Program encoding and counterfeit tracking system and method
RE046918 ยท 2018-06-26
Assignee
Inventors
Cpc classification
G06T2201/0064
PHYSICS
G06T1/0028
PHYSICS
G06T2201/0081
PHYSICS
G06T1/0085
PHYSICS
International classification
G06F21/00
PHYSICS
H04N21/442
ELECTRICITY
Abstract
Unique encoding of each of a substantial number of distribution video copies of a program such as a motion picture is produced by altering the images slightly at several pre-selected locations in the program in a uniquely coded pattern. Suspected counterfeits can be compared with an unaltered master video to determine the encoded number for the copy which was counterfeited to enable tracking the source of the counterfeit. Preferably, each frame of several whole scenes is altered at each location by shifting an image so as to make the alterations largely undetectable by counterfeiters but easily detected by comparison with an unaltered master video. Artifacts are inserted in patterns representing a unique number for the program. These supplement the encoding by alteration of images and gives added means to aid in tracing counterfeit copies.
Claims
.[.1. A method for uniquely identifying a copy of an audio-visual program recorded in an electronic recording medium or optically recorded form, said method comprising: selecting a master version of an audio-visual program to be copied; making at least one copy of the master version of an audio-visual program such that each copy includes its own unique identification; and embedding the unique identification into each copy of the audio-visual program when making each copy of the audio-visual program by performing the following steps: (a) altering visible images appearing at selected ones of a plurality of different locations in said master version of an audio-visual program by enlarging an image in at least one frame in each of said selected locations; and (b) selecting said ones of said locations in each copy to create a unique pattern of enlarged images in each copy to uniquely identify each copy..].
.[.2. A method as in claim 1 including the step of storing at a location separate from said copy information representing said pattern for each copy..].
.[.3. A method as in claim 1 in which all of the images in a scene are altered at each of said locations..].
.[.4. A method as in claim 1 in which said enlarging step comprises enlarging said image in at least one dimension by from approximately four to ten percent..].
.[.5. A method as in claim 1 including distributing a plurality of said copies to a plurality of recipients with each of said copies having a unique pattern, recording the identity of each of said recipients, and storing the patterns of each copy distributed to each of said recipients..].
.[.6. A method as in claim 1 including the step of introducing artifacts forming an encoded symbol in each copy at further selected ones of a plurality of other locations..].
.[.7. A method as in claim 6 including storing the locations of said artifacts for each copy and storing the identification of the recipients of each copy..].
.[.8. A method as in claim 6 in which said artifacts are introduced at locations immediately following an edit..].
.[.9. A method as in claim 6 in which a plurality of specific locations is provided at each of a plurality of larger locations, there being one specific location in a larger location for each of ten numbers which forms one digit of an identification number for the copy being made, whereby the place and the digit can be determined by the specific location of the artifacts..].
.[.10. A method as in claim 1 in which the presence of an altered image in a selected frame indicates one of a digital 1 and a digital 0, and the absence of an altered image in said frame indicates the other of said digital 1 and 0, and the combination of digital 1's and 0's in a given sequence of selected frames forms a number unique to the program copy in which it appears..].
.[.11. A method as in claim 1 in which said alteration is repeated in a plurality of different scenes at each of said locations..].
.[.12. The method of claim 1, wherein the image is enlarged by altering an aspect ratio of the image..].
.[.13. The method of claim 1, further comprising making a plurality of copies of the master version of an audio-visual program such that each of the a plurality of copies includes its own respective unique pattern of enlarged images to uniquely identify each copy..].
