2
9602891 Winograd et al. Mar 2017 B2
9607131 Winograd et al. Mar 2017 B2
20020032864 Rhoads et al. Mar 2002 A1
20020059622 Grove et al. May 2002 A1
20020078233 Biliris et al. Jun 2002 A1
20020138695 Beardsley et al. Sep 2002 A1
20030012403 Rhoads et al. Jan 2003 A1
20030055979 Cooley Mar 2003 A1
20030084294 Aoshima et al. May 2003 A1
20030103645 Levy Jun 2003 A1
20030193616 Baker et al. Oct 2003 A1
20030228030 Wendt Dec 2003 A1
20040039914 Barr et al. Feb 2004 A1
20040098370 Garland et al. May 2004 A1
20040101160 Kunisa May 2004 A1
20040250080 Levy et al. Dec 2004 A1
20050182792 Israel et al. Aug 2005 A1
20060047704 Gopalakrishnan Mar 2006 A1
20060053292 Langelaar Mar 2006 A1
20060062426 Levy et al. Mar 2006 A1
20060083242 Pulkkinen Apr 2006 A1
20060115108 Rodriguez et al. Jun 2006 A1
20060239501 Petrovic et al. Oct 2006 A1
20070003103 Lemma et al. Jan 2007 A1
20070039018 Saslow et al. Feb 2007 A1
20070071037 Abraham et al. Mar 2007 A1
20070135084 Ido et al. Jun 2007 A1
20070250560 Wein et al. Oct 2007 A1
20080002854 Tehranchi et al. Jan 2008 A1
20080037825 Lofgren et al. Feb 2008 A1
20080263612 Cooper Oct 2008 A1
20080297654 Verberkt et al. Dec 2008 A1
20080301304 Chitsaz et al. Dec 2008 A1
20090060055 Blanchard et al. Mar 2009 A1
20090089078 Bursey Apr 2009 A1
20090158318 Levy Jun 2009 A1
20090319639 Gao et al. Dec 2009 A1
20100023489 Miyata et al. Jan 2010 A1
20100054531 Kogure et al. Mar 2010 A1
20100063978 Lee et al. Mar 2010 A1
20100097494 Gum et al. Apr 2010 A1
20100111355 Petrovic et al. May 2010 A1
20100131461 Prahlad et al. May 2010 A1
20100145926 Jeong Jun 2010 A1
20100172540 Davis et al. Jul 2010 A1
20100174608 Harkness et al. Jul 2010 A1
20100281142 Stoyanov Nov 2010 A1
20100325646 Alhadeff et al. Dec 2010 A1
20110058188 Guo et al. Mar 2011 A1
20110088075 Eyer Apr 2011 A1
20110103444 Baum et al. May 2011 A1
20110161086 Rodriguez Jun 2011 A1
20110164784 Grill et al. Jul 2011 A1
20110188700 Kim et al. Aug 2011 A1
20110261667 Ren et al. Oct 2011 A1
20110281574 Patel et al. Nov 2011 A1
20110286625 Petrovic et al. Nov 2011 A1
20110293090 Ayaki et al. Dec 2011 A1
20110307545 Bouazizi Dec 2011 A1
20110320627 Landow et al. Dec 2011 A1
20120023595 Speare et al. Jan 2012 A1
20120063635 Matsushita et al. Mar 2012 A1
20120072731 Winograd et al. Mar 2012 A1
20120102304 Brave Apr 2012 A1
20120113230 Jin May 2012 A1
20120116883 Asam May 2012 A1
20120117031 Cha et al. May 2012 A1
20120117584 Gordon May 2012 A1
20120122429 Wood et al. May 2012 A1
20120129547 Andrews, III et al. May 2012 A1
20120203556 Villette et al. Aug 2012 A1
20120203734 Spivack et al. Aug 2012 A1
20120216236 Robinson et al. Aug 2012 A1
20120265735 McMillan et al. Oct 2012 A1
20120272012 Aronovich et al. Oct 2012 A1
20120272327 Shin et al. Oct 2012 A1
20120300975 Chalamala et al. Nov 2012 A1
20120304206 Roberts et al. Nov 2012 A1
20120308071 Ramsdell et al. Dec 2012 A1
20130006866 Pendakur Jan 2013 A1
20130007462 Petrovic et al. Jan 2013 A1
20130024894 Eyer Jan 2013 A1
20130031579 Klappert Jan 2013 A1
20130060837 Chakraborty et al. Mar 2013 A1
20130073065 Chen et al. Mar 2013 A1
20130077699 Gifford et al. Mar 2013 A1
20130114848 Petrovic et al. May 2013 A1
20130117571 Petrovic et al. May 2013 A1
20130129303 Lee et al. May 2013 A1
20130151855 Petrovic et al. Jun 2013 A1
20130151856 Petrovic et al. Jun 2013 A1
20130152210 Petrovic et al. Jun 2013 A1
20130171926 Distribeo Jul 2013 A1
20130188923 Hartley et al. Jul 2013 A1
