Patent classifications
H04N2005/91335
STREAMING PIRACY DETECTION METHOD AND SYSTEM
In one embodiment, a command is received from a video provider at a media rendering device, the command being a command to embed a subscriber ID in at least one video frame in a video stream. A random key, k is also received from the video provider at the media rendering device. An injective transformation is invoked for k and the subscriber ID, the injective transformation generating a sequence of pairs of: near-transparent patterns and corresponding time periods. Logical blocks of the at least one video frame in the video stream are overlaid with one of the near-transparent patterns for its one of the corresponding time periods. Related apparatus, systems, and methods are also described.
MULTIMEDIA CONTENT PROTECTION
A method is disclosed for protecting a multimedia content distributed by a content service to a user device, the multimedia content being related to a live event, wherein the method comprises, during the live event: identifying a significant segment of the live event; generating a trigger signal associated with the significant segment; at the user device, on the basis of the trigger signal, generating a marking comprising information identifying the user device; and, at the user device, applying the marking to a selected portion of the multimedia content, the selected portion corresponding to the significant segment of the live event.
Method and apparatus for secure transfer and playback of multimedia content
A method and apparatus for secure transfer and playback of multimedia content enables the secure transfer of multimedia content from a digital video recorder (DVR) to a personal computer (PC) and further to a handheld device. A DVR determines which devices on a Local Area Network (LAN) are authorized to share and/or retrieve content from the DVR. The DVR receives a connection request from a PC on the LAN, authorizes the connection request and establishes a secure connection between the DVR and the PC. Once the secure connection is established, the DVR receives a request for multimedia content from the PC, prepares the multimedia content for transfer and transfers the multimedia content to the PC.
Digital watermarking system and method
A computer implemented method and a system configured to receive digital content; draw the digital content onto a drawing board; draw a watermark on the drawing board over the digital content, the watermark comprising a series of non-linear lines with the lines having random spacing therebetween in the x and y axes, and save the content of the drawing board in a desired file format.
Method and electronic device for controlling content integrity using numerical data
A method and an apparatus for controlling content integrity. A method for operating in an electronic device can include including unique information of content in a watermark image, and inserting the watermark image to the content.
Digital information recording apparatus, reproducing apparatus and transmitting apparatus
A digital information recording apparatus includes a recording circuit for recording information of a retention period included in the digital information and indicating a period for permitting the digital information to be held in the recording medium, starting with a time at which the digital information is recorded on the recording medium; and information of a playback permission period included in the digital information and indicating a period for permitting the digital information to be played back starting with a time at which the information is reproduced initially following recording of the digital information on the recording medium, permitting temporary recording or copying for the information permitted for “copy never” or “copy one generation.”
EMBEDDING DATA IN VIDEO WITHOUT VISIBLE IMPAIRMENTS
Methods, devices, and computer-program products are provided for adding data to a digital video signal in a visually imperceptible manner. For example, a region of pixels can be identified in a video frame, and one or more pixel characteristics of the region of pixels can be determined. Based on the one or more pixel characteristics of the region of pixels, at least one pixel characteristic of a subset of pixels from the region of pixels can be modified in order to encode a set of data into the region of pixels. An output frame can be provided that includes the modified at least one pixel characteristics for the subset of pixels.
Digital media authentication
A method, system and product including obtaining a media sample of a media stream; retrieving from a database a media record that matches the media sample of the media stream; aligning the media record with the media stream, wherein aligning the media record comprises determining an offset from a start of the media record; comparing the media stream with the media record according to the offset; and upon identifying a semantic deviation between the media stream and the media record, determining that the media stream is semantically manipulated.
METHOD AND APPARATUS FOR SECURE TRANSFER AND PLAYBACK OF MULTIMEDIA CONTENT
A method and apparatus for secure transfer and playback of multimedia content enables the secure transfer of multimedia content from a digital video recorder (DVR) to a personal computer (PC) and further to a handheld device. A DVR determines which devices on a Local Area Network (LAN) are authorized to share and/or retrieve content from the DVR. The DVR receives a connection request from a PC on the LAN, authorizes the connection request and establishes a secure connection between the DVR and the PC. Once the secure connection is established, the DVR receives a request for multimedia content from the PC, prepares the multimedia content for transfer and transfers the multimedia content to the PC.
SYSTEMS AND METHODS FOR IDENTIFYING A CONTENT RECEIVING DEVICE
A method for identifying from among network-connected devices a particular device likely associated with a theft of distributed content includes obtaining content, the content having been distributed from a particular one of the network-connected devices, identifying in the obtained content anti-collusion codes, and determining the particular one of the network-connected devices is likely associated with the theft of distributed content when an aggregated probability calculated using the identified anti-collusion codes is equal to or exceeds a predetermined threshold.