.Iadd.14. A method for uniquely identifying a copy of an audio-visual program having a sequence of frames of images, the method comprising selecting a master version of the audio-visual program to be copied; and making at least one copy of the master version of the audio-visual program such that each respective copy includes its own unique identification, wherein the making of the respective copy of the master version of the audio-visual program comprises embedding the unique identification into the respective copy of the audio-visual program by obtaining in a computing device a unique identifier corresponding to the unique identification of the respective copy; selecting by the computing device a plurality of different locations in the sequence of frames to form a set of predetermined locations; enlarging by the computing device an image contained within one or more frames at each of the plurality of different locations in the sequence of frames; and creating by the computing device a unique pattern of enlarged images within the frames in the sequence of frames in the respective copy, the unique pattern corresponding to the unique identifier; wherein the enlarging and the creating further comprise receiving, in a router, the master version of the audio-visual program; receiving, in the router, an altered version of the audio-visual program, wherein the altered version of the audio-visual program has enlarged images within the frames at each location in the set of predetermined locations; and switching, by the router, between the master version of the audio-visual program and the altered version of the audio-visual program at selected locations within the set of predetermined locations in accordance with the unique identifier to generate the respective copy of the master version of the audio-visual program having the unique pattern of enlarged images within the frames. .Iaddend.
.Iadd.15. The method of claim 14, further comprising identifying a set of different scenes in the audio-visual program; and selecting the set of predetermined locations based on the set of different scenes. .Iaddend.
.Iadd.16. A non-transitory computer storage medium storing instructions which when executed by a computing device, cause the computing device to perform a method for uniquely identifying a copy of an audio-visual program having a sequence of frames of images, the method comprising receiving, in a computing device, a master version of the audio-visual program to be copied; generating, by the computing device, an altered version of the audio-visual program by determining a set of predetermined locations in the sequence of frames; enlarging an image within one or more frames at each location within the set of predetermined locations in the sequence of frames; and replacing frames of the master version at the set of predetermined locations with altered frames containing the enlarged images; and making a plurality of copies of the master version of the audio-visual program, such that each respective copy includes a respective unique identification, by embedding the respective unique identification into each respective copy of the audio-visual program, wherein the embedding further comprises obtaining, in the computing device, a unique identifier corresponding to the unique identification of the respective copy; switching, by the computing device, at a subset of the set of predetermined locations, between the master version of the audio-visual program and the altered version of the audio-visual program, in accordance with the unique identifier; and creating, through the switching, a unique pattern of the altered frames within the set of predetermined locations within the sequence of frames in the respective copy of the master version of the audio-visual program, wherein the unique pattern corresponds to the unique identifier. .Iaddend.
.Iadd.17. The non-transitory computer storage medium of claim 16, wherein each unique identifier includes a plurality of bits corresponding to the set of predetermined locations in the sequence of frames; and for each respective bit of the unique identifier, the switching between the master version and the altered version further comprises in response to a determination that the respective bit is in a first predetermined state, outputting frames from the master version of the audio-visual program as frames of the respective copy; and in response to a determination that the respective bit is in a second predetermined state, outputting frames from the altered version of the audio-visual program as frames of the respective copy. .Iaddend.
.Iadd.18. A computing device, comprising at least one server; and a non-transitory computer storage medium storing instructions which when executed by the at least one server, causes the at least one server to receive a master version of an audio-visual program having a sequence of frames of images; generate an altered version of the audio-visual program through replacing, at a set of predetermined locations within the sequence of frames, respective frames of the master version with altered frames of the respective frames of the master version having enlarged images within the altered frames; and make a plurality of copies of the master version of the audio-visual program, such that each respective copy includes a respective unique identification, by embedding the respective unique identification into each respective copy, wherein the embedding further comprises obtaining a unique identifier corresponding to the unique identification of the respective copy; switching, at a subset of the set of predetermined locations, between outputting the master version of the audio-visual program and outputting the altered version of the audio-visual program in accordance with the unique identifier; and generating, via the switching, a unique pattern of the altered frames within the set of predetermined locations within the sequence of frames in the respective copy, wherein the unique pattern corresponds to the unique identifier. .Iaddend.
.Iadd.19. The computing device of claim 18, wherein each unique identifier includes a plurality of bits corresponding to the set of predetermined locations in the sequence of frames; and wherein, for each respective bit of the unique identifier, the switching between the master version and the altered version comprises in response to a determination that the respective bit is in a first predetermined state, outputting frames from the master version of the audio-visual program as frames of the respective copy; and in response to a determination that the respective bit is in a second predetermined state, outputting frames from the altered version of the audio-visual program as frames of the respective copy. .Iaddend.
