US20050210257A1 - System and method for protecting digital media - Google Patents

System and method for protecting digital media Download PDF

Info

Publication number
US20050210257A1
US20050210257A1 US11/130,991 US13099105A US2005210257A1 US 20050210257 A1 US20050210257 A1 US 20050210257A1 US 13099105 A US13099105 A US 13099105A US 2005210257 A1 US2005210257 A1 US 2005210257A1
Authority
US
United States
Prior art keywords
identifier
digital recording
sections
watermark
digital
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/130,991
Inventor
Laszlo Hars
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US11/130,991 priority Critical patent/US20050210257A1/en
Publication of US20050210257A1 publication Critical patent/US20050210257A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/10Digital recording or reproducing
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • G11B20/00884Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a watermark, i.e. a barely perceptible transformation of the original data which can nevertheless be recognised by an algorithm
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B19/00Driving, starting, stopping record carriers not specifically of filamentary or web form, or of supports therefor; Control thereof; Control of operating function ; Driving both disc and head
    • G11B19/02Control of operating function, e.g. switching from recording to reproducing
    • G11B19/04Arrangements for preventing, inhibiting, or warning against double recording on the same blank or against other recording or reproducing malfunctions
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B19/00Driving, starting, stopping record carriers not specifically of filamentary or web form, or of supports therefor; Control thereof; Control of operating function ; Driving both disc and head
    • G11B19/02Control of operating function, e.g. switching from recording to reproducing
    • G11B19/12Control of operating function, e.g. switching from recording to reproducing by sensing distinguishing features of or on records, e.g. diameter end mark
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/00086Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/10Digital recording or reproducing
    • G11B20/12Formatting, e.g. arrangement of data block or words on the record carriers
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B20/00Signal processing not specific to the method of recording or reproducing; Circuits therefor
    • G11B20/10Digital recording or reproducing
    • G11B20/12Formatting, e.g. arrangement of data block or words on the record carriers
    • G11B20/1217Formatting, e.g. arrangement of data block or words on the record carriers on discs