20130227293 Leddy et al. Aug 2013 A1
20130271657 Park et al. Oct 2013 A1
20140037132 Heen et al. Feb 2014 A1
20140047475 Oh et al. Feb 2014 A1
20140059116 Oh et al. Feb 2014 A1
20140059591 Terpstra et al. Feb 2014 A1
20140067950 Winograd Mar 2014 A1
20140068686 Oh et al. Mar 2014 A1
20140074855 Zhao et al. Mar 2014 A1
20140075465 Petrovic et al. Mar 2014 A1
20140075469 Zhao Mar 2014 A1
20140114456 Stavropoulos et al. Apr 2014 A1
20140115644 Kim et al. Apr 2014 A1
20140130087 Cho et al. May 2014 A1
20140142958 Sharma et al. May 2014 A1
20140149395 Nakamura et al. May 2014 A1
20140196071 Terpstra et al. Jul 2014 A1
20140219495 Hua Aug 2014 A1
20140267907 Downes et al. Sep 2014 A1
20140270337 Zhao et al. Sep 2014 A1
20140279549 Petrovic et al. Sep 2014 A1
20140282695 Bakar Sep 2014 A1
20140325550 Winograd et al. Oct 2014 A1
20140325673 Petrovic Oct 2014 A1
20150030200 Petrovic et al. Jan 2015 A1
20150043728 Kim et al. Feb 2015 A1
20150043768 Breebaart Feb 2015 A1
20150052571 Stokking et al. Feb 2015 A1
20150063659 Poder et al. Mar 2015 A1
20150093016 Jiang et al. Apr 2015 A1
20150121534 Zhao et al. Apr 2015 A1
20150170661 Srinivasan Jun 2015 A1
20150229979 Wood et al. Aug 2015 A1
20150261753 Winograd et al. Sep 2015 A1
20150264429 Winograd et al. Sep 2015 A1
20150324947 Winograd et al. Nov 2015 A1
20150340045 Hardwick et al. Nov 2015 A1
20160037189 Holden et al. Feb 2016 A1
20160055606 Petrovic et al. Feb 2016 A1
20160055607 Petrovic et al. Feb 2016 A1
20160057317 Zhao et al. Feb 2016 A1
20160148334 Petrovic May 2016 A1
20160150297 Petrovic et al. May 2016 A1
20160182973 Winograd et al. Jun 2016 A1
20160182977 Mitra Jun 2016 A1
20160241932 Winograd et al. Aug 2016 A1
20160373418 Ståhl Dec 2016 A1
20170169462 Meredith Jun 2017 A1
20170272839 Winograd et al. Sep 2017 A1
20170280205 Winograd et al. Sep 2017 A1
20170374434 Petrovic et al. Dec 2017 A1
20180018748 Petrovic et al. Jan 2018 A1
20180234728 Hwang Aug 2018 A1
20200007922 Yun Jan 2020 A1
20200034874 Narayan Jan 2020 A1
20200275168 Merchant Aug 2020 A1
20210176538 Littlejohn Jun 2021 A1
Foreign Referenced Citations (47)
Number Date Country
103533343 Jan 2014 CN
1474924 Nov 2004 EP
2439735 Apr 2012 EP
2489181 Aug 2012 EP
2899720 Jul 2015 EP
2004163855 Jun 2004 JP
2004173237 Jun 2004 JP
2004193843 Jul 2004 JP
2004194233 Jul 2004 JP
2004328747 Nov 2004 JP
2005051733 Feb 2005 JP
2005094107 Apr 2005 JP
2005525600 Aug 2005 JP
20100272920 Dec 2010 JP
1020080087047 Sep 2008 KR
20100009384 Jan 2010 KR
10201016712 Feb 2011 KR
1020120083903 Jul 2012 KR
1020120128149 Nov 2012 KR
20130078663 Jul 2013 KR
1020130074922 Jul 2013 KR
101352917 Jan 2014 KR
10201424049 Jul 2014 KR
9803014 Jan 1998 WO
WO 2000059148 Oct 2000 WO
WO 2005017827 Feb 2005 WO
WO 2005038778 Apr 2005 WO
WO 2006051043 May 2006 WO
WO 2008045880 Apr 2008 WO
WO 2009031082 Mar 2009 WO
WO 2010073236 Jul 2010 WO
WO 2010135687 Nov 2010 WO
WO 2011046590 Apr 2011 WO
WO 2011116309 Sep 2011 WO
WO 2012177126 Dec 2012 WO
WO 2012177874 Dec 2012 WO
WO 2013025035 Feb 2013 WO
2013067439 May 2013 WO
WO 2013163921 Nov 2013 WO
WO 2014014252 Jan 2014 WO
WO 2015138798 Sep 2015 WO
WO 2015168697 Nov 2015 WO
WO 2015174086 Nov 2015 WO
WO 2016028934 Feb 2016 WO
WO 2016028936 Feb 2016 WO
WO 2016029055 Feb 2016 WO
WO 2016086047 Jun 2016 WO
Non-Patent Literature Citations (26)
Entry
Extended European Search Report dated Nov. 21, 2017 for European Application No. 15785628.7 (7 pages).