.Iadd.20. A method for uniquely identifying a copy of an audio-visual program having a sequence of frames of images, the method comprising selecting a master version of the audio-visual program to be copied; and making at least one copy of the master version of the audio-visual program such that each respective copy includes its own unique identification, wherein the making of the respective copy of the master version of the audio-visual program comprises embedding the unique identification into the respective copy of the audio-visual program by obtaining in a computing device a unique identifier corresponding to the unique identification of the respective copy; selecting by the computing device a plurality of different locations in the sequence of frames to form a set of predetermined locations; enlarging by the computing device an image within one or more frames at each of the plurality of different locations in the sequence of frames; and creating by the computing device a unique pattern of enlarged images within the frames in the sequence of frames in the respective copy, the unique pattern corresponding to the unique identifier; wherein the unique identifier includes a plurality of bits corresponding to the set of predetermined locations in the sequence of frames; a first subset of locations in the set of predetermined locations having enlarged images within the frames corresponds to bits of the unique identifier having a first state; and a second subset of locations in the set of predetermined locations having no enlarged images within the frames corresponds to bits of the unique identifier having a second state. .Iaddend.
.Iadd.21. The method of claim 20, wherein the enlarging and the creating comprise: receiving, in a router, the master version of the audio-visual program; receiving, in the router, an altered version of the audio-visual program, wherein the altered version of the audio-visual program has enlarged images within the frames at each location in the set of predetermined locations; and switching, by the router, between the master version of the audio-visual program and the altered version of the audio-visual program at selected locations within the set of predetermined locations in accordance with the unique identifier to generate the respective copy of the master version of the audio-visual program having the unique pattern of enlarged images within the frames. .Iaddend.
.Iadd.22. The method of claim 20, further comprising identifying a set of different scenes in the audio-visual program; and selecting the set of predetermined locations based on the set of different scenes. .Iaddend.
.Iadd.23. The method of claim 20, further comprising storing by the computing device at a location separate from the respective copy an identity of a recipient of the respective copy and information representing the unique pattern. .Iaddend.
.Iadd.24. The method of claim 20, wherein the enlarging of the image within the frames at each of the plurality of different locations in the sequence of frames according to the unique identifier includes enlarging images within all of the frames at each of the plurality of locations in the sequence of frames. .Iaddend.
.Iadd.25. The method of claim 20, wherein the enlarged images within the frames at each of the plurality of locations in the sequence of frames are enlarged in at least one dimension by four to ten percent. .Iaddend.
Description
IN THE DRAWINGS
(1)
(2)
(3)
(4)
GENERAL DESCRIPTION
(5)
(6) Each frame contains an image of a square or block 26. It is moving from left to right and thus is shown progressively closer to the right edge of the frame as one moves from frame 12 to frame 16.
(7)
(8) In each of the altered frames 20, 22 and 24 the right edge 20 of the enlarged object 28 is closer to the right-hand border of the frame than the unaltered object 26 in the corresponding frame of
(9) In accordance with a highly advantageous feature of the preferred embodiment of the invention, the same alteration of the images is applied to all frames of each scene in which alteration is applied.
(10) The fact that a frame of the video program has been altered can be determined by viewing the altered frame in comparison with the same frame in the unaltered master video copy, such as by juxtaposing the two frames near one another, in the manner illustrated by
(11) This superior result is due, in part, to the fact that the same alteration is applied to every frame within the scene in which it is applied. Were this not done, a counterfeiter might be able to detect the alteration as a sudden change within a scene and take steps to correct his counterfeit copy to eliminate it. Instead, the sudden change from one scene to the next masks the sudden change caused by the alteration.
(12) Since it is relatively easy to keep the unaltered master out of the hands of counterfeiters, the encoding of the invention is very difficult for counterfeiters to detect and defeat.
Coding Scheme
(13) A variety of coding schemes can be used to encode a unique identification in each video distribution copy of a program.