Definitions

  • the present invention relates generally to security systems for digital recordings, and more particularly relates to anti-pirating schemes for controlling the copying, playing, and distribution of digital music.
  • SDMI Secure Digital Music Initiative
  • Information regarding SDMI can be found at their website at ⁇ www.sdmi.org>.
  • SDMI Secure Digital MI-compliant players
  • SDMI-compliant players must be able to play music already in a library
  • SDMI must provide the ability to prevent large numbers of perfect digital copies of music
  • SDMI must prevent the distribution on the Internet without any compensation to the creator or copyright holder.
  • SDMI requires that a limited form of copying must be allowed, while at the same time widespread copying must be prohibited.
  • This invention addresses the above-mentioned problems, as well as others, by providing a protection system and method that verifies ownership of a digital recording by requiring the presence of the entire medium (e.g., CD), or entire collection of tracks, as they existed when the digital recording was originally distributed.
  • the entire medium e.g., CD
  • the invention provides a system for marking a digital recording, wherein the digital recording includes a plurality of tracks, comprising: a mechanism for dividing the digital recording into a plurality of sections and associating a random number to each section; a mechanism for calculating an identifier as a function of the associated random numbers; and a watermarking mechanism for watermarking sections within a block of sections, wherein the watermark for each section includes the random number associated with the section and a portion of the identifier.
  • the invention provides a system for verifying a digital recording by ensuring a completeness of the digital recording, comprising: a mechanism for reading watermarks from each of a plurality of sections on the digital recording and extracting a first and second part from each watermark; a mechanism for calculating a first identifier as a function of the extracted first parts; a mechanism for calculating a second identifier based on a block of the second extracted parts; and a mechanism for comparing the first identifier and the second identifier.
  • the invention provides a program product stored on a recordable media for marking a digital recording having a plurality of tracks that, when executed, comprises: means for assigning a value to each of a plurality of sections within the digital recording; means for calculating an identifier as a function of all of the assigned values; and means for determining a watermark for each section within a block of sections, wherein each watermark includes the value assigned to the section and a portion of the identifier.
  • the invention provides a program product stored on a recordable media for verifying a digital recording that, when executed, comprises: means for reading watermarks from each of a plurality of sections on the digital recording and extracting a first part and a second part from each watermark; means for calculating a first identifier as a function of the extracted first parts; means for calculating a second identifier based on a block of the second extracted parts; and means for comparing the first identifier and the second identifier.
  • the invention provides a method for preventing unauthorized use of a digital recording, wherein the digital recording includes a plurality of tracks, comprising the steps of: encoding the digital recording by partitioning the digital recording into a plurality of sections; generating a random number for each section; calculating an identifier as a function of all of the generated random numbers; splitting the identifier into m partitions, wherein m is an integer; grouping the sections into blocks of m sections; and watermarking each section in each block with the random number for the section and one of the m partitions.
  • the invention includes a watermarked digital recording, comprising: a plurality of tracks; and a plurality of sections commingled with the plurality of tracks, wherein each section includes a random value and a value that is dependent on the random values for all of the sections.
  • FIG. 1 depicts a block diagram of a verification system in accordance with a preferred embodiment of the invention.
  • FIG. 2 depicts a graphical representation of a digital recording containing watermarked information in accordance with the invention.
  • the present invention provides a system and method for protecting digital recordings from illicit processing.
  • processing may include any type of reproduction, transmission, playback, modification, etc., of the digital content.
  • digital content may include any type of information, data, music, video, multimedia, etc. that can be stored in a digital format.
  • the described embodiments accomplish protection by requiring a complete data set of the digital recording to be present before processing can occur.
  • music is typically delivered on an audio CD that comprises a collection of tracks or songs. This invention would thus provide a system and method requiring the complete collection of tracks to be present before processing. Since illicit music copying is often limited to a small subset of the songs on a CD, the ability to illegally post and download individual songs from the Internet would be substantially limited.
  • the exemplary embodiments described herein require the presence of the whole medium (or entire collection of data as originally distributed) at the time of processing as proof of legal ownership. If a portion of the medium is not present, the processing of the digital recording can be aborted.
  • a portion of the medium is not present, the processing of the digital recording can be aborted.
  • a plurality of tracks shall be defined to include any digital recording that has more than one individually usable or desirable segment.
  • FIG. 1 depicts an anti-pirating system 10 for encoding and verifying a digital recording 12 having a plurality of tracks, such as a music CD. Encoding is accomplished with a watermark encoder 14 , and verification is accomplished with a verification system 28 .
  • verification system 28 is shown as part of a compliant device 26 (e.g., a CD recorder or player), but could exist independently from other components.
  • Watermark encoder 14 receives digital recording 12 and generates a watermarked digital recording 24 .
  • Watermark encoder 14 comprises various modules for encoding digital recording 12 . These modules include a sectioning mechanism 16 , a random number generator 18 , a hash function 20 , a portioning function 22 , and a watermarking system 23 . The process of how these modules encode digital recording 12 is described in detail with regard to FIG. 2 .
