US20140095112A1 - Method and device for monitoring and analyzing signals - Google Patents

Method and device for monitoring and analyzing signals Download PDF

Info

Publication number
US20140095112A1
US20140095112A1 US14/094,987 US201314094987A US2014095112A1 US 20140095112 A1 US20140095112 A1 US 20140095112A1 US 201314094987 A US201314094987 A US 201314094987A US 2014095112 A1 US2014095112 A1 US 2014095112A1
Authority
US
United States
Prior art keywords
signal
perceptual
content
version
abstract
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/094,987
Inventor
Scott A. Moskowitz
Mike W. Berry
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wistaria Trading Ltd
Original Assignee
Blue Spike LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=39182297&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=US20140095112(A1) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Blue Spike LLC filed Critical Blue Spike LLC
Priority to US14/094,987 priority Critical patent/US20140095112A1/en
Assigned to BLUE SPIKE LLC reassignment BLUE SPIKE LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MOSKOWITZ, SCOTT A., BERRY, MIKE W.
Publication of US20140095112A1 publication Critical patent/US20140095112A1/en
Priority to US14/727,944 priority patent/US20150261639A1/en
Assigned to WISTARIA TRADING LTD reassignment WISTARIA TRADING LTD ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BLUE SPIKE, LLC
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N19/00Methods or arrangements for coding, decoding, compressing or decompressing digital video signals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2458Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
    • G06F16/2468Fuzzy queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/903Querying
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • Y10S707/99932Access augmentation or optimizing
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10TECHNICAL SUBJECTS COVERED BY FORMER USPC
    • Y10STECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y10S707/00Data processing: database and file management or data structures
    • Y10S707/99931Database or file accessing
    • Y10S707/99933Query processing, i.e. searching

Definitions

  • the invention relates to the monitoring and analysis of digital information.
  • a method and device are described which relate to signal recognition to enhance identification and monitoring activities.
  • Digital watermarks help to authenticate the content of digitized multimedia information, and can also discourage piracy. Because piracy is clearly a disincentive to the digital distribution of copyrighted content, establishment of responsibility for copies and derivative copies of such works is invaluable. In considering the various forms of multimedia content, whether “master,” stereo, NTSC video, audio tape or compact disc, tolerance of quality will vary with individuals and affect the underlying commercial and aesthetic value of the content. It is desirable to tie copyrights, ownership rights, purchaser information or some combination of these and related data into the content in such a manner that the content must undergo damage, and therefore reduction of its value, with subsequent, unauthorized distribution, commercial or otherwise. Digital watermarks address many of these concerns. A general discussion of digital watermarking as it has been applied in the art may be found in U.S. Pat. No. 5,687,236 (whose specification is incorporated in whole herein by reference).
  • natural extensions may be added to digital watermarks that may also separate frequencies (color or audio), channels in 3D while utilizing discreteness in feature-based encoding only known to those with pseudo-random keys (i.e., cryptographic keys) or possibly tools to access such information, which may one day exist on a quantum level.
  • pseudo-random keys i.e., cryptographic keys
  • a matter of general weakness in digital watermark technology relates directly to the manner of implementation of the watermark. Many approaches to digital watermarking leave detection and decode control with the implementing party of the digital watermark, not the creator of the work to be protected. This weakness removes proper economic incentives for improvement of the technology.
  • One specific form of exploitation mostly regards efforts to obscure subsequent watermark detection. Others regard successful over encoding using the same watermarking process at a subsequent time.
  • Yet another way to perform secure digital watermark implementation is through “key-based” approaches.
  • a method for monitoring and analyzing at least one signal comprises the steps of: receiving at least one reference signal to be monitored; creating an abstract of the at least one reference signal; storing the abstract of the at least one reference signal in a reference database; receiving at least one query signal to be analyzed; creating an abstract of the at least one query signal; and comparing the abstract of the at least one query signal to the abstract of the at least one reference signal to determine if the abstract of the at least one query signal matches the abstract of the at least one reference signal.
  • a method for monitoring a plurality of reference signals comprises the steps of: creating an abstract for each one of a plurality of reference signals; storing each of the abstracts in a reference database; receiving at least one query signal to be analyzed; creating an abstract of each at least one query signal; locating an abstract in the reference database that matches the abstract of each at least one query signal; and recording the identify of the reference signal whose abstract matched the abstract of each at least one query signal.
  • a computerized system for monitoring and analyzing at least one signal comprises: a processor for creating an abstract of a signal using selectable criteria; a first input for receiving at least one reference signal to be monitored, the first input being coupled to the processor such that the processor may generate an abstract for each reference signal input to the processor; a reference database, coupled to the processor, for storing abstracts of each at least one reference signal; a second input for receiving at least one query signal to be analyzed, the second input being coupled to the processor such that the processor may generate an abstract for each query signal; and a comparing device, coupled to the reference database and to the second input, for comparing an abstract of the at least one query signal to the abstracts stored in the reference database to determine if the abstract of the at least one query signal matches any of the stored abstracts.
  • an electronic system for monitoring and analyzing at least one signal comprises: a first input for receiving at least one reference signal to be monitored, a first processor for creating an abstract of each reference signal input to the first processor through the first input; a second input for receiving at least one query signal to be analyzed, a second processor for creating an abstract of each query signal; a reference database for storing abstracts of each at least one reference signal; and a comparing device for comparing an abstract of the at least one query signal to the abstracts stored in the reference database to determine if the abstract of the at least one query signal matches any of the stored abstracts.
  • the abstract of a signal may be generated by the following steps: 1) analyze the characteristics of each signal in a group of audible/perceptible variations for the same signal (e.g., analyze each of five versions of the same song—which versions may have the same lyrics and music but which are sung by different artists); and 2) select those characteristics which achieve or remain relatively constant (or in other words, which have minimum variation) for each of the signals in the group.
  • the null case may be defined using those characteristics which are common to each member of the group of versions.
  • Lossless and lossy compression schemes are appropriate candidates for data reduction technologies, as are those subset of approaches that are based on perceptual models, such as AAC, MP3, TwinVQ, JPEG, GIF, MPEG, etc. Where spectral transforms fail to assist in greater data reduction of the signal, other signal characteristics can be identified as candidates for further data reduction.
  • Linear predictive coding (LPC), z-transform analysis, root mean square (rms), signal to peak may be appropriate tools to measure signal characteristics, but other approaches or combinations of signal characteristic analysis are contemplated. While such signal characteristics may assist in determining particular applications of the present invention, a generalized approach to signal recognition is necessary to optimize the deployment and use of the present invention.
  • the present invention relates to identification of digitally-sampled information, such as images, audio and video.
  • digitally-sampled information such as images, audio and video.
  • Traditional methods of identification and monitoring of those signals do not rely on “perceptual quality,” but rather upon a separate and additional signal.
  • additive signals will be called “additive signals” as they provide information about the original images, audio or video, but such information is in addition to the original signal.
  • One traditional, text-based additive signal is title and author information.
  • the title and author for example, is information about a book, but it is in addition to the text of the book. If a book is being duplicated digitally, the title and author could provide one means of monitoring the number of times the text is being duplicated, for example, through an Internet download.
  • the present invention is directed to the identification of a digital signal—whether text, audio, or video—using only the digital signal itself and then monitoring the number of times the signal is duplicated.
  • Reliance on an additive signal has many shortcomings. For example, first, someone must incorporate the additive signal within the digital data being transmitted, for example, by concatenation or through an embedding process. Such an additive signal, however, can be easily identified and removed by one who wants to utilize the original signal without paying for its usage. If the original signal itself is used to identify the content, an unauthorized user could not avoid payment of a royalty simply by removing the additive signal—because there is no additive signal to remove. Hence, the present invention avoids a major disadvantage of the prior art.
  • One such additive signal that may be utilized is a digital watermark—which ideally cannot be removed without perceptually altering the original signal.
  • a watermark may also be used as a monitoring signal (for example, by encoding an identifier that uniquely identifies the original digital signal into which the identifier is being embedded).
  • a digital watermark used for monitoring is also an additive signal, and such a signal may make it difficult for the user who wants to duplicate a signal without paying a royalty—mainly by degrading the perceptual quality of the original signal if the watermark (and hence the additive monitoring signal) is removed. This is, however, is a different solution to the problem.
  • the present invention eliminates the need of any additive monitoring signal because the present invention utilizes the underlying content signal as the identifier itself. Nevertheless, the watermark may increase the value of monitoring techniques by increasing the integrity of the embedded data and by indicating tampering of either the original content signal or the monitoring signal.
  • the design of a watermarking embedding algorithm is closely related to the perceptibility of noise in any given signal and can represent an ideal subset of the original signal: the watermark bits are an inverse of the signal to the extent that lossy compression schemes, which can be used, for instance, to optimize a watermarking embedding scheme, can yield information about the extent to which a data signal can be compressed while holding steadfast to the design requirement that the compressed signal maintain its perceptual relationship with the original, uncompressed signal.
  • lossy compression schemes which can be used, for instance, to optimize a watermarking embedding scheme
  • the present invention may be used in conjunction with watermarking technology (including the use of keys to accomplish secure digital watermarking), but watermarking is not necessary to practice the present invention.
  • Keys for watermarking may have many forms, including: descriptions of the original carrier file formatting, mapping of embedded data (actually imperceptible changes made to the carrier signal and referenced to the predetermined key or key pairs), assisting in establishing the watermark message data integrity (by incorporation of special one way functions in the watermark message data or key), etc. Discussions of these systems in the patents and pending patent applications are incorporated by reference above.
  • the “recognition” of a particular signal or an instance of its transmission, and its monitoring are operations that may be optimized through the use of digital watermark analysis.
  • a practical difference between the two approaches of using a separate, additive monitoring signal and using the original signal itself as the monitoring signal is control. If a separate signal is used for monitoring, then the originator of the text, audio or video signal being transmitted and the entity doing the monitoring have to agree as to the nature of the separate signal to be used for monitoring—otherwise, the entity doing the monitoring would not know where to look, for what to look, or how to interpret the monitoring signal once it was identified and detected. On the other hand, if the original signal is used itself as a monitoring signal, then no such agreement is necessary. Moreover, a more logical and self-sufficient relationship between the original and its data-reduced abstract enhances the transparency of any resulting monitoring efforts. The entity doing the monitoring is not looking for a separate, additive monitoring system, and further, need not have to interpret the content of the monitoring signal.
  • Monitoring implementations can be handled by robust watermark techniques (those techniques that are able to survive many signal manipulations but are not inherently “secure” for verification of a carrier signal absent a logically-related watermarking key) and forensic watermark techniques (which enable embedding of watermarks that are not able to survive perceptible alteration of the carrier signal and thus enable detection of tampering with the originally watermarked carrier signal).
  • robust watermark techniques such as those techniques that are able to survive many signal manipulations but are not inherently “secure” for verification of a carrier signal absent a logically-related watermarking key
  • forensic watermark techniques which enable embedding of watermarks that are not able to survive perceptible alteration of the carrier signal and thus enable detection of tampering with the originally watermarked carrier signal.
  • the techniques have obvious trade-offs between speed, performance and security of the embedded watermark data.
  • a digital watermark may be used to “tag” content in a manner that is not humanly-perceptible, in order to ensure that the human perception of the signal quality is maintained.
  • Watermarking must inherently alter at least one data bit of the original signal to represent a minimal change from the original signal's “unwatermarked state.” The changes may affect only a bit, at the very least, or be dependent on information hiding relating to signal characteristics, such as phase information, differences between digitized samples, root mean square (RMS) calculations, z-transform analysis, or similar signal characteristic category.
  • RMS root mean square
  • the present invention describes useful methods for using digital signal processing for benchmarking a novel basis for differencing signals with binary data comparisons. These techniques may be complemented with perceptual techniques, but are intended to leverage the generally decreasing cost of bandwidth and signal processing power in an age of increasing availability and exchange of digitized binary data.
  • a method which analyzed a portion of a song by compressing it to a single line of lyrics fails to maintain the ability to distinguish the perceptual quality of the songs being compared.
  • a compression fails to maintain the ability to distinguish between the various recorded versions of the song, say, for example between Billy Joel's recording and Barbara Streisand's recording.
  • Such a method is, therefore, incapable of providing accurate monitoring of the artist's recordings because it could not determine which of the two artists is deserving of a royalty—unless of course, there is a separate monitoring signal to provide the name of the artist or other information sufficient to distinguish the two versions.
  • the present invention aims to maintain some level of perceptual quality of the signals being compared and would deem such a compression to be excessive.
  • the original signal may be compressed to create a realistic or self-similar representation of the original signal, so that the compressed signal can be referenced at a subsequent time as unique binary data that has computational relevance to the original signal.
  • general data reduction of the original signal can be as simple as massive compression or may relate to the watermark encoding envelope parameter (those bits which a watermarking encoding algorithm deem as candidate bits for mapping independent data or those bits deemed imperceptible to human senses but detectable to a watermark detection algorithm).
  • certain media which are commonly known by signal characteristics, a painting, a song, a TV commercial, a dialect, etc., may be analyzed more accurately, and perhaps, more efficiently than a text-based descriptor of the signal. So long as the sender and receiver agree that the data representation is accurate, even insofar as the data-reduction technique has logical relationships with the perceptibility of the original signal, as they must with commonly agreed to text descriptors, no independent cataloging is necessary.
  • the present invention generally contemplates a signal recognition system that has at least five elements.
  • the actual number of elements may vary depending on the number of domains in which a signal resides (for example, audio is at least one domain while visual carriers are at least two dimensional).
  • the present invention contemplates that the number of elements will be sufficient to effectively and efficiently meet the demands of various classes of signal recognition.
  • the design of the signal recognition that may be used with data reduction is better understood in the context of the general requirements of a pattern or signal recognition system.
  • the first element is the reference database, which contains information about a plurality of potential signals that will be monitored.
  • the reference database would contain digital copies of original works of art as they are recorded by the various artists, for example, contain digital copies of all songs that will be played by a particular radio station.
  • the reference database would contain not perfect digital copies of original works of art, but digital copies of abstracted works of art, for example, contain digital copies of all songs that have been preprocessed such that the copies represent the perceptual characteristics of the original songs.
  • the reference database would contain digital copies of processed data files, which files represent works of art that have been preprocessed in such a fashion as to identify those perceptual differences that can differentiate one version of a work of art from another version of the same work of art, such as two or more versions of the same song, but by different artists.
  • These examples have obvious application to visually communicated works such as images, trademarks or photographs, and video as well.
  • the second element is the object locator, which is able to segment a portion of a signal being monitored for analysis (i.e., the “monitored signal”).
  • the segmented portion is also referred to as an “object.”
  • the signal being monitored may be thought of comprising a set of objects.
  • a song recording, for example, can be thought of as having a multitude of objects.
  • the objects need not be of uniform length, size, or content, but merely be a sample of the signal being monitored.
  • Visually communicated informational signals have related objects; color and size are examples.
  • the third element is the feature selector, which is able to analyze a selected object and identify perceptual features of the object that can be used to uniquely describe the selected object.
  • the feature selector can identify all, or nearly all, of the perceptual qualities of the object that differentiate it from a similarly selected object of other signals.
  • a feature selector has a direct relationship with the perceptibility of features commonly observed.
  • Counterfeiting is an activity which specifically seeks out features to misrepresent the authenticity of any given object. Highly granular, and ideally successful, counterfeiting is typically sought for objects that are easily recognizable and valuable, for example, currency, stamps, and trademarked or copyrighted works and objects that have value to a body politic.
  • the fourth element is the comparing device which is able to compare the selected object using the features selected by the feature selector to the plurality of signals in the reference database to identify which of the signals matches the monitored signal.
  • the comparing device may compare the selected object directly to the signal information stored in the database.
  • the comparing device may need to process the signal information stored in the database using input from the feature selector and then compare the selected object to the processed signal information.
  • the comparing device may need to process the selected object using input from the feature selector and then compare the processed selected object to the signal information.
  • the comparing device may need to process the signal information stored in the database using input from the feature selector, process the selected object using input from the feature selector, and then compare the processed selected object to the processed signal information.
  • the fifth element is the recorder which records information about the number of times a given signal is analyzed and detected.
  • the recorder may comprise a database which keeps track of the number of times a song, image, or a movie has been played, or may generate a serial output which can be subsequently processed to determine the total number of times various signals have been detected.
  • an error handler may be incorporated into the comparing device. If the comparing device identifies multiple signals which appear to contain the object being sought for analysis or monitoring, the error handler may offer further processing in order to identify additional qualities or features in the selected object such that only one of the set of captured signals is found to contain the further analyzed selected object that actually conforms with the object thought to have been transmitted or distributed.
  • one or more of the five identified elements may be implemented with software that runs on the same processor, or which uses multiple processors.
  • the elements may incorporate dynamic approaches that utilize stochastic, heuristic, or experience-based adjustments to refine the signal analysis being conducted within the system, including, for example, the signal analyses being performed within the feature selector and the comparing device. This additional analyses may be viewed as filters that are designed to meet the expectations of accuracy or speed for any intended application.
  • the present invention concerns itself with perceptible relationships only to the extent that efficiencies can be achieved both in accuracy and speed with enabling logical relationships between an original signal and its abstract.
  • the challenge is to maximize the ability to sufficiently compress a signal to both retain its relationship with the original signal while reducing the data overhead to enable more efficient analysis, archiving and monitoring of these signals.
  • data reduction alone will not suffice: the sender and receiver must agree to the accuracy of the recognition.
  • agreement will actually depend on a third party who authored or created the signal in question.
  • a digitized signal may have parameters to assist in establishing more accurate identification, for example, a “signal abstract” which naturally, or by agreement with the creator, the copyright owner or other interested parties, can be used to describe the original signal. By utilizing less than the original signal, a computationally inexpensive means of identification can be used.
  • the present invention incorporates what could best be described as “computer-acoustic” and “computer-visual” modeling, where the signal abstracts are created using data reduction techniques to determine the smallest amount of data, at least a single bit, which can represent and differentiate two digitized signal representations for a given predefined signal set.
  • Each of such representations must have at least a one bit difference with all other members of the database to differentiate each such representation from the others in the database.
  • the predefined signal set is the object being analyzed.
  • the signal identifier/detector should receive its parameters from a database engine. The engine will identify those characteristics (for example, the differences) that can be used to distinguish one digital signal from all other digital signals that are stored in its collection.
  • the engine will also consider the NULL case for a generalized item not in its database, or perhaps in situations where data objects may have collisions.
  • the NULL case is not necessary, thus making the whole system faster.
  • Greater efficiency in processing a relational database can be obtained because the rules for comparison are selected for the maximum efficiency of the processing hardware and/or software, whether or not the processing is based on psychoacoustic or psychovisual models.
  • the benefits of massive data reduction, flexibility in constructing appropriate signal recognition protocols and incorporation of cryptographic techniques to further add accuracy and confidence in the system are clearly improvements over the art. For example, where the data reduced abstract needs to have further uniqueness, a hash or signature may be required. And for objects which have further uniqueness requirements, two identical instances of the object could be made unique with cryptographic techniques.
  • Accuracy in processing and identification may be increased by using one or more of the following fidelity evaluation functions:
  • RMS root mean square
  • a RMS function may be used to assist in determining the distance between data based on mathematically determinable Euclidean distance between the beginning and end data points (bits) of a particular signal carrier.
  • Frequency weighted RMS For example, different weights may be applied to different frequency components of the carrier signal before using RMS. This selective weighting can assist in further distinguishing the distance between beginning and end points of the signal carrier (at a given point in time, described as bandwidth, or the number of total bits that can be transmitted per second) and may be considered to be the mathematical equivalent of passing a carrier signal difference through a data filter and figuring the average power in the output carrier.
  • Absolute error criteria including particularly the NULL set (described above)
  • the NULL may be utilized in two significant cases: First, in instances where the recognized, signal appears to be an identified object which is inaccurately attributed or identified to an object not handled by the database of objects; and second, where a collision of data occurs. For instance, if an artist releases a second performance of a previously recorded song, and the two performances are so similar that their differences are almost imperceptible, then the previously selected criteria may not be able to differentiate the two recordings. Hence, the database must be “recalibrated” to be able to differentiate these two versions. Similarly, if the system identifies not one, but two or more, matches for a particular search, then the database may need “recalibration” to further differentiate the two objects stored in the database.
  • the present invention may use an experience-based analysis within a recognition engine. Once such analysis may involve mathematically determining a spectral transform or its equivalent of the carrier signal. A spectral transform enables signal processing and should maintain, for certain applications, some cognitive or perceptual relationship with the original analog waveform.
  • additional classes may be subject to humanly-perceptible observation. For instance, an experience-based criteria which relates particularly to the envisioned or perceived accuracy of the data information object as it is used or applied in a particular market, product, or implementation. This may include a short 3 second segment of a commercially available and recognizable song which is used for commercials to enable recognition of the good or service being marketed.
  • the complete song is marketed as a separately valued object from the use of a discrete segment of the song (that may be used for promotion or marketing—for the complete song or for an entirely different good or service).
  • cognitive identification is a form of filtering to enable differentiations between different and intended uses of the same or subset of the same signal (object).
  • the implementation relating specifically, as disclosed herein, to the predetermined identification or recognition means and/or any specified relationship with subsequent use of the identification means can be used to create a history as to how often a particular signal is misidentified, which history can then be used to optimize identification of that signal in the future.
  • the difference between use of an excerpt of the song to promote a separate and distinct good or service and use of the excerpt to promote recognition of the song itself relates informationally to a decision based on recognized and approved use of the song.
  • Both the song and applications of the song in its entirety or as a subset are typically based on agreement by the creator and the sender who seeks to utilize the work.
  • Trust in the means for identification which can be weighted in the present invention (for example, by adjusting bit-addressable information), is an important factor in adjusting the monitoring or recognition features of the object or carrier signal, and by using any misidentification information, (including any experience-based or heuristic information), additional features of the monitored signal can be used to improve the performance of the monitoring system envisioned herein.
  • the issue of central concern with cognitive identification is a greater understanding of the parameters by which any given object is to be analyzed.
  • the system contemplated herein includes rules for governing the application of bit-addressable information to increase the accuracy of the database.
  • the predetermined parameters that are associated with a discrete case for any given object will have a significant impact upon the ability to accurately process and identify the signals. For example, if a song is transmitted over a FM carrier, then one skilled in the art will appreciate that the FM signal has a predetermined bandwidth which is different from the bandwidth of the original recording, and different even from song when played on an AM carrier, and different yet from a song played using an 8-bit Internet broadcast. Recognition of these differences, however, will permit the selection of an identification means which can be optimized for monitoring a FM broadcasted signal. In other words, the discreteness intended by the sender is limited and directed by the fidelity of the transmission means.
  • Objects may be cataloged and assessing with the understanding that all monitoring will occur using a specific transmission fidelity.
  • a database may be optimized with the understanding that only AM broadcast signals will be monitored.
  • different data bases may be created for different transmission channels, e.g., AM broadcasts, FM broadcasts, Internet broadcasts, etc.
  • bandwidth (which in the digital domain is equated to the total number of bits that can be transmitted in a fixed period of time) is a limited resource which places limitations upon transmission capacity and information coding schemes, the importance of monitoring for information objects transmitted over any given channel must take into consideration the nature and utilization of a given channel. The supply and demand of bandwidth will have a dramatic impact on the transmission, and ultimately, upon the decision to monitor and recognize signals. A discussion of this is found in a co-pending application by the inventor under U.S. patent application Ser. No. 08/674,726 (which issued Apr. 22, 2008 as U.S. Pat. No. 7,362,775) “Exchange Mechanisms for Digital Information Packages with Bandwidth Securitization, Multichannel Digital Watermarks, and Key Management” (which application is incorporated herein by reference as if fully setforth herein).
  • a filter is to be used in connection with the recognition or monitoring engine, it may be desirable for the filter to anticipate and take into consideration the following factors, which affect the economics of the transmission as they relate to triggers for payment and/or relate to events requiring audits of the objects which are being transmitted: 1) time of transmission (i.e., the point in time when the transmission occurred), including whether the transmission is of a live performance); 2) location of transmission (e.g., what channel was used for transmission, which usually determines the associated cost for usage of the transmission channel); 3) the point of origination of the transmission (which may be the same for a signal carrier over many distinct channels); and 4) pre-existence of the information carrier signal (pre-recorded or newly created information carrier signal, which may require differentiation in certain markets or instances).
  • positional information carrier signals are contemplated by this invention, namely, perceptual differences between the seemingly “same” information carrier that can be recognized as consumers of information seek different versions or quality levels of the same carrier signal. Perceptual differences exist between a song and its reproduction from a CD, an AM radio, and an Internet broadcast. To the extent that the creator or consumer of the signal can define a difference in any of the four criteria above, means can be derived (and programmed for selectability) to recognize and distinguish these differences. It is, however, quite possible that the ability to monitor carrier signal transmission with these factors will increase the variety and richness of available carrier signals to existing communications channels.
  • the monitoring and analysis contemplated by this invention may have a variety of purposes, including, for example, the following: to determine the number of times a song is broadcast on a particular radio broadcast or Internet site; to control security though a voice-activated security system; and to identify associations between a beginner's drawing and those of great artists (for example to draw comparisons between technique, compositions, or color schemes). None of these examples could be achieved with any significant degree of accuracy using a text-based analysis. Additionally, strictly text-based systems fail to fully capture the inherent value of the data recognition or monitoring information itself.
  • a database of audio signals (e.g., songs) is stored or maintained by a radio station or Internet streaming company, who may select a subset of the songs are stored so that the subset may be later broadcast to listeners.
  • the subset for example, may comprise a sufficient number of songs to fill 24 hours of music programming (between 300 or 500 songs).
  • monitoring is accomplished by embedding some identifier into the signal, or affixing the identifier to the signal, for later analysis and determination of royalty payments.
  • the present invention creates a second database from the first database, wherein each of the stored audio signals in the first database is data reduced in a manner that is not likely to reflect the human perceptual quality of the signal, meaning that a significantly data-reduced signal is not likely to be played back and recognized as the original signal.
  • the size of the second database (as measured in digital terms) is much smaller than the size of the first database, and is determined by the rate of compression. If, for example, if 24 hours worth of audio signals are compressed at a 10,000:1 compression rate, the reduced data could occupy a little more than 1 megabyte of data. With such a large compression rate, the data to be compared and/or analyzed may become computationally small such that computational speed and efficiency are significantly improved.
  • the present invention may utilize a centralized database where copies of new recordings may be deposited to ensure that copyright owners, who authorize transmission or use of their recordings by others, can independently verify that the object is correctly monitored.
  • the rules for the creator himself to enter his work would differ from a universally recognized number assigned by an independent authority (say, ISRC, ISBN for recordings and books respectively).
  • ISRC independent authority
  • Those skilled in the art of algorithmic information theory (AIT) can recognize that it is now possible to describe optimized use of binary data for content and functionality. The differences between objects must relate to decisions made by the user of the data, introducing subjective or cognitive decisions to the design of the contemplated invention as described above.
  • Another embodiment of the invention relates to visual images, which of course, involve at least two dimensions.
  • a psychovisual model attempts to represent a visual image with less data, and yet preserve those perceptual qualities that permit a human to recognize the original visual image.
  • signal monitoring of visual images may be implemented.
  • One such application for monitoring and analyzing visual images involves a desire to find works of other artists that relate to a particular theme. For example, finding paintings of sunsets or sunrises.
  • a traditional approach might involve a textual search involving a database wherein the works of other artists have been described in writing.
  • the present invention involves the scanning of an image involving a sun, compressing the data to its essential characteristics (i.e., those perceptual characteristics related to the sun) and then finding matches in a database of other visual images (stored as compressed or even uncompressed data).
  • Another useful application involving this type of monitoring and analyzing is the identification of photographs of potential suspects whose identity matches the sketch of a police artist.
  • monitoring techniques discussed above can be used for audio-visual monitoring, such as video-transmission by a television station or cable station.
  • the techniques would have to compensate, for example, for a cable station that is broadcasting a audio channel unaccompanied by video.

