EP1546888A4 - Digital content with information of latent value to purchaser and method for making the same - Google Patents
Digital content with information of latent value to purchaser and method for making the sameInfo
- Publication number
- EP1546888A4 EP1546888A4 EP02759353A EP02759353A EP1546888A4 EP 1546888 A4 EP1546888 A4 EP 1546888A4 EP 02759353 A EP02759353 A EP 02759353A EP 02759353 A EP02759353 A EP 02759353A EP 1546888 A4 EP1546888 A4 EP 1546888A4
- Authority
- EP
- European Patent Office
- Prior art keywords
- digital
- purchaser
- information
- content
- file
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000000034 method Methods 0.000 title claims description 52
- 238000013475 authorization Methods 0.000 claims abstract description 20
- 238000004891 communication Methods 0.000 claims description 40
- 238000010586 diagram Methods 0.000 description 15
- 238000012545 processing Methods 0.000 description 11
- 238000013459 approach Methods 0.000 description 7
- 230000008901 benefit Effects 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 6
- 230000005540 biological transmission Effects 0.000 description 4
- 238000001514 detection method Methods 0.000 description 4
- 239000000284 extract Substances 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 230000003467 diminishing effect Effects 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000004364 calculation method Methods 0.000 description 2
- 230000015556 catabolic process Effects 0.000 description 2
- 238000006731 degradation reaction Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 238000000605 extraction Methods 0.000 description 2
- 230000008707 rearrangement Effects 0.000 description 2
- 238000011084 recovery Methods 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 241001465382 Physalis alkekengi Species 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 230000002860 competitive effect Effects 0.000 description 1
- 230000000295 complement effect Effects 0.000 description 1
- 238000007906 compression Methods 0.000 description 1
- 230000006835 compression Effects 0.000 description 1
- 230000007423 decrease Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 230000008447 perception Effects 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 238000013139 quantization Methods 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 238000007619 statistical method Methods 0.000 description 1
- 239000004575 stone Substances 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00485—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier
- G11B20/00492—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted
- G11B20/00536—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier characterised by a specific kind of data which is encrypted and recorded on and/or reproduced from the record carrier wherein content or user data is encrypted wherein encrypted content data is subjected to a further, iterated encryption, e.g. interwoven encryption
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0071—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a purchase action
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00884—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving a watermark, i.e. a barely perceptible transformation of the original data which can nevertheless be recognised by an algorithm
Definitions
- This invention relates generally to digital information processing systems and methods that protect digital information from improper use. More particularly, the present invention relates to embedding in a digital file information that has a latent value to the purchaser.
- Steganography literally means, "covered writing” and is usually interpreted to mean hiding information in other information. Steganography is thus concerned with the embedding of a hidden message in some other information commonly referred to as a "cover,” in such a manner that the existence of the hidden message should be undetected.
- a cover some other information commonly referred to as a "cover”
- transform domain techniques such as transform domain techniques
- spread spectrum techniques such as spread spectrum distortions
- statistical methods to name a few.
- With each method of hiding information there is a trade off between the amount of hidden information that is embedded and the survivability or robustness of that information to remain undetected. This trade off results from the fact that both the original information and the message one wants to embed tend to have unique patterns or signatures that can be exploited. Thus, even information that is subject to quantization, filters, transformation, etc. is still detectable.
- the "pirate" has essentially two general approaches to try to defeat the system. Both approaches typically require detection or at least a suspicion that hidden information is present. Then the attacker either extracts and removes the information or the attacker overwrites and disables the information. Thus, the goal of a steganographic system is to avoid detection. If suspicion is raised then the goal is defeated because the detection of the hidden information is hard to find, however, it is typically not hard to be removed or it can be defeated once found.
- creative methods have been devised in the "hiding" process to reduce detection of the embedded information, equally creative analysis methods have been devised to find or detect the presence of the hidden information.
- Digital watermarking is a type of steganography commonly used for copyright protection and authentication.
- a generic example of a watermarked digital image is shown as output from a printer in Fig. 1.
- the data shown as a "W" in Fig. 1
- the hidden information i.e. the watermark
- the hidden information is then embedded in the noise signal of the original, which for clarity is shown as the "W" superimposed on the picture in the second frame of Fig. 1.
- the watermarked image is shown in the bottom frame of Fig. 1 , is invisible, and is retrieved only by extraction software.
- watermarking used for copyright protection is typically secure and robust and it may be visible or invisible.
- digital watermarking is closely related to steganography it is also distinguished in one major aspect, notably watermarks should be robust against attacks. Even if the existence of the embedded information is known, it should be hard for an attacker to destroy the embedded information without knowledge of a key. However, this also leads to a limitation in the use of digital watermarks, that is, the robustness requirements typically result in the embedding of much less information in the original "cover" information than steganographic methods. Thus, watermarking and steganography are more complementary than competitive approaches.
