Patent classifications
H04N21/8358
Methods and apparatus to determine sources of media presentations
Example apparatus disclosed herein are to obtain, from a network monitor, an address associated with one or more network communications used to convey a media stream to a first input device of a plurality of input devices in communication with a media device, query one or more data structures based on the address to identify a first input source of the media device, the one or more data structures to map respective ones of the plurality of input devices to corresponding ones of a plurality of input sources of the media device, the plurality of input sources including the first input source, obtain a watermark from a meter that is to monitor an output of the media device, and identify the first input source of the media device as associated with media presented by the media device in response to determination that the watermark corresponds to the media stream.
STREAMING PIRACY DETECTION METHOD AND SYSTEM
In one embodiment, a command is received from a video provider at a media rendering device, the command being a command to embed a subscriber ID in at least one video frame in a video stream. A random key, k is also received from the video provider at the media rendering device. An injective transformation is invoked for k and the subscriber ID, the injective transformation generating a sequence of pairs of: near-transparent patterns and corresponding time periods. Logical blocks of the at least one video frame in the video stream are overlaid with one of the near-transparent patterns for its one of the corresponding time periods. Related apparatus, systems, and methods are also described.
STREAMING PIRACY DETECTION METHOD AND SYSTEM
In one embodiment, a command is received from a video provider at a media rendering device, the command being a command to embed a subscriber ID in at least one video frame in a video stream. A random key, k is also received from the video provider at the media rendering device. An injective transformation is invoked for k and the subscriber ID, the injective transformation generating a sequence of pairs of: near-transparent patterns and corresponding time periods. Logical blocks of the at least one video frame in the video stream are overlaid with one of the near-transparent patterns for its one of the corresponding time periods. Related apparatus, systems, and methods are also described.
METHODS AND APPARATUS TO IDENTIFY AND CREDIT MEDIA USING RATIOS OF MEDIA CHARACTERISTICS
Apparatus, systems, articles of manufacture, and methods to identify and credit media using ratios of media characteristics are disclosed herein. Example apparatus to identify media include at least one memory, instructions, and at least one processor to execute the instructions to: determine a first ratio based on a first time interval and a second time interval of a monitored media signal; determine a second ratio based on the second time interval and a third time interval of the monitored media signal; generate a first ratio signature based on the first and second ratios; and initiate transmission of the first ratio signature to a recipient that is to compare the first signature with a second ratio signature to identify the media.
METHODS AND APPARATUS TO IDENTIFY AND CREDIT MEDIA USING RATIOS OF MEDIA CHARACTERISTICS
Apparatus, systems, articles of manufacture, and methods to identify and credit media using ratios of media characteristics are disclosed herein. Example apparatus to identify media include at least one memory, instructions, and at least one processor to execute the instructions to: determine a first ratio based on a first time interval and a second time interval of a monitored media signal; determine a second ratio based on the second time interval and a third time interval of the monitored media signal; generate a first ratio signature based on the first and second ratios; and initiate transmission of the first ratio signature to a recipient that is to compare the first signature with a second ratio signature to identify the media.
SCALABLE ARCHITECTURES FOR REFERENCE SIGNATURE MATCHING AND UPDATING
Methods, apparatus, systems and articles of manufacture are disclosed for scalable architectures for reference signature matching and updating. An example method for scalable architectures for reference signature matching and updating includes accessing site signatures to be compared to reference signatures from a first group of media sources. Determining if a first reference node is an owner of a first one of the site signatures. Comparing a neighborhood of site signatures including the first site signature to reference signatures in a first subset of reference signatures when the first reference node is the owner of the first site signature, the first subset of references signatures stored in a first memory partition associated with the first reference node. Not comparing site signature to reference signatures when the first reference node is not the owner of the first one of the site signatures.
SCALABLE ARCHITECTURES FOR REFERENCE SIGNATURE MATCHING AND UPDATING
Methods, apparatus, systems and articles of manufacture are disclosed for scalable architectures for reference signature matching and updating. An example method for scalable architectures for reference signature matching and updating includes accessing site signatures to be compared to reference signatures from a first group of media sources. Determining if a first reference node is an owner of a first one of the site signatures. Comparing a neighborhood of site signatures including the first site signature to reference signatures in a first subset of reference signatures when the first reference node is the owner of the first site signature, the first subset of references signatures stored in a first memory partition associated with the first reference node. Not comparing site signature to reference signatures when the first reference node is not the owner of the first one of the site signatures.
SYSTEM AND METHOD FOR SIGNALING SECURITY AND DATABASE POPULATION
The disclosed technology relates to methods, devices, systems and computer program products that facilitate access to metadata associated with a content. In one example, a method is described that includes receiving a multimedia content at a receiver device, extracting a watermark message from a first segment of the multimedia content, using at least a portion of the first watermark message to obtain additional information regarding the first segment of the multimedia content that includes the first watermark message, and associating and storing one or more values of the first watermark message and the additional information. The method further includes repeating the above operations to extract additional watermark messages from additional segments of the content and to form a table or array of items that can be accessed by specifying the one or more values of the first watermark message or one or more values of the additional watermark messages.
SYSTEM AND METHOD FOR SIGNALING SECURITY AND DATABASE POPULATION
The disclosed technology relates to methods, devices, systems and computer program products that facilitate access to metadata associated with a content. In one example, a method is described that includes receiving a multimedia content at a receiver device, extracting a watermark message from a first segment of the multimedia content, using at least a portion of the first watermark message to obtain additional information regarding the first segment of the multimedia content that includes the first watermark message, and associating and storing one or more values of the first watermark message and the additional information. The method further includes repeating the above operations to extract additional watermark messages from additional segments of the content and to form a table or array of items that can be accessed by specifying the one or more values of the first watermark message or one or more values of the additional watermark messages.
Use of Steganographically-Encoded Time Information as Basis to Establish a Time Offset, to Facilitate Taking Content-Related Action
A method and system for using steganographically-encoded time information as a basis to control when a client carries out a content-related action. The client processes for presentation one or more linear media streams, each defining a respective time sequence of frames of media content, and at least one of the streams being steganographically encoded with at least one watermark at a respective time-point within the linear media stream, the watermark encoding a timestamp of the respective time-point within the linear media stream according to a server clock. The client extracts the timestamp from the watermark and computes a time offset based on a difference between the extracted timestamp and a current time according to a client clock. And the client uses the computed time offset as a basis to determine when the client should carry out a content-related action in a given one of the one or more linear media streams.