(14) In the preferred coding scheme, 64 different locations in the program are pre-selected. The locations can be selected at random. The time code of each location is stored. Thus, during review of a suspected counterfeit, the master can be run to each code location and still-framed when the code location is reached. When the corresponding portion of the copy is found and still-framed, frames in the master can be compared with corresponding frames of the copy.
(15) A random number generator is used to generate a unique combination of signals forming a digital one or zero at each of the 64 locations. If the images are unaltered at a location, that is taken to be a digital zero. If the images are altered, that is taken to be a digital one.
(16) The number of genuine copies made of many programs, such as movies, usually is relatively low, e.g., in the hundreds or low thousands. A 64-unit code is not necessary in order to uniquely identify each such copy. However, by providing so many digits, distinct advantages are obtained.
(17) First, there is no need to access the code at its start because virtually any sequence of 10 to 15 digits can be compared with the codes stored for the copies until a unique match is found. A match can be found quickly and easily using conventional computer software.
(18) Secondly, a longer code sequence is harder to completely delete when making an illegal copy. Thus, it is more likely that enough code will survive the counterfeiter's effort to destroy it.
(19) The alterations preferably are repeated in each of a plurality of scenes at each of the 64 locations in order to avoid the loss of code due to cuts or deletions made in the copy by the counterfeiter, either deliberately or accidentally. Also, it facilitates detection of alterations by enforcement personnel because the alterations may be more visible in some scenes than others.
(20) In addition, if a scene is repeated at a location very near its first appearance, both of the appearances will be altered and comparison of the two will yield nothing for the counterfeiter.
Encoding and Duplication System
(21)
(22) The system includes a first video server 34, a second video server 36, a video router 40, a computer 42 with an input keyboard and screen 60, with a storage unit 44, and a plurality of video recorders 50, 52, 54, 56, etc., for making distribution video copies.
(23) Although it does not take part in the production of copies, also shown in
(24) The unaltered master video is stored in the first or master server 34, and the altered video is stored in the second or modification server 36. The altered video preferably has altered scenes at each of the 64 locations selected randomly by the computer 42.
(25) Signals from the unaltered master video are sent from the master server 34 to the router 40 while altered video signals are sent from the modification server 36 to the router 40 in synchronism with the master video signals.
(26) The video router 40, as it is well known, has the ability to switch rapidly back and forth between two input video signals to produce on each of a large number of output terminals 58 a unique video signal which is made up of signals from each source alternating with signals from the other source.
(27) The computer 42 contains a random number generator which is used to generate a unique 64-digit random number which is assigned to and stored for each of the output terminals of the router.
(28) Each of the recorders 50, 52, etc., has a unique bar code identifying it. Each blank DVD or tape on which the program is recorded also has a bar-code identifying it. These bar codes are read by the use of bar code readers 62, 64, 66 and 68, and associated with one another and stored in memory (e.g., a disk file) 44.
(29) The random number code also is stored and associated with the bar codes for the recorder and the record. Similarly, the identification for the recipient of each copy is stored and associated with the copy identification.
(30) The time codes for the 64 locations are stored once for each program and made available to enforcement personnel in order to check a suspected counterfeit.
(31) It should be understood that the alterations to the images can take forms other than enlargements. For example, the images can be enlarged in one dimension only instead of in both height and width, images can be slightly reduced in size in both or only one dimension, etc.
Second Coding Method
(32) Although the foregoing method can be used alone, it is preferred to use a second coding method in addition.
(33)
(34) Preferably, the pattern is made of a plurality of very small dots 82, 84, 86 and 88 in a 33 dot matrix, although patterns and code elements other than those described can be used instead, as it will be explained in detail below.
(35) Although any desired information can be encoded, in this invention, it is preferred that the pattern represent one of the digits of an identification number which is assigned to each video copy. Preferably, this is a 5 digit number starting with 00001 and increasing by one for each additional copy made. Thus, if 128 recorders are connected to the router 40 during a production run, the numbers used will be 00001 to 00128. In the second production run, the numbers assigned will be 00129 to 00257, etc.