- a watermark could be a visible "seal" placed over an image to identify the copyright owner and might also contain the identity of the purchaser of a particular copy of the image so that it is traceable back to the specific version of the original from which it was created.
- the watermark should be hard to remove without destroying the digital content.
- the watermarked digital content is traceable back to the specific version of the original from which it was created.
- an attacker obtains more than one copy of the digital content, possibly through collusion with another, then the attacker averages the copies to make a
- the first problem involves the implementation of safeguards to prevent a user from sharing the decryption key with illegitimate users.
- a user wishing to purchase some digital information obtains the encrypted information through one of many possible distribution channels (i.e. compact disc read-only memory ⁇ CD-ROM ⁇ , Internet, etc.).
- the user then contacts an authorization center to legitimately obtain the decryption key to decrypt the purchased information to make it useable.
- the authorization center does not supply the decryption key directly since to do so allows the user to provide or even sell at a profit the decryption key to others. No matter what cryptographic system the authorization center utilizes, in all encryption cases the user, to successfully utilize the encrypted information, must have in the user's possession the decryption key.
- the second problem that also must be overcome is that regardless of what system is used to protect the unauthorized use of the decryption key there is nothing to prevent a legitimate user from copying the decrypted content and sharing that with unauthorized users.
- barring a tamper- proof hardware decryption system there is no solution known in the art to overcome this second problem; at some point in the process, a legitimate user must have access to the decrypted information in order to use it. As long as the user is sufficiently sophisticated to be able to capture the information then the user will be able to copy it and redistribute it.
- Valued content in a digital form includes a digital file and a digital string that is provided by a purchaser to a provider system of the valued content.
- the digital string has a latent value to the purchaser, and the provider system embeds the digital string in the digital file before the valued content is conveyed to the purchaser.
- Fig. 1 is a generalized example, depicting a digital image as output from a printer, of prior art showing a watermarking technique
- Fig. 2 is a block diagram of a valued content according to an embodiment of this invention.
- Fig. 3a is a block diagram of a valued content according to an alternate embodiment of this invention.
- Fig. 3b is a block diagram of a recovery scheme according to the embodiment of this invention shown in Fig. 3b;
- Fig. 4 is a block diagram of a valued content according to an alternate embodiment of this invention
- Fig. 5 is a block diagram of a valued content according to an alternate embodiment of this invention
- Fig. 6a is a digitized image according to an embodiment of this invention
- Fig. 6b is an enlarged view of a portion of the digitized image shown in Fig. 6a according to an embodiment of this invention
- Fig. 7 is a block diagram of a digital content processing system according to an alternate embodiment of this invention
- Fig. 8 is a flow diagram of a method for protecting digital content according to an embodiment of this invention
- Fig. 9 is a flow diagram of a method for protecting digital content according to an alternate embodiment of this invention.
- content providers attempt to cripple or hinder output devices such as DVD players (commonly referred to as either digital video disc or digital versatile disc players), printers, digital audio tape players etc. in some fashion when improperly obtained (i.e. pirated) content is accessed.
- DVD players commonly referred to as either digital video disc or digital versatile disc players
- printers digital audio tape players etc.
- digital audio tape players etc.
- the content providers attempt to mark or label the valued content with some ownership information. When marked pirated content is accessed, the mark provides a means for the owner to legally attempt to enforce his rights against those who have improperly distributed or obtained the valued content.
- a feature of the present invention unlike the prior techniques used by the owner to actively protect his rights includes the embedding of information, which has a latent value to the purchaser, in the digital file before that file is used by the purchaser.
- the very ubiquity of pirating is an enforcement method by tying together the property rights of the content provider and the purchaser.
- the purchaser In combining the interests of providers and purchasers by embedding information that the purchaser is unlikely to want to have distributed, the purchaser is converted into a guardian of the valued content. Further, by embedding this information multiple times the incentive to the purchaser is increased because the purchaser can never be certain that all of the embedded versions have been found or are known. Thus, potential pirates are changed into enforcers.
- Another feature of the present invention is the ability to incorporate the embedding of information of latent value to the purchaser into existing protection systems as well as future systems.
- the present invention advantageously uses information obtained from each purchaser that has a latent value to the purchaser to embed in the digital content before the purchaser has access to the digital content.
- a purchaser who wishes to purchase some valued content 200 in a digital form transmits a digital string 214 via a communication channel 210 to the provider system 222 using purchaser system 220.
- the original digital file 212 can be of any nature such as a digitized image, a text document, video images such as a movie, digitized audio such as a song, software, or other digital file.
- the communication channel 210 is a digital network such as what is commonly referred to as the Internet.
- Other communication channels such as wireless communication, wireline telephone, digital cable television, as well as other point-to-point, point-to-multipoint, and broadcast communications methods can also be used.
