throbber
' •
`•••;;;•:'• •
`
`• •
`
`'•
`.
`;;:' 14:19
`-.
`. ,Z1`-•-• •1;;?'•11-4,::*
`v..,
`%p.a.` .
` •
`•
`• •:-./:.:••••!...•i i..;-t; • ""••••-••"" •••.:5
`Its*WJ
`%." • -
`r•
`
`71.-.% •
`v •
`
`••..:.•:?-<.-)fa.:' •
`---""iirilf,•
`••
`
`• ..„
`
`• ..17:
`
`-
`
`r.,
`
`s.
`
`.:*-';•-.7••••0
`...E. •
`
`if: 41
`
`Fig. 5. A standard 500 x 480 image of
`a mandrill.
`
`•••
`
`r.
`
`, 4;4 .44
`
`.
`
`''....4.
`
`...V V a.titi&_•• .:F.,
`.',.:
`1,
`
`3
`
`"IP f ..1,
`
`
`
`ii i. f •, ).•
`....• ;N
`:.•
`
`t
`
`%
`
`.
`
`'.. ' W:
`
`t.•ft
`
`1. .
`
`'
`
`' IM11,441
`‘,....j I; "I
`
`.1 tit k
`• . stt.4 ••
`
`. . .
`
`41.
`Ve•
`
`: .?..
`
`Fig. 6. A log polar map of the image of
`a mandrill. The log-polar map employs
`bilinear interpolation and the log-polar
`grid is 600 x 600 samples.
`
`6 Conclusion
`
`This paper has outlined the theory of integral transform invariants and showed
`that this can be used to produce watermarks that are resistant to translation,
`
`15
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1895
`
`

`

`.--
`
`E.-
`,.
`
`t--..- (....4,..,....1.,0
`, 4' i, 'r
`,0
`...",
`
`se
`-.4.".;..
`
`.
`
`'- '7 -`
`,-..
`
`6
`
`'1
`
`.
`
`,'"1.:::Z
`
`1., I'
`
`•:.
`
`- . .-- • I...., ii, -.,,?..
`!
`;
`. % ...c.7. •
`':.zi.' ,4, ; - '
`!Z•t.............)
`• •
`• -
`
`4,
`
`-
`
`'
`
`• .
`
`- ,,,
`
`i
`-.. 1,*
`
`'4%
`
`ien• •••
`• • ,
`••••,—. 4?
`
`.
`
`-- • 1.-7.
`
`.1%-k•g"
`
`.
`" 044
`
`r:
`' •••
`
`Fig. 7. The image of a mandrill recon-
`structed from a log polar map of size
`100 x 100 samples. This reconstruction
`uses nearest neighbour interpolation.
`
`t';', •
`
`r,
`
`• •••
`
`•
`
`•
`
`ti
`
`•
`
`•:;•••:
`,;(..:r•f,.•• •
`: ; : 1!
`:73'?‘"
`• -
`
`.
`
`Nrss
`
`•,*:
`
`•
`
`•,.‘. •
`•
`e. t • 7.
`
`ir;0
`
`,
`
`•.;
`
`et c,.
`'r $
`
`Fig. 8. A watermarked image of a man-
`drill that has been rotated by 143 de-
`grees and scaled by 75%. The embedded
`mark was recovered from this image.
`rotation and scaling. The importance of invertibility of the invariant represen-
`tation was emphasised. One of the significant points is the novel application
`of the Fourier-Mellin transform to digital image watermarking.
`
`16
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1896
`
`