(36) For example, the dot pattern shown may represent the first digit 0 of the number 01736 which has been given to the copy. Similarly, a different dot pattern is used to represent the 1, the 7, and each other digit in the number.
(37) During a record production run, the modification server 36 begins by generating the pattern for the number 0 in the first placeholder location. This pattern will appear for two film frames, immediately following an edit.
(38) Locating a pattern immediately following an edit makes the dots harder to see. The patterns can be generated at any edit point throughout the program with the exception of edits within modified scenes; that is, within scenes in which the images have been altered as described above.
(39) There are ten specific locations for each of the numbers 0-9 at the first placeholder location, ten more specific locations at the second placeholder location for the second number, ten more at the third placeholder location, and ten more at each of the fourth and fifth place holder locations.
(40) Each of the specific locations is selected by the computer, and its time code is stored. Thus, if a pattern is found at a particular time code position in a suspected counterfeit program, it will not be necessary to be able to read the pattern; it will be known what the number is simply by its location. Of course, its place in the identification number (that is, whether it is the first, second, third, fourth or fifth digit) also is known, from the stored time codes.
(41) In the production of a batch of copies (e.g., 128 copies), the modification server 36 first generates the pattern for the number 0 in the first placeholder position. All recorders that have been assigned the number 0 in the first placeholder position will now be switched by the router to receive an input feed from the modification server 36.
(42) Next, the modification server 36 will generate the number 1 for the first placeholder. Once again, any recorders requiring the number 1 in the first placeholder will now be switched to the output of the server 36.
(43) In this fashion, the system steps through all of the numbers in all of the placeholders; 0 to 9 in placeholder number 1; 0 to 9 in placeholder number 2, etc., until the patterns forming all the numbers to represent a different five-digit number for each copy have been recorded.
(44) The numbers generated for each placeholder will not exceed what is required before moving on to the next placeholder. In the example 01736, there is no need to generate anything higher than a 1 in the second placeholder.
(45) This process is repeated anywhere from 5 to 10 times throughout the duration of the program, depending on the run time of the program. Thus, the coded copy number is repeated 5 to 10 times during the program. This protects against destruction of the code patterns which frequently occurs due to data compression or deliberate destruction by the counterfeiter.
(46) Preferably, the artifacts forming each code are formed by altering specific pixels of the video picture signals being transmitted from the second server 36 (
(47) Pixel luminance and chroma values may be brought to zero or any other level greater than zero. For example, it can be desirable to subtract a predetermined luminance value from the existing luminance value of the pixel. The amount to be subtracted is the minimum amount required to enable enforcement personnel to see the dots in a pirated copy. In this method, no more pixel level change is used than is necessary, and this makes the pixels less obvious. Similarly, colors can be used to create the necessary marks. For example, a combination of luminance and color can be used to create the color brown, which is less obvious than black.
(48) In other words, the contrast between the artifact and the program material is made just high enough to make the artifacts visible to enforcement personnel who know where to look.
(49) The dots 82, 84, 86, 88 are visible to the naked eye. Therefore, the print copy number can be read without any special equipment. However, reading is greatly aided by use of a stored record of where the codes are recorded in the film. With the aid of a time code reader and a video display unit, enforcement personnel can fast-forward to the locations in the program wherein the coded frames are located, and still-frame the codes frames for reading.
(50) In this way, the other digits of the program code number can be read, and the records kept showing the entity or person to which each copy was sent will then help to quickly narrow the search for the counterfeiter.
(51) The dots need not be circular. However, it is preferred that they look like specks of dirt. This prevents them from being too evident to ordinary movie patrons, and makes them harder to find by people who do not know where to look.
(52) As it is explained in greater detail in the above-identified co-pending patent application, small marks other than dots can be used as code elements. Small marks which look like small scratches, elongated spots or color artifacts can be used
(53) When both encoding methods are used, enforcement personnel can use one method to check the accuracy of the other, or can select which one is easiest to read in a given counterfeit copy.
(54) The above description of the invention is intended to be illustrative and not limiting. Various changes or modifications in the embodiments described may occur to those skilled in the art. These can be made without departing from the spirit or scope of the invention.