- the digital string 214 is a binary representation of human perceptible characters or sound suitable for transmission over the Internet or other electronic channels.
- the digital string 214 can be of any nature such as a number, text, or an image.
- the digital string 214 contains information that has a latent value to the purchaser.
- the digital string 214 contains information that places the purchaser at increased financial risk when known by another. Both the adequacy and sufficiency of the information provided by the purchaser via the purchaser system 220 is typically made by the provider system 222, however, negotiation between the purchaser and a provider directly or between the purchaser system 220 and the provider system 222 may occur.
- Information that may be used or requested by the provider system 222 are credit card numbers and expiration dates, social security number, date of birth, bank account number, personal identification numbers (PIN), address, or phone number are just a few examples and are not meant to be exhaustive nor limit the scope of the present invention.
- the valued content 200 is made accessible to the purchaser and/or the purchaser system 220.
- the provider system 222 uses various digital watermarking techniques, steganographic techniques, encryption/decryption schemes, or semantic embedding techniques to embed 226 the digital string 214 into an original digital file 212 to generate the valued content 200.
- various digital watermarking techniques, steganographic techniques, encryption/decryption schemes, or semantic embedding techniques to embed 226 the digital string 214 into an original digital file 212 to generate the valued content 200.
- a combination of techniques available such as digital watermarking and steganography or any of the other combinations available are used to embed the digital string 214 in the valued content 200.
- the provider system 222 takes advantage of the fundamental differences between them. For example, by using both a digital watermarking technique and a steganographic system two different robustness criteria are established.
- the provider system 222 encrypts the digital string 214 using "m” different encryption keys and then embed 226 those "m” encrypted digital strings "n” times in the original digital file 212'.
- the provider system 222 then publishes via the Internet or other communication channel a subset of the "m” encryption keys to enable others who believe they have obtained an illegal copy to gain access to the sensitive information conveyed by the purchaser system 220.
- the provider system 222 by providing various subsets of the "m” encryption keys at different times increases the incentive to the purchaser because the purchaser can never be certain all the embedded versions of the digital string 214 have been found for which keys are available.
- the information embedded in the valued content 200 can also include a provider string 227 which contains other information such as a finders fee in addition to the digital string 214 provided by the purchaser system 220.
- the provider system 222 can also embed 226 a notice for a reward to any member of the public who identifies a file that has been inappropriately distributed to others, in addition to the sensitive information obtained from the purchaser or the purchaser system 220.
- Access 224 to the valued content 200 by the purchaser system 220 is gained via a communication channel 210'.
- the valued content 200 can be conveyed to the purchaser via the communication channel 210'.
- communication channel 210' is the same as communication channel 210; however, other communications channels, such as wireless communication or digital cable television can also be used.
- the decryption key or some authorization code can be conveyed to the purchaser system 220 by the communication channel 210' in which either the decryption key or the authorization code is embedded in it the digital string 214.
- the valued content 200 is then generated on the purchaser's system 220 (i.e. both the decryption of the original digital file 212' and the embedding 226 of digital string 214' in the original digital file 212').
- An alternate embodiment of the present invention where the provider system 322 protects the valued content 300 by using a digital watermark containing the digital string 214 is shown as a simplified block diagram in Fig. 3.
- the provider system 322 once the provider system 322 has obtained the digital string 214 from the purchaser system 220, the provider system 322 generates a digital watermark 350 from the information contained in the digital string 214 using a particular watermarking scheme.
- the provider system 322 utilize a watermarking technique that allows for the watermark to be retrieved regardless of the domain where it was embedded. This is important in applications such as audio and video and images requiring resilience to transcoding or change of format.
- the watermarking embedding process utilizes the digital string 214' as the watermark, original digital file 212' as the "cover” and an optional encryption key 334 to generate an encrypted digital watermark.
- the encryption key 334 may or may not be used depending on the particular application.
- the encryption key 334 may be used in combination with some unencrypted watermarks.
- the encryption key 334 used is of the type generally referred to as a private/public encryption key, and a combination of several keys are utilized to embed multiple encrypted digital strings 214'.
- the encryption key 334 provides additional security against manipulation or erasure by unauthorized parties trying to defeat the watermark.
- the modifications caused by the watermark embedding process are below a perceptible threshold that includes a criterion that weighs the value of the original digital file 212' against the loss resulting from unauthorized use.
- the information contained in the digital string 214' preferably is redundantly distributed over many samples (bytes, pixels, features, etc.) of the original digital file 212' shown as "n" in Fig. 3. If "m” represents the number of different encryption keys used then "m” encrypted digital strings 214' are embedded in the original digital file 212' "n" times.
- the output of the watermarking technique is the valued content 300, which contains the watermarked digital file.