  • a watermarked digital recording 24 is provided, which can be distributed or sold to the general public in a format that will allow compliant systems, such as compliant device 26 , to limit illicit processing.
  • a compliant device 26 may include any type of system for processing watermarked digital recording 24 , e.g., a recording device for making copies of a watermarked CD. While there are no specific limitations placed on compliant device 26 , it is understood that it generally comprises a system compliant with watermark encoder 14 , i.e., it can analyze a watermark created by watermark encoder 14 .
  • Compliant device 26 includes a verification system 28 for verifying watermarked digital recording 24 , a processing system 38 for performing the actual processing operation of the digital recording (e.g., record/playback/transmit), and an abort system 40 for aborting processing when the inputted digital recording is not properly verified.
  • Verification system 28 comprises various modules for verifying the watermark in watermarked digital recording 24 . These modules may include a watermark extractor 30 , a hash function 32 , a coalescing function 34 , and comparator 36 . The operation of these modules is described in more detail below with reference to FIG. 2 .
  • FIG. 2 depicts a watermarked digital recording 24 comprised of: (1) a digital recording 12 having a plurality of tracks (T 1 , T 2 , T 3 . . . TN), and (2) a plurality of sections 44 (S 1 , S 2 , S 3 . . . Sn) that contain watermark information.
  • the watermark information is commingled with the tracks such that each track has several sections of watermark information associated therewith.
  • the placement of the watermark information along side the tracks may be accomplished in any manner known in the art.
  • digital recording 12 comprises digital content, such as a music CD containing N songs.
  • Watermark information is stored in each of the n sections 44 .
  • Each section 44 includes an individual watermark element (R 1 D 1 , R 2 D 2 , R 3 D 3 . . . ) that is required to be present to verify any portion of digital recording 24 .
  • R 1 D 1 , R 2 D 2 , R 3 D 3 . . . watermark element that is required to be present to verify any portion of digital recording 24 .
  • a single track e.g., T 1
  • the sections are logically grouped into blocks of sections 46 and 48 , with each block containing m sections where m is any integer.
  • sectioning mechanism 16 of watermark encoder 14 partitions digital recording 12 into a plurality of logical sections 44 (S 1 , S 2 . . . Sn), each of a predetermined length. For example, for a music CD, each section 44 may be approximately 15 seconds in length.
  • random number generator 18 generates an r-bit random number Ri for each section i.
  • Each r-bit random number (R 1 , R 2 . . . Rn) may be any size, but preferably comprises 4 to 16 bits.
  • a d-bit hash of these random numbers is generated by hash function 20 .
  • Hash functions are well known in the art, and hash function 20 may comprise any function that can operate on the random numbers and generate a single value D, e.g., a sum value.
  • the d-bit hash may be of any size, but preferably comprises 32 to 80 bits of data.
  • the next step is to split identifier D into m portions, and to map each of the m portions into each block of sections 46 , 48 .
  • P(D) D 1 , D 2 . . . Dm.
  • each section is watermarked by watermark system 23 with: (1) the section's associated random number Ri, and (2) one of m identifier portions (D 1 , D 2 . . . Dm).
  • a first block of sections 46 are watermarked with R 1 D 1 , R 2 D 2 , R 3 D 3 , and R 4 D 4 ; a second block of sections 48 are watermarked with R 5 D 1 , R 6 D 2 , R 7 D 3 and R 8 D 4 ; and so on.
  • each of the identifier portions (D 1 , D 2 . . . Dm) is mapped into a block using the “mod” operator.
  • any other method of mapping the D partitions into each block may be utilized.
  • the result is a watermarked digital recording 24 that includes n watermarked sections commingled with the N tracks.
  • Verification of watermarked digital recording 24 is accomplished by verifying that each of the n watermarks encoded by encoder 14 exist. Verification system 28 achieves this in the following manner.
  • watermark extraction system 30 opens an inputted digital recording, determines how many sections n′ exist, and reads each of the n′ watermarks.
  • the random numbers (R 1 ′, R 2 ′ . . . Rn′) and identifier portions (D 1 ′, D 2 ′ . . . Dm′) are then extracted.
  • Identifier portions (D 1 ′, D 2 ′ . . . Dm′) may be extracted on a block-by-block basis based on an inverse of the mapping formula used to map the portions into blocks by encoder 14 .
  • a first verification identifier D′ is calculated by the same hash function 20 that was used by encoder 14 .
  • D′ H(R 1 ′, R 2 ′ . . . Rn′).
  • a second verification identifier D′′ is calculated by coalescing function 34 , which combines the extracted identifier partitions D 1 ′, D 2 ′ . . . Dm′.
  • comparator 36 compares D′ and D′′ to determine if all of the sections, and therefore the entire digital recording, is present. If D′ is not equal to D′′, this indicates (1) that not all sections are present or (2) that some of the sections have been modified, and abort mechanism 40 will abort the processing. If the entire digital recording is present, processing system 38 will proceed with the desired processing (e.g., record/playback/transmit).
  • the length of the watermark r+d/m can be freely chosen, but should be chosen to prevent substitution attacks using sections from other CD's kept in a manageable size pre-calculated table.
  • systems, mechanisms, and modules described herein can be implemented in hardware, software, or a combination of hardware and software. They may be implemented by any type of computer system—or other apparatus adapted for carrying out the methods described herein.
  • a typical combination of hardware and software could be a general-purpose computer system with a computer program that, when loaded and executed, controls the computer system such that it carries out the methods described herein.
  • a specific use computer containing specialized hardware for carrying out one or more of the functional tasks of the invention could be utilized.
  • the present invention can also be embedded in a computer program product, which comprises all the features enabling the implementation of the methods and functions described herein, and which—when loaded in a computer system—is able to carry out these methods and functions.
  • Computer program, software program, program, program product, or software in the present context mean any expression, in any language, code or notation, of a set of instructions intended to cause a system having an information processing capability to perform a particular function either directly or after either or both of the following: (a) conversion to another language, code or notation; and/or (b) reproduction in a different material form.