Abstract

A method and system for monitoring and analyzing at least one signal are disclosed. An abstract of at least one reference signal is generated and stored in a reference database. An abstract of a query signal to be analyzed is then generated so that the abstract of the query signal can be compared to the abstracts stored in the reference database for a match. The method and system may optionally be used to record information about the query signals, the number of matches recorded, and other useful information about the query signals. Moreover, the method by which abstracts are generated can be programmable based upon selectable criteria. The system can also be programmed with error control software so as to avoid the re-occurrence of a query signal that matches more than one signal stored in the reference database.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application is a continuation of application Ser. No. 13/802,384, filed Mar. 13, 2013, which is a continuation of application Ser. No. 13/487,119, filed Jun. 1, 2012, which is a continuation of application Ser. No. 13/035,964, filed Feb. 26, 2011, which is a continuation of application Ser. No. 12/655,357, filed Dec. 22, 2009, now U.S. Pat. No. 7,949,494, which is a continuation of application Ser. No. 12/005,229, filed Dec. 26, 2007, now U.S. Pat. No. 7,660,700, which is a continuation of application Ser. No. 09/657,181, filed Sep. 7, 2000, now U.S. Pat. No. 7,346,472. The previously identified patents and/or patent applications are hereby incorporated by reference, in their entireties, as if fully stated herein.
  • This application is related to U.S. patent application Ser. No. 08/999,766, filed Jul. 23, 1997, entitled “Steganographic Method and Device” (issued as U.S. Pat. No. 7,568,100); pending U.S. patent application Ser. No. 08/772,222, filed Dec. 20, 1996, entitled “Z-Transform Implementation of Digital Watermarks” (issued as U.S. Pat. No. 6,078,664); pending U.S. patent application Ser. No. 09/456,319, filed Dec. 8, 1999, entitled “Z-Transform Implementation of Digital Watermarks” (issued as U.S. Pat. No. 6,853,726); pending U.S. patent application. Ser. No. 08/674,726, filed Jul. 2, 1996, entitled “Exchange Mechanisms for Digital Information Packages with Bandwidth Securitization, Multichannel Digital Watermarks, and Key Management” (issued as U.S. Pat. No. 7,362,775); pending U.S. patent application Ser. No. 09/545,589, filed Apr. 7, 2000, entitled “Method and System for Digital Watermarking” (issued as U.S. Pat. No. 7,007,166); pending U.S. patent application Ser. No. 09/046,627, filed Mar. 24, 1998, entitled “Method for Combining Transfer Function with Predetermined Key Creation” (issued as U.S. Pat. No. 6,598,162); pending U.S. patent application Ser. No. 09/053,628, filed Apr. 2, 1998, entitled “Multiple Transform Utilization and Application for Secure Digital Watermarking” (issued as U.S. Pat. No. 6,205,249); pending U.S. patent application Ser. No. 09/281,279, filed Mar. 30, 1999, entitled “Optimization Methods for the Insertion, Protection, and Detection of Digital Watermarks in Digital Data (issued as U.S. Pat. No. 6,522,767)”; U.S. patent application Ser. No. 09,594,719, filed Jun. 16, 2000, entitled “Utilizing Data Reduction in Steganographic and Cryptographic Systems” (which is a continuation-in-part of PCT application No. PCT/US00/06522, filed Mar. 14, 2000, which PCT application claimed priority to U.S. Provisional Application No. 60/125,990, filed Mar. 24, 1999) (issued as U.S. Pat. No. 7,123,718); pending U.S. Application No. 60/169,274, filed Dec. 7, 1999, entitled “Systems, Methods And Devices For Trusted Transactions” (issued as U.S. Pat. No. 7,159,116); and PCT Application No. PCT/US00/21189, filed Aug. 4, 2000 (which claims priority to U.S. patent application Ser. No. 60/147,134, filed Aug. 4, 1999, and to U.S. patent application No. 60/213,489, filed Jun. 23, 2000, both of which are entitled, “A Secure Personal Content Server”) (issued as U.S. Pat. No. 7,475,246). The previously identified patents and/or patent applications are hereby incorporated by reference, in their entireties, as if fully stated herein.
  • In addition, this application hereby incorporates by reference, as if fully stated herein, the total disclosures of U.S. Pat. No. 5,613,004 “Steganographic Method and Device”; U.S. Pat. No. 5,745,569 “Method for Stega-Cipher Protection of Computer Code”; and U.S. Pat. No. 5,889,868 “Optimization Methods for the Insertion, Protection, and Detection of Digital Watermarks in Digitized Data.”
  • BACKGROUND OF THE INVENTION
  • 1. Field of the Invention
  • The invention relates to the monitoring and analysis of digital information. A method and device are described which relate to signal recognition to enhance identification and monitoring activities.
  • 2. Description of the Related Art
  • Many methods and protocols are known for transmitting data in digital form for multimedia applications (including computer applications delivered over public networks such as the internet or World Wide Web (“WWW”). These methods may include protocols for the compression of data, such that it may more readily and quickly be delivered over limited bandwidth data lines. Among standard protocols for data compression of digital files may be mentioned the MPEG compression standards for audio and video digital compression, promulgated by the Moving Picture Experts Group. Numerous standard reference works and patents discuss such compression and transmission standards for digitized information.
  • Digital watermarks help to authenticate the content of digitized multimedia information, and can also discourage piracy. Because piracy is clearly a disincentive to the digital distribution of copyrighted content, establishment of responsibility for copies and derivative copies of such works is invaluable. In considering the various forms of multimedia content, whether “master,” stereo, NTSC video, audio tape or compact disc, tolerance of quality will vary with individuals and affect the underlying commercial and aesthetic value of the content. It is desirable to tie copyrights, ownership rights, purchaser information or some combination of these and related data into the content in such a manner that the content must undergo damage, and therefore reduction of its value, with subsequent, unauthorized distribution, commercial or otherwise. Digital watermarks address many of these concerns. A general discussion of digital watermarking as it has been applied in the art may be found in U.S. Pat. No. 5,687,236 (whose specification is incorporated in whole herein by reference).
  • Further applications of basic digital watermarking functionality have also been developed. Examples of such applications are shown in U.S. Pat. No. 5,889,868 (whose specification is incorporated in whole herein by reference). Such applications have been drawn, for instance, to implementations of digital watermarks that were deemed most suited to particular transmissions, or particular distribution and storage mediums, given the nature of digitally sampled audio, video, and other multimedia works. There have also been developed techniques for adapting watermark application parameters to the individual characteristics of a given digital sample stream, and for implementation of digital watermarks that are feature-based—i.e., a system in which watermark information is not carried in individual samples, but is carried in the relationships between multiple samples, such as in a waveform shape. For instance, natural extensions may be added to digital watermarks that may also separate frequencies (color or audio), channels in 3D while utilizing discreteness in feature-based encoding only known to those with pseudo-random keys (i.e., cryptographic keys) or possibly tools to access such information, which may one day exist on a quantum level.
  • A matter of general weakness in digital watermark technology relates directly to the manner of implementation of the watermark. Many approaches to digital watermarking leave detection and decode control with the implementing party of the digital watermark, not the creator of the work to be protected. This weakness removes proper economic incentives for improvement of the technology. One specific form of exploitation mostly regards efforts to obscure subsequent watermark detection. Others regard successful over encoding using the same watermarking process at a subsequent time. Yet another way to perform secure digital watermark implementation is through “key-based” approaches.
  • SUMMARY OF THE INVENTION
  • A method for monitoring and analyzing at least one signal is disclosed, which method comprises the steps of: receiving at least one reference signal to be monitored; creating an abstract of the at least one reference signal; storing the abstract of the at least one reference signal in a reference database; receiving at least one query signal to be analyzed; creating an abstract of the at least one query signal; and comparing the abstract of the at least one query signal to the abstract of the at least one reference signal to determine if the abstract of the at least one query signal matches the abstract of the at least one reference signal.
  • A method for monitoring a plurality of reference signals is also disclosed, which method comprises the steps of: creating an abstract for each one of a plurality of reference signals; storing each of the abstracts in a reference database; receiving at least one query signal to be analyzed; creating an abstract of each at least one query signal; locating an abstract in the reference database that matches the abstract of each at least one query signal; and recording the identify of the reference signal whose abstract matched the abstract of each at least one query signal.
  • A computerized system for monitoring and analyzing at least one signal is also disclosed, which system comprises: a processor for creating an abstract of a signal using selectable criteria; a first input for receiving at least one reference signal to be monitored, the first input being coupled to the processor such that the processor may generate an abstract for each reference signal input to the processor; a reference database, coupled to the processor, for storing abstracts of each at least one reference signal; a second input for receiving at least one query signal to be analyzed, the second input being coupled to the processor such that the processor may generate an abstract for each query signal; and a comparing device, coupled to the reference database and to the second input, for comparing an abstract of the at least one query signal to the abstracts stored in the reference database to determine if the abstract of the at least one query signal matches any of the stored abstracts.
  • Further, an electronic system for monitoring and analyzing at least one signal is disclosed, which system comprises: a first input for receiving at least one reference signal to be monitored, a first processor for creating an abstract of each reference signal input to the first processor through the first input; a second input for receiving at least one query signal to be analyzed, a second processor for creating an abstract of each query signal; a reference database for storing abstracts of each at least one reference signal; and a comparing device for comparing an abstract of the at least one query signal to the abstracts stored in the reference database to determine if the abstract of the at least one query signal matches any of the stored abstracts.
  • DETAILED DESCRIPTION OF THE INVENTION
  • While there are many approaches to data reduction that can be utilized, a primary concern is the ability to reduce the digital signal in such a manner as to retain a “perceptual relationship” between the original signal and its data reduced version. This relationship may either be mathematically discernible or a result of market-dictated needs. The purpose is to afford a more consistent means for classifying signals than proprietary, related text-based approaches. A simple analogy is the way in which a forensic investigator uses a sketch artist to assist in determining the identity of a human.
  • In one embodiment of the invention, the abstract of a signal may be generated by the following steps: 1) analyze the characteristics of each signal in a group of audible/perceptible variations for the same signal (e.g., analyze each of five versions of the same song—which versions may have the same lyrics and music but which are sung by different artists); and 2) select those characteristics which achieve or remain relatively constant (or in other words, which have minimum variation) for each of the signals in the group. Optionally, the null case may be defined using those characteristics which are common to each member of the group of versions.
  • Lossless and lossy compression schemes are appropriate candidates for data reduction technologies, as are those subset of approaches that are based on perceptual models, such as AAC, MP3, TwinVQ, JPEG, GIF, MPEG, etc. Where spectral transforms fail to assist in greater data reduction of the signal, other signal characteristics can be identified as candidates for further data reduction. Linear predictive coding (LPC), z-transform analysis, root mean square (rms), signal to peak, may be appropriate tools to measure signal characteristics, but other approaches or combinations of signal characteristic analysis are contemplated. While such signal characteristics may assist in determining particular applications of the present invention, a generalized approach to signal recognition is necessary to optimize the deployment and use of the present invention.
  • Increasingly, valuable information is being created and stored in digital form. For example, music, photographs and motion pictures can all be stored and transmitted as a series of binary digits—1's and 0's. Digital techniques permit the original information to be duplicated repeatedly with perfect or near perfect accuracy, and each copy is perceived by viewers or listeners as indistinguishable from the original signal. Unfortunately, digital techniques also permit the information to be easily copied without the owner's permission. While digital representations of analog waveforms may be analyzed by perceptually-based or perceptually-limited analysis it is usually costly and time-consuming to model the processes of the highly effective ability of humans to identify and recognize a signal. In those applications where analog signals require analysis, the cost of digitizing the analog signal is minimal when compared to the benefits of increased accuracy and speed of signal analysis and monitoring when the processes contemplated by this invention are utilized.
  • The present invention relates to identification of digitally-sampled information, such as images, audio and video. Traditional methods of identification and monitoring of those signals do not rely on “perceptual quality,” but rather upon a separate and additional signal. Within this application, such signals will be called “additive signals” as they provide information about the original images, audio or video, but such information is in addition to the original signal. One traditional, text-based additive signal is title and author information. The title and author, for example, is information about a book, but it is in addition to the text of the book. If a book is being duplicated digitally, the title and author could provide one means of monitoring the number of times the text is being duplicated, for example, through an Internet download. The present invention, however, is directed to the identification of a digital signal—whether text, audio, or video—using only the digital signal itself and then monitoring the number of times the signal is duplicated. Reliance on an additive signal has many shortcomings. For example, first, someone must incorporate the additive signal within the digital data being transmitted, for example, by concatenation or through an embedding process. Such an additive signal, however, can be easily identified and removed by one who wants to utilize the original signal without paying for its usage. If the original signal itself is used to identify the content, an unauthorized user could not avoid payment of a royalty simply by removing the additive signal—because there is no additive signal to remove. Hence, the present invention avoids a major disadvantage of the prior art.
  • One such additive signal that may be utilized is a digital watermark—which ideally cannot be removed without perceptually altering the original signal. A watermark may also be used as a monitoring signal (for example, by encoding an identifier that uniquely identifies the original digital signal into which the identifier is being embedded). A digital watermark used for monitoring is also an additive signal, and such a signal may make it difficult for the user who wants to duplicate a signal without paying a royalty—mainly by degrading the perceptual quality of the original signal if the watermark (and hence the additive monitoring signal) is removed. This is, however, is a different solution to the problem.
  • The present invention eliminates the need of any additive monitoring signal because the present invention utilizes the underlying content signal as the identifier itself. Nevertheless, the watermark may increase the value of monitoring techniques by increasing the integrity of the embedded data and by indicating tampering of either the original content signal or the monitoring signal. Moreover, the design of a watermarking embedding algorithm is closely related to the perceptibility of noise in any given signal and can represent an ideal subset of the original signal: the watermark bits are an inverse of the signal to the extent that lossy compression schemes, which can be used, for instance, to optimize a watermarking embedding scheme, can yield information about the extent to which a data signal can be compressed while holding steadfast to the design requirement that the compressed signal maintain its perceptual relationship with the original, uncompressed signal. By describing those bits that are candidates for imperceptible embedding of watermark bits, further data reduction may be applied on the candidate watermarks as an example of retaining a logical and perceptible relationship with the original uncompressed signal.
  • Of course, the present invention may be used in conjunction with watermarking technology (including the use of keys to accomplish secure digital watermarking), but watermarking is not necessary to practice the present invention. Keys for watermarking may have many forms, including: descriptions of the original carrier file formatting, mapping of embedded data (actually imperceptible changes made to the carrier signal and referenced to the predetermined key or key pairs), assisting in establishing the watermark message data integrity (by incorporation of special one way functions in the watermark message data or key), etc. Discussions of these systems in the patents and pending patent applications are incorporated by reference above. The “recognition” of a particular signal or an instance of its transmission, and its monitoring are operations that may be optimized through the use of digital watermark analysis.
  • A practical difference between the two approaches of using a separate, additive monitoring signal and using the original signal itself as the monitoring signal is control. If a separate signal is used for monitoring, then the originator of the text, audio or video signal being transmitted and the entity doing the monitoring have to agree as to the nature of the separate signal to be used for monitoring—otherwise, the entity doing the monitoring would not know where to look, for what to look, or how to interpret the monitoring signal once it was identified and detected. On the other hand, if the original signal is used itself as a monitoring signal, then no such agreement is necessary. Moreover, a more logical and self-sufficient relationship between the original and its data-reduced abstract enhances the transparency of any resulting monitoring efforts. The entity doing the monitoring is not looking for a separate, additive monitoring system, and further, need not have to interpret the content of the monitoring signal.
  • Monitoring implementations can be handled by robust watermark techniques (those techniques that are able to survive many signal manipulations but are not inherently “secure” for verification of a carrier signal absent a logically-related watermarking key) and forensic watermark techniques (which enable embedding of watermarks that are not able to survive perceptible alteration of the carrier signal and thus enable detection of tampering with the originally watermarked carrier signal). The techniques have obvious trade-offs between speed, performance and security of the embedded watermark data.
  • In other disclosures, we suggest improvements and implementations that relate to digital watermarks in particular and embedded signaling in general. A digital watermark may be used to “tag” content in a manner that is not humanly-perceptible, in order to ensure that the human perception of the signal quality is maintained. Watermarking, however, must inherently alter at least one data bit of the original signal to represent a minimal change from the original signal's “unwatermarked state.” The changes may affect only a bit, at the very least, or be dependent on information hiding relating to signal characteristics, such as phase information, differences between digitized samples, root mean square (RMS) calculations, z-transform analysis, or similar signal characteristic category.
  • There are weaknesses in using digital watermark technology for monitoring purposes. One weakness relates directly to the way in which watermarks are implemented. Often, the persons responsible for encoding and decoding the digital watermark are not the creator of the valuable work to be protected. As such, the creator has no input on the placement of the monitoring signal within the valuable work being protected. Hence, if a user wishing to avoid payment of the royalty can find a way to decode or remove the watermark, or at least the monitoring signal embedded in the watermark, then the unauthorized user may successfully duplicate the signal with impunity. This could occur, for example, if either of the persons responsible for encoding or decoding were to have their security compromised such that the encoding or decoding algorithms were discovered by the unauthorized user.
  • With the present invention, no such disadvantages exist because the creator need not rely on anyone to insert a monitoring signal—as no such signal is necessary. Instead, the creator's work itself is used as the monitoring signal. Accordingly, the value in the signal will have a strong relationship with its recognizability.
  • By way of improving methods for efficient monitoring as well as effective confirmation of the identity of a digitally-sampled signal, the present invention describes useful methods for using digital signal processing for benchmarking a novel basis for differencing signals with binary data comparisons. These techniques may be complemented with perceptual techniques, but are intended to leverage the generally decreasing cost of bandwidth and signal processing power in an age of increasing availability and exchange of digitized binary data.
  • So long as there exist computationally inexpensive ways of identifying an entire signal with some fractional representation or relationship with the original signal, or its perceptually observable representation, we envision methods for faster and more accurate auditing of signals as they are played, distributed or otherwise shared amongst providers (transmitters) and consumers (receivers). The ability to massively compress a signal to its essence—which is not strictly equivalent to “lossy” or “lossless” compression schemes or perceptual coding techniques, but designed to preserve some underlying “aesthetic quality” of the signal—represents a useful means for signal analysis in a wide variety of applications. The signal analysis, however, must maintain the ability to distinguish the perceptual quality of the signals being compared. For example, a method which analyzed a portion of a song by compressing it to a single line of lyrics fails to maintain the ability to distinguish the perceptual quality of the songs being compared. Specifically, for example, if the song “New York State of Mind” were compressed to the lyrics “I'm in a New York State of Mind,” such a compression fails to maintain the ability to distinguish between the various recorded versions of the song, say, for example between Billy Joel's recording and Barbara Streisand's recording. Such a method is, therefore, incapable of providing accurate monitoring of the artist's recordings because it could not determine which of the two artists is deserving of a royalty—unless of course, there is a separate monitoring signal to provide the name of the artist or other information sufficient to distinguish the two versions. The present invention, however, aims to maintain some level of perceptual quality of the signals being compared and would deem such a compression to be excessive.
  • This analogy can be made clearer if it is understood that there are a large number of approaches to compressing a signal to, say, 1/10,000th of its original size, not for maintaining its signal quality to ensure computational ease for commercial quality distribution, but to assist in identification, analysis or monitoring of the signal. Most compression is either lossy or lossless and is designed with psychoacoustic or psychovisual parameters. That is to say, the signal is compressed to retain what is “humanly-perceptible.” As long as the compression successfully mimics human perception, data space may be saved when the compressed file is compared to the uncompressed or original file. While psychoacoustic and psychovisual compression has some relevance to the present invention, additional data reduction or massive compression is anticipated by the present invention. It is anticipated that the original signal may be compressed to create a realistic or self-similar representation of the original signal, so that the compressed signal can be referenced at a subsequent time as unique binary data that has computational relevance to the original signal. Depending on the application, general data reduction of the original signal can be as simple as massive compression or may relate to the watermark encoding envelope parameter (those bits which a watermarking encoding algorithm deem as candidate bits for mapping independent data or those bits deemed imperceptible to human senses but detectable to a watermark detection algorithm). In this manner, certain media which are commonly known by signal characteristics, a painting, a song, a TV commercial, a dialect, etc., may be analyzed more accurately, and perhaps, more efficiently than a text-based descriptor of the signal. So long as the sender and receiver agree that the data representation is accurate, even insofar as the data-reduction technique has logical relationships with the perceptibility of the original signal, as they must with commonly agreed to text descriptors, no independent cataloging is necessary.