`

`There are several advantages in using integral transform domain marks. The
`main advantage is that the transforms can be computed very quickly (although
`in practice it has been found that the inverse log-polar mapping is a compu-
`tational bottleneck). In addition, transform space contains a large number of
`samples which can be used to hide a spread spectrum signal.
`
`An example of a rotation and scale invariant watermark was presented. As one
`might expect, this proved to be robust to changes in scale and rotation. It was
`also found to be weakly resistant to lossy image compression and cropping. The
`robustness of the embedded mark to these attacks will be greatly improved
`with future work.
`
`On its own, the invariant watermark discussed in this paper cannot resist
`changes in aspect ratio or shear transformations. There is no obvious means
`of constructing an integral transform-based operator that is invariant to these
`transformations. However, work is currently in progress to find a means of
`searching for the most likely values of aspect ratio and shear factor, and then
`to apply the necessary corrections during watermark extraction.
`
`In addition to the above, we intend to investigate the possible use of phase-
`based complete invariants. This would have some advantage over only marking
`strong invariants, since a complete invariant presents a maximal number of po-
`tential communications channels through which watermark information may
`be transmitted.
`
`Acknowledgement
`
`We wish to thank Dr David McG. Squire, Sergei Starchik and Dr Feng-Lin
`for their extremely helpful advice on the theory of invariants and Dr A. Z.
`Tirkel for many stimulating conversations and for exchanging many ideas. We
`are also grateful to Dr Alexander Herrigel and Adrian Perrig for their useful
`comments.
`
`References
`
`[1] R. E. Blahut. The theory and practice of error control codes. Addison-Wesley,
`1983.
`[2] R. D. Brandt and F. Lin. Representations that uniquely characterize images
`modulo translation, rotation and scaling. Pattern Recognition Letters, 17:1001-
`1015, August 1996.
`[3] G. Caronni. Assuring Ownership Rights for Digital Images.
`In H. H.
`. Brueggemann and W. Gerhardt-Haeckl, editors, Reliable IT Systems VIS '95.
`Vieweg Publishing Company, Germany, 1995.
`[4] W. G. Chambers. Basics' of Communications and Coding. Oxford Science
`Publications. Clarendon Press Oxford, 1985.
`
`17
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1897
`
`

`

`[5] I. Cox, J. Killian, T. Leighton, and T. Shamoon. Secure spread spectrum
`communication for multimedia. Technical report, N.E.C. Research Institute,
`1995. ftp://ftp.nj.nec.com/pub/ingemar/papers/watermark.ps.Z.
`[6] I. Cox, J. Killian, T. Leighton, and T. Shamoon. Secure spread spectrum
`watermarking for images, audio and video. In Proceedings of the IEEE Int.
`Conf. on Image Processing ICIP-96, pages 243-246, Lausanne, Switzerland,
`September 16-19 1996.
`[7] I. Cox, S. Roy, and S. L. Hingorani. Dynamic histogram warping of image pairs
`for constant image brightness. In Proceedings of the IEEE Int. Conf. on Image
`Processing ICIP-95, Austin, Texas, 1995.
`[8] S. Craver, N. Memon, B. Yeo, and M. Yeung. Can invisible marks resolve
`rightful ownerships?
`In IS€T/SPIE Electronic Imaging '97: Storage and
`Retrieval of Image and Video Databases, 1997.
`[9] P. Davern and M. Scott. Fractal based image steganography. In Ross Anderson,
`editor, Proceedings of the First International Workshop in Information Hiding,
`Lecture Notes in Computer Science, pages 279-294, Cambridge, UK, May/June
`1996. Springer Verlag.
`[10] J.F. Delaigle, C. De Vleeschouwer, and B Macq. A psychovisual approach for
`digital picture watermarking. submitted to the Journal of Electronic Imaging,
`1996.
`[11]'Mario Ferraro and Terry M. Caelli. Lie transform groups, integral transforms,
`and invariant pattern recognition. Spatial Vision, 8(1):33-44, 1994.
`[12] James Gibson. The Senses Considered as Perceptual Systems. Houghton-
`Mifflin, Boston, Massachusetts, 1966.
`[13] K. Matsui and K. Tanaka. Video-Steganography: How to secretly embed a
`signature in a picture. In IMA Intellectual Property Project Proceedings, pages
`187-206, January 1994.
`[14] R. Milanese, S. Gil, and T. Pun. Attentive mechanisms for dynamic and static
`scene analysis. Optical Engineering, 34(8):2428-2434, August 1995.
`[15] J. J. K. 6 Ruanaidh, W. J. Dowling, and F. M. Boland. Phase watermarking
`of digital images. In Proceedings of the IEEE Int. Conf. on Image Processing
`ICIP-96, pages 239-242, Lausanne, Switzerland, September 16-19 1996.
`[16] J. J. K. 6 Ruanaidh, W. J. Dowling, and F. M. Boland. Watermarking digital
`images for copyright protection. IEE Proceedings on Vision, Image and Signal
`Processing, 143(4):250-256, August 1996. Invited paper, based on the paper of
`the same title at the IEE Conference on Image Processing and Its Applications,
`Edinburgh, July 1995.
`[17] A. V. Oppenheim and J. S. Lim. The importance of phase in signals.
`Proceedings of the IEEE, 69(5):529-541, May 1981.
`[18] B Pfitzmann.
`Information hiding terminology.
`In Ross Anderson, editor,
`Proceedings of the First International Workshop in Information Hiding, Lecture
`Notes in Computer Science, pages 347-350, Cambridge, UK, May/June 1996.
`Springer Verlag.
`[19] R. L. Pickholtz, D. L. Schilling, and L. B. Milstein. Theory of spread spectrum
`communications - a tutorial. IEEE Transactions on Communications, COM-
`30(5):855-884, May 1982.
`
`18
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1898
`
`