Partial Supplementary European Search Report dated Feb. 23, 2018 for European Application No. 15833725.3 (12 pages).
Extended European Search Report dated Feb. 23, 2018 for European Application No. 15833741.0 (8 pages).
“ATSC-3.0 Automatic Content Recognition Watermarking Solutions,” ATSC Technology Group, Advanced Television Systems Committee, Inc., Jan. 2014 (6 pages).
Aris Technologies, Inc. “Audio Watermarking System to Screen Digital Audio Content for LCM Acceptance,” May 1999 (17 pages).
Bangaleea, R., et al., “Performance improvement of spread spectrum spatialdomain watermarking scheme through diversity and attack characterisation,” IEEE Africon, pp. 293-298, 2002.
Extended European Search Report dated Sep. 21, 2017 for European Application No. 15762332.3 (9 pages).
Furon, T., “A constructive and unifying framework for zero-bit watermarking,” CS.MM, Jan. 12, 2007.
Hartung, F., et al., “Watermarking of MPEG-2 encoded video without decoding and re-coding,” Proc. SPIE Multimedia Computing and Networking 97, 3020:264-274, Feb. 1997.
Hartung, F., et al., “Watermarking of uncompressed and compressed video,” Signal Processing, 3(66):283-301, May 1998.
International Search Report and Written Opinion dated Apr. 12, 2016 for International Application No. PCT/US2015/066872, filed Dec. 18, 2015 (7 pages).
International Search Report and Written Opinion dated Aug. 13, 2015 for International Application No. PCT/US2015/029097, filed May 4, 2015 (14 pages).
International Search Report and Written Opinion dated Dec. 7, 2015 for International Application No. PCT/US2015/045960, filed Aug. 19, 2015 (14 pages).
International Search Report and Written Opinion dated Jan. 21, 2016 for International Application No. PCT/US2015/046166, filed Aug. 20, 2015 (8 pages).
International Search Report and Written Opinion dated Jan. 28, 2016 for International Application No. PCT/US2015/045964, filed Aug. 19, 2015 (8 pages).
International Search Report and Written Opinion dated Mar. 15, 2016 for International Application No. PCT/US2015/062514, filed Nov. 24, 2015 (10 pages).
International Search Report and Written Opinion dated May 28, 2015 for International Application No. PCT/US2015/020282, filed Mar. 12, 2015 (7 pages).
Kalker, T., et al., “System issues in digital image and video watermarking for copy protection,” Proc. IEEE Int. Conf. on Multimedia Computing and Systems, pp. 562-567, Jun. 1999.
Kirovski, D., et al., “Multimedia content screening using a dual watermarking and fingerprinting system,” Proceedings of the tenth ACM international conference, pp. 372-381, 2002.
Kirovski, D., et al., “Multimedia content screening using a dual watermarking and fingerprinting system,” Multimedia '02 Proceedings of the tenth ACM international conference on Multimedia, 2002 (11 pages).
Office Action dated Jul. 28, 2016 for Korean Patent Application No. 10-2016-7002289 (11 pages).
Office Action dated Jun. 10, 2016 for Korean Patent Application No. 10-2016-7002291 (19 pages). .
Office action dated Nov. 30, 2016 for Korean Patent Application No. 10-2016-7002289 (4 pages).
Verance Corporation, “Confirmedia,” PowerPoint presentation made to National Association of Broadcasters, Apr. 24, 2001 (40 pages).
Zhao, J., “A WWW service to embed and prove digital copyright watermarks,” Proc. European Conf. on Multimedia Applications, Services and Techniques (ECMAST'96), May 1996 (15 pages).
Zhao, J., “Applying digital watermarking techniques to online multimedia commerce,” Proc. Int. Conf. on Imaging Science, Systems and Applications (CISSA'97), Jun./Jul. 1997 (7 pages).
Related Publications (1)
Number Date Country
20240098334 A1 Mar 2024 US
Provisional Applications (2)
Number Date Country
62909139 Oct 2019 US
62893138 Aug 2019 US
Continuations (1)
Number Date Country
Parent 17006751 Aug 2020 US
Child 18476271 US