  • The present invention generally contemplates a signal recognition system that has at least five elements. The actual number of elements may vary depending on the number of domains in which a signal resides (for example, audio is at least one domain while visual carriers are at least two dimensional). The present invention contemplates that the number of elements will be sufficient to effectively and efficiently meet the demands of various classes of signal recognition. The design of the signal recognition that may be used with data reduction is better understood in the context of the general requirements of a pattern or signal recognition system.
  • The first element is the reference database, which contains information about a plurality of potential signals that will be monitored. In one form, the reference database would contain digital copies of original works of art as they are recorded by the various artists, for example, contain digital copies of all songs that will be played by a particular radio station. In another form, the reference database would contain not perfect digital copies of original works of art, but digital copies of abstracted works of art, for example, contain digital copies of all songs that have been preprocessed such that the copies represent the perceptual characteristics of the original songs. In another form, the reference database would contain digital copies of processed data files, which files represent works of art that have been preprocessed in such a fashion as to identify those perceptual differences that can differentiate one version of a work of art from another version of the same work of art, such as two or more versions of the same song, but by different artists. These examples have obvious application to visually communicated works such as images, trademarks or photographs, and video as well.
  • The second element is the object locator, which is able to segment a portion of a signal being monitored for analysis (i.e., the “monitored signal”). The segmented portion is also referred to as an “object.” As such, the signal being monitored may be thought of comprising a set of objects. A song recording, for example, can be thought of as having a multitude of objects. The objects need not be of uniform length, size, or content, but merely be a sample of the signal being monitored. Visually communicated informational signals have related objects; color and size are examples.
  • The third element is the feature selector, which is able to analyze a selected object and identify perceptual features of the object that can be used to uniquely describe the selected object. Ideally, the feature selector can identify all, or nearly all, of the perceptual qualities of the object that differentiate it from a similarly selected object of other signals. Simply, a feature selector has a direct relationship with the perceptibility of features commonly observed. Counterfeiting is an activity which specifically seeks out features to misrepresent the authenticity of any given object. Highly granular, and arguably successful, counterfeiting is typically sought for objects that are easily recognizable and valuable, for example, currency, stamps, and trademarked or copyrighted works and objects that have value to a body politic.
  • The fourth element is the comparing device which is able to compare the selected object using the features selected by the feature selector to the plurality of signals in the reference database to identify which of the signals matches the monitored signal. Depending upon how the information of the plurality of signals is stored in the reference database and depending upon the available computational capacity (e.g., speed and efficiency), the exact nature of the comparison will vary. For example, the comparing device may compare the selected object directly to the signal information stored in the database. Alternatively, the comparing device may need to process the signal information stored in the database using input from the feature selector and then compare the selected object to the processed signal information. Alternatively, the comparing device may need to process the selected object using input from the feature selector and then compare the processed selected object to the signal information. Alternatively, the comparing device may need to process the signal information stored in the database using input from the feature selector, process the selected object using input from the feature selector, and then compare the processed selected object to the processed signal information.
  • The fifth element is the recorder which records information about the number of times a given signal is analyzed and detected. The recorder may comprise a database which keeps track of the number of times a song, image, or a movie has been played, or may generate a serial output which can be subsequently processed to determine the total number of times various signals have been detected.
  • Other elements may be added to the system or incorporated into the five elements identified above. For example, an error handler may be incorporated into the comparing device. If the comparing device identifies multiple signals which appear to contain the object being sought for analysis or monitoring, the error handler may offer further processing in order to identify additional qualities or features in the selected object such that only one of the set of captured signals is found to contain the further analyzed selected object that actually conforms with the object thought to have been transmitted or distributed.
  • Moreover, one or more of the five identified elements may be implemented with software that runs on the same processor, or which uses multiple processors. In addition, the elements may incorporate dynamic approaches that utilize stochastic, heuristic, or experience-based adjustments to refine the signal analysis being conducted within the system, including, for example, the signal analyses being performed within the feature selector and the comparing device. This additional analyses may be viewed as filters that are designed to meet the expectations of accuracy or speed for any intended application.
  • Since maintenance of original signal quality is not required by the present invention, increased efficiencies in processing and identification of signals can be achieved. The present invention concerns itself with perceptible relationships only to the extent that efficiencies can be achieved both in accuracy and speed with enabling logical relationships between an original signal and its abstract.
  • The challenge is to maximize the ability to sufficiently compress a signal to both retain its relationship with the original signal while reducing the data overhead to enable more efficient analysis, archiving and monitoring of these signals. In some cases, data reduction alone will not suffice: the sender and receiver must agree to the accuracy of the recognition. In other cases, agreement will actually depend on a third party who authored or created the signal in question. A digitized signal may have parameters to assist in establishing more accurate identification, for example, a “signal abstract” which naturally, or by agreement with the creator, the copyright owner or other interested parties, can be used to describe the original signal. By utilizing less than the original signal, a computationally inexpensive means of identification can be used. As long as a realistic set of conditions can be arrived at governing the relationship between a signal and its data reduced abstract, increases in effective monitoring and transparency of information data flow across communications channels is likely to result. This feature is significant in that it represents an improvement over how a digitally-sampled signal can be cataloged and identified, though the use of a means that is specifically selected based upon the strengths of a general computing device and the economic needs of a particular market for the digitized information data being monitored. The additional benefit is a more open means to uniformly catalog, analyze, and monitor signals. As well, such benefits can exist for third parties, who have a significant interest in the signal but are not the sender or receiver of said information.
  • As a general improvement over the art, the present invention incorporates what could best be described as “computer-acoustic” and “computer-visual” modeling, where the signal abstracts are created using data reduction techniques to determine the smallest amount of data, at least a single bit, which can represent and differentiate two digitized signal representations for a given predefined signal set. Each of such representations must have at least a one bit difference with all other members of the database to differentiate each such representation from the others in the database. The predefined signal set is the object being analyzed. The signal identifier/detector should receive its parameters from a database engine. The engine will identify those characteristics (for example, the differences) that can be used to distinguish one digital signal from all other digital signals that are stored in its collection. For those digital signals or objects which are seemingly identical, except[ing] that the signal may have different performance or utilization in the newly created object, benefits over additive or text-based identifiers are achieved. Additionally, decisions regarding the success or failure of an accurate detection of any given object may be flexibly implemented or changed to reflect market-based demands of the engine. Appropriate examples are songs or works or art which have been sampled or reproduced by others who are not the original creator.
  • In some cases, the engine will also consider the NULL case for a generalized item not in its database, or perhaps in situations where data objects may have collisions. For some applications, the NULL case is not necessary, thus making the whole system faster. For instance, databases which have fewer repetitions of objects or those systems which are intended to recognize signals with time constraints or capture all data objects. Greater efficiency in processing a relational database can be obtained because the rules for comparison are selected for the maximum efficiency of the processing hardware and/or software, whether or not the processing is based on psychoacoustic or psychovisual models. The benefits of massive data reduction, flexibility in constructing appropriate signal recognition protocols and incorporation of cryptographic techniques to further add accuracy and confidence in the system are clearly improvements over the art. For example, where the data reduced abstract needs to have further uniqueness, a hash or signature may be required. And for objects which have further uniqueness requirements, two identical instances of the object could be made unique with cryptographic techniques.
  • Accuracy in processing and identification may be increased by using one or more of the following fidelity evaluation functions:
  • 1) RMS (root mean square). For example, a RMS function may be used to assist in determining the distance between data based on mathematically determinable Euclidean distance between the beginning and end data points (bits) of a particular signal carrier.
  • 2) Frequency weighted RMS. For example, different weights may be applied to different frequency components of the carrier signal before using RMS. This selective weighting can assist in further distinguishing the distance between beginning and end points of the signal carrier (at a given point in time, described as bandwidth, or the number of total bits that can be transmitted per second) and may be considered to be the mathematical equivalent of passing a carrier signal difference through a data filter and figuring the average power in the output carrier.
  • 3) Absolute error criteria, including particularly the NULL set (described above) The NULL may be utilized in two significant cases: First, in instances where the recognized, signal appears to be an identified object which is inaccurately attributed or identified to an object not handled by the database of objects; and second, where a collision of data occurs. For instance, if an artist releases a second performance of a previously recorded song, and the two performances are so similar that their differences are almost imperceptible, then the previously selected criteria may not be able to differentiate the two recordings. Hence, the database must be “recalibrated” to be able to differentiate these two versions. Similarly, if the system identifies not one, but two or more, matches for a particular search, then the database may need “recalibration” to further differentiate the two objects stored in the database.
  • 4) Cognitive Identification. For example, the present invention may use an experience-based analysis within a recognition engine. Once such analysis may involve mathematically determining a spectral transform or its equivalent of the carrier signal. A spectral transform enables signal processing and should maintain, for certain applications, some cognitive or perceptual relationship with the original analog waveform. As a novel feature to the present invention, additional classes may be subject to humanly-perceptible observation. For instance, an experience-based criteria which relates particularly to the envisioned or perceived accuracy of the data information object as it is used or applied in a particular market, product, or implementation. This may include a short 3 second segment of a commercially available and recognizable song which is used for commercials to enable recognition of the good or service being marketed. The complete song is marketed as a separately valued object from the use of a discrete segment of the song (that may be used for promotion or marketing—for the complete song or for an entirely different good or service). To the extent that an owner of the song in question is able to further enable value through the licensing or agreement for use of a segment of the original signal, cognitive identification is a form of filtering to enable differentiations between different and intended uses of the same or subset of the same signal (object). The implementation relating specifically, as disclosed herein, to the predetermined identification or recognition means and/or any specified relationship with subsequent use of the identification means can be used to create a history as to how often a particular signal is misidentified, which history can then be used to optimize identification of that signal in the future. The difference between use of an excerpt of the song to promote a separate and distinct good or service and use of the excerpt to promote recognition of the song itself (for example, by the artist to sell copies of the song) relates informationally to a decision based on recognized and approved use of the song. Both the song and applications of the song in its entirety or as a subset are typically based on agreement by the creator and the sender who seeks to utilize the work. Trust in the means for identification, which can be weighted in the present invention (for example, by adjusting bit-addressable information), is an important factor in adjusting the monitoring or recognition features of the object or carrier signal, and by using any misidentification information, (including any experience-based or heuristic information), additional features of the monitored signal can be used to improve the performance of the monitoring system envisioned herein. The issue of central concern with cognitive identification is a greater understanding of the parameters by which any given object is to be analyzed. To the extent that a creator chooses varying and separate application of his object, those applications having a cognitive difference in a signal recognition sense (e.g., the whole or an excerpt), the system contemplated herein includes rules for governing the application of bit-addressable information to increase the accuracy of the database.
  • 5) Finally, the predetermined parameters that are associated with a discrete case for any given object will have a significant impact upon the ability to accurately process and identify the signals. For example, if a song is transmitted over a FM carrier, then one skilled in the art will appreciate that the FM signal has a predetermined bandwidth which is different from the bandwidth of the original recording, and different even from song when played on an AM carrier, and different yet from a song played using an 8-bit Internet broadcast. Recognition of these differences, however, will permit the selection of an identification means which can be optimized for monitoring a FM broadcasted signal. In other words, the discreteness intended by the sender is limited and directed by the fidelity of the transmission means. Objects may be cataloged and assessing with the understanding that all monitoring will occur using a specific transmission fidelity. For example, a database may be optimized with the understanding that only AM broadcast signals will be monitored. For maximum efficiency, different data bases may be created for different transmission channels, e.g., AM broadcasts, FM broadcasts, Internet broadcasts, etc.
  • For more information on increasing efficiencies for information systems, see The Mathematical Theory of Communication (1948), by Shannon.
  • Because bandwidth (which in the digital domain is equated to the total number of bits that can be transmitted in a fixed period of time) is a limited resource which places limitations upon transmission capacity and information coding schemes, the importance of monitoring for information objects transmitted over any given channel must take into consideration the nature and utilization of a given channel. The supply and demand of bandwidth will have a dramatic impact on the transmission, and ultimately, upon the decision to monitor and recognize signals. A discussion of this is found in a co-pending application by the inventor under U.S. patent application Ser. No. 08/674,726 (which issued Apr. 22, 2008 as U.S. Pat. No. 7,362,775) “Exchange Mechanisms for Digital Information Packages with Bandwidth Securitization, Multichannel Digital Watermarks, and Key Management” (which application is incorporated herein by reference as if fully setforth herein).
  • If a filter is to be used in connection with the recognition or monitoring engine, it may be desirable for the filter to anticipate and take into consideration the following factors, which affect the economics of the transmission as they relate to triggers for payment and/or relate to events requiring audits of the objects which are being transmitted: 1) time of transmission (i.e., the point in time when the transmission occurred), including whether the transmission is of a live performance); 2) location of transmission (e.g., what channel was used for transmission, which usually determines the associated cost for usage of the transmission channel); 3) the point of origination of the transmission (which may be the same for a signal carrier over many distinct channels); and 4) pre-existence of the information carrier signal (pre-recorded or newly created information carrier signal, which may require differentiation in certain markets or instances).
  • In the case of predetermined carrier signals (those which have been recorded and stored for subsequent use), “positional information carrier signals” are contemplated by this invention, namely, perceptual differences between the seemingly “same” information carrier that can be recognized as consumers of information seek different versions or quality levels of the same carrier signal. Perceptual differences exist between a song and its reproduction from a CD, an AM radio, and an Internet broadcast. To the extent that the creator or consumer of the signal can define a difference in any of the four criteria above, means can be derived (and programmed for selectability) to recognize and distinguish these differences. It is, however, quite possible that the ability to monitor carrier signal transmission with these factors will increase the variety and richness of available carrier signals to existing communications channels. The differentiation between an absolute case for transmission of an object, which is a time dependent event, for instance a live or real time broadcast, versus the relative case, which is prerecorded or stored for transmission at a later point in time, creates recognizable differences for signal monitoring.
  • The monitoring and analysis contemplated by this invention may have a variety of purposes, including, for example, the following: to determine the number of times a song is broadcast on a particular radio broadcast or Internet site; to control security though a voice-activated security system; and to identify associations between a beginner's drawing and those of great artists (for example to draw comparisons between technique, compositions, or color schemes). None of these examples could be achieved with any significant degree of accuracy using a text-based analysis. Additionally, strictly text-based systems fail to fully capture the inherent value of the data recognition or monitoring information itself.
  • SAMPLE EMBODIMENTS Sample Embodiment 1
  • A database of audio signals (e.g., songs) is stored or maintained by a radio station or Internet streaming company, who may select a subset of the songs are stored so that the subset may be later broadcast to listeners. The subset, for example, may comprise a sufficient number of songs to fill 24 hours of music programming (between 300 or 500 songs). Traditionally, monitoring is accomplished by embedding some identifier into the signal, or affixing the identifier to the signal, for later analysis and determination of royalty payments. Most of the traditional analysis is performed by actual persons who use play lists and other statistical approximations of audio play, including for example, data obtained through the manual (i.e., by persons) monitoring of a statistically significant sample of stations and transmission times so that an extrapolation may be made to a larger number of comparable markets.
  • The present invention creates a second database from the first database, wherein each of the stored audio signals in the first database is data reduced in a manner that is not likely to reflect the human perceptual quality of the signal, meaning that a significantly data-reduced signal is not likely to be played back and recognized as the original signal.
  • As a result of the data reduction, the size of the second database (as measured in digital terms) is much smaller than the size of the first database, and is determined by the rate of compression. If, for example, if 24 hours worth of audio signals are compressed at a 10,000:1 compression rate, the reduced data could occupy a little more than 1 megabyte of data. With such a large compression rate, the data to be compared and/or analyzed may become computationally small such that computational speed and efficiency are significantly improved.
  • With greater compression rates, it is anticipated that similarity may exist between the data compressed abstractions of different analog signals (e.g., recordings by two different artists of the same song). The present invention contemplates the use of bit-addressable differences to distinguish between such cases. In applications where the data to be analyzed has higher value in some predetermined sense, cryptographic protocols, such as a hash or digital signature, can be used to distinguish such close cases.
  • In a preferred embodiment, the present invention may utilize a centralized database where copies of new recordings may be deposited to ensure that copyright owners, who authorize transmission or use of their recordings by others, can independently verify that the object is correctly monitored. The rules for the creator himself to enter his work would differ from a universally recognized number assigned by an independent authority (say, ISRC, ISBN for recordings and books respectively). Those skilled in the art of algorithmic information theory (AIT) can recognize that it is now possible to describe optimized use of binary data for content and functionality. The differences between objects must relate to decisions made by the user of the data, introducing subjective or cognitive decisions to the design of the contemplated invention as described above. To the extent that objects can have an optimized data size when compared with other objects for any given set of objects, the algorithms for data reduction would have predetermined flexibility directly related to computational efficiency and the set of objects to be monitored. The flexibility in having transparent determination of unique signal abstracts, as opposed to independent third party assignment, is likely to increase confidence in the monitoring effort by the owners of the original signals themselves. The prior art allows for no such transparency to the copyright creators.
  • Sample Embodiment 2
  • Another embodiment of the invention relates to visual images, which of course, involve at least two dimensions.
  • Similar to the goals of a psychoacoustic model, a psychovisual model attempts to represent a visual image with less data, and yet preserve those perceptual qualities that permit a human to recognize the original visual image. Using the very same techniques described above in connection with an audio signal, signal monitoring of visual images may be implemented.
  • One such application for monitoring and analyzing visual images involves a desire to find works of other artists that relate to a particular theme. For example, finding paintings of sunsets or sunrises. A traditional approach might involve a textual search involving a database wherein the works of other artists have been described in writing. The present invention, however, involves the scanning of an image involving a sun, compressing the data to its essential characteristics (i.e., those perceptual characteristics related to the sun) and then finding matches in a database of other visual images (stored as compressed or even uncompressed data). By studying the work of other artists using such techniques, a novice, for example, could learn much by comparing the presentations of a common theme by different artists.
  • Another useful application involving this type of monitoring and analyzing is the identification of photographs of potential suspects whose identity matches the sketch of a police artist.
  • Note that combinations of the monitoring techniques discussed above can be used for audio-visual monitoring, such as video-transmission by a television station or cable station. The techniques would have to compensate, for example, for a cable station that is broadcasting a audio channel unaccompanied by video.
  • Other embodiments and uses of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. The specification and examples should be considered exemplary only with the true scope and spirit of the invention indicated by the following claims. As will be easily understood by those of ordinary skill in the art, variations and modifications of each of the disclosed embodiments can be easily made within the scope of this invention as defined by the following claims.