`

`[20] I Pitas. A method for signature casting on digital images. In Proceedings of
`the IEEE Int. Conf. on Image Processing ICIP-96, pages 215-218, Lausanne,
`Switzerland, September 16-19 1996.
`[21] W.H. Press, S.A. Teukolsky, W.T. Vetterling, and B.P. Flannery. Numerical
`• Recipes in C. Cambridge University Press, second edition, 1992.
`[22] J. Puate and F. Jordan. Using fractal compression scheme to embed a digital
`signature into an image. http://ltswww.epfl.ch/kutter/publications/fvt.html,
`November 1996.
`
`[23] T. H. Reiss. Recognizing planar Objects Using Invariant Image Features.
`Lecture Notes in Computer Science. Springer-Verlag, 1993.
`
`[24] B. Schneier. Applied Cryptography. Wiley, 2nd edition, 1995.
`
`[25] J. Smith and B. Comiskey. Modulation and information hiding in images.
`In Ross Anderson, editor, Proceedings of the First International Workshop
`in Information Hiding, Lecture Notes in Computer Science, pages 207-226,
`Cambridge, UK, May/June 1996. Springer Verlag.
`
`[26] D. McG. Squire. Model-based Neural Networks for Invariant Pattern
`Recognition. PhD thesis, Curtin University of Technology, _Perth, Western
`Australia, October 1996.
`[27] M. D. Swanson, B. Zhu, and A. Tewfik.
`Transparent robust image
`watermarking. In Proceedings of the IEEE Int. Conf. on Image Processing
`ICIP-96, pages 211-214, Lausanne, Switzerland, September 16-19 1996.
`[28] P. Sweeney. Error Control Coding: An Introduction. Prentice-Hall, 1991.
`[29] A. Z. Tirkel, G. A. Rankin, R. G. van Schyndel, W. J. Ho, N. R. A. Mee, and
`C. F. Osborne. Electronic watermark. In Dicta-93, pages 666-672, Macquarie
`University, Sydney, December 1993.
`[30] A. Z. Tirkel, R. G. van Schyndel, and C. F. Osborne. A two-dimensional digital
`watermark. In ACCV'95, pages 378-383, University of Queensland, Brisbane,
`December 6-8 1995.
`[31] A.Z. Tirkel. Image and watermark registration. Submitted to Signal processing,
`January 1997.
`[32] R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne. A digital watermark.
`In IEEE Int. Conf. on Image Processing ICIP-95, pages 86-90, Austin, Texas,
`1994.
`
`[33] R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne. Towards a robust digital
`watermark. In Dicta-95, pages 504-508, Nanyang Technological University,
`Singapore, December 5-8 1995.
`[34] J. Zhao and E. Koch. Embedding robust labels into images for copyright
`protection. Technical report, Fraunhofer Institute for Computer Graphics,
`Darmstadt, Germany, 1994.
`
`19
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1899
`
`

