Digital watermarking for workflow
First Claim
1. An computerized apparatus comprising:
- a controller;
router; and
a digital watermark embedder, wherein said controller controls said router and includes or communicates with an associated data record, the data record maintaining a time-based user log to track which users access the apparatus relative to time, said controller providing user information to the data record to update the data record, and wherein said digital watermark embedder automatically embeds an embedder ID and time stamp into content provided from the router, the embedder ID being uniquely associated with the apparatus or controller such that the content is traceable via the embedder ID and time stamp to a user of the apparatus via reference to the associated data record at a particular time.
6 Assignments
0 Petitions
Accused Products
Abstract
Digital watermarking provides a chain of custody for video in movie studios. Several novel improvements in workflow processes for digital watermarking provide chains of custody. In a first implementation, a digital watermark payload includes an embedder ID and time stamp. The embedder ID is associated with a controlling PC user log, including, e.g., the user log being linked to a biometric of the user. In a second implementation, a video player is forced to run a video digital watermark embedder based upon a rights command, where an ID embedded in a watermark payload is determined solely by the embedder. A third implementation encrypts a conglomerate of watermarked segments of video so that a rendering device can decrypt the segments in a manner to produce different results in each usage dependent upon the key. A fourth implementation embeds digital watermarks in DVD disk images during delivery to a duplication house.
-
Citations
18 Claims
-
1. An computerized apparatus comprising:
-
a controller;
router; and
a digital watermark embedder, wherein said controller controls said router and includes or communicates with an associated data record, the data record maintaining a time-based user log to track which users access the apparatus relative to time, said controller providing user information to the data record to update the data record, and wherein said digital watermark embedder automatically embeds an embedder ID and time stamp into content provided from the router, the embedder ID being uniquely associated with the apparatus or controller such that the content is traceable via the embedder ID and time stamp to a user of the apparatus via reference to the associated data record at a particular time. - View Dependent Claims (2, 3, 4)
-
-
5. A method of embedding digital watermarks in content comprising:
-
tracking users relative to time on a computer system;
updating a data record to reflect which users accessed the computer system with respect to time;
automatically embedding a digital watermark including an identifier in a copy of content, wherein the identifier is uniquely associated with the data record, and wherein said digital watermark further comprises a timestamp;
upon receipt of the identifier, identifying the data record, and upon receipt identifying a user in the data record that is associated with a time represented by the timestamp. - View Dependent Claims (6, 7, 8, 9)
-
-
10. A method of rendering steganographically embedded content comprising:
-
searching content or data associated with content for a rights command, wherein the rights command specifies restrictions associated with rendering the content, and wherein at least one of the restriction comprises steganographically embedding the content upon rendering;
steganographically embedding an identifier in the content, wherein the identifier is uniquely determined by a watermark embedder cooperating with a content rendering device; and
rendering the content. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A method to forensically track content embedded with a digital watermark comprising:
-
receiving a watermark identifier;
identifying a data record from among a plurality of data records based on the watermark identifier;
receiving a timestamp; and
identifying a user that is associated with a time indicated by the timestamp.
-
Specification