Abstract

A system and method for verifying digital recordings that have a plurality of tracks. The system includes an encoder that: divides the digital recording into a plurality of sections and associates a random number with each section; calculates an identifier as a function of the associated random numbers; and watermarks sections within a block of sections with the associated random number and a portion of the identifier. A verification system is provided that extracts the random numbers and identifier portions; calculates a first identifier as a function of the extracted random numbers; calculates a second identifier based on the identifier portions; and compares the first identifier and the second identifier.

Description

    BACKGROUND OF THE INVENTION
  • 1. Technical Field
  • The present invention relates generally to security systems for digital recordings, and more particularly relates to anti-pirating schemes for controlling the copying, playing, and distribution of digital music.
  • 2. Related Art
  • The popularity of both the Internet and digital media technologies (e.g., compact disks “CD's” and digital versatile disks “DVD's”) has created tremendous problems for copyright owners of digital media content. The ability to reproduce, play and transmit digital content has become readily available to anyone with a personal computer and access to the Internet. This ability has led to widespread abuses to the rights of copyright owners who are unable to stop the illegal reproduction of their works.
  • One particular area where copyright ownership is particularly abused involves the music industry. The illicit pirating of digital music across the Internet is causing immeasurable damages to the music industry. Heretofore, most music content has been packaged and stored in an open, unsecured format that can be read and processed by any digital media player or recorder, i.e., content can be readily reproduced, stored and transmitted. To address this, the music industry has sought to create a secure domain to control the rampant pirating of music.
  • One solution the music industry is exploring involves establishing standards for secure playback and recording devices that process specially encoded content. Numerous secure devices and systems have been proposed. For instance, U.S. Pat. No. 5,513,260, issued on Apr. 30, 1996, entitled, Method and Apparatus For Copy Protection For Various Recording Media, describes a system in which an authorization signature is required before a protected CD can be played. PCT application WO 99/60568, published on Nov. 25, 1999, entitled, Copy Protection Using Broken Modulation Rules, also discloses various anti-pirating systems. Each of these references is hereby incorporated by reference.
  • In addition, a group referred to as SDMI (Secure Digital Music Initiative), made up of more than 180 companies and organizations representing information technology, consumer electronics, telecommunication, security technology, the worldwide recording industry, and Internet service providers, is attempting to develop standards and architectures for secure delivery of digital music in all forms. Information regarding SDMI can be found at their website at <www.sdmi.org>.
  • One of the challenges with implementing compliant systems, such as those sought under SDMI, is that various competing requirements must be met. For instance, under SDMI: (1) people must be allowed to make an unlimited number of personal copies of their CDs if in possession of the original CD; (2) SDMI-compliant players must be able to play music already in a library; (3) SDMI must provide the ability to prevent large numbers of perfect digital copies of music; and (4) SDMI must prevent the distribution on the Internet without any compensation to the creator or copyright holder. Thus, SDMI requires that a limited form of copying must be allowed, while at the same time widespread copying must be prohibited.
  • Unfortunately, such competing requirements create opportunities for hackers and pirates to defeat the protection schemes of the systems. Accordingly, protection schemes that are difficult to defeat, but will meet the open requirements for initiatives such as SDMI, must be developed.
  • SUMMARY OF THE INVENTION
  • This invention addresses the above-mentioned problems, as well as others, by providing a protection system and method that verifies ownership of a digital recording by requiring the presence of the entire medium (e.g., CD), or entire collection of tracks, as they existed when the digital recording was originally distributed.
  • In a first aspect, the invention provides a system for marking a digital recording, wherein the digital recording includes a plurality of tracks, comprising: a mechanism for dividing the digital recording into a plurality of sections and associating a random number to each section; a mechanism for calculating an identifier as a function of the associated random numbers; and a watermarking mechanism for watermarking sections within a block of sections, wherein the watermark for each section includes the random number associated with the section and a portion of the identifier.
  • In a second aspect, the invention provides a system for verifying a digital recording by ensuring a completeness of the digital recording, comprising: a mechanism for reading watermarks from each of a plurality of sections on the digital recording and extracting a first and second part from each watermark; a mechanism for calculating a first identifier as a function of the extracted first parts; a mechanism for calculating a second identifier based on a block of the second extracted parts; and a mechanism for comparing the first identifier and the second identifier.
  • In a third aspect, the invention provides a program product stored on a recordable media for marking a digital recording having a plurality of tracks that, when executed, comprises: means for assigning a value to each of a plurality of sections within the digital recording; means for calculating an identifier as a function of all of the assigned values; and means for determining a watermark for each section within a block of sections, wherein each watermark includes the value assigned to the section and a portion of the identifier.
  • In a fourth aspect, the invention provides a program product stored on a recordable media for verifying a digital recording that, when executed, comprises: means for reading watermarks from each of a plurality of sections on the digital recording and extracting a first part and a second part from each watermark; means for calculating a first identifier as a function of the extracted first parts; means for calculating a second identifier based on a block of the second extracted parts; and means for comparing the first identifier and the second identifier.
  • In a fifth aspect, the invention provides a method for preventing unauthorized use of a digital recording, wherein the digital recording includes a plurality of tracks, comprising the steps of: encoding the digital recording by partitioning the digital recording into a plurality of sections; generating a random number for each section; calculating an identifier as a function of all of the generated random numbers; splitting the identifier into m partitions, wherein m is an integer; grouping the sections into blocks of m sections; and watermarking each section in each block with the random number for the section and one of the m partitions.
  • In a sixth aspect, the invention includes a watermarked digital recording, comprising: a plurality of tracks; and a plurality of sections commingled with the plurality of tracks, wherein each section includes a random value and a value that is dependent on the random values for all of the sections.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The preferred exemplary embodiment of the present invention will hereinafter be described in conjunction with the appended drawings, where like designations denote like elements, and:
  • FIG. 1 depicts a block diagram of a verification system in accordance with a preferred embodiment of the invention.
  • FIG. 2 depicts a graphical representation of a digital recording containing watermarked information in accordance with the invention.
  • DETAILED DESCRIPTION OF THE DRAWINGS
  • 1. Overview
  • The present invention provides a system and method for protecting digital recordings from illicit processing. The term “processing,” as used herein, may include any type of reproduction, transmission, playback, modification, etc., of the digital content. The term “digital content” may include any type of information, data, music, video, multimedia, etc. that can be stored in a digital format. The described embodiments accomplish protection by requiring a complete data set of the digital recording to be present before processing can occur. For example, in the music industry, music is typically delivered on an audio CD that comprises a collection of tracks or songs. This invention would thus provide a system and method requiring the complete collection of tracks to be present before processing. Since illicit music copying is often limited to a small subset of the songs on a CD, the ability to illegally post and download individual songs from the Internet would be substantially limited.
  • Accordingly, the exemplary embodiments described herein require the presence of the whole medium (or entire collection of data as originally distributed) at the time of processing as proof of legal ownership. If a portion of the medium is not present, the processing of the digital recording can be aborted. Although one important application of this invention relates to the delivery of music content, it should be understood that the invention has applications to any type of digital recording that has a plurality of tracks. For the purposes of this disclosure, “a plurality of tracks” shall be defined to include any digital recording that has more than one individually usable or desirable segment.
  • 2. Exemplary Embodiment
  • Referring now to the figures, FIG. 1 depicts an anti-pirating system 10 for encoding and verifying a digital recording 12 having a plurality of tracks, such as a music CD. Encoding is accomplished with a watermark encoder 14, and verification is accomplished with a verification system 28. In this embodiment, verification system 28 is shown as part of a compliant device 26 (e.g., a CD recorder or player), but could exist independently from other components.