`

`cocti.0 ON TIFIE ORIGINAL
`
`'44
`
`!.!
`1
`
`.
`:.;•':
`
`. . .
`..
`".,.• cz..k.', .
`1 t ogg„ .
`iotityl i I
`
`$
`
`,
`
`C'
`
`'
`
`\
`
`,
`
`4.
`
`I 0 141
`''' •
`• •••-•0.
`\
`d 5.p., ra\c?
`'ie•-'
`1.. \ '#'45%.ii. 4,
`0 *V
`...
`.•
`kr)
`
`1
`
`• • i ii
`
`.
`
`J., •
`
`•
`
`ta.
`t-5,
`o$
`,
`4'0 $741
`i, • . - wi, i.
`
`,
`
`00c
`
`96 AN ,
`
`wi 6%
`
`Gie
`
`ca'
`
` isl. 6,
`
`4'
`
`SS(Ves)
`
`4
`
`.)V,k4:f+A.
`0e,,4),,,: „,
`
`vir %/51C4V.Y0
`
`•900
`
`/4
`
`:f0
`
`'4.141,?
`
`041.4P°40444
`
`*
`
`woof,
`
`Pay 4001,..1".41784/431.
`140/14/1-131idoklri.)•,..,3
`
`411344..
`
`- ettimanziosaitsw4 11
`arrivoNas•form--
`
`,•&01.4
`ij.P..S„ert
`
`Na °i
`CitAl"Ifia7
`•
`•
`
`• ..ag,f.* 9.11 .0166
`SO' 10 sla
`
`INA. NI (MC"—
`
`Isoatc°*xt`‘*°\
`
`I.Oack
`
`ti
`
`O
`
`SA
`
`.!
`
`7.:
`
`V,*1
`
`h/
`
`
`. •
`
`• .*
`
`4%
`
`tN
`
`tl
`•riti it ill
`
`V:*
`
`w 4s-
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1900
`
`

`

`ti
`
`:•
`
`•
`
`±CC
`
`• .,, •
`I
`
`k.
`
`fi :
`
`o;•
`0
`0.
`
`:•.•.•.•
`
`•
`
`•
`
`•
`
`6 6)
`
`‘444044,V
`•
`.•••= 'sr
`
`•
`
`'''
`:::••74••'''• •
`41-.7
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1901
`
`

`

`-
`
`41,? 614 4
`
`C OA
`
`This
`
`heco
`holt
`tel
`
`cr.
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1902
`
`

`

`4
`
`Phil Collins
`Testify
`SECURITY SERVICE
`INDIVIDUALLY WATERMARKED
`
`Atlantic Records259
`
`40,0""Mtlk,
`
`' tr)
`
`r\,/
`
`:
`
`Id RN
`
`DIGITAL AUDIO
`
`[PROMOTION ONLY. NOT FOR SALE]
`2-83563
`
`Please note: This CD has been individually watermarked with a unique identification number
`entiedded in the music. This number is traceable directly to the authorized recipient, which allows
`us to identify the source of any unauthorized copies or other reproductions of the music contained on
`this CD. The watermark is not changed or destroyed by extracting clips of the music, or by using
`any compression technology such as MP3. The sound quality of the audio playback is not
`affected This CD is intended to be listened to solely oy the authorized recipient ana no portion of
`its contents may be copied or reproduced in any manner, nor made available in any manner to any
`third party (whether by means of streaming, so-called "peer-to-peer" networks or otherwise). This
`CD should not be played in a computer. Thank you in advance for your understanding...Enjoy!
`2002 Atlantic Records, a Time Warner Company
`
`00
`
`Made In U.S.A.
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1903
`
`

`

`a
`
`4.114;
`
`Z.2
`
`64710) \c‘`,\•
`
`4:di;al:C.-
`
`4,,
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1904
`
`

`

`3"
`
`fc^
`
`r'rr
`
`:
`
`14
`
`i()
`
`;A
`
`• r
`
`p
`
`ri
`
`4
`
`-4
`
`Crr
`
`%
`
`AW
`
`4
`
`■
`
`,erto'ccre177:77
`
`tAr
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1905
`
`