Claims (35)

1-100. (canceled)
101. A method for generating a signal abstract representative of a content signal, the method comprising:
receiving a version of a content signal;
performing a first signal analysis of a first version of said content signal to determine perceptual features of said first version of said content signal;
performing a second signal analysis of a second version of said content signal to determine perceptual features of said second version of said content signal;
comparing the first content signal's analysis to the second content signal's analysis which results in a comparison; and
generating at least one signal abstract, depending on said comparison, wherein said at least one signal abstract is representative of said content signal.
102. The method of claim 101 wherein said comparing comprises determining at least one of similarity; self-similarity, absolute error criteria, and cognitive identification.
103. The method of claim 101 wherein perceptual features determined by said first signal analysis comprise at least one of a psychoacoustic feature and a psychovisual feature.
104. The method of claim 101 wherein said generating said at least one signal abstract comprises lossy or lossless data compression.
105. The method of claim 101 wherein perceptual features determined by said first signal analysis comprises bit-addressable information.
106. A method for generating a signal abstract representative of a content signal, the method comprising:
receiving at least two versions of the content signal;
performing a first signal analysis of a first version of the content signal to provide perceptual features of said first version of the content signal;
performing a second signal analysis of a second version of the content signal to provide perceptual features of the second version of the content signal;
comparing the first content signal's perceptual features to the second content signal's perceptual features; and
assigning a value depending on the comparison;
generating the signal abstract depending upon said comparison; and
wherein said signal abstract is representative of said content signal.
107. The method of claim 106 wherein said comparing comprises determining at least one of similarity; self-similarity, absolute error criteria, and cognitive identification.
108. The method of claim 106 wherein perceptual features determined by said first signal analysis comprise at least one of a psychoacoustic feature and a psychovisual feature.
109. The method of claim 106 wherein said generating said signal abstract comprises lossy or lossless data compression.
110. The method of claim 106 wherein perceptual features determined by said first signal analysis comprises bit-addressable information.
111. A comparison unit for providing a signal abstract representative of a content signal, the signal abstract comparison unit comprising:
a first feature selector for analyzing the content signal and for identifying a first content signal filter parameter;
a second feature selector for receiving the content signal and identifying a second content signal filter parameter;
a comparator for comparing the first content signal filter parameter and the second content signal filter parameter and for providing a comparison result representative of a signal abstract of the content signal.
112. The unit of claim 111 wherein said comparator is configured to determine at least one of similarity; self-similarity, absolute error criteria, and cognitive identification.
113. The unit of claim 111 wherein said first content signal filter parameter comprises at least one of a psychoacoustic parameter and a psychovisual parameter.
114. The unit of claim 111 wherein the said comparator performs lossy or lossless data compression to provide said signal abstract.
115. The unit of claim 111 wherein said first content signal filter parameter comprises bit-addressable information.
116. An apparatus for providing an indication of a similarity of versions of signals, the apparatus comprising:
a first signal feature selector for selecting a first version of a signal and a second version of a signal and for identifying the first version signal's perceptual qualities and the second version signal's perceptual qualities;
a second signal feature selector for selecting a third version of a signal and a fourth version of a signal and for identifying the third version signal's perceptual qualities and the fourth version signal's perceptual qualities;
a comparing device configured to receive the first version signal's perceptual qualities, the second version signal's perceptual qualities, the third version signal's perceptual qualities, and the fourth version signal's perceptual qualities and configured to analyze the first version signal's perceptual qualities with the second version signal's perceptual qualities to differentiate between the first and second versions of the signal and further configured to analyze the third version signal's perceptual qualities with the fourth version signal's perceptual qualities to differentiate between the third and fourth versions of the signal,
said comparing device further configured to compare said first signal feature selector's analysis with said second signal feature selector's analysis and to provide an indication of similarity in said first and second versions of the signal and an indication of similarity of said third and forth versions of the signal and to indicate differences in perceptual features between the indicated similarity of the first and second versions of the signal from the indicated third and fourth versions of the signal.
117. The apparatus of claim 116 wherein the third and fourth versions of the signal are an audiovisual or A/V signal or features derived therefrom.
118. The apparatus of claim 116 wherein the third and fourth versions of the signal are an audiovisual or A/V signal or features derived therefrom and wherein the audio or video portion have perceptible differences.
119. The apparatus of claim 116 wherein the third and fourth versions of the signal are an audiovisual or A/V signal or features derived therefrom and wherein the audio or video portion have bit-addressable differences.
120. The apparatus of claim 116 wherein the first and second versions of the signal are an audio signal or features derived therefrom.
121. The apparatus of claim 116 wherein said comparing device's indications of similarity are based upon said comparing device using at least one absolute error criteria and cognitive identification.
122. The apparatus of claim 116 wherein said first signal feature selector is configured to identify perceptual qualities comprising at least one of a psychoacoustic parameter and a psychovisual parameter.
123. The apparatus of claim 116 wherein said apparatus is further configured to perform lossy or lossless data compression to generate a signal abstract for a signal.
124. The apparatus of claim 116 wherein said first signal feature selector is configured to identify perceptual qualities comprising bit-addressable information.
125. A method for analyzing content files for one or more of monitoring, identifying, and determining content file characteristics, comprising:
1) measuring at least one perceptual feature from a set of perceptual features consisting of cognitive features, a perceptible characteristic; and bit-addressable differences thereof, for a first content file to provide a first measurement;
2) measuring at least one perceptual feature from the set of perceptual features consisting of cognitive features, a perceptible characteristic; and bit-addressable differences thereof, for a second content file to provide a second measurement;
3) associating said first measurement with said first content file;
4) associating said second measurement with said second content file;
5) computing at least one value based upon said first measurement and said second measurement;
6) comparing said first measurement to said second measurement.
126. The method of claim 125 wherein said comparing comprises determining at least one of similarity; self-similarity, absolute error criteria, and cognitive identification.
127. The method of claim 125 wherein said perceptible characteristic comprise at least one of a psychoacoustic feature and a psychovisual feature.
128. The method of claim 125 wherein the said generating said at least one signal abstract comprises lossy or lossless data compression.
129. The method of claim 125 wherein said perceptible characteristic comprises bit-addressable information.
130. A computer program product comprising a tangible medium modified to store computer readable code, which, when implemented in a computer system, causes the computer system to perform the following method for analyzing content files for one or more of monitoring, identifying, and determining content file characteristics, comprising:
1) measuring at least one perceptual feature from a set of perceptual features consisting of cognitive features, a perceptible characteristic; and bit-addressable differences thereof, for a first content file to provide a first measurement;
2) measuring at least one perceptual feature from the set of perceptual features consisting of cognitive features, a perceptible characteristic; and bit-addressable differences thereof, for a second content file to provide a second measurement;
3) associating said first measurement with said first content file;
4) associating said second measurement with said second content file;
5) computing at least one value based upon said first measurement and said second measurement;
6) comparing said first measurement to said second measurement.
131. A computer program product of claim 130 further comprising on said tangible medium computer readable code, which, when implemented in a computer system, causes the computer system to determine at least one of similarity; self-similarity, absolute error criteria, cognitive identification, of two content files.
132. A computer program product of claim 130 wherein said perceptual feature is a psychoacoustic and/or psychovisual feature.
133. A computer program product of claim 130 wherein said measuring comprises lossy or lossless data compression.
134. A computer program product of claim 130 wherein said perceptual features consist of bit-addressable information.
US14/094,987 1996-07-02 2013-12-03 Method and device for monitoring and analyzing signals Abandoned US20140095112A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US14/094,987 US20140095112A1 (en) 2000-09-07 2013-12-03 Method and device for monitoring and analyzing signals
US14/727,944 US20150261639A1 (en) 1996-07-02 2015-06-02 Method and device for monitoring and analyzing signals

