Secure tracking system and method for video program content
First Claim
Patent Images
1. A method of tracking a broadcast program, comprising:
- inserting a unique watermark value into a program to be broadcast;
deriving a fingerprint value based on said program'"'"'s content;
storing said program'"'"'s watermark value and associated fingerprint value;
detecting any watermark value inserted in a given broadcast program;
deriving a fingerprint value based on said given broadcast program'"'"'s content;
creating a database in which said unique watermark(s) and their associated derived fingerprint values for a plurality of unique programs to be broadcast are stored;
registering said unique watermark and associated derived fingerprint value for said program to be broadcast in said database; and
redundantly identifying said given broadcast program, said redundant identification comprising;
comparing any detected watermark value with said database of registered watermark values;
if a detected watermark value matches a registered watermark value from said database of registered watermark values, cross-checking said fingerprint value derived from said given broadcast program against said database of registered fingerprints; and
if said fingerprint matches a registered fingerprint from said database of registered fingerprints, a first identification information associated with said registered watermark value is compared with a second identification information associated with said registered fingerprint to assess a status of said broadcast program.
3 Assignments
0 Petitions
Accused Products
Abstract
A secure tracking system for video program content places a special code (watermark) within the broadcast program, preferably via the user bits of the SMPTE time code already used on virtually all film and video production systems. A registering authority provides proof of a program broadcast by detecting watermarking and fingerprinting on various broadcast media around the world and reporting it back to a central database.
-
Citations
35 Claims
-
1. A method of tracking a broadcast program, comprising:
-
inserting a unique watermark value into a program to be broadcast; deriving a fingerprint value based on said program'"'"'s content; storing said program'"'"'s watermark value and associated fingerprint value; detecting any watermark value inserted in a given broadcast program; deriving a fingerprint value based on said given broadcast program'"'"'s content; creating a database in which said unique watermark(s) and their associated derived fingerprint values for a plurality of unique programs to be broadcast are stored; registering said unique watermark and associated derived fingerprint value for said program to be broadcast in said database; and redundantly identifying said given broadcast program, said redundant identification comprising; comparing any detected watermark value with said database of registered watermark values; if a detected watermark value matches a registered watermark value from said database of registered watermark values, cross-checking said fingerprint value derived from said given broadcast program against said database of registered fingerprints; and if said fingerprint matches a registered fingerprint from said database of registered fingerprints, a first identification information associated with said registered watermark value is compared with a second identification information associated with said registered fingerprint to assess a status of said broadcast program. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for enabling reliable identification of a content comprising:
-
embedding a watermark value into said content to produce an embedded content; generating a fingerprint associated with said content; registering information comprising said watermark value and said fingerprint, wherein combination of said registered watermark value and fingerprint are subsequently used to redundantly identify said content, said redundant identification comprising; generating a fingerprint associated with a received content; analyzing said received content to detect at least one watermark value; identifying said received content by comparing said detected watermark value with a database of registered watermark values; if said detected watermark value matches a registered watermark value from said database of registered watermark values, said fingerprint is compared with a database of registered fingerprints; and if said derived fingerprint matches a registered fingerprint from said database of registered fingerprints, a first identification information associated with said stored watermark value is compared with a second identification information associated with said fingerprint to assess a status of said received content. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
-
28. A method for enabling identification of a received content comprising:
-
generating a fingerprint associated with said received content; analyzing said received content to discern the presence of embedded watermarks; and identifying said received content in accordance with a plurality of registered fingerprint and watermark values and by redundant utilization of both of said generated fingerprint and said analyzing, wherein; at least one watermark value is detected as a result of said analyzing; said identifying comprises comparing a detected watermark value with a database of registered watermark values; if said detected watermark value matches a registered watermark value from said database of registered watermark values, said fingerprint is compared with a database of registered fingerprints; and if said fingerprint matches a registered fingerprint from said database of registered fingerprints, a first identification information associated with said stored watermark value is compared with a second identification information associated with said fingerprint to assess a status of said received content. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35)
-
Specification