`

`1
`
`PATENT
`ATTORNEY DOCKET NO. 066112.0132
`
`5
`
`10
`
`15
`
`20
`
`25
`
`METHOD AND DEVICE FOR MONITORING AND ANALYZING SIGNALS
`
`CROSS-REFERENCE TO RELATED APPLICATIONS
`This application claims the benefit of pending U.S. Patent Application Serial No.
`
`08/999,766, filed July 23, 1997, entitled "Steganographic Method and Device"; pending U.S.
`Patent Application Serial No. 08/772,222, filed December 20, 1996, entitled "Z-Transform
`Implementation of Digital Watermarks"; pending U.S. Patent Application Serial No. 09/456,319,
`filed December 8, 1999, entitled "Transform Implementation of Digital Watermarks"; pending
`U.S. Patent Application Serial No. 08/674,726, filed July 2, 1996, entitled "Exchange
`Mechanisms for Digital Information Packages with Bandwidth Securitization, Multichannel
`Digital. Watermarks, and Key Management"; pending U.S. Patent Application Serial No.
`09/545,589, filed April 7, 2000, entitled "Method and System for Digital Watermarking";
`pending U.S. Patent Application Serial No. 09/046,627, filed March 24, 1998, entitled "Method
`for Combining Transfer Function with Predetermined Key Creation"; pending U.S. Patent
`Application Serial No. 09/053,628, filed April 2, 1998, entitled "Multiple Transform Utilization
`and Application for Secure Digital Watermarking"; pending U.S. Patent Application Serial No.
`09/281,279, filed March 30, 1999, entitled "Optimization Methods for the Insertion, Protection,
`and Detection..."; U.S. Patent Application Serial No.09,594,719, filed June 16, 2000, entitled
`"Utilizing Data Reduction in Steganographic and Cryptographic Systems" (which is a
`continuation-in-part of PCT application No. PCT/US00/06522, filed March 14, 2000, which PCT
`application claimed priority to U.S. Provisional Application No. 60/125,990, filed March 24,
`1999); pending U.S. Application No 60/169,274, filed December 7, 1999, entitled "Systems,
`Methods And Devices For Trusted Transactions"; and PCT Application No. PCT/US00/21189,
`filed August 4, 2000 (which claims priority to U.S. Patent Application Serial No. 60/147,134,
`
`DC01:244302.5
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1906
`
`

`

`- 2 -
`
`filed August 4, 1999, and to US Patent Application No. 60/213,489, filed June 23, 2000, both of
`
`which are entitled, "A Secure Personal Content Server"). The previously identified patents andJor
`
`patent applications are hereby incorporated by reference, in their entireties.
`
`In addition, this application hereby incorporates by reference, as if fully stated herein, the
`
`5
`
`total disclosures of US Patent 5,613,004 "Steganographic Method and Device"; U.S. Patent
`
`5,745,569 "Method for Stega-Cipher Protection of Computer Code"; and U.S. Patent 5,889,868
`
`"Optimization Methods for the Insertion, Protection, and Detection of Digital Watermarks in
`
`Digitized Data."
`
`10
`
`BACKGROUND OF THE INVENTION
`
`1.
`
`'Field of the Invention
`
`The invention relates to the monitoring and analysis of digital information. A method
`
`and device are described which relate to signal recognition to enhance identification and
`
`monitoring activities.
`
`2.
`
`Description of the Related Art
`Many methods and protocols are known for transmitting data in digital form for
`
`multimedia applications (including computer applications delivered over public networks such as
`the intemet or World Wide Web ("WWW"). These methods may include protocols for the
`compression of data, such that it may more readily and quickly be delivered over limited
`bandwidth data lines. Among standard protocols for data compression of digital files may be
`
`mentioned the MPEG compression standards for audio and video digital compression,
`promulgated by the Moving Picture Experts Group. Numerous standard reference works and
`
`patents discuss such compression and transmission standards for digitized information.
`Digital watermarks help to authenticate the content of digitized multimedia information,
`and can also discourage piracy. Because piracy is clearly a disincentive to the digital distribution
`
`• DC01:244302.5
`
`15
`
`20
`
`25
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1907
`
`