  • Watermark encoder 14 receives digital recording 12 and generates a watermarked digital recording 24. Watermark encoder 14 comprises various modules for encoding digital recording 12. These modules include a sectioning mechanism 16, a random number generator 18, a hash function 20, a portioning function 22, and a watermarking system 23. The process of how these modules encode digital recording 12 is described in detail with regard to FIG. 2. Once encoded, a watermarked digital recording 24 is provided, which can be distributed or sold to the general public in a format that will allow compliant systems, such as compliant device 26, to limit illicit processing.
  • A compliant device 26, as shown in FIG. 1, may include any type of system for processing watermarked digital recording 24, e.g., a recording device for making copies of a watermarked CD. While there are no specific limitations placed on compliant device 26, it is understood that it generally comprises a system compliant with watermark encoder 14, i.e., it can analyze a watermark created by watermark encoder 14. Compliant device 26 includes a verification system 28 for verifying watermarked digital recording 24, a processing system 38 for performing the actual processing operation of the digital recording (e.g., record/playback/transmit), and an abort system 40 for aborting processing when the inputted digital recording is not properly verified.
  • Verification system 28 comprises various modules for verifying the watermark in watermarked digital recording 24. These modules may include a watermark extractor 30, a hash function 32, a coalescing function 34, and comparator 36. The operation of these modules is described in more detail below with reference to FIG. 2.
  • FIG. 2 depicts a watermarked digital recording 24 comprised of: (1) a digital recording 12 having a plurality of tracks (T1, T2, T3 . . . TN), and (2) a plurality of sections 44 (S1, S2, S3 . . . Sn) that contain watermark information. The watermark information is commingled with the tracks such that each track has several sections of watermark information associated therewith. The placement of the watermark information along side the tracks may be accomplished in any manner known in the art.
  • As noted, digital recording 12 comprises digital content, such as a music CD containing N songs. Watermark information is stored in each of the n sections 44. Each section 44 includes an individual watermark element (R1D1, R2D2, R3D3 . . . ) that is required to be present to verify any portion of digital recording 24. Thus, if a section is missing, digital recording 24 will not be verified. Accordingly, a single track (e.g., T1) cannot be processed unless all of the other tracks are present. The sections are logically grouped into blocks of sections 46 and 48, with each block containing m sections where m is any integer.
  • The procedure for creating watermarked digital recording 24 from digital recording 12 is as follows. First, sectioning mechanism 16 of watermark encoder 14 partitions digital recording 12 into a plurality of logical sections 44 (S1, S2 . . . Sn), each of a predetermined length. For example, for a music CD, each section 44 may be approximately 15 seconds in length. Next, random number generator 18 generates an r-bit random number Ri for each section i. Each r-bit random number (R1, R2 . . . Rn) may be any size, but preferably comprises 4 to 16 bits. Next, a d-bit hash of these random numbers is generated by hash function 20. The resulting d-bit value, referred to herein as identifier D is given by D=H(R1, R2, R3 . . . ), where H is hash function 20. Hash functions are well known in the art, and hash function 20 may comprise any function that can operate on the random numbers and generate a single value D, e.g., a sum value. The d-bit hash may be of any size, but preferably comprises 32 to 80 bits of data.
  • The next step is to split identifier D into m portions, and to map each of the m portions into each block of sections 46, 48. The splitting process is accomplished with portioning function “P” 22, where P(D)=D1, D2 . . . Dm. In the embodiment depicted in FIG. 2, m=4, denoting that each block comprises four sections and identifier D is split into four portions. The d-bit identifier D may be split and mapped in any manner. For example, groups of bits ranging from least significant to most significant may be split into portions D1, D2, D3 . . . Dm. It is understood that the number of sections “m” in a block can be any integer, but preferably is between 1 and 16. In the case where m=1, each section is its own block.
  • Once all the random numbers (R1, R2 . . . Rn) and identifier portions (D1, D2 . . . Dm) are calculated, each section is watermarked by watermark system 23 with: (1) the section's associated random number Ri, and (2) one of m identifier portions (D1, D2 . . . Dm). In this exemplary embodiment, each section i is given a watermark WMi, where WMi=Ri D(1+(i mod m)). Thus, referring to FIG. 2, a first block of sections 46 are watermarked with R1D1, R2D2, R3D3, and R4D4; a second block of sections 48 are watermarked with R5D1, R6D2, R7D3 and R8D4; and so on. In this exemplary embodiment, each of the identifier portions (D1, D2 . . . Dm) is mapped into a block using the “mod” operator. However, it is understood that any other method of mapping the D partitions into each block may be utilized. The result is a watermarked digital recording 24 that includes n watermarked sections commingled with the N tracks.
  • Verification of watermarked digital recording 24 is accomplished by verifying that each of the n watermarks encoded by encoder 14 exist. Verification system 28 achieves this in the following manner. First, watermark extraction system 30 opens an inputted digital recording, determines how many sections n′ exist, and reads each of the n′ watermarks. The random numbers (R1′, R2′ . . . Rn′) and identifier portions (D1′, D2′ . . . Dm′) are then extracted. Identifier portions (D1′, D2′ . . . Dm′) may be extracted on a block-by-block basis based on an inverse of the mapping formula used to map the portions into blocks by encoder 14.
  • Next, a first verification identifier D′ is calculated by the same hash function 20 that was used by encoder 14. Thus, D′=H(R1′, R2′ . . . Rn′). Then, a second verification identifier D″ is calculated by coalescing function 34, which combines the extracted identifier partitions D1′, D2′ . . . Dm′. Coalescing function 34 operates in an inverse manner in which portioning function P 22 splits identifier D. Accordingly, D″=P−1(D1′, D2′ . . . Dm′). Next, comparator 36 compares D′ and D″ to determine if all of the sections, and therefore the entire digital recording, is present. If D′ is not equal to D″, this indicates (1) that not all sections are present or (2) that some of the sections have been modified, and abort mechanism 40 will abort the processing. If the entire digital recording is present, processing system 38 will proceed with the desired processing (e.g., record/playback/transmit).
  • The proposed system and method is effective since if one or more section is changed or left out, the verification system's hash calculation D′=H(R1′, R2′ . . . Rn′) will be different from the encoder's hash calculation D=H(R1, R2 . . . Rn), and therefore not match with the extracted and combined identifier D″=P−1(D1′, D2′ . . . Dm′). It is of negligible probability that a collection with missing, altered, or replaced sections will provide the same hash value as the original content.
  • If the identifier D is split into m parts, these parts reoccur periodically, and the number of possible different watermarks is m·2r, where r is the number of bits in each random number. Accordingly, even if a few sections have the same watermark, the system is still effective as long as most of the watermarks are different. (Otherwise, a subset of sections could falsely prove the presence of the whole CD content.) If there are 300 sections on a given music CD, it is relatively easy to achieve an implementation wherein almost all watermarks are different (e.g., m=5, r=6 will achieve over 300 watermarks).
  • The length of the watermark r+d/m can be freely chosen, but should be chosen to prevent substitution attacks using sections from other CD's kept in a manageable size pre-calculated table. The following parameters can be freely chosen, but have preferred ranges and values as follows: r=4 . . . 16; d=32 . . . 80; m=1 . . . 16; m·2r≧300; and r+d/m≧16.
  • It is understood that systems, mechanisms, and modules described herein can be implemented in hardware, software, or a combination of hardware and software. They may be implemented by any type of computer system—or other apparatus adapted for carrying out the methods described herein. A typical combination of hardware and software could be a general-purpose computer system with a computer program that, when loaded and executed, controls the computer system such that it carries out the methods described herein. Alternatively, a specific use computer, containing specialized hardware for carrying out one or more of the functional tasks of the invention could be utilized. The present invention can also be embedded in a computer program product, which comprises all the features enabling the implementation of the methods and functions described herein, and which—when loaded in a computer system—is able to carry out these methods and functions. Computer program, software program, program, program product, or software, in the present context mean any expression, in any language, code or notation, of a set of instructions intended to cause a system having an information processing capability to perform a particular function either directly or after either or both of the following: (a) conversion to another language, code or notation; and/or (b) reproduction in a different material form.
  • The foregoing description of the preferred embodiments of the invention have been presented for purposes of illustration and description. They are not intended to be exhaustive or to limit the invention to the precise form disclosed, and obviously many modifications and variations are possible in light of the above teachings. Such modifications and variations that are apparent to a person skilled in the art are intended to be included within the scope of this invention as defined by the accompanying claims.

