G06T1/0085

CLIENT FORENSIC WATERMARKING DEVICE, SYSTEM, AND METHOD
20220239993 · 2022-07-28 · ·

A client forensic watermarking device, system, and method. A forensic watermarking device capable of communicating with a content server selecting a watermark mask area in which a watermark mask is displayed from video content and storing watermark area information about the watermark mask area in a storage unit according to the present disclosure may provide: a downloading unit requesting the video content to be played from the content server and receiving the video content and the watermark area information from the content server; a watermark mask generation unit outputting the watermark mask using the watermark area information inputted from the downloading unit; and an overlay unit superimposing the watermark mask inputted from the watermark mask generation unit on the watermark mask area of the video content inputted from the downloading unit, thereby enabling a client to display a forensic watermark so as to deal with a collusion attack.

Use of steganographically-encoded time information as basis to establish a time offset, to facilitate taking content-related action

A method and system for using steganographically-encoded time information as a basis to control when a client carries out a content-related action. The client processes for presentation one or more linear media streams, each defining a respective time sequence of frames of media content, and at least one of the streams being steganographically encoded with at least one watermark at a respective time-point within the stream, the watermark encoding a timestamp of the respective time-point within the stream according to a server clock. The client extracts the timestamp from the watermark and computes a time offset based on a difference between the extracted timestamp and a current time according to a client clock. And the client uses the computed time offset as a basis to determine when the client should carry out a content-related action in a given one of the one or more linear media streams.

SYSTEM AND METHOD FOR IDENTIFYING ALTERED CONTENT
20210385556 · 2021-12-09 ·

Methods and systems for identifying altered content are described herein. The system generates a fingerprint for an unverified content item and locates a plurality of content items that match the fingerprint. The system then compares corresponding frames between the unverified content item and each content item of the plurality of content items. The system identifies, based on the comparing, an altered frame in the unverified content item that does not match a corresponding frame in two or more of the plurality of content items. The system also determines that one or more frames of the unverified content item that follow the altered frame match corresponding frames in the two or more of the plurality of content items. The system then generates for display an indication that the unverified content item contains one or more altered frames.

METHODS, SYSTEMS, AND STORAGE MEDIA FOR ISSUING AND VERIFYING A SECONDARY CRYPTOGRAPHIC PHOTO ID
20210385340 · 2021-12-09 ·

Methods, systems, and storage media for issuing and verifying a secondary cryptographic photo ID are disclosed. Exemplary implementations may: capture, using a scanning component of a printing device, a primary digital image of a primary photo ID; recognize, using a processing component of the printing device, alphanumeric information in the captured primary digital image; encrypt, using the processing component of the printing device, the recognized alphanumeric information; generate, using the processing component of the printing device, a digital watermark comprising the encrypted recognized alphanumeric information; recognize, using the processing component of the printing device, a photograph in the primary digital image; generate, using the processing component of the printing device, a secondary digital image comprising the recognized photograph and the generated digital watermark; and print, using a printing component of the printing device, a secondary photo ID comprising the secondary digital image.

APPARATUS AND METHOD FOR EMBEDDING PLURALITY OF FORENSIC MARKS
20220207120 · 2022-06-30 ·

Provided is an apparatus for embedding a plurality of forensic marks comprising: a pre-processing unit configured to: embed a watermark 0 symbol in each section content of an original content and store 0-section contents as a 0-content file and embed a watermark 1 symbol in each section content of the original content and store 1-section contents as a 1-content file; and embed random information in at least one section content among the 0-section contents and the 1-section contents and store random information section contents as a random information content file; and a distribution unit configured to: select corresponding section contents of the 0-content file and the 1-content file using predetermined information that is based on metadata; if a random information section content is present, select the random information section content instead of a 0-section content or a 1-section content; and output the selected random information section content as a distribution content.

LIVE VIDEO STREAMING ARCHITECTURE WITH REAL-TIME FRAME AND SUBFRAME LEVEL LIVE WATERMARKING
20220201372 · 2022-06-23 ·

A live media streaming architecture with real-time live watermarking wherein watermarks are added at a frame or subframe level. The architecture can use a UDP/WebRTC architecture, without requiring a content delivery network, which is not dependent on transmitting media by segments, thus allowing insertion of the watermark at a frame or subframe level. By inserting watermarks at a frame or subframe level, latency is minimized for media delivery to under 500 milliseconds (ms) and for extraction to about five to fifteen seconds.

System and method for signaling security and database population
11368766 · 2022-06-21 · ·

The disclosed technology relates to methods, devices, systems and computer program products that facilitate access to metadata associated with a content. In one example, a method is described that includes receiving a multimedia content at a receiver device, extracting a watermark message from a first segment of the multimedia content, using at least a portion of the first watermark message to obtain additional information regarding the first segment of the multimedia content that includes the first watermark message, and associating and storing one or more values of the first watermark message and the additional information. The method further includes repeating the above operations to extract additional watermark messages from additional segments of the content and to form a table or array of items that can be accessed by specifying the one or more values of the first watermark message or one or more values of the additional watermark messages.

COLLUSION ATTACK PREVENTION
20230274383 · 2023-08-31 ·

Systems and methods are described for obfuscating variants of content segments. Variants of content segments can be used to encode an identifying sequence in a transmission of content. The variants of the content segments can each include one or more marked frames and one or more unmarked frames. Variations can be introduced into the unmarked frames for each of the variants of the content segments.

SYSTEM AND METHOD FOR MISSION CRITICAL SCREEN VALIDATION ON COMMERCIAL DISPLAYS

A method for verifying the integrity, continuity, and availability (ICA) of information displayed on an uncertified display is disclosed. The method includes creating application data for display on the uncertified display device that includes a subliminal symbol that is periodically embedded in a few out of multiple tens of frames and that is camouflaged in the application data using steganography; transmitting the application data to the uncertified display device for display; receiving images of the application data displayed on the display screen; determining whether the subliminal symbol is detected in the captured images by extracting the symbol from the captured images and comparing the extracted symbol to an expected symbol; determining that the application data is not corrupted when the extracted symbol matches the expected symbol; and identifying a loss of ICA when the subliminal symbol is not detected or does not match the expected symbol.

Use of steganographically-encoded time information as basis to establish a time offset, to facilitate taking content-related action

A method and system for using steganographically-encoded time information as a basis to control when a client carries out a content-related action. The client processes for presentation one or more linear media streams, each defining a respective time sequence of frames of media content, and at least one of the streams being steganographically encoded with at least one watermark at a respective time-point within the linear media stream, the watermark encoding a timestamp of the respective time-point within the linear media stream according to a server clock. The client extracts the timestamp from the watermark and computes a time offset based on a difference between the extracted timestamp and a current time according to a client clock. And the client uses the computed time offset as a basis to determine when the client should carry out a content-related action in a given one of the one or more linear media streams.