Applications Claiming Priority (7)

Application Number Priority Date Filing Date Title
US09/657,181 US7346472B1 (en) 2000-09-07 2000-09-07 Method and device for monitoring and analyzing signals
US12/005,229 US7660700B2 (en) 2000-09-07 2007-12-26 Method and device for monitoring and analyzing signals
US12/655,357 US7949494B2 (en) 2000-09-07 2009-12-22 Method and device for monitoring and analyzing signals
US13/035,964 US8214175B2 (en) 2000-09-07 2011-02-26 Method and device for monitoring and analyzing signals
US13/487,119 US20120239686A1 (en) 2000-09-07 2012-06-01 Method and device for monitoring and analyzing signals
US13/802,384 US8712728B2 (en) 2000-09-07 2013-03-13 Method and device for monitoring and analyzing signals
US14/094,987 US20140095112A1 (en) 2000-09-07 2013-12-03 Method and device for monitoring and analyzing signals

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US13/802,384 Continuation US8712728B2 (en) 1996-07-02 2013-03-13 Method and device for monitoring and analyzing signals

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US14/727,944 Continuation US20150261639A1 (en) 1996-07-02 2015-06-02 Method and device for monitoring and analyzing signals

Publications (1)

Publication Number Publication Date
US20140095112A1 true US20140095112A1 (en) 2014-04-03

Family

ID=39182297

Family Applications (8)

Application Number Title Priority Date Filing Date
US09/657,181 Expired - Fee Related US7346472B1 (en) 1996-07-02 2000-09-07 Method and device for monitoring and analyzing signals
US12/005,229 Expired - Fee Related US7660700B2 (en) 1996-07-02 2007-12-26 Method and device for monitoring and analyzing signals
US12/655,357 Expired - Fee Related US7949494B2 (en) 1996-07-02 2009-12-22 Method and device for monitoring and analyzing signals
US13/035,964 Expired - Fee Related US8214175B2 (en) 1996-07-02 2011-02-26 Method and device for monitoring and analyzing signals
US13/487,119 Abandoned US20120239686A1 (en) 1996-07-02 2012-06-01 Method and device for monitoring and analyzing signals
US13/802,384 Expired - Fee Related US8712728B2 (en) 1996-07-02 2013-03-13 Method and device for monitoring and analyzing signals
US14/094,987 Abandoned US20140095112A1 (en) 1996-07-02 2013-12-03 Method and device for monitoring and analyzing signals
US14/727,944 Abandoned US20150261639A1 (en) 1996-07-02 2015-06-02 Method and device for monitoring and analyzing signals

Family Applications Before (6)

Application Number Title Priority Date Filing Date
US09/657,181 Expired - Fee Related US7346472B1 (en) 1996-07-02 2000-09-07 Method and device for monitoring and analyzing signals
US12/005,229 Expired - Fee Related US7660700B2 (en) 1996-07-02 2007-12-26 Method and device for monitoring and analyzing signals
US12/655,357 Expired - Fee Related US7949494B2 (en) 1996-07-02 2009-12-22 Method and device for monitoring and analyzing signals
US13/035,964 Expired - Fee Related US8214175B2 (en) 1996-07-02 2011-02-26 Method and device for monitoring and analyzing signals
US13/487,119 Abandoned US20120239686A1 (en) 1996-07-02 2012-06-01 Method and device for monitoring and analyzing signals
US13/802,384 Expired - Fee Related US8712728B2 (en) 1996-07-02 2013-03-13 Method and device for monitoring and analyzing signals

Family Applications After (1)

Application Number Title Priority Date Filing Date
US14/727,944 Abandoned US20150261639A1 (en) 1996-07-02 2015-06-02 Method and device for monitoring and analyzing signals

Country Status (1)

Country Link
US (8) US7346472B1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10347262B2 (en) 2017-10-18 2019-07-09 The Nielsen Company (Us), Llc Systems and methods to improve timestamp transition resolution

Families Citing this family (120)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6560349B1 (en) * 1994-10-21 2003-05-06 Digimarc Corporation Audio monitoring using steganographic information
US7362775B1 (en) * 1996-07-02 2008-04-22 Wistaria Trading, Inc. Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management
US6760463B2 (en) * 1995-05-08 2004-07-06 Digimarc Corporation Watermarking methods and media
US5613004A (en) * 1995-06-07 1997-03-18 The Dice Company Steganographic method and device
US7006661B2 (en) 1995-07-27 2006-02-28 Digimarc Corp Digital watermarking systems and methods
US7562392B1 (en) * 1999-05-19 2009-07-14 Digimarc Corporation Methods of interacting with audio and ambient music
US6650761B1 (en) * 1999-05-19 2003-11-18 Digimarc Corporation Watermarked business cards and methods
US6205249B1 (en) 1998-04-02 2001-03-20 Scott A. Moskowitz Multiple transform utilization and applications for secure digital watermarking
US7664263B2 (en) * 1998-03-24 2010-02-16 Moskowitz Scott A Method for combining transfer functions with predetermined key creation
US7346472B1 (en) 2000-09-07 2008-03-18 Blue Spike, Inc. Method and device for monitoring and analyzing signals
US7159116B2 (en) 1999-12-07 2007-01-02 Blue Spike, Inc. Systems, methods and devices for trusted transactions
US7177429B2 (en) 2000-12-07 2007-02-13 Blue Spike, Inc. System and methods for permitting open access to data objects and for securing data within the data objects
US5889868A (en) 1996-07-02 1999-03-30 The Dice Company Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
US7095874B2 (en) 1996-07-02 2006-08-22 Wistaria Trading, Inc. Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
US7457962B2 (en) 1996-07-02 2008-11-25 Wistaria Trading, Inc Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
US7730317B2 (en) * 1996-12-20 2010-06-01 Wistaria Trading, Inc. Linear predictive coding implementation of digital watermarks
JPH1155201A (en) 1997-07-29 1999-02-26 Sony Corp Device, method and system for information processing and transmitting medium
US7664264B2 (en) 1999-03-24 2010-02-16 Blue Spike, Inc. Utilizing data reduction in steganographic and cryptographic systems
US7206820B1 (en) * 2000-03-18 2007-04-17 Digimarc Corporation System for linking from object to remote resource
US7475246B1 (en) 1999-08-04 2009-01-06 Blue Spike, Inc. Secure personal content server
US9609278B2 (en) 2000-04-07 2017-03-28 Koplar Interactive Systems International, Llc Method and system for auxiliary data detection and delivery
US8121843B2 (en) * 2000-05-02 2012-02-21 Digimarc Corporation Fingerprint methods and systems for media signals
US6990453B2 (en) 2000-07-31 2006-01-24 Landmark Digital Services Llc System and methods for recognizing sound and music signals in high noise and distortion
US8205237B2 (en) 2000-09-14 2012-06-19 Cox Ingemar J Identifying works, using a sub-linear time search, such as an approximate nearest neighbor search, for initiating a work-based action, such as an action on the internet
US7127615B2 (en) 2000-09-20 2006-10-24 Blue Spike, Inc. Security based on subliminal and supraliminal channels for data objects
US8001053B2 (en) * 2001-05-31 2011-08-16 Contentguard Holdings, Inc. System and method for rights offering and granting using shared state variables
US7177430B2 (en) * 2001-10-31 2007-02-13 Portalplayer, Inc. Digital entroping for digital audio reproductions
US7287275B2 (en) * 2002-04-17 2007-10-23 Moskowitz Scott A Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth
US20040091111A1 (en) * 2002-07-16 2004-05-13 Levy Kenneth L. Digital watermarking and fingerprinting applications
US8230480B2 (en) * 2004-04-26 2012-07-24 Avaya Inc. Method and apparatus for network security based on device security status
US7412842B2 (en) 2004-04-27 2008-08-19 Emerson Climate Technologies, Inc. Compressor diagnostic and protection system
US7275377B2 (en) 2004-08-11 2007-10-02 Lawrence Kates Method and apparatus for monitoring refrigerant-cycle systems
KR20070046846A (en) 2004-08-12 2007-05-03 코닌클리케 필립스 일렉트로닉스 엔.브이. Selection of content from a stream of video or audio data
US7664796B2 (en) * 2004-10-13 2010-02-16 Microsoft Corporation Electronic labeling for offline management of storage devices
US7581036B2 (en) * 2004-10-13 2009-08-25 Microsoft Corporation Offline caching of control transactions for storage devices
US8874477B2 (en) 2005-10-04 2014-10-28 Steven Mark Hoffberg Multifactorial optimization system and method
US8260008B2 (en) 2005-11-11 2012-09-04 Eyelock, Inc. Methods for performing biometric recognition of a human eye and corroboration of same
US20070162761A1 (en) 2005-12-23 2007-07-12 Davis Bruce L Methods and Systems to Help Detect Identity Fraud
US8364646B2 (en) 2006-03-03 2013-01-29 Eyelock, Inc. Scalable searching of biometric databases using dynamic selection of data subsets
GB2436417B (en) * 2006-03-22 2008-02-20 Nec Technologies Radio access bearer transfer
US8604901B2 (en) 2006-06-27 2013-12-10 Eyelock, Inc. Ensuring the provenance of passengers at a transportation facility
US8590325B2 (en) 2006-07-19 2013-11-26 Emerson Climate Technologies, Inc. Protection and diagnostic module for a refrigeration system
US8738749B2 (en) 2006-08-29 2014-05-27 Digimarc Corporation Content monitoring and host compliance evaluation
US8707459B2 (en) 2007-01-19 2014-04-22 Digimarc Corporation Determination of originality of content
US8010511B2 (en) 2006-08-29 2011-08-30 Attributor Corporation Content monitoring and compliance enforcement
US20080216494A1 (en) 2006-09-07 2008-09-11 Pham Hung M Compressor data module
EP2076871A4 (en) 2006-09-22 2015-09-16 Eyelock Inc Compact biometric acquisition system and method
EP2100253A4 (en) 2006-10-02 2011-01-12 Global Rainmakers Inc Fraud resistant biometric financial transaction system and method
US7668680B2 (en) * 2007-03-02 2010-02-23 Agilent Technologies, Inc. Operational qualification by independent reanalysis of data reduction patch
US8953849B2 (en) 2007-04-19 2015-02-10 Eyelock, Inc. Method and system for biometric recognition
WO2008131201A1 (en) 2007-04-19 2008-10-30 Global Rainmakers, Inc. Method and system for biometric recognition
US20120239458A9 (en) * 2007-05-18 2012-09-20 Global Rainmakers, Inc. Measuring Effectiveness of Advertisements and Linking Certain Consumer Activities Including Purchases to Other Activities of the Consumer
US8439733B2 (en) * 2007-06-14 2013-05-14 Harmonix Music Systems, Inc. Systems and methods for reinstating a player within a rhythm-action game
US8678896B2 (en) 2007-06-14 2014-03-25 Harmonix Music Systems, Inc. Systems and methods for asynchronous band interaction in a rhythm action game
US20090037142A1 (en) 2007-07-30 2009-02-05 Lawrence Kates Portable method and apparatus for monitoring refrigerant-cycle systems
US9117119B2 (en) 2007-09-01 2015-08-25 Eyelock, Inc. Mobile identity platform
WO2009029765A1 (en) 2007-09-01 2009-03-05 Global Rainmakers, Inc. Mirror system and method for acquiring biometric data
US9036871B2 (en) 2007-09-01 2015-05-19 Eyelock, Inc. Mobility identity platform
US8212870B2 (en) 2007-09-01 2012-07-03 Hanna Keith J Mirror system and method for acquiring biometric data
US9002073B2 (en) 2007-09-01 2015-04-07 Eyelock, Inc. Mobile identity platform
US20090106297A1 (en) * 2007-10-18 2009-04-23 David Howell Wright Methods and apparatus to create a media measurement reference database from a plurality of distributed sources
US20090111584A1 (en) 2007-10-31 2009-04-30 Koplar Interactive Systems International, L.L.C. Method and system for encoded information processing
US9140728B2 (en) 2007-11-02 2015-09-22 Emerson Climate Technologies, Inc. Compressor sensor module
WO2009158662A2 (en) 2008-06-26 2009-12-30 Global Rainmakers, Inc. Method of reducing visibility of illimination while acquiring high quality imagery
US8663013B2 (en) 2008-07-08 2014-03-04 Harmonix Music Systems, Inc. Systems and methods for simulating a rock band experience
US8189776B2 (en) * 2008-09-18 2012-05-29 The Hong Kong University Of Science And Technology Method and system for encoding multimedia content based on secure coding schemes using stream cipher
US8676822B2 (en) * 2009-02-06 2014-03-18 Disney Enterprises, Inc. System and method for quality assured media file storage
CA2754170A1 (en) * 2009-03-11 2010-09-16 Paymaan Behrouzi Digital signatures
US8117220B2 (en) * 2009-04-30 2012-02-14 Hewlett-Packard Development Company, L.P. Artificial record added to a database
EP2433391A4 (en) 2009-05-21 2013-01-23 Digimarc Corp Combined watermarking and fingerprinting
US8805723B2 (en) * 2009-05-27 2014-08-12 Iviu Technologies, Llc Acoustically transmitting a resource identifier in multiple concurrent segments
US8489774B2 (en) * 2009-05-27 2013-07-16 Spot411 Technologies, Inc. Synchronized delivery of interactive content
US8465366B2 (en) 2009-05-29 2013-06-18 Harmonix Music Systems, Inc. Biasing a musical performance input to a part
US8449360B2 (en) 2009-05-29 2013-05-28 Harmonix Music Systems, Inc. Displaying song lyrics and vocal cues
KR101545290B1 (en) * 2009-06-04 2015-08-19 한화테크윈 주식회사 Method for controlling video recorder and video recorder adopting the method
US9873053B2 (en) 2009-06-18 2018-01-23 Koplar Interactive Systems International, Llc Methods and systems for processing gaming data
US8521779B2 (en) 2009-10-09 2013-08-27 Adelphoi Limited Metadata record generation
US9981193B2 (en) 2009-10-27 2018-05-29 Harmonix Music Systems, Inc. Movement based recognition and evaluation
EP2494432B1 (en) 2009-10-27 2019-05-29 Harmonix Music Systems, Inc. Gesture-based user interface
US8702485B2 (en) 2010-06-11 2014-04-22 Harmonix Music Systems, Inc. Dance game and tutorial
US20110119141A1 (en) * 2009-11-16 2011-05-19 Hoyos Corporation Siccolla Identity Verification Architecture and Tool
US8874243B2 (en) 2010-03-16 2014-10-28 Harmonix Music Systems, Inc. Simulating musical instruments
CA2798072C (en) 2010-05-04 2017-02-14 Shazam Entertainment Ltd. Methods and systems for synchronizing media
CN102959624B (en) 2010-06-09 2015-04-22 阿德尔福伊有限公司 System and method for audio media recognition
US8562403B2 (en) 2010-06-11 2013-10-22 Harmonix Music Systems, Inc. Prompting a player of a dance game
US9358456B1 (en) 2010-06-11 2016-06-07 Harmonix Music Systems, Inc. Dance competition game
US9447963B2 (en) 2010-08-16 2016-09-20 Emerson Process Management Power & Water Solutions, Inc. Dynamic tuning of dynamic matrix control of steam temperature
US9335042B2 (en) 2010-08-16 2016-05-10 Emerson Process Management Power & Water Solutions, Inc. Steam temperature control using dynamic matrix control
US9217565B2 (en) * 2010-08-16 2015-12-22 Emerson Process Management Power & Water Solutions, Inc. Dynamic matrix control of steam temperature with prevention of saturated steam entry into superheater
US9024166B2 (en) 2010-09-09 2015-05-05 Harmonix Music Systems, Inc. Preventing subtractive track separation
US10043229B2 (en) 2011-01-26 2018-08-07 Eyelock Llc Method for confirming the identity of an individual while shielding that individual's personal data
EP2676223A4 (en) 2011-02-17 2016-08-10 Eyelock Llc Efficient method and system for the acquisition of scene imagery and iris imagery using a single sensor
CN105910247B (en) 2011-02-28 2018-12-14 艾默生电气公司 The monitoring and diagnosis of the HVAC of house solution
US9124798B2 (en) 2011-05-17 2015-09-01 Eyelock Inc. Systems and methods for illuminating an iris with visible light for biometric acquisition
US9163828B2 (en) 2011-10-31 2015-10-20 Emerson Process Management Power & Water Solutions, Inc. Model-based load demand control
US8964338B2 (en) 2012-01-11 2015-02-24 Emerson Climate Technologies, Inc. System and method for compressor motor protection
US9292894B2 (en) 2012-03-14 2016-03-22 Digimarc Corporation Content recognition and synchronization using local caching
US10158927B1 (en) * 2012-09-05 2018-12-18 Google Llc Systems and methods for detecting audio-video synchronization using timestamps
US9310439B2 (en) 2012-09-25 2016-04-12 Emerson Climate Technologies, Inc. Compressor having a control and diagnostic module
US9638436B2 (en) 2013-03-15 2017-05-02 Emerson Electric Co. HVAC system remote monitoring and diagnosis
US9551504B2 (en) 2013-03-15 2017-01-24 Emerson Electric Co. HVAC system remote monitoring and diagnosis
US9803902B2 (en) 2013-03-15 2017-10-31 Emerson Climate Technologies, Inc. System for refrigerant charge verification using two condenser coil temperatures
EP2981772B1 (en) 2013-04-05 2022-01-12 Emerson Climate Technologies, Inc. Heat-pump system with refrigerant charge diagnostics
US9952922B2 (en) 2013-07-18 2018-04-24 Nxp Usa, Inc. Fault detection apparatus and method
US9219723B1 (en) 2013-12-20 2015-12-22 Certify Global Inc. Source device for systems and methods of verifying an authentication using dynamic scoring
US9905233B1 (en) 2014-08-07 2018-02-27 Digimarc Corporation Methods and apparatus for facilitating ambient content recognition using digital watermarks, and related arrangements
US9652633B2 (en) 2014-11-25 2017-05-16 Certify Global Inc. Systems and methods of verifying an authenticated document biosignature
US10726113B2 (en) 2014-11-25 2020-07-28 Certify Global Inc. Systems and methods of verifying an authenticated document biosignature glyph containing a selected image
US10581843B2 (en) 2014-11-25 2020-03-03 Certify Global Inc. Systems and methods of verifying an authenticated document biosignature encoding restricted access information
US9805344B1 (en) 2015-01-23 2017-10-31 Island Intellectual Property, Llc Notification system and method
WO2017019094A1 (en) * 2015-07-30 2017-02-02 Hewlett Packard Enterprise Development Lp Component sensing
US10841542B2 (en) 2016-02-26 2020-11-17 A9.Com, Inc. Locating a person of interest using shared video footage from audio/video recording and communication devices
US10033780B2 (en) 2016-02-26 2018-07-24 Ring Inc. Sharing video footage from audio/video recording and communication devices
US10397528B2 (en) 2016-02-26 2019-08-27 Amazon Technologies, Inc. Providing status information for secondary devices with video footage from audio/video recording and communication devices
US10489453B2 (en) 2016-02-26 2019-11-26 Amazon Technologies, Inc. Searching shared video footage from audio/video recording and communication devices
US11393108B1 (en) 2016-02-26 2022-07-19 Amazon Technologies, Inc. Neighborhood alert mode for triggering multi-device recording, multi-camera locating, and multi-camera event stitching for audio/video recording and communication devices
US10748414B2 (en) 2016-02-26 2020-08-18 A9.Com, Inc. Augmenting and sharing data from audio/video recording and communication devices
US9965934B2 (en) 2016-02-26 2018-05-08 Ring Inc. Sharing video footage from audio/video recording and communication devices for parcel theft deterrence
US10237608B2 (en) * 2016-09-13 2019-03-19 Facebook, Inc. Systems and methods for evaluating synchronization between content streams
WO2021226147A1 (en) * 2020-05-08 2021-11-11 Worthy Technology LLC System for optimizing data-driven signals