`

`- 3 -
`
`of copyrighted content, establishment of responsibility for copies and derivative copies of such
`
`works is invaluable. In considering the various forms of multimedia content, whether "master,"
`
`stereo, NTSC video, audio tape or compact disc, tolerance of quality will vary with individuals
`
`and affect the underlying commercial and aesthetic value of the content. It is desirable to tie
`
`5
`
`copyrights, ownership rights, purchaser information or some combination of these and related
`
`data into the content in such a manner that the content must undergo damage, and therefore
`reduction of its value, with subsequent, unauthorized distribution, commercial or otherwise.
`
`Digital watermarks address many of these concerns. A general discussion of digital
`watermarking as it has been applied in the art may be found in U.S. Patent No. 5,687,236 (whose
`
`10
`
`specification is incorporated in whole herein by reference).
`
`Further applications of basic digital watermarking functionality have also been
`
`developed. Examples of such applications are shown in U.S. Patent No. 5,889,868 (whose
`specification is incorporated in whole herein by reference). Such applications have been drawn,
`for instance, to implementations of digital watermarks that were deemed most suited to particular
`transmissions, or particular distribution and storage mediums, given the nature of digitally
`sampled audio, video, and other multimedia works. There have also been developed techniques
`for adapting watermark application parameters to the individual characteristics of a given digital
`sample stream, and for implementation of digital watermarks that are feature-based - i.e., a
`system in which watermark information is not carried in individual samples, but is carried in the
`relationships between multiple samples, such as in a waveform shape. For instance, natural
`extensions may be added to digital watermarks that may also separate frequencies (color or
`audio), channels in 3D while utilizing discreteness in feature-based encoding 'only known to
`those with pseudo-random keys (i.e., cryptographic keys) or possibly tools to access such
`
`information, which may one day exist on a quantum level.
`A matter of general weakness in digital watermark technology relates directly to
`the manner of implementation of the watermark. Many approaches to digital watermarking leave
`
`DC01:244302.5
`
`15
`
`20
`
`25
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1908
`
`

`

`- 4 -
`
`detection and decode control with the implementing party of the digital watermark, not the
`
`creator of the work to be protected. This weakness removes proper economic incentives for
`
`improvement of the technology. One specific form of exploitation mostly regards efforts to
`
`obscure subsequent watermark detection. Others regard successful over encoding using the same
`
`5
`
`watermarking process at a subsequent time. Yet another way to perform secure digital
`
`watermark implementation is through "key-based" approaches.
`
`SUMMARY OF THE INVENTION
`
`A method for monitoring and analyzing at least one signal is disclosed, which method
`
`10
`
`comprises the steps of: receiving at least one reference signal to be monitored; creating an
`
`abstract of the at least one reference signal; storing the abstract of the at least one reference signal
`
`in a reference database; receiving at least one query signal to be analyzed; creating an abstract of
`
`the at least one query signal; and comparing the abstract of the at least one query signal to the
`
`abstract of the at least one reference signal to determine if the abstract of the at least one query
`
`15
`
`signal matches the abstract of the at least one reference signal.
`
`A method for monitoring a plurality of reference signals is also disclosed, which method
`
`comprises the steps of: creating an abstract for each one of a plurality of reference signals;
`
`storing each of the abstracts in a reference database; receiving at least one query signal to be
`
`analyzed; creating an abstract of each at least one query signal; locating an abstract in the
`
`20
`
`reference database that matches the abstract of each at least one query signal; and recording the
`
`identify of the reference signal whose abstract matched the abstract of each at least one query
`
`signal.
`
`A computerized system for monitoring and analyzing at least one signal is also disclosed,
`which system comprises: a processor for creating an abstract of a signal using selectable criteria;
`a first input for receiving at least one reference signal to be monitored, the first input being
`coupled to the processor such that the processor may generate an abstract for each reference
`
`25
`
`DC01:244302.5
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1909
`
`