- the valued content 300 is then conveyed 324 to the purchaser system 220 via the communication channel 210'.
- the communication channel 210' is the same as the communication channel 210; however, other communications channels may also be used.
- the purchaser or purchaser system 220 has obtained valued content 300 the purchaser has access to the digital information contained in the original digital file 212.
- An advantage of the present invention is that at the point the purchaser system 220 has access to the digital information the purchaser has a vested interest in ensuring that the information contained in the original digital file 212 is not distributed to other users since the valued content 300 also contains information about the purchaser, that has latent value to the purchaser.
- FIG 3b A simplified block diagram of a watermarking recovery scheme is shown in Fig 3b, which provides additional incentive to the purchaser not to distribute the valued content 300 to other users.
- the provider system 322 when the valued content 300 is conveyed 324 to the purchaser system 220 (as shown in Fig. 3a), also places in the public domain a subset of the "m" versions of the public encryption keys 334' used and makes this known to the purchaser at the time of purchase.
- the provider system 322 also makes a watermark extraction process publicly available.
- the subsequent users 351 can gain access to the very information that the purchaser wants to keep private by utilizing the public encryption key 334' distributed by the provider system 322.
- the watermark extraction process 352 using the public encryption key 334' extracts bits of information (i.e. the digital string 214") from either the valued content 300 or the possibly distorted digital file 301.
- the provider system 322 distributes the public encryption key over the Internet, however other communication channels may also be used without diminishing the utility of the present invention.
- the provider system 322' can also extract the digital string 214" from either the valued content 300 or the possibly distorted digital file 301 by utilizing either the encryption key 334' or the watermark/original digital string 350'.
- the provider system 322 gains the advantage of providing an additional incentive to the purchaser not to unlawfully distribute valued content 300.
- the provider system 322 can also maintain one or more of the redundantly embedded digital strings 214' in a secure manner for eventual decryption (i.e.
- FIG. 4 An alternate embodiment of the present invention, where the provider system 422 protects the valued content 400 by generating a steganographic object containing the digital string 214, is shown as a simplified block diagram in Fig. 4.
- the provider system 422 generates, from the digital file 212', the digital string 214' and a random number generator 444, a steganographic object 456 using a particular steganographic technique.
- a private/public encryption key 434 it is also advantageous to use a private/public encryption key 434 and to hide the information contained in digital string 214' multiple times denoted by "n" in Fig. 4.
- the provider system 422 distributes the public encryption key over the Internet, however other communication channels may also be used without diminishing the utility of the present invention.
- the valued content 400 containing the digital file with the hidden digital string preferably should not be distinguishable from the original digital file 212, either by human perception or by a computer looking for a statistical pattern. It is also preferable that the particular steganographic technique used should allow any computer readable data such as image files, digital sound, or written text etc. to be used. Those skilled in the art will readily recognize that although watermarking schemes and steganographic techniques have been described separately they can also be utilized in combination to take advantage of the fundamental differences between them.
- the provider system 422 can optimize the ability for others to access the purchaser's sensitive information via watermarking, as well as providing tracking and enforcement of the owner's legal rights against those who have improperly distributed the valued content 400 via the steganographic technique.
- FIG. 5 An alternate embodiment of the present invention is shown as a simplified block diagram in Fig. 5, where the provider system 522 protects the valued content 500 by using authorization file 546 containing the encrypted digital string 514 to enable decryption of the valued content 500.
- a purchaser who wishes to purchase some valued content 500 in a digital form transmits a digital string 214 via a communication channel 210 to the provider system 522.
- the valued content 500 is in the form of an encrypted digital file 512, that the purchaser system 220 then uses a decryption key to gain access to the valued content 500 in a useable form.
- an encryption/decryption technique is described in US Patent No. 6,038,316.
- the valued content 500 also contains whatever other information is required to be stored with the content as is necessary for the various encryption/decryption schemes utilized, such as an extractor and an embedder.
- the extractor is an extrication program 572 that uses the authorization file 546 to decrypt encrypted digital file 512, however other means will also work such as a hardware device.
- the embedder preferably, is a digital string embedding program 570, which will be explained later.
- the encrypted digital file is conveyed over communication channel
- the provider system 522 generates an encrypted digital file 512 using the content encryption key 532 to encrypt the original digital file 212.
- the provider system 522 also generates the encrypted digital string 514 from the digital string 214 obtained from the purchaser system 220 using the encryption key 534.
- the encryption key 534 is preferably a private/public encryption key pair and can be similar to the encryption keys described for watermarking and steganographic techniques as shown in Fig. 3a and 4.
- the provider system 522 may either make redundant copies of the encrypted digital string 514 or, more preferably, the provider system 522 encrypts the digital string 214 using "m" different encryption keys and then embeds those "m” encrypted digital strings "n” times in the key 547.