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5889868A (en) * 1996-07-02 1999-03-30 The Dice Company Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
US6088455A (en) * 1997-01-07 2000-07-11 Logan; James D. Methods and apparatus for selectively reproducing segments of broadcast programming
US6704451B1 (en) * 1998-03-02 2004-03-09 Koninklijke Kpn N.V. Method and arrangement for objective assessment of video quality

Family Cites Families (343)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US536348A (en) * 1895-03-26 Rotary steam-engine
US5870474A (en) 1995-12-04 1999-02-09 Scientific-Atlanta, Inc. Method and apparatus for providing conditional access in connection-oriented, interactive networks with a multiplicity of service providers
US3986624A (en) 1971-02-16 1976-10-19 International Incinerators, Inc. Disposal feeding system including selective container control
US3947825A (en) * 1973-04-13 1976-03-30 International Business Machines Corporation Abstracting system for index search machine
SE390266B (en) * 1973-08-08 1976-12-13 Kockums Ind Ab CIRCUIT
GB1519142A (en) 1974-07-04 1978-07-26 Emi Ltd Detection of magnetic patterns
US3984624A (en) 1974-07-25 1976-10-05 Weston Instruments, Inc. Video system for conveying digital and analog information
US4339134A (en) 1977-07-05 1982-07-13 Rockwell International Corporation Electronic card game
US4200770A (en) 1977-09-06 1980-04-29 Stanford University Cryptographic apparatus and method
US4218582A (en) 1977-10-06 1980-08-19 The Board Of Trustees Of The Leland Stanford Junior University Public key cryptographic apparatus and method
US4405829A (en) 1977-12-14 1983-09-20 Massachusetts Institute Of Technology Cryptographic communications system and method
US4424414A (en) 1978-05-01 1984-01-03 Board Of Trustees Of The Leland Stanford Junior University Exponentiation cryptographic apparatus and method
EP0067998B1 (en) 1980-09-26 1986-04-16 Bo LÖFBERG Method for processing an information signal and means for carrying out the method
CA1153103A (en) 1981-03-19 1983-08-30 Northern Telecom Limited Scrambling and unscrambling video signals in a pay tv system
US4755889A (en) * 1983-04-19 1988-07-05 Compusonics Video Corporation Audio and video digital recording and playback system
US4472747A (en) * 1983-04-19 1984-09-18 Compusound, Inc. Audio digital recording and playback system
US4908873A (en) 1983-05-13 1990-03-13 Philibert Alex C Document reproduction security system
US4672605A (en) 1984-03-20 1987-06-09 Applied Spectrum Technologies, Inc. Data and voice communications system
US4980782A (en) 1985-06-03 1990-12-25 Peter Ginkel Software protection and identification system
JPH0743748B2 (en) 1986-02-17 1995-05-15 株式会社オークネット Information transmission processing method of auction information transmission processing system
GB8611014D0 (en) 1986-05-06 1986-06-11 Emi Plc Thorn Signal identification
US4748668A (en) 1986-07-09 1988-05-31 Yeda Research And Development Company Limited Method, apparatus and article for identification and signature
US5050213A (en) 1986-10-14 1991-09-17 Electronic Publishing Resources, Inc. Database usage metering and protection system and method
US4977594A (en) 1986-10-14 1990-12-11 Electronic Publishing Resources, Inc. Database usage metering and protection system and method
US4827508A (en) 1986-10-14 1989-05-02 Personal Library Software, Inc. Database usage metering and protection system and method
DE3851724T2 (en) 1987-07-08 1995-05-04 Matsushita Electric Ind Co Ltd Method and device for protecting copy signals.
US4896275A (en) 1987-07-10 1990-01-23 Bull Hn Information Systems Inc. Full page graphics image display data reduction
US4939515A (en) 1988-09-30 1990-07-03 General Electric Company Digital signal encoding and decoding apparatus
GB8824969D0 (en) 1988-10-25 1988-11-30 Emi Plc Thorn Identification codes
US5111530A (en) * 1988-11-04 1992-05-05 Sony Corporation Digital audio signal generating apparatus
NL8901032A (en) 1988-11-10 1990-06-01 Philips Nv CODER FOR INCLUDING ADDITIONAL INFORMATION IN A DIGITAL AUDIO SIGNAL WITH A PREFERRED FORMAT, A DECODER FOR DERIVING THIS ADDITIONAL INFORMATION FROM THIS DIGITAL SIGNAL, AN APPARATUS FOR RECORDING A DIGITAL SIGNAL ON A CODE OF RECORD. OBTAINED A RECORD CARRIER WITH THIS DEVICE.
US5142576A (en) * 1989-02-07 1992-08-25 Market Data Corporation System for securely providing restricted video information
US5341477A (en) 1989-02-24 1994-08-23 Digital Equipment Corporation Broker for computer network server selection
US4972471A (en) 1989-05-15 1990-11-20 Gary Gross Encoding system
US5077665A (en) 1989-05-25 1991-12-31 Reuters Limited Distributed matching system
US5123045A (en) 1989-08-18 1992-06-16 Massachusetts Institute Of Technology Comprehensive software protection system
US4969204A (en) 1989-11-29 1990-11-06 Eastman Kodak Company Hybrid residual-based hierarchical storage and display method for high resolution digital images in a multiuse environment
US5337361C1 (en) 1990-01-05 2001-05-15 Symbol Technologies Inc Record with encoded data
US5210820A (en) * 1990-05-02 1993-05-11 Broadcast Data Systems Limited Partnership Signal recognition system and method
EP0459046A1 (en) 1990-05-31 1991-12-04 International Business Machines Corporation Computer software protection
US5136581A (en) 1990-07-02 1992-08-04 At&T Bell Laboratories Arrangement for reserving and allocating a plurality of competing demands for an ordered bus communication network
US5136646A (en) 1991-03-08 1992-08-04 Bell Communications Research, Inc. Digital document time-stamping with catenate certificate
US5136647A (en) 1990-08-02 1992-08-04 Bell Communications Research, Inc. Method for secure time-stamping of digital documents
US5091938B1 (en) 1990-08-06 1997-02-04 Nippon Denki Home Electronics Digital data cryptographic system
US5243515A (en) 1990-10-30 1993-09-07 Lee Wayne M Secure teleprocessing bidding system
JP2644096B2 (en) 1991-03-20 1997-08-25 富士通株式会社 Mail center management method
US5361296A (en) 1991-11-25 1994-11-01 Zoom Telephonics, Inc. Modem with ring detection/modem processing capability
US5319735A (en) 1991-12-17 1994-06-07 Bolt Beranek And Newman Inc. Embedded signalling
US5243423A (en) 1991-12-20 1993-09-07 A. C. Nielsen Company Spread spectrum digital data transmission over TV video
JP3210054B2 (en) 1992-02-21 2001-09-17 烈 山川 Apparatus and method for generating chaotic signal and chaotic device
US5469536A (en) 1992-02-25 1995-11-21 Imageware Software, Inc. Image editing system including masking capability
FI90934C (en) 1992-04-13 1994-04-11 Salon Televisiotehdas Oy A method for incorporating digital information into an audio signal prior to its channel encoding
US5327520A (en) * 1992-06-04 1994-07-05 At&T Bell Laboratories Method of use of voice message coder/decoder
US5754697A (en) * 1994-12-02 1998-05-19 Fu; Chi-Yung Selective document image data compression technique
JP2589932B2 (en) 1992-06-15 1997-03-12 インターナショナル・ビジネス・マシーンズ・コーポレイション Global optimization method and system for device allocation
US5721788A (en) 1992-07-31 1998-02-24 Corbis Corporation Method and system for digital image signatures
JPH06119388A (en) 1992-10-07 1994-04-28 Sony Corp Picture data managing method and picture data base
US5437050A (en) 1992-11-09 1995-07-25 Lamb; Robert G. Method and apparatus for recognizing broadcast information using multi-frequency magnitude detection
EP1494374B1 (en) 1992-11-16 2013-09-18 Arbitron Inc. Method and apparatus for encoding/decoding brodcast or recorded segments and monitoring audience exposure thereto
US5341429A (en) 1992-12-04 1994-08-23 Testdrive Corporation Transformation of ephemeral material
US5369707A (en) 1993-01-27 1994-11-29 Tecsec Incorporated Secure network method and apparatus
US5379345A (en) 1993-01-29 1995-01-03 Radio Audit Systems, Inc. Method and apparatus for the processing of encoded data in conjunction with an audio broadcast
US5365586A (en) 1993-04-09 1994-11-15 Washington University Method and apparatus for fingerprinting magnetic media
US5408505A (en) 1993-04-09 1995-04-18 Washington University Method and apparatus for process control, tension control, and testing of magnetic media
US5546462A (en) 1993-04-09 1996-08-13 Washington University Method and apparatus for fingerprinting and authenticating various magnetic media
JP3424262B2 (en) 1993-04-21 2003-07-07 ヤマハ株式会社 Online karaoke system
US5860099A (en) * 1993-05-12 1999-01-12 Usar Systems, Inc. Stored program system with protected memory and secure signature extraction
GB2278973B (en) * 1993-06-11 1997-10-29 Quantel Ltd Video image processing systems
US5581703A (en) 1993-06-29 1996-12-03 International Business Machines Corporation Method and apparatus for reserving system resources to assure quality of service
US5428606A (en) 1993-06-30 1995-06-27 Moskowitz; Scott A. Digital information commodities exchange
CA2125337A1 (en) 1993-06-30 1994-12-31 Marlin Jay Eller Method and system for searching compressed data
US5363448A (en) 1993-06-30 1994-11-08 United Technologies Automotive, Inc. Pseudorandom number generation and cryptographic authentication
US5418713A (en) 1993-08-05 1995-05-23 Allen; Richard Apparatus and method for an on demand data delivery system for the preview, selection, retrieval and reproduction at a remote location of previously recorded or programmed materials
US5412718A (en) 1993-09-13 1995-05-02 Institute Of Systems Science Method for utilizing medium nonuniformities to minimize unauthorized duplication of digital information
US5657461A (en) 1993-10-04 1997-08-12 Xerox Corporation User interface for defining and automatically transmitting data according to preferred communication channels
US5513126A (en) 1993-10-04 1996-04-30 Xerox Corporation Network having selectively accessible recipient prioritized communication channel profiles
US5478990A (en) 1993-10-14 1995-12-26 Coleman Environmental Systems, Inc. Method for tracking the production history of food products
JP3372611B2 (en) 1993-10-18 2003-02-04 キヤノン株式会社 Video transmission system, video processing device, and video processing method
JPH07212712A (en) 1993-10-29 1995-08-11 Eastman Kodak Co Method and equipment for adding and deleting digital watermark in hierarchical picture memory and fetch system
US5625690A (en) 1993-11-15 1997-04-29 Lucent Technologies Inc. Software pay per use system
US5862260A (en) * 1993-11-18 1999-01-19 Digimarc Corporation Methods for surveying dissemination of proprietary empirical data
US6611607B1 (en) 1993-11-18 2003-08-26 Digimarc Corporation Integrating digital watermarks in multimedia content
US5748783A (en) 1995-05-08 1998-05-05 Digimarc Corporation Method and apparatus for robust information coding
US7171016B1 (en) 1993-11-18 2007-01-30 Digimarc Corporation Method for monitoring internet dissemination of image, video and/or audio files
US5832119C1 (en) * 1993-11-18 2002-03-05 Digimarc Corp Methods for controlling systems using control signals embedded in empirical data
US6983051B1 (en) * 1993-11-18 2006-01-03 Digimarc Corporation Methods for audio watermarking and decoding
WO1995014289A2 (en) * 1993-11-18 1995-05-26 Pinecone Imaging Corporation Identification/authentication coding method and apparatus
US20020009208A1 (en) * 1995-08-09 2002-01-24 Adnan Alattar Authentication of physical and electronic media objects using digital watermarks
US5636292C1 (en) 1995-05-08 2002-06-18 Digimarc Corp Steganography methods employing embedded calibration data
US5748763A (en) * 1993-11-18 1998-05-05 Digimarc Corporation Image steganography system featuring perceptually adaptive and globally scalable signal embedding
US5454039A (en) 1993-12-06 1995-09-26 International Business Machines Corporation Software-efficient pseudorandom function and the use thereof for encryption
US5394324A (en) 1993-12-08 1995-02-28 Xerox Corporation Auction-based control system for energy resource management in a building
US5649284A (en) * 1993-12-17 1997-07-15 Sony Corporation Multiplex broadcasting system
US5513261A (en) 1993-12-29 1996-04-30 At&T Corp. Key management scheme for use with electronic cards
US5398285A (en) 1993-12-30 1995-03-14 Motorola, Inc. Method for generating a password using public key cryptography
US5973731A (en) 1994-03-03 1999-10-26 Schwab; Barry H. Secure identification system
US6116714A (en) 1994-03-04 2000-09-12 Canon Kabushiki Kaisha Printing head, printing method and apparatus using same, and apparatus and method for correcting said printing head
US5450490A (en) 1994-03-31 1995-09-12 The Arbitron Company Apparatus and methods for including codes in audio signals and decoding
US5974141A (en) 1995-03-31 1999-10-26 Mitsubishi Corporation Data management system
DE4413451A1 (en) 1994-04-18 1995-12-14 Rolf Brugger Device for the distribution of music information in digital form
US5497419A (en) 1994-04-19 1996-03-05 Prima Facie, Inc. Method and apparatus for recording sensor data
US5598470A (en) 1994-04-25 1997-01-28 International Business Machines Corporation Method and apparatus for enabling trial period use of software products: Method and apparatus for utilizing a decryption block
CA2143874C (en) 1994-04-25 2000-06-20 Thomas Edward Cooper Method and apparatus for enabling trial period use of software products: method and apparatus for utilizing a decryption stub
US5568556A (en) 1994-05-26 1996-10-22 Graph-It, Inc. System and method for encrypting sensitive information
US5493677A (en) 1994-06-08 1996-02-20 Systems Research & Applications Corporation Generation, archiving, and retrieval of digital images with evoked suggestion-set captions and natural language interface
EP0689321A1 (en) 1994-06-23 1995-12-27 International Business Machines Corporation System for high availablility of network-wide bandwidth allocation
JPH088853A (en) 1994-06-24 1996-01-12 Sony Corp Scrambling device and descrambling device
US5617506A (en) * 1994-06-29 1997-04-01 The 3Do Company Method for communicating a value over a transmission medium and for decoding same
US5530751A (en) 1994-06-30 1996-06-25 Hewlett-Packard Company Embedded hidden identification codes in digital objects
US6041316A (en) 1994-07-25 2000-03-21 Lucent Technologies Inc. Method and system for ensuring royalty payments for data delivered over a network
US5606609A (en) 1994-09-19 1997-02-25 Scientific-Atlanta Electronic document verification system and method
US5781184A (en) * 1994-09-23 1998-07-14 Wasserman; Steve C. Real time decompression and post-decompress manipulation of compressed full motion video
US5568570A (en) 1994-09-30 1996-10-22 Eastman Kodak Company Method and apparatus for reducing quantization artifacts in a hierarchical image storage and retrieval system
US6363483B1 (en) * 1994-11-03 2002-03-26 Lucent Technologies Inc. Methods and systems for performing article authentication
JP3705447B2 (en) 1994-11-17 2005-10-12 株式会社ルネサステクノロジ Image processing method and image processing apparatus
US5629980A (en) 1994-11-23 1997-05-13 Xerox Corporation System for controlling the distribution and use of digital works
US5758257A (en) 1994-11-29 1998-05-26 Herz; Frederick System and method for scheduling broadcast of and access to video programs and other data using customer profiles
US5646997A (en) 1994-12-14 1997-07-08 Barton; James M. Method and apparatus for embedding authentication information within digital data
KR0135815B1 (en) 1994-12-19 1998-06-15 김광호 Data communicating method and device
US7362775B1 (en) 1996-07-02 2008-04-22 Wistaria Trading, Inc. Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management
US5745569A (en) 1996-01-17 1998-04-28 The Dice Company Method for stega-cipher protection of computer code
US7007166B1 (en) 1994-12-28 2006-02-28 Wistaria Trading, Inc. Method and system for digital watermarking
US5530759A (en) 1995-02-01 1996-06-25 International Business Machines Corporation Color correct digital watermarking of images
US5943422A (en) 1996-08-12 1999-08-24 Intertrust Technologies Corp. Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
US5659726A (en) 1995-02-23 1997-08-19 Sandford, Ii; Maxwell T. Data embedding
US5774452A (en) 1995-03-14 1998-06-30 Aris Technologies, Inc. Apparatus and method for encoding and decoding information in audio signals
US5640569A (en) 1995-04-28 1997-06-17 Sun Microsystems, Inc. Diverse goods arbitration system and method for allocating resources in a distributed computer system
US5583488A (en) 1995-04-28 1996-12-10 Sala; Nicola R. Proximity alarm system
US6590996B1 (en) * 2000-02-14 2003-07-08 Digimarc Corporation Color adaptive watermarking
US5613004A (en) 1995-06-07 1997-03-18 The Dice Company Steganographic method and device
US5790677A (en) 1995-06-29 1998-08-04 Microsoft Corporation System and method for secure electronic commerce transactions
CA2179973C (en) 1995-06-30 2002-03-05 Takayuki Nagashima Image transmission apparatus, image transmission system, and communication apparatus
US7562392B1 (en) 1999-05-19 2009-07-14 Digimarc Corporation Methods of interacting with audio and ambient music
US7289643B2 (en) * 2000-12-21 2007-10-30 Digimarc Corporation Method, apparatus and programs for generating and utilizing content signatures
US5680462A (en) 1995-08-07 1997-10-21 Sandia Corporation Information encoder/decoder using chaotic systems
US5751811A (en) 1995-08-30 1998-05-12 Magnotti; Joseph C. 32N +D bit key encryption-decryption system using chaos
US5757923A (en) 1995-09-22 1998-05-26 Ut Automotive Dearborn, Inc. Method of generating secret identification numbers
US5696828A (en) 1995-09-22 1997-12-09 United Technologies Automotive, Inc. Random number generating system and process based on chaos
JP3545110B2 (en) 1995-09-26 2004-07-21 富士通株式会社 Communication service quality control method
EP0766468B1 (en) 1995-09-28 2006-05-03 Nec Corporation Method and system for inserting a spread spectrum watermark into multimedia data
US5765152A (en) 1995-10-13 1998-06-09 Trustees Of Dartmouth College System and method for managing copyrighted electronic media
US5675653A (en) 1995-11-06 1997-10-07 Nelson, Jr.; Douglas Valmore Method and apparatus for digital encryption
US5859920A (en) * 1995-11-30 1999-01-12 Eastman Kodak Company Method for embedding digital information in an image
US5719937A (en) 1995-12-06 1998-02-17 Solana Technology Develpment Corporation Multi-media copy management system
KR100462915B1 (en) 1995-12-11 2005-08-05 코닌클리케 필립스 일렉트로닉스 엔.브이. Methods and apparatus for marking video and / or audio signals, Methods and apparatus for detecting marked video signals, Video or audio signals and storage media
US5633932A (en) 1995-12-19 1997-05-27 Intel Corporation Apparatus and method for preventing disclosure through user-authentication at a printing node
US6067622A (en) 1996-01-02 2000-05-23 Moore; Steven Jerome Software security system using remove function to restrict unauthorized duplicating and installation of an application program
US5905975A (en) 1996-01-04 1999-05-18 Ausubel; Lawrence M. Computer implemented methods and apparatus for auctions
US7664263B2 (en) 1998-03-24 2010-02-16 Moskowitz Scott A Method for combining transfer functions with predetermined key creation
US6205249B1 (en) 1998-04-02 2001-03-20 Scott A. Moskowitz Multiple transform utilization and applications for secure digital watermarking
US5822432A (en) 1996-01-17 1998-10-13 The Dice Company Method for human-assisted random key generation and application for digital watermark system
US5689587A (en) 1996-02-09 1997-11-18 Massachusetts Institute Of Technology Method and apparatus for data hiding in images
US5901178A (en) * 1996-02-26 1999-05-04 Solana Technology Development Corporation Post-compression hidden data transport for video
US5664018A (en) 1996-03-12 1997-09-02 Leighton; Frank Thomson Watermarking process resilient to collusion attacks
US5923763A (en) * 1996-03-21 1999-07-13 Walker Asset Management Limited Partnership Method and apparatus for secure document timestamping
US5673316A (en) 1996-03-29 1997-09-30 International Business Machines Corporation Creation and distribution of cryptographic envelope
ATE195207T1 (en) 1996-04-01 2000-08-15 Macrovision Corp METHOD FOR CONTROLLING COPY PROTECTION MEASURES IN DIGITAL TELEVISION NETWORKS
US5828325A (en) * 1996-04-03 1998-10-27 Aris Technologies, Inc. Apparatus and method for encoding and decoding information in analog signals
US5839100A (en) * 1996-04-22 1998-11-17 Wegener; Albert William Lossless and loss-limited compression of sampled data signals
US5884033A (en) 1996-05-15 1999-03-16 Spyglass, Inc. Internet filtering system for filtering data transferred over the internet utilizing immediate and deferred filtering actions
JPH09321894A (en) * 1996-05-31 1997-12-12 Sony Corp Information processor
US5893067A (en) * 1996-05-31 1999-04-06 Massachusetts Institute Of Technology Method and apparatus for echo data hiding in audio signals
GB2313974B (en) 1996-06-06 2000-06-28 Berners Lee Charles Peter Apparatus and method for encoding data
US6049838A (en) 1996-07-01 2000-04-11 Sun Microsystems, Inc. Persistent distributed capabilities
US7457962B2 (en) 1996-07-02 2008-11-25 Wistaria Trading, Inc Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
US7177429B2 (en) 2000-12-07 2007-02-13 Blue Spike, Inc. System and methods for permitting open access to data objects and for securing data within the data objects
US7095874B2 (en) 1996-07-02 2006-08-22 Wistaria Trading, Inc. Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
US6078664A (en) 1996-12-20 2000-06-20 Moskowitz; Scott A. Z-transform implementation of digital watermarks
US7346472B1 (en) 2000-09-07 2008-03-18 Blue Spike, Inc. Method and device for monitoring and analyzing signals
US7913087B2 (en) 1996-07-02 2011-03-22 Wistaria Trading, Inc. Optimization methods for the insertion, protection, and detection of digital watermarks in digital data
