Abstract:
A watermark-based dynamic ad insertion (DAI) technique for presenting different users of content different advertisements based on the user's profile for content viewed on broadcast channels or in multichannel video programming distributor (MVPD) channels. A number of solutions issues with watermark-based DAI are presented. Interoperability is addressed by providing a multiplexing technique so that the DAI watermarks do not interfere with other watermarks, such as ATSC 3.0 watermarks. Reliability is addressed by providing a matched filtering technique. Security is addressed by providing a mutual authentication technique.
Abstract:
The disclosed technology relates to methods, devices, systems and computer program products that facilitate access to metadata associated with a content. In one example, a method is described that includes receiving a multimedia content at a receiver device, extracting a watermark message from a first segment of the multimedia content, using at least a portion of the first watermark message to obtain additional information regarding the first segment of the multimedia content that includes the first watermark message, and associating and storing one or more values of the first watermark message and the additional information. The method further includes repeating the above operations to extract additional watermark messages from additional segments of the content and to form a table or array of items that can be accessed by specifying the one or more values of the first watermark message or one or more values of the additional watermark messages.
Abstract:
A watermark-based dynamic ad insertion (DAI) technique for presenting different users of content different advertisements based on the user's profile for content viewed on broadcast channels or in multichannel video programming distributor (MVPD) channels. A number of solutions issues with watermark-based DAI are presented. Interoperability is addressed by providing a multiplexing technique so that the DAI watermarks do not interfere with other watermarks, such as ATSC 3.0 watermarks. Reliability is addressed by providing a matched filtering technique. Security is addressed by providing a mutual authentication technique.
Abstract:
Methods, devices, systems and computer program products enable enhances delivery and use of metadata that is associated a primary multimedia content. Watermarks that are detected by a watermark extractor produce an indication as to a state of the watermark detector as being in one of a an unmarked content state, a marked content state or a gap state, and cause the watermark extractor to transition from one state to another state based on event that are recognized based a failure or a success in detecting watermarks, an indication of low content activity and a previous state of the watermark extractor. The events and states associated with the watermark extractor further allows retrieval of new metadata associated with the primary content, use of an existing metadata in a modified manner or a change in presentation of a secondary content that is associated with the primary content.
Abstract:
Methods, apparatus, and systems use embedded watermarks to determine whether the segments of a multimedia content has been rearranged. The embedded watermarks are recovered from the content and one or more attributes associated with the recovered watermarks are identified. A continuity of the content can then be assessed in accordance with the one or more attributes. The continuity assessment may be based on a variety of factors, including but not limited to a determined heartbeat of the recovered watermarks, a density, separation, location, or extent, of the recovered watermarks, as well as information associated with the watermarks, such as a stego key, channel bits, packet numbers, a fingerprint, or the like.
Abstract:
Methods, devices, systems and computer program products enable generation, distribution and management of live broadcast content in such a way so as to allow identification of a pirate device or subscriber quickly and efficiently. Content is divided into content blocks, where each content block is divided into content units. Each of the content units is selectable from n variations of the content unit and a majority of ail possible combinations of content unit variations are permissible to be selected for production of the uniquely identifiable content. The content blocks, including the n variations of the content units, a media block key, and at least one device key is delivered to an authorized device. A particular pattern of content units is generated that identifies which of the n content unit variations must be used by the authorized device for constructing each content block.
Abstract:
Methods and devices are provided to obtain associated information for a multimedia content. One such method includes receiving a content at a receiver device equipped with a watermark detector, performing watermark detection on the received content to extract a payload of an embedded watermark. The payload comprises a first field that includes a server identifier and a second field that includes an interval identifier associated with the server identifier. The first field provides a mapping to an Internet address accessible to retrieve metadata associated with content segments identified by the watermark payload. In this method, based on the detected watermark payload, a query is formed and transmitted to a server identified by the Internet address, and a response to the query is received from the server that includes metadata associated with the content.
Abstract:
Methods, apparatus, and systems for signal continuity assessment using embedded watermarks are provided. The embedded watermarks are recovered from the content and one or more attributes associated with the recovered watermarks are identified. A continuity of the content can then be assessed in accordance with the one or more attributes. The continuity assessment may be based on a variety of factors, including but not limited to a determined heartbeat of the recovered watermarks, a density, separation, location, or extent, of the recovered watermarks, as well as information associated with the watermarks, such as a stego key, channel bits, packet numbers, a fingerprint, or the like.
Abstract:
Systems, methods, devices and computer program products are provided that improve stego key management of watermarking systems and reduce the impact of leaked secrets related to watermark embedding and extraction operations. In the event that a watermark extractor is compromised and its extraction stego key is revealed, new extraction stego key sets are generated and assigned to a particular group of devices with similar security features. The new extraction stego key sets have significant overlap with one another, and can be retired once a device within the particular group of devices is compromised. The described techniques are complementary to other security enhancement practices, such as obfuscation and tamper resistant techniques, to strengthen the security of a watermarking system.
Abstract:
Methods, devices, systems and computer program products facilitate accessing metadata associated with a primary audio visual content. Upon reception of a primary content, one or more watermark messages are extracted from the primary content obtain a server code and an interval code. A query to a metadata server is initiated based on the information obtained from the extracted watermark messages. In response to the query, service recovery information is received that includes information identifying one or more timed events, where each timed event identifies an operation to be performed at a corresponding instance in time as the primary content is being presented by the receiver device. One or more operations identified the timed events are initiated at the corresponding instance(s) in time.