- the provider system 522 generates the purchaser authorization file 546 that contains the key 547 that will enable the purchaser system 220 to utilize the valued content 500.
- the provider system 522 also publishes via the Internet or other communication channel a subset of the "m" encryption keys to enable others who believe they have obtained an illegal copy to gain access to the purchasers sensitive information.
- the provider system 522 also gains the advantage of providing an additional incentive to the purchaser not to unlawfully distribute the purchaser authorization file 546 by utilizing both a combination of the encryption keys 534 and redundantly distributing the encrypted digital string 514 numerous times in the key 547.
- the provider system 522 uses a private/public encryption key the provider system 522 by encrypting with the public key 534 can also maintain one or more of the redundantly embedded encrypted digital strings 514 in a secure manner for eventual identification, tracking, and enforcement of the owner's legal rights against those who have improperly distributed the purchaser authorization file 546.
- the provider system 522 also places in the public domain one or several versions of the public encryption key 534 and makes this known to the purchaser at the time of purchase.
- the provider system 522 distributes the public encryption key over the Internet commonly referred to as the world wide web 535, however other communication channels may also be used without diminishing the utility of the present invention.
- the key 547 may contain various attributes. For example, if the extrication program contains the decryption key necessary to decrypt the encrypted digital file 512 then the key 547 in addition to containing the encrypted digital string 514 will also contain an authorization code that enables the extrication program to execute the extrication function on the authorization code to generate the decryption key. Alternatively, the key 547 may contain the decryption key itself with multiple copies of the encrypted digital string 514 embedded in the decryption key.
- the provider system 522 advantageously solves the decryption revelation problem since the purchaser has a vested interest in ensuring that the information contained in the key 547 is not distributed to other users since the key 547 also contains information about the purchaser that has latent value to the purchaser regardless of the particular encryption/decryption scheme utilized.
- the provider system 522 uses an encryption/decryption scheme that embeds multiple copies of the encrypted digital string 514 embedded in the decryption key sent to the purchaser system 220.
- Fig. 6a The printer output of a digitized image representing valued content to which a purchaser is interested in obtaining some particular rights is illustrated in Fig. 6a.
- the digitized image reproduced on an inkjet printer output page is representative of the output from a digital file according to an embodiment of this invention.
- the image has value to the provider because of the cost incurred in obtaining the image from the previous owner or from business costs in the creation, development and handling as well as possible artistic costs associated with producing the image.
- the image also has value to the purchaser again for possible esthetic reasons or for use in a product being developed such a magazine article or sales brochure.
- information that has a latent value to the purchaser is communicated to the content provider.
- the information has latent value to the purchaser because for purposes of this illustration it is assumed that the purchaser's name, credit card number, and expiration date are sufficient to create an incentive in the purchaser not to share the image with others.
- the image shown in Fig. 6a could be a "proof image used by the purchaser for layout purposes. Once the purchaser is satisfied with the layout, the purchaser then purchases the same image with the information having latent value embedded in the image such that the information is not visible to the normal eye using any of the embodiments previously described.
- the embedded digital string 626 as shown in Fig. 6a represents the information of latent value to the purchaser as seen in the output from the digital file.
- Fig. 6b is an enlarged view of a portion of the output from Fig. 6a showing the embedded digital string 626' that has also been embedded in a different portion of the digital file.
- An alternate embodiment of the present invention is where the provider system protects the valued content by using semantic embedding.
- the provider system employs rearrangements of semantic elements of the digital file.
- the semantic elements are those elements that have a contextual meaning and are used to convey information, which may be additional to the content itself.
- An example of semantic embedding is, "One if by land. Two if by sea,” where the information represented by the arrangement of lanterns in a church scene is used to encode the route of arrival of British forces.
- so-called “product placements” embed advertising information into the semantic content of a movie or television show.
- the valued content is digitized video such as a movie, television show, or digitized audio.
- the content itself preferably has a multiplicity of transposable elements. These elements should be transposable in space, time, quality, and in the presence or absence of the elements. Further, these elements must be contextual to the content, however, each of the set of rearrangements of the elements should be approximately equivalent in terms of the meaning of the content to others. After the purchaser provides the digital string containing information of latent value to the provider system, the provider system encodes this information in the arrangements of the transposable elements in the content.
- the provider system also records the 'key' to the location(s) and to the deciphering of the information obtained from the purchaser for later release as described in the previous embodiments. For example, this can be as simple as providing directions on where to look for the information, or as complex as cryptographic techniques. With the advent of digital compositing, and it concomitant automation it is possible to create a new version of a film, video, song, etc. for every purchaser. By delaying the final compositing until the time of purchase, the provider system can add the information obtained from the purchaser to the configuration of, for example, the computer graphics animation. The resulting digital output can be composited with the more fixed elements of the original digital file to produce a valued content that is thus different for each purchaser.