Claims (11)

1-5. (canceled)
6. A system for verifying a digital recording by ensuring a completeness of the digital recording, comprising:
a mechanism for reading watermarks from each of a plurality of sections on the digital recording and extracting a first and second part from each watermark;
a mechanism for calculating a first identifier as a function of the extracted first parts;
a mechanism for calculating a second identifier based on a subset of the second extracted parts; and
a mechanism for comparing the first identifier and the second identifier.
7. The system of claim 6, wherein the first part of each watermark is a random number.
8. The system of claim 7, wherein the second part of each watermark is a hash of a complete set of random numbers from an original copy of the digital recording.
9. The system of claim 6, further comprising a mechanism for terminating further processing of the digital recording if the first and second identifier do not match.
10-13. (canceled)
14. A program product stored on a recordable media for verifying a digital recording that, when executed, comprises:
means for reading watermarks from each of a plurality of sections on the digital recording and extracting a first part and a second part from each watermark;
means for calculating a first identifier as a function of the extracted first parts;
means for calculating a second identifier based on a subset of the second extracted parts; and
means for comparing the first identifier and the second identifier.
15. The program product of claim 14, wherein the first part of each watermark is a random number.
16. The program product of claim 15, wherein the second part of each watermark is a hash of a complete set of random numbers from an original copy of the digital recording.
17-20. (canceled)
21. A watermarked digital recording, comprising:
a plurality of tracks; and
a plurality of sections commingled with the plurality of tracks, wherein each section includes a random value and a value that is dependent on the random values for all of the sections.
US11/130,991 2000-12-05 2005-05-17 System and method for protecting digital media Abandoned US20050210257A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/130,991 US20050210257A1 (en) 2000-12-05 2005-05-17 System and method for protecting digital media

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US09/730,336 US6925342B2 (en) 2000-12-05 2000-12-05 System and method for protecting digital media
US11/130,991 US20050210257A1 (en) 2000-12-05 2005-05-17 System and method for protecting digital media

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US09/730,336 Continuation US6925342B2 (en) 2000-12-05 2000-12-05 System and method for protecting digital media

Publications (1)

Publication Number Publication Date
US20050210257A1 true US20050210257A1 (en) 2005-09-22

Family

ID=24934905

Family Applications (2)

Application Number Title Priority Date Filing Date
US09/730,336 Expired - Fee Related US6925342B2 (en) 2000-12-05 2000-12-05 System and method for protecting digital media
US11/130,991 Abandoned US20050210257A1 (en) 2000-12-05 2005-05-17 System and method for protecting digital media

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US09/730,336 Expired - Fee Related US6925342B2 (en) 2000-12-05 2000-12-05 System and method for protecting digital media

Country Status (8)

Country Link
US (2) US6925342B2 (en)
EP (1) EP1259961B1 (en)
JP (1) JP2004515872A (en)
KR (1) KR20020073526A (en)
CN (1) CN1398400A (en)
AT (1) ATE301864T1 (en)
DE (1) DE60112552T2 (en)
WO (1) WO2002047078A2 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150278545A1 (en) * 2014-03-28 2015-10-01 Aruba Networks, Inc. Anonymization of client data
US20220207120A1 (en) * 2020-12-30 2022-06-30 Inka Entworks, Inc Apparatus and method for embedding plurality of forensic marks