US7123718B1 (en) 1999-03-24 2006-10-17 Blue Spike, Inc. Utilizing data reduction in stegnographic and cryptographic systems
US7159116B2 (en) 1999-12-07 2007-01-02 Blue Spike, Inc. Systems, methods and devices for trusted transactions
US7107451B2 (en) * 1996-07-02 2006-09-12 Wistaria Trading, Inc. Optimization methods for the insertion, protection, and detection of digital watermarks in digital data
US7989689B2 (en) 1996-07-10 2011-08-02 Bassilic Technologies Llc Electronic music stand performer subsystems and music communication methodologies
US5918223A (en) * 1996-07-22 1999-06-29 Muscle Fish Method and article of manufacture for content-based analysis, storage, retrieval, and segmentation of audio information
CA2261933A1 (en) * 1996-07-25 1998-02-05 Hybrid Networks, Inc. Two-way asymmetric communication system
DE69737097T2 (en) 1996-08-19 2007-07-12 Ntru Cryptosystems, Inc. CRYPTOGRAPHIC PROCESS AND DEVICE WITH PUBLIC KEY
US5799083A (en) 1996-08-26 1998-08-25 Brothers; Harlan Jay Event verification system
US6061793A (en) 1996-08-30 2000-05-09 Regents Of The University Of Minnesota Method and apparatus for embedding data, including watermarks, in human perceptible sounds
US6272634B1 (en) 1996-08-30 2001-08-07 Regents Of The University Of Minnesota Digital watermarking to resolve multiple claims of ownership
US6978370B1 (en) 1996-09-03 2005-12-20 Cryptography Research, Inc. Method and system for copy-prevention of digital copyright works
US6069914A (en) 1996-09-19 2000-05-30 Nec Research Institute, Inc. Watermarking of image data using MPEG/JPEG coefficients
US5848155A (en) 1996-09-04 1998-12-08 Nec Research Institute, Inc. Spread spectrum watermark for embedded signalling
US5809139A (en) 1996-09-13 1998-09-15 Vivo Software, Inc. Watermarking method and apparatus for compressed digital video
US5734752A (en) 1996-09-24 1998-03-31 Xerox Corporation Digital watermarking using stochastic screen patterns
US5915027A (en) 1996-11-05 1999-06-22 Nec Research Institute Digital watermarking
US6178405B1 (en) * 1996-11-18 2001-01-23 Innomedia Pte Ltd. Concatenation compression method
US7730317B2 (en) 1996-12-20 2010-06-01 Wistaria Trading, Inc. Linear predictive coding implementation of digital watermarks
US5920900A (en) 1996-12-30 1999-07-06 Cabletron Systems, Inc. Hash-based translation method and apparatus with multiple level collision resolution
US5842213A (en) 1997-01-28 1998-11-24 Odom; Paul S. Method for modeling, storing, and transferring data in neutral form
US6009176A (en) 1997-02-13 1999-12-28 International Business Machines Corporation How to sign digital streams
US6233684B1 (en) 1997-02-28 2001-05-15 Contenaguard Holdings, Inc. System for controlling the distribution and use of rendered digital works through watermaking
US5978787A (en) 1997-02-28 1999-11-02 Oracle Corporation Report server caching
NL1005523C2 (en) 1997-03-13 1998-09-15 Univ Eindhoven Tech Point-to-multipoint analogue or digital signal distribution
US5903721A (en) 1997-03-13 1999-05-11 cha|Technologies Services, Inc. Method and system for secure online transaction processing
DE19710967C1 (en) 1997-03-17 1998-10-22 Karl Heinz Koeppen Full range speakers
US6341353B1 (en) * 1997-04-11 2002-01-22 The Brodia Group Smart electronic receipt system
US6192138B1 (en) 1997-05-08 2001-02-20 Kabushiki Kaisha Toshiba Apparatus and method for embedding/unembedding supplemental information
US6427012B1 (en) 1997-05-19 2002-07-30 Verance Corporation Apparatus and method for embedding and extracting information in analog signals using replica modulation
US6131162A (en) 1997-06-05 2000-10-10 Hitachi Ltd. Digital data authentication method
US6173322B1 (en) 1997-06-05 2001-01-09 Silicon Graphics, Inc. Network request distribution based on static rules and dynamic performance data
AU7957998A (en) 1997-06-09 1999-01-25 Intertrust, Incorporated Obfuscation techniques for enhancing software security
US6449640B1 (en) 1997-06-19 2002-09-10 International Business Machines Corporation Web server with unique identification of linked objects
JPH1132200A (en) 1997-07-09 1999-02-02 Matsushita Electric Ind Co Ltd Watermark data insertion method and watermark data detection method
US6577472B2 (en) 1997-07-24 2003-06-10 Hitachi, Ltd. Glass substrate for a magnetic disk, a magnetic disk which can be formed with a stable texture
US5949973A (en) 1997-07-25 1999-09-07 Memco Software, Ltd. Method of relocating the stack in a computer system for preventing overrate by an exploit program
KR100323441B1 (en) 1997-08-20 2002-06-20 윤종용 Mpeg2 motion picture coding/decoding system
EP0898396B1 (en) 1997-08-20 2006-11-22 Canon Kabushiki Kaisha Electronic watermark system, electronic information distribution system, and image filing apparatus
US6230268B1 (en) 1997-09-12 2001-05-08 International Business Machines Corporation Data control system
US6611599B2 (en) 1997-09-29 2003-08-26 Hewlett-Packard Development Company, L.P. Watermarking of digital object
ATE222040T1 (en) 1997-10-08 2002-08-15 Macrovision Corp METHOD AND APPARATUS FOR INSERTING A ONE-TIME COPY WATERMARK FOR VIDEO RECORDING
US5949055A (en) * 1997-10-23 1999-09-07 Xerox Corporation Automatic geometric image transformations using embedded signals
US6051029A (en) 1997-10-31 2000-04-18 Entelos, Inc. Method of generating a display for a dynamic simulation model utilizing node and link representations
JP3092567B2 (en) 1997-10-31 2000-09-25 日本電気株式会社 Method and apparatus for generating encryption key
US6035398A (en) 1997-11-14 2000-03-07 Digitalpersona, Inc. Cryptographic key generation using biometric data
JPH11232779A (en) 1997-11-20 1999-08-27 Toshiba Corp Copy preventing device
US6141754A (en) 1997-11-28 2000-10-31 International Business Machines Corporation Integrated method and system for controlling information access and distribution
US6330672B1 (en) * 1997-12-03 2001-12-11 At&T Corp. Method and apparatus for watermarking digital bitstreams
US6674858B1 (en) 1997-12-10 2004-01-06 Hitachi, Ltd. Receiving device, recording and reproducing device and receiving/recording-reproducing system for digital broadcast signal
JP3407287B2 (en) * 1997-12-22 2003-05-19 日本電気株式会社 Encoding / decoding system
US6208745B1 (en) 1997-12-30 2001-03-27 Sarnoff Corporation Method and apparatus for imbedding a watermark into a bitstream representation of a digital image sequence
US6373960B1 (en) * 1998-01-06 2002-04-16 Pixel Tools Corporation Embedding watermarks into compressed video data
US6385596B1 (en) 1998-02-06 2002-05-07 Liquid Audio, Inc. Secure online music distribution system
US6141753A (en) 1998-02-10 2000-10-31 Fraunhofer Gesellschaft Secure distribution of digital representations
DE19807872A1 (en) 1998-02-25 1999-08-26 Pact Inf Tech Gmbh Method of managing configuration data in data flow processors
US6351765B1 (en) 1998-03-09 2002-02-26 Media 100, Inc. Nonlinear video editing system
US6557103B1 (en) 1998-04-13 2003-04-29 The United States Of America As Represented By The Secretary Of The Army Spread spectrum image steganography
US6754822B1 (en) 1998-04-30 2004-06-22 Fraunhofer-Gesellschaft Zur Forderung Der Angewandten Forshung E.V. Active watermarks and watermark agents
US6278791B1 (en) 1998-05-07 2001-08-21 Eastman Kodak Company Lossless recovery of an original image containing embedded data
US6148333A (en) 1998-05-13 2000-11-14 Mgi Software Corporation Method and system for server access control and tracking
US6977894B1 (en) 1998-05-20 2005-12-20 Nortel Networks Limited Method and apparatus for discarding data packets through the use of descriptors
US6647424B1 (en) 1998-05-20 2003-11-11 Nortel Networks Limited Method and apparatus for discarding data packets
US6233347B1 (en) 1998-05-21 2001-05-15 Massachusetts Institute Of Technology System method, and product for information embedding using an ensemble of non-intersecting embedding generators
US6029126A (en) * 1998-06-30 2000-02-22 Microsoft Corporation Scalable audio coder and decoder
US7644282B2 (en) 1998-05-28 2010-01-05 Verance Corporation Pre-processed information embedding system
JP3156667B2 (en) 1998-06-01 2001-04-16 日本電気株式会社 Digital watermark insertion system, digital watermark characteristic table creation device
US6044471A (en) 1998-06-04 2000-03-28 Z4 Technologies, Inc. Method and apparatus for securing software to reduce unauthorized use
US6799277B2 (en) 1998-06-04 2004-09-28 Z4 Technologies, Inc. System and method for monitoring software
US20040225894A1 (en) 1998-06-04 2004-11-11 Z4 Technologies, Inc. Hardware based method for digital rights management including self activating/self authentication software
US20040117628A1 (en) 1998-06-04 2004-06-17 Z4 Technologies, Inc. Computer readable storage medium for enhancing license compliance of software/digital content including self-activating/self-authenticating software/digital content
US20040117664A1 (en) 1998-06-04 2004-06-17 Z4 Technologies, Inc. Apparatus for establishing a connectivity platform for digital rights management
US6986063B2 (en) 1998-06-04 2006-01-10 Z4 Technologies, Inc. Method for monitoring software using encryption including digital signatures/certificates
US6523113B1 (en) 1998-06-09 2003-02-18 Apple Computer, Inc. Method and apparatus for copy protection
US6154571A (en) 1998-06-24 2000-11-28 Nec Research Institute, Inc. Robust digital watermarking
US6128626A (en) * 1998-06-30 2000-10-03 Bull Hn Information Systems Inc. Method for minimizing storage requirements for production assembly information and updates
US6530021B1 (en) 1998-07-20 2003-03-04 Koninklijke Philips Electronics N.V. Method and system for preventing unauthorized playback of broadcasted digital data streams
US6226618B1 (en) 1998-08-13 2001-05-01 International Business Machines Corporation Electronic content delivery system
JP4424769B2 (en) 1998-09-10 2010-03-03 興和株式会社 Digital watermark embedding device
KR100484209B1 (en) 1998-09-24 2005-09-30 삼성전자주식회사 Digital Content Encryption / Decryption Device and Method
US6266705B1 (en) 1998-09-29 2001-07-24 Cisco Systems, Inc. Look up mechanism and associated hash table for a network switch
US6285775B1 (en) 1998-10-01 2001-09-04 The Trustees Of The University Of Princeton Watermarking scheme for image authentication
US6345100B1 (en) 1998-10-14 2002-02-05 Liquid Audio, Inc. Robust watermark method and apparatus for digital signals
JP4763866B2 (en) 1998-10-15 2011-08-31 インターシア ソフトウェア エルエルシー Method and apparatus for protecting digital data by double re-encryption
AU760436B2 (en) 1998-10-16 2003-05-15 Matsushita Electric Industrial Co., Ltd. Production protection system dealing with contents that are digital production
US6983308B1 (en) * 1998-11-19 2006-01-03 Openwave Systems, Inc. Mail synchronization of remote and local mail systems
SE513356C2 (en) 1998-11-20 2000-08-28 Ericsson Telefon Ab L M Method and apparatus for encrypting images
US5991426A (en) 1998-12-18 1999-11-23 Signafy, Inc. Field-based watermark insertion and detection
US6539475B1 (en) 1998-12-18 2003-03-25 Nec Corporation Method and system for protecting digital data from unauthorized copying
US7162642B2 (en) * 1999-01-06 2007-01-09 Digital Video Express, L.P. Digital content distribution system and method
US6442283B1 (en) * 1999-01-11 2002-08-27 Digimarc Corporation Multimedia data embedding
US6282650B1 (en) 1999-01-25 2001-08-28 Intel Corporation Secure public digital watermark
US6957330B1 (en) 1999-03-01 2005-10-18 Storage Technology Corporation Method and system for secure information handling
US6668246B1 (en) 1999-03-24 2003-12-23 Intel Corporation Multimedia data delivery and playback system with multi-level content and privacy protection
US7664264B2 (en) 1999-03-24 2010-02-16 Blue Spike, Inc. Utilizing data reduction in steganographic and cryptographic systems
US6865747B1 (en) 1999-04-01 2005-03-08 Digital Video Express, L.P. High definition media storage structure and playback mechanism
US6823455B1 (en) 1999-04-08 2004-11-23 Intel Corporation Method for robust watermarking of content
US6405203B1 (en) 1999-04-21 2002-06-11 Research Investment Network, Inc. Method and program product for preventing unauthorized users from using the content of an electronic storage medium
US6665489B2 (en) 1999-04-21 2003-12-16 Research Investment Network, Inc. System, method and article of manufacturing for authorizing the use of electronic content utilizing a laser-centric medium and a network server
US6966002B1 (en) 1999-04-30 2005-11-15 Trymedia Systems, Inc. Methods and apparatus for secure distribution of software
JP2000322825A (en) * 1999-05-13 2000-11-24 Hitachi Ltd Digital signal-recording apparatus
US8095796B2 (en) * 1999-05-19 2012-01-10 Digimarc Corporation Content identifiers
US6522769B1 (en) 1999-05-19 2003-02-18 Digimarc Corporation Reconfiguring a watermark detector
US6834343B1 (en) 1999-05-27 2004-12-21 Microsoft Corporation Method for watermarking computer programs
US6463468B1 (en) * 1999-06-01 2002-10-08 Netzero, Inc. Targeted network video download interface
KR100334722B1 (en) * 1999-06-05 2002-05-04 강호석 Method and the apparatus for generating stereoscopic image using MPEG data
US6785815B1 (en) 1999-06-08 2004-08-31 Intertrust Technologies Corp. Methods and systems for encoding and protecting data using digital signature and watermarking techniques
US6594761B1 (en) 1999-06-09 2003-07-15 Cloakware Corporation Tamper resistant software encoding
US6381618B1 (en) 1999-06-17 2002-04-30 International Business Machines Corporation Method and apparatus for autosynchronizing distributed versions of documents
US7020285B1 (en) 1999-07-13 2006-03-28 Microsoft Corporation Stealthy audio watermarking
US7475246B1 (en) 1999-08-04 2009-01-06 Blue Spike, Inc. Secure personal content server
US6775772B1 (en) 1999-10-12 2004-08-10 International Business Machines Corporation Piggy-backed key exchange protocol for providing secure low-overhead browser connections from a client to a server using a trusted third party
US6725372B1 (en) * 1999-12-02 2004-04-20 Verizon Laboratories Inc. Digital watermarking
US6606393B1 (en) * 1999-12-02 2003-08-12 Verizon Laboratories Inc. Message authentication code using image histograms
US6282300B1 (en) * 2000-01-21 2001-08-28 Signafy, Inc. Rotation, scale, and translation resilient public watermarking for images using a log-polar fourier transform
US7058570B1 (en) 2000-02-10 2006-06-06 Matsushita Electric Industrial Co., Ltd. Computer-implemented method and apparatus for audio data hiding
US6385329B1 (en) 2000-02-14 2002-05-07 Digimarc Corporation Wavelet domain watermarks
US6834308B1 (en) * 2000-02-17 2004-12-21 Audible Magic Corporation Method and apparatus for identifying media content presented on a media playing device
US6829710B1 (en) 2000-03-14 2004-12-07 Microsoft Corporation Technique for producing, through watermarking, highly tamper-resistant executable code and resulting “watermarked” code so formed
US7046808B1 (en) 2000-03-24 2006-05-16 Verance Corporation Method and apparatus for detecting processing stages applied to a signal
US6574195B2 (en) 2000-04-19 2003-06-03 Caspian Networks, Inc. Micro-flow management
US6453252B1 (en) 2000-05-15 2002-09-17 Creative Technology Ltd. Process for identifying audio content
WO2002003385A1 (en) 2000-07-05 2002-01-10 Moskowitz Scott A Copy protection of digital data combining steganographic and cryptographic techniques
AU2001275712A1 (en) * 2000-07-27 2002-02-13 Activated Content Corporation, Inc. Stegotext encoder and decoder
US6990453B2 (en) 2000-07-31 2006-01-24 Landmark Digital Services Llc System and methods for recognizing sound and music signals in high noise and distortion
AU2001286421A1 (en) 2000-08-09 2002-02-18 Murphy Company Material and labor cost estimating method and system
US6430301B1 (en) 2000-08-30 2002-08-06 Verance Corporation Formation and analysis of signals with common and transaction watermarks
US20040243540A1 (en) 2000-09-07 2004-12-02 Moskowitz Scott A. Method and device for monitoring and analyzing signals
US7127615B2 (en) 2000-09-20 2006-10-24 Blue Spike, Inc. Security based on subliminal and supraliminal channels for data objects
US20020152179A1 (en) 2000-10-27 2002-10-17 Achiezer Racov Remote payment method and system
US7562012B1 (en) 2000-11-03 2009-07-14 Audible Magic Corporation Method and apparatus for creating a unique audio signature
US7050396B1 (en) 2000-11-30 2006-05-23 Cisco Technology, Inc. Method and apparatus for automatically establishing bi-directional differentiated services treatment of flows in a network
WO2002049363A1 (en) 2000-12-15 2002-06-20 Agency For Science, Technology And Research Method and system of digital watermarking for compressed audio
US6532284B2 (en) 2001-02-27 2003-03-11 Morgan Guaranty Trust Company Method and system for optimizing bandwidth cost via caching and other network transmission delaying techniques
US7359889B2 (en) * 2001-03-02 2008-04-15 Landmark Digital Services Llc Method and apparatus for automatically creating database for use in automated media recognition system
EP1490767B1 (en) * 2001-04-05 2014-06-11 Audible Magic Corporation Copyright detection and protection system and method
US6973574B2 (en) 2001-04-24 2005-12-06 Microsoft Corp. Recognizer of audio-content in digital signals
US7043050B2 (en) 2001-05-02 2006-05-09 Microsoft Corporation Software anti-piracy systems and methods utilizing certificates with digital content
US8006262B2 (en) 2001-06-29 2011-08-23 Rodriguez Arturo A Graphic user interfaces for purchasable and recordable media (PRM) downloads
US7095715B2 (en) 2001-07-02 2006-08-22 3Com Corporation System and method for processing network packet flows
US6581478B2 (en) 2001-07-05 2003-06-24 Eaton Corporation Torque measuring apparatus and method employing a crystal oscillator
US6968337B2 (en) 2001-07-10 2005-11-22 Audible Magic Corporation Method and apparatus for identifying an unknown work
DE10133333C1 (en) * 2001-07-10 2002-12-05 Fraunhofer Ges Forschung Producing fingerprint of audio signal involves setting first predefined fingerprint mode from number of modes and computing a fingerprint in accordance with set predefined mode
US7877438B2 (en) 2001-07-20 2011-01-25 Audible Magic Corporation Method and apparatus for identifying new media content
US20030027549A1 (en) 2001-07-30 2003-02-06 Msafe Inc. Prepaid communication system and method
US7177430B2 (en) * 2001-10-31 2007-02-13 Portalplayer, Inc. Digital entroping for digital audio reproductions
US7233669B2 (en) 2002-01-02 2007-06-19 Sony Corporation Selective encryption to enable multiple decryption keys
US7287275B2 (en) 2002-04-17 2007-10-23 Moskowitz Scott A Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth
US7103184B2 (en) 2002-05-09 2006-09-05 Intel Corporation System and method for sign mask encryption and decryption
AU2003261154A1 (en) 2002-07-12 2004-02-02 The Penn State Research Foundation Real-time packet traceback and associated packet marking strategies
WO2004008457A2 (en) * 2002-07-17 2004-01-22 Koninklijke Philips Electronics N.V. Copy control using digital speed bumps
DE60304207D1 (en) 2002-07-26 2006-05-11 Green Border Technologies Watermark embedding on the package level
KR100426317B1 (en) 2002-09-06 2004-04-06 한국전자통신연구원 System for providing a real-time attacking connection traceback using of packet watermark insertion technique and method therefor
KR20050046815A (en) * 2002-09-30 2005-05-18 코닌클리케 필립스 일렉트로닉스 엔.브이. Fingerprint extraction
EP1551644A4 (en) 2002-10-15 2008-01-02 Digimarc Corp Identification document and related methods
AU2003264774A1 (en) * 2002-11-01 2004-05-25 Koninklijke Philips Electronics N.V. Improved audio data fingerprint searching
US7150003B2 (en) 2002-11-25 2006-12-12 Matsushita Electric Industrial Co., Ltd. Class coalescence for obfuscation of object-oriented software
US6983337B2 (en) * 2002-12-18 2006-01-03 Intel Corporation Method, system, and program for handling device interrupts
US6784354B1 (en) * 2003-03-13 2004-08-31 Microsoft Corporation Generating a music snippet
US7206649B2 (en) 2003-07-15 2007-04-17 Microsoft Corporation Audio watermarking with dual watermarks
US7310815B2 (en) 2003-10-29 2007-12-18 Sonicwall, Inc. Method and apparatus for datastream analysis and blocking
US8694802B2 (en) 2004-04-30 2014-04-08 Apple Inc. System and method for creating tamper-resistant code
DE102004023436B4 (en) * 2004-05-10 2006-06-14 M2Any Gmbh Apparatus and method for analyzing an information signal
US8140848B2 (en) 2004-07-01 2012-03-20 Digimarc Corporation Digital watermark key generation
US7719966B2 (en) 2005-04-13 2010-05-18 Zeugma Systems Inc. Network element architecture for deep packet inspection
US7743001B1 (en) 2005-06-21 2010-06-22 Amazon Technologies, Inc. Method and system for dynamic pricing of web services utilization
US20070083467A1 (en) 2005-10-10 2007-04-12 Apple Computer, Inc. Partial encryption techniques for media data
CA2635969C (en) 2006-01-05 2014-09-30 Wireless Edge Canada Inc. Systems and methods for improved network based content inspection
US8009861B2 (en) * 2006-04-28 2011-08-30 Vobile, Inc. Method and system for fingerprinting digital video object based on multiresolution, multirate spatial and temporal signatures
WO2009001458A1 (en) 2007-06-28 2008-12-31 Shinko Seiki Company, Limited Ophthalmic inspection device
CN102177726B (en) 2008-08-21 2014-12-03 杜比实验室特许公司 Feature optimization and reliability estimation for audio and video signature generation and detection
US8179846B2 (en) 2008-09-08 2012-05-15 Alcatel Lucent DPI-driven bearer termination for short-lived applications
US8860883B2 (en) 2009-11-30 2014-10-14 Miranda Technologies Partnership Method and apparatus for providing signatures of audio/video signals and for making use thereof
US8359417B2 (en) 2010-07-16 2013-01-22 Miranda Technologies Inc. Audio/video router

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5889868A (en) * 1996-07-02 1999-03-30 The Dice Company Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
US6088455A (en) * 1997-01-07 2000-07-11 Logan; James D. Methods and apparatus for selectively reproducing segments of broadcast programming
US6704451B1 (en) * 1998-03-02 2004-03-09 Koninklijke Kpn N.V. Method and arrangement for objective assessment of video quality

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10347262B2 (en) 2017-10-18 2019-07-09 The Nielsen Company (Us), Llc Systems and methods to improve timestamp transition resolution
US10734004B2 (en) 2017-10-18 2020-08-04 The Nielsen Company (Us), Llc Systems and methods to improve timestamp transition resolution
US11087772B2 (en) 2017-10-18 2021-08-10 The Nielsen Company (Us), Llc Systems and methods to improve timestamp transition resolution
US11562753B2 (en) 2017-10-18 2023-01-24 The Nielsen Company (Us), Llc Systems and methods to improve timestamp transition resolution

Also Published As

Publication number Publication date
US8214175B2 (en) 2012-07-03
US20100106736A1 (en) 2010-04-29
US20080109417A1 (en) 2008-05-08
US7949494B2 (en) 2011-05-24
US20110179069A1 (en) 2011-07-21
US20130204899A1 (en) 2013-08-08
US7346472B1 (en) 2008-03-18
US8712728B2 (en) 2014-04-29
US20120239686A1 (en) 2012-09-20
US7660700B2 (en) 2010-02-09
US20150261639A1 (en) 2015-09-17

Similar Documents

Publication Publication Date Title
US8712728B2 (en) Method and device for monitoring and analyzing signals
US20040243540A1 (en) Method and device for monitoring and analyzing signals
US7328153B2 (en) Automatic identification of sound recordings
Petitcolas et al. Public automated web-based evaluation service for watermarking schemes: Stirmark benchmark
Cano et al. Audio fingerprinting: concepts and applications
US8607354B2 (en) Deriving multiple fingerprints from audio or video content
EP2109248B1 (en) Method and device for testing consistency of numeric contents
US20040028281A1 (en) Apparatus and method for fingerprinting digital media
Steinebach et al. Watermarking-based digital audio data authentication
Gomes et al. Audio watermarking and fingerprinting: For which applications?
JP2007528017A (en) Digital watermark embedding and detection
EP1497935A1 (en) Feature-based audio content identification
Choi et al. Application of a generalized difference expansion based reversible audio data hiding algorithm
US8787613B2 (en) Forensic mark insertion apparatus and method
JP4512371B2 (en) How to personalize and identify communications
Fatès et al. Watermarking scheme evaluation tool
Dhar et al. Advances in audio watermarking based on matrix decomposition
Moskowitz What is acceptable quality in the application of digital watermarking: trade-offs of security, robustness and quality
Cichowski et al. Low-level music feature vectors embedded as watermarks
Bouarfa Research Assignment on
Zmudzinski et al. Watermark embedding using audio fingerprinting
Kalker et al. Robust Identification of Audio Using Watermarking and Fingerprinting
Dautov et al. OPYRIGHT PROTECTION OF MUSIC IN DIGITAL FORM
Badii et al. A framework towards a multi-modal fingerprinting scheme for multimedia assets
Mani et al. Intelligent embedding and decoding scheme for real time audio processing

Legal Events

Date Code Title Description
AS Assignment

Owner name: BLUE SPIKE LLC, TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MOSKOWITZ, SCOTT A.;BERRY, MIKE W.;SIGNING DATES FROM 20130222 TO 20130415;REEL/FRAME:031704/0168

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: WISTARIA TRADING LTD, BERMUDA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BLUE SPIKE, LLC;REEL/FRAME:043082/0189

Effective date: 20170724