- a pattern of ornamentation on a magic sword could be the set of transposable elements into which the information of latent value is placed.
- the computer graphics embodying the sword are designed, along with the camera views of the sword, such that the computer graphics of the sword can be altered.
- every view of the sword throughout the movie can be automatically changed, and the resulting views composited into that copy of the film delivered to that particular purchaser.
- the placement of decorative pinwheels in an otherwise insignificant background of an entire scene can be arranged as postproduction customization to encode the information obtained from the purchaser.
- Another example would be the placement of the seams in a stone wall can also be arranged as postproduction customization to encode the information obtained from the purchaser.
- the digital processing system 780 contains a processor 786, storage 784 and a content perceiver 782 that is all used by the provider system 722 for generating the various digital calculations and processing as described in the above embodiments.
- the processor 786 embeds the digital string 214 in the original digital file 212 to generate the valued content 200 all shown in Fig. 2.
- a further example is the processor 786 encrypting both the original digital file 212 and the digital string 214 shown in Fig. 5.
- the content perceiver 782 can be a computer terminal, a printer device such as an inkjet printer, a digital camera, or audio or video device such as a digital audio tape drive system or DVD system.
- the content perceiver is any device necessary to perceive the original data file 212 shown in Fig. 2.
- Storage 784 can be processor memory, other computer memory such as a hard disk or portable memory such as a CD-ROM, DVD, DAT etc. or any appropriate combination.
- the digital processing system also contains an interface 788 allowing the provider system 722 to communicate with the content owners system 761 and 761' as well as the purchaser systems 720 and 720' over the communication channels 210.
- the communication channel 210 is a digital network 772 such as what is commonly referred to as the Internet.
- Other communication channels such as wireless communication, wireline telephone, digital cable television, as well as other point-to-point, point-to- multipoint, and broadcast communications methods can also be used.
- the communication channels 210 can also include various combinations of the above mentioned channels.
- the provider system 722 and the content owner system 761 can communicate over a wireless communication channel and the provider system 722 and the purchaser system 220 can communicate over a wireline telephone channel.
- a digital processing system 790 that contains a processor 786, storage 794 and a content perceiver 792 that is all used by the purchaser system 220 for generating the digital string 214 and accessing the valued content 200 shown in Fig. 2.
- the processor 796 decrypts the encrypted digital file 412 shown in Fig. 5.
- the content perceiver 792 is any device necessary to perceive the original data file 212 shown in Fig. 2 and may be more specialized than the content perceiver 782 used by the provider system 722.
- Storage 794 can be processor memory, other computer memory such as a hard disk or portable memory such as a CD- ROM, DVD, DAT etc. or any appropriate combination.
- the interface 798 allows the purchaser system 720 to communicate with the content owner systems 761 and 761' as well as the provider system 722 over the communication channels 210.
- a digital processing system 760 that contains a processor 766, storage 764 and a content perceiver 762 that is all used by content owner 761 for creating or modifying the original digital file 212 shown in Fig. 2.
- the content perceiver 762 is any device necessary to perceive the original data file 212 shown in Fig. 2 and may be more specialized than the content perceiver 782 used by the provider system 722.
- Storage 764 can be processor memory, other computer memory such as a hard disk or portable memory such as a CD-ROM, DVD, DAT etc. or any appropriate combination.
- the interface 768 allows the content owner 761 to communicate with the purchasers 790 and 790' as well as the provider system 722 over communication channels 210.
- the point of sale machine 774 also shown in Fig. 7 provides several advantages. It is applicable when purchaser system 220 does not have either interface 798 or access to communication channel 210 but has the other equipment necessary to access valued content 100 as shown in Fig. 2.
- communication channel 710 preferably is a digital network such as what is commonly referred to as the Internet.
- Other communication channels such as wireless communication, wireline telephone, digital cable television, as well as other point-to-point, point-to-multipoint, and broadcast communications methods can also be used.
- the use of the point of sale machine 774 is also applicable where purchaser system 220 wants to purchase valued content 100 as shown in Fig. 2 in a form which is useable in a portable media format such as DVD or DAT.
- the provider system accesses the digital file.
- the digital file may reside on the provider's digital processing system 790 or the content owner's digital processing system 761 as shown in Fig. 7 or it may also reside on some remote processing system such as a server on the network 772 also shown in Fig. 7.
- the provider system determines what information of latent value to the purchaser is appropriate, in step 802, that is sufficient to establish an incentive in the purchaser not to distribute the digital file to others by placing the purchaser at an increased financial risk when known by another.
- Step 802 may be predetermined by a provider or step 802 may also involve the provider system negotiating with the purchaser directly or the purchaser system to agree on the information required.
- the provider system then acquires the digital string from the purchaser system over a communication channel in step 804.
- the provider system authenticates the information contained in the digital string obtained from the purchaser system.
- the authentication step 806 can include both internal databases residing on the provider's digital processing system (790 as shown in Fig. 7) or external databases residing on a remote processing system or on a server on the network.
- the provider system also determines what if any provider information should also be embedded in the digital file before conveying the digital file to the purchaser.
- This provider information can be, for example, a reward or finders fee that adds further protection to the provider that the purchaser will not unlawfully distribute the digital file.
- the provider system in step 810 determines the redundancy levels "n" and " n' " where n is the number of times the purchaser information acquired in step 804 will be embedded into the digital file accessed in step 800.
- the value " n' " is the number of times the provider information determined in step 808 will be embedded into the digital file accessed in step 800.
- the provider may take into consideration the purpose and value of the digital file, the attributes of the digital file for both watermarking and the steganographic technique being utilized as well as others.
- the provider system then embeds the purchaser digital string in the digital file in step 812 using one of the embodiments previously described, such as watermarking, steganographic techniques, or encryption schemes.
- the provider system also embeds the provider digital string, in step 814, in the digital file using one of the embodiments previously described.
- the method used to embed the provider digital string in step 814 can be the same or different than the method used to embed the purchaser digital string in step 812.
- the purchaser digital string can be embedded using a watermarking technique, while the provider digital string can be steganographically embedded.
- Step 816 After completion of the embedding steps the provider then provides the purchaser access to the valued digital content, in step 816, containing the embedded information of latent value to the purchaser and if appropriate the embedded information from the provider.
- Step 816 is accomplished in numerous ways. Preferably, it involves transmitting the valued digital content over the Internet. However, it can involve sending the purchaser authorization file to the purchaser via the Internet. It may also involve providing the valued content recorded on a portable media such as a DVD, or DAT either through a point of purchase machine 774 as shown in Fig. 7 or other means.
- Steps 800 through 810 are similar to those described in Fig. 8.
- the provider system determines the redundancy levels "n" and " n' "
- the provider system in step 900 encrypts "n" purchaser digital strings using the encryption keys Ki through K n .
- the provider system then, in step 902 encrypts " n' " provider digital strings using the encryption keys Ky through Kn-.
- the provider system generates a watermark using the encrypted purchaser digital strings from step 900.
- a steganographic object using the encrypted provider digital strings from step 902 is generated by the provider system in step 906.
- the watermark and stego-object formed in steps 904 and 906 are then embedded in the digital file, in step 908, forming the valued content.
- the valued content generated in step 908 is then conveyed to the purchaser in step 910.
- the valued content is conveyed, in step 910, to the purchaser by transmitting the valued digital content over the Internet.
- the provider system also in step 912 publishes a subset of the encryption keys Kj and Kp used in steps 900 and 902 respectively to provide access to the purchaser's digital string in the event that the purchaser unlawfully distributes the valued content to others.
- a content provider's need to cripple or hinder output devices such as DVD players, printers, digital audio tape players etc. in some fashion when improperly obtained (i.e. pirated) content is accessed, or their attempt to mark or label the valued content with some ownership information in order for the owner to then legally attempt to enforce his rights against those who have improperly distributed or obtained the valued content is alleviated.
- the compromises the content provider typically makes between robustness of the protection system and some other attribute either of the digital file being protected or the information being embedded is reduced.
- a feature of the present invention unlike the prior techniques used by the owner to actively protect his rights includes the embedding of information, which has a latent value to the purchaser, in the digital file before that file is used by the purchaser.
- the very ubiquity of pirating is an enforcement method by tying together the property rights of the content provider and the purchaser.
- the purchaser is converted into a guardian of the valued content.
- potential pirates are changed into enforcers.
- the present invention advantageously uses information obtained from each purchaser that has a latent value to the purchaser to embed in the digital content before the purchaser has access to the digital content.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- Technology Law (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Multimedia (AREA)
- Editing Of Facsimile Originals (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/US2002/025720 WO2004015580A1 (en) | 2002-08-13 | 2002-08-13 | Digital content with information of latent value to purchaser and method for making the same |
Publications (2)
Publication Number | Publication Date |
---|---|
EP1546888A1 EP1546888A1 (en) | 2005-06-29 |
EP1546888A4 true EP1546888A4 (en) | 2007-08-15 |
Family
ID=31713800
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP02759353A Withdrawn EP1546888A4 (en) | 2002-08-13 | 2002-08-13 | Digital content with information of latent value to purchaser and method for making the same |
Country Status (4)
Country | Link |
---|---|
EP (1) | EP1546888A4 (en) |
JP (1) | JP2005535959A (en) |
AU (1) | AU2002324695A1 (en) |
WO (1) | WO2004015580A1 (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2671386A4 (en) * | 2011-02-04 | 2015-05-20 | Jesse Bickmore | Unique watermarking for digital media |
US20150058202A1 (en) * | 2013-08-21 | 2015-02-26 | David Dahaeck | System and method for tracking and controlling ownership of digital works and rewarding authors, artists and/or their representatives over time |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1999041900A1 (en) * | 1998-02-10 | 1999-08-19 | Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. | Secure distribution of digital representations |
US20010013097A1 (en) * | 1996-11-08 | 2001-08-09 | Monolith Co., Ltd. | Method and apparatus for imprinting id information into a digital content and for reading out the same |
EP1195702A2 (en) * | 2000-10-02 | 2002-04-10 | Hudson Soft Co., Ltd. | A digital contents data generating system |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5530751A (en) * | 1994-06-30 | 1996-06-25 | Hewlett-Packard Company | Embedded hidden identification codes in digital objects |
US5646997A (en) * | 1994-12-14 | 1997-07-08 | Barton; James M. | Method and apparatus for embedding authentication information within digital data |
US5953415A (en) * | 1996-03-25 | 1999-09-14 | Sun Microsystems, Inc. | Fingerprinting plain text information |
-
2002
- 2002-08-13 AU AU2002324695A patent/AU2002324695A1/en not_active Abandoned
- 2002-08-13 EP EP02759353A patent/EP1546888A4/en not_active Withdrawn
- 2002-08-13 JP JP2004527517A patent/JP2005535959A/en not_active Withdrawn
- 2002-08-13 WO PCT/US2002/025720 patent/WO2004015580A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20010013097A1 (en) * | 1996-11-08 | 2001-08-09 | Monolith Co., Ltd. | Method and apparatus for imprinting id information into a digital content and for reading out the same |
WO1999041900A1 (en) * | 1998-02-10 | 1999-08-19 | Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. | Secure distribution of digital representations |
EP1195702A2 (en) * | 2000-10-02 | 2002-04-10 | Hudson Soft Co., Ltd. | A digital contents data generating system |
Also Published As
Publication number | Publication date |
---|---|
WO2004015580A1 (en) | 2004-02-19 |
EP1546888A1 (en) | 2005-06-29 |
JP2005535959A (en) | 2005-11-24 |
AU2002324695A1 (en) | 2004-02-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1055321B1 (en) | Secure distribution of digital representations | |
US8607354B2 (en) | Deriving multiple fingerprints from audio or video content | |
US8650128B2 (en) | Rights management system and methods | |
US8526611B2 (en) | Utilizing data reduction in steganographic and cryptographic systems | |
Barni et al. | Data hiding for fighting piracy | |
US9021602B2 (en) | Data protection method and device | |
US20030016842A1 (en) | Digital content with information of latent value to purchaser and method for making the same | |
US20030061489A1 (en) | Embedding data in material | |
JP2005137004A (en) | System for post decode watermarking of media | |
Yu | Digital multimedia at home and content rights management | |
He et al. | Digital right management model based on cryptography and digital watermarking | |
EP1546888A1 (en) | Digital content with information of latent value to purchaser and method for making the same | |
Kwok et al. | Intellectual property protection for electronic commerce applications. | |
Peinado et al. | Digital rights management for digital cinema | |
Seitz et al. | Digital watermarking: an introduction | |
Arsenova | Technical aspects of digital rights management | |
JP4080700B2 (en) | Data operation method and apparatus | |
EP1546889A1 (en) | Digital content with information of latent value to purchaser and method for making the same | |
Jahnke et al. | An introduction in digital watermarking: Applications, principles, and problems | |
Rao et al. | Multimedia digital rights protection using watermarking techniques | |
JPH11344926A (en) | Device for preventing unauthorized utilization, unauthorized copy and unauthorized change of contents and recording media therefor | |
Moskowitz | Introduction—Digital Rights Management | |
Jahnke et al. | Digital watermarking and its impact on intellectual property limitation for the digital age | |
Chaturvedi et al. | Overview on Various Techniques Developed In Steganography By Different Agencies | |
Seitz et al. | Digital Watermarking |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20050222 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE TR |
|
AX | Request for extension of the european patent |
Extension state: AL LT LV MK RO SI |
|
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 1074502 Country of ref document: HK |
|
DAX | Request for extension of the european patent (deleted) | ||
RBV | Designated contracting states (corrected) |
Designated state(s): DE FI FR GB |
|
A4 | Supplementary search report drawn up and despatched |
Effective date: 20070712 |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: G06F 12/14 20060101ALI20070707BHEP Ipc: G06F 1/00 20060101AFI20070707BHEP |
|
17Q | First examination report despatched |
Effective date: 20080305 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20080716 |
|
REG | Reference to a national code |
Ref country code: HK Ref legal event code: WD Ref document number: 1074502 Country of ref document: HK |