Families Citing this family (49)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7724919B2 (en) 1994-10-21 2010-05-25 Digimarc Corporation Methods and systems for steganographic processing
US7224819B2 (en) 1995-05-08 2007-05-29 Digimarc Corporation Integrating digital watermarks in multimedia content
US6728390B2 (en) 1995-05-08 2004-04-27 Digimarc Corporation Methods and systems using multiple watermarks
US6763123B2 (en) 1995-05-08 2004-07-13 Digimarc Corporation Detection of out-of-phase low visibility watermarks
US7711564B2 (en) * 1995-07-27 2010-05-04 Digimarc Corporation Connected audio and other media objects
US7562392B1 (en) * 1999-05-19 2009-07-14 Digimarc Corporation Methods of interacting with audio and ambient music
US6505160B1 (en) * 1995-07-27 2003-01-07 Digimarc Corporation Connected audio and other media objects
US6804376B2 (en) 1998-01-20 2004-10-12 Digimarc Corporation Equipment employing watermark-based authentication function
US7644282B2 (en) 1998-05-28 2010-01-05 Verance Corporation Pre-processed information embedding system
US6737957B1 (en) 2000-02-16 2004-05-18 Verance Corporation Remote control signaling using audio watermarks
US7738673B2 (en) * 2000-04-19 2010-06-15 Digimarc Corporation Low visible digital watermarks
US8027509B2 (en) 2000-04-19 2011-09-27 Digimarc Corporation Digital watermarking in data representing color channels
US8121843B2 (en) * 2000-05-02 2012-02-21 Digimarc Corporation Fingerprint methods and systems for media signals
US7499742B2 (en) * 2001-09-26 2009-03-03 Cvrx, Inc. Electrode structures and methods for their use in cardiovascular reflex control
US20020073317A1 (en) * 2000-12-08 2002-06-13 Philips Electronics North America Corporation. System and method for protecting digital media
US7248715B2 (en) * 2001-04-06 2007-07-24 Digimarc Corporation Digitally watermarking physical media
US7046819B2 (en) 2001-04-25 2006-05-16 Digimarc Corporation Encoded reference signal for digital watermarks
JP3678181B2 (en) * 2001-08-08 2005-08-03 ソニー株式会社 REPRODUCTION DEVICE AND METHOD, AND DISC REPRODUCTION DEVICE
US7194617B2 (en) * 2001-11-05 2007-03-20 Koninklijke Philips Electronics N.V. Method and apparatus to prevent the unauthorized copying of digital information
US20030088773A1 (en) * 2001-11-07 2003-05-08 Koninklijke Philips Electronics N. V. Method of and apparatus for preventing illicit copying of digital content
US7728048B2 (en) 2002-12-20 2010-06-01 L-1 Secure Credentialing, Inc. Increasing thermal conductivity of host polymer used with laser engraving methods and compositions
EP1552454B1 (en) 2002-10-15 2014-07-23 Verance Corporation Media monitoring, management and information system
DE602004030434D1 (en) 2003-04-16 2011-01-20 L 1 Secure Credentialing Inc THREE-DIMENSIONAL DATA STORAGE
CA2427023A1 (en) * 2003-04-29 2004-10-29 Iline Entertainment Inc. Method and apparatus for the protection of fixed media
US20050010616A1 (en) * 2003-07-09 2005-01-13 Burks David P. System and method for restoring files
US20060239501A1 (en) 2005-04-26 2006-10-26 Verance Corporation Security enhancements of digital watermarks for multi-media content
US20060069796A1 (en) * 2004-09-29 2006-03-30 Infinium Labs, Inc. Method for automatic patching of a sparsely streamed application
JP4728104B2 (en) * 2004-11-29 2011-07-20 株式会社日立製作所 Electronic image authenticity guarantee method and electronic data disclosure system
US8020004B2 (en) 2005-07-01 2011-09-13 Verance Corporation Forensic marking using a common customization function
US8781967B2 (en) 2005-07-07 2014-07-15 Verance Corporation Watermarking in an encrypted domain
US20070191975A1 (en) * 2006-01-20 2007-08-16 Sanmina-Sci, A Delaware Corporation Secure content delivery device
US8199969B2 (en) 2008-12-17 2012-06-12 Digimarc Corporation Out of phase digital watermarking in two chrominance directions
US9117268B2 (en) * 2008-12-17 2015-08-25 Digimarc Corporation Out of phase digital watermarking in two chrominance directions
US9607131B2 (en) 2010-09-16 2017-03-28 Verance Corporation Secure and efficient content screening in a networked environment
US8923548B2 (en) 2011-11-03 2014-12-30 Verance Corporation Extraction of embedded watermarks from a host content using a plurality of tentative watermarks
US8682026B2 (en) 2011-11-03 2014-03-25 Verance Corporation Efficient extraction of embedded watermarks in the presence of host content distortions
US8615104B2 (en) 2011-11-03 2013-12-24 Verance Corporation Watermark extraction based on tentative watermarks
US8745403B2 (en) 2011-11-23 2014-06-03 Verance Corporation Enhanced content management based on watermark extraction records
US8708252B2 (en) 2011-11-28 2014-04-29 Neoperl Gmbh Sanitary installation part
US9323902B2 (en) 2011-12-13 2016-04-26 Verance Corporation Conditional access using embedded watermarks
US9547753B2 (en) * 2011-12-13 2017-01-17 Verance Corporation Coordinated watermarking
US9571606B2 (en) 2012-08-31 2017-02-14 Verance Corporation Social media viewing system
US9106964B2 (en) 2012-09-13 2015-08-11 Verance Corporation Enhanced content distribution using advertisements
US8869222B2 (en) 2012-09-13 2014-10-21 Verance Corporation Second screen content
US9262793B2 (en) 2013-03-14 2016-02-16 Verance Corporation Transactional video marking system
US9251549B2 (en) 2013-07-23 2016-02-02 Verance Corporation Watermark extractor enhancements based on payload ranking
US9208334B2 (en) 2013-10-25 2015-12-08 Verance Corporation Content management using multiple abstraction layers
EP3117626A4 (en) 2014-03-13 2017-10-25 Verance Corporation Interactive content acquisition using embedded codes
US10957355B2 (en) * 2018-02-28 2021-03-23 International Business Machines Corporation Authenticating digital recordings