`

`- 5 -
`
`signal input to the processor; a reference database, coupled to the processor, for storing abstracts
`of each at least one reference signal; a second input for receiving at least one query signal to be
`analyzed, the second input being coupled to the processor such that the processor may generate
`an abstract for each query signal; and a comparing device, coupled to the reference database and
`to the second input, for comparing an abstract of the at least one query signal to the abstracts
`stored in the reference database to determine if the abstract of the at least one query signal
`
`matches any of the stored abstracts.
`Further, an electronic system for monitoring and analyzing at least one signal is disclosed,
`which system comprises: a first input for receiving at least one reference signal to be monitored,
`a first processor for creating an abstract of each reference signal input to the first processor
`through the first input; a second input for receiving at least one query signal to be analyzed, a
`second processor for creating an abstract of each query signal; a reference database for storing
`abstracts of each at least one reference signal; and a comparing device for comparing an abstract
`of the at least one query signal to the abstracts stored in the reference database to determine if the
`abstract of the at least one query signal matches any of the stored abstracts.
`
`DETAILED DESCRIPTION OF THE INVENTION
`While there are many approaches to data reduction that can be utilized, a primary concern
`is the ability to reduce the digital signal in such a manner as to retain a "perceptual relationship"
`between the original signal and its data reduced version. This relationship may either be
`mathematically discernible or a result of market-dictated needs. The purpose is to afford a more
`consistent means for classifying signals than proprietary, ' related text-based approaches. A
`simple analogy is the way in which a forensic investigator uses a sketch artist to assist in
`determining the identity of a human.
`In one embodiment of the invention, the abstract of a signal may be generated by the
`following steps: 1) analyze the characteristics of each signal in a group of audible/perceptible
`
`DC01:244302.5
`
`5
`
`10
`
`15
`
`20
`
`25
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1910
`
`

`

`- 6 -
`
`variations for the same signal (e.g., analyze each of five versions of the same song—which
`
`versions may have the same lyrics and music but which are sung by different artists); and 2)
`
`select those characteristics which achieve remain relatively constant (or in other words, which
`
`have minimum variation) for each of the signals in the group. Optionally, the null case may be
`
`5
`
`defined using those characteristics which are common to each member of the group of versions.
`
`Lossless and lossy compression schemes are appropriate candidates for data reduction
`
`technologies, as are those subset of approaches that are based on perceptual models, such as
`
`AAC, MP3, TwinVQ, JPEG, GIF, MPEG, etc. Where spectral transforms fail to assist in greater
`
`data reduction of the signal, other signal characteristics can be identified as candidates for further
`
`10
`
`data reduction. Linear predictive coding (LPC), z-transform analysis, root mean square (rms),
`
`signal to peak, may be appropriate tools to measure signal characteristics, but other approaches or
`
`combinations of signal characteristic analysis are contemplated. While such signal
`
`characteristics may assist in determining particular applications of the present invention, a
`
`generalized approach to signal recognition is necessary to optimize the deployment and use of the
`
`15
`
`present invention.
`
`Increasingly, valuable information is being created and stored in digital form. For
`
`example, music, photographs and motion pictures can all be stored and transmitted as a series of
`
`binary digits -- l's and 0's. Digital techniques permit the original information to be duplicated
`
`repeatedly with perfect or near perfect accuracy, and each copy is perceived by viewers or
`
`20
`
`listeners as indistinguishable from the original signal. Unfortunately, digital techniques also
`
`permit the information to • be easily copied without the owner's permission. While digital
`
`representations of analog waveforms may be analyzed by perceptually-based or perceptually-
`
`limited analysis it is usually costly and time-consuming to model the processes of the highly
`
`effective ability of humans to identify and recognize a signal. In those applications where analog
`
`25
`
`signals require analysis, the cost of digitizing the analog signal is minimal when compared to the
`
`benefits of increased accuracy and speed of signal analysis and monitoring when the processes
`
`DC01:244302.5
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1911
`
`

`

`contemplated by this invention are utilized.
`
`7
`
`The present invention relates to identification of digitally-sampled information, such as
`
`images, audio and video. Traditional methods of identification and monitoring of those signals
`
`do not rely on "perceptual quality," but rather upon a separate and additional signal. Within this
`
`5
`
`application, such signals will be called "additