Abstract:
A method, apparatus and article of manufacture is provided for automatic insertion of a compressed GOP offset table within a previously encoded MPEG video file, for frame accurate random access of each individual video frame in play-from-offset mode. The method creates a compressed GOP offset table having an entry for each GOP header of every video packet of the MPEG video file, and modifies the MPEG video file by inserting the compressed GOP offset table before the MPEG video file as at least one padding packet, thereby preserving the MPEG compliance and compressed audio/video data of the MPEG video file. The method further has a step for estimating a number of padding packets needed for the GOP offset table, thereby limiting the MPEG video file reading to a single read.
Abstract:
A method and system to acquire, digitize, store, and deliver live content (102), such as music, to an end user via a network. The system can capture live content directly into a portable audio format which can be encoded at various levels of resolution into a file. The encoded file can then be transported over a network to a network distributor (116) who can then sell the encoded file to end users. The system can also insert a digital watermark into each user file which can contain the user information, the copyright information, and a unique serial number for future verification and copy protection. The digital watermark can survive file or format conversion.
Abstract:
The invention relates to a method of embedding a watermark W in an information signal P, to a corresponding arrangement for embedding a watermark W in an information signal P, to an information signal P with an embedded watermark W and to a storage medium 50 having stored thereon an information signal P with an embedded watermark W. This method is carried out by determining local weight factors lambda (P) for said watermark based on data of said information signal P, wherein said local weight factors lambda (P) are determined such that the embedded watermark W is rendered substantially imperceptible when embedded in said information signal. The watermark W is locally weighted using said determined local weight factors lambda (P). Then said locally weighted watermark is embedded in said information signal P. When determining said local weight factors lambda (P) of said watermark W temporal data of said information signal are taken into account.
Abstract:
The present invention provides software for accomplishing the dynamic management of key information (Ks) for accessing secure (KE) multimedia multicast (k1-kn). The invention additionally concerns computer systems that use such software.
Abstract:
A method and apparatus for embedding data in an encoded video bitstream, wherein the bitstream includes redundantly coded syntax element values of which one is an overriding value, includes mandatorily coding the syntax element overriding value and replacing the non-overriding syntax element value with the data to be embedded. Apparatus for embedding data in such bitstream includes a coder creating the coded video bitstream with such value mandatorily coded in the overriding syntax element position therein, and a data inserter for inserting the data to be embedded into the non-overriding syntax element position. An MPEG quantization scale code (QSC) value is mandatorily explicitly coded in the first coded macroblock following a slice header and the embedded data is inserted into the QSC position in the slice header.
Abstract:
A system for embedding and detecting digital watermarks, e.g., for copyright protection of digital content distributed via the Internet (170) or other channels. Different copies of content, such as audio data, are formed with a common watermark (CW), and different transaction watermarks (TW). Based on a user (180) transaction request, portions of the different copies of the content are assembled to provide a copy with a unique sequence of TWs associated with the user (180). A copy of content which is subsequently located can be analyzed to determine if it has been used in a collusion attack, where a pirate attempts to modify the watermarks, e.g., in an averaging or cut-and-splice attack. The CWs are provided in time-aligned intervals of the different copies of the content so they are not modified by the attack. Content from different web sites can be analyzed (312) by first determining if a particular CW is embedded in the content (315), and, if so, recovering the TW (322) to identify the unauthorized distributor.
Abstract:
Disclosed is a system and method that provides rate controlled insertion of asynchronous data into a synchronous stream in a broadcast system. A calculation of the transmission time for an asynchronous data file is determined from the file size, available data transfer rate, redundancy transmission factor, bandwidth scale factor and connect time latency. Transmission time may be employed to schedule transmission of asynchronous data for use at a predetermined time. Transmission time for multiple files may be combined to determine a transmission start time for a first file such that a last asynchronous file is transmitted by a predetermined time.
Abstract:
Disclosed is a system and method that provides rate controlled insertion of asynchronous data into a synchronous stream in a broadcast system. A calculation of the transmission time for an asynchronous data file is determined from the file size, available data transfer rate, redundancy transmission factor, bandwidth scale factor and connect time latency. Transmission time may be employed to schedule transmission of asynchronous data for use at a predetermined time. Transmission time for multiple files may be combined to determine a transmission start time for a first file such that a last asynchronous file is transmitted by a predetermined time.
Abstract:
A material (e.g. video, audio or data) processing system (648) processes material including a watermark. The system comprises a remover (640) for removing the watermark, a processor (646) for processing the material from which the watermark has been removed, and an inserter (642) for inserting a watermark into the processed material.
Abstract:
A watermark applied to audio, image, video or multimedia data can serve to verify the authenticity of the data. For the watermark to be imperceptible, e.g. invisible or inaudible, it is inserted into selected parts of the data that are neither significant nor insignificant perceptually. Examples for the domain of embedding are complex Fourier coefficients and wavelet coefficients. A frequency spectral representation of the data is obtained, preferably a complex Fourier transform, and the watermark is inserted into those frequencies whose variance lies in a range between two thresholds, minimal and maximal. In the Fourier transform the block size is large enough for the components to be approximately Gaussian. The resultant watermarked spectral data is subjected to an inverse transform to produce the watermarked data.