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5513260A (en) * 1994-06-29 1996-04-30 Macrovision Corporation Method and apparatus for copy protection for various recording media
US5949885A (en) * 1996-03-12 1999-09-07 Leighton; F. Thomson Method for protecting content using watermarking
US20020073317A1 (en) * 2000-12-08 2002-06-13 Philips Electronics North America Corporation. System and method for protecting digital media
US6611607B1 (en) * 1993-11-18 2003-08-26 Digimarc Corporation Integrating digital watermarks in multimedia content
US6671387B1 (en) * 2000-07-21 2003-12-30 Wen-Hsing Hsu Watermarking of a digitized image
US6674874B1 (en) * 1998-11-27 2004-01-06 Canon Kabushiki Kaisha Data processing apparatus and method and storage medium

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPS61206905A (en) * 1985-03-11 1986-09-13 Hitachi Ltd Copy preventing system for magnetic disc device
JP3488603B2 (en) 1997-09-16 2004-01-19 株式会社東芝 Copy protection system using digital watermark
JPH11234264A (en) * 1998-02-17 1999-08-27 Canon Inc Electronic papermarking system, electronic information distribution system using the same and storage medium
WO1999060741A1 (en) 1998-05-20 1999-11-25 Recording Industry Association Of America Method for minimizing pirating or unauthorized copying of data
CA2332008A1 (en) * 1999-03-15 2000-09-21 Koninklijke Philips Electronics N.V. A method and system for providing copy-protection on a storage medium by randomizing locations upon write access, and a player and a storage medium for use in such a system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6611607B1 (en) * 1993-11-18 2003-08-26 Digimarc Corporation Integrating digital watermarks in multimedia content
US5513260A (en) * 1994-06-29 1996-04-30 Macrovision Corporation Method and apparatus for copy protection for various recording media
US5949885A (en) * 1996-03-12 1999-09-07 Leighton; F. Thomson Method for protecting content using watermarking
US6674874B1 (en) * 1998-11-27 2004-01-06 Canon Kabushiki Kaisha Data processing apparatus and method and storage medium
US6671387B1 (en) * 2000-07-21 2003-12-30 Wen-Hsing Hsu Watermarking of a digitized image
US20020073317A1 (en) * 2000-12-08 2002-06-13 Philips Electronics North America Corporation. System and method for protecting digital media

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150278545A1 (en) * 2014-03-28 2015-10-01 Aruba Networks, Inc. Anonymization of client data
US20220207120A1 (en) * 2020-12-30 2022-06-30 Inka Entworks, Inc Apparatus and method for embedding plurality of forensic marks

Also Published As

Publication number Publication date
DE60112552T2 (en) 2006-06-14
JP2004515872A (en) 2004-05-27
DE60112552D1 (en) 2005-09-15
EP1259961A2 (en) 2002-11-27
ATE301864T1 (en) 2005-08-15
WO2002047078A2 (en) 2002-06-13
US20020068987A1 (en) 2002-06-06
EP1259961B1 (en) 2005-08-10
WO2002047078A3 (en) 2002-09-19
KR20020073526A (en) 2002-09-26
US6925342B2 (en) 2005-08-02
CN1398400A (en) 2003-02-19

Similar Documents

Publication Publication Date Title
US6925342B2 (en) System and method for protecting digital media
EP1256086B1 (en) Methods and apparatus for multi-layer data hiding
US20020073317A1 (en) System and method for protecting digital media
US5905800A (en) Method and system for digital watermarking
JP4046767B2 (en) Recording signal copy prevention system
WO2000075925A1 (en) Method and systems for protecting data using digital signature and watermark
US7730313B2 (en) Tracing content usage
JP2004519912A (en) Improved copy protection of owned materials using multiple watermarks
KR100746018B1 (en) Signal processing methods, devices, and applications for digital rights management
US20020076048A1 (en) System and method for inserting disruptions into merged digital recordings
GB2404296A (en) Data content identification using watermarks as distinct codes
Kirovski et al. Digital rights management for digital cinema
US7194617B2 (en) Method and apparatus to prevent the unauthorized copying of digital information
KR20020068459A (en) Watermark-based copy management system and method for digital media copy protection
RU2237934C2 (en) Device for recording and reproducing data
US7213004B2 (en) Apparatus and methods for attacking a screening algorithm based on partitioning of content
KR20070057917A (en) Detecting and reacting to protected content material in a display or video drive unit
US20030088773A1 (en) Method of and apparatus for preventing illicit copying of digital content
JP2001125484A (en) Device and method for embedding watermark data, transmission method, recording medium and watermark
Xu et al. Content protection and usage control for digital music
Steinebach et al. Capacity-optimized mp2 audio watermarking
Steinbach et al. Design principles for active audio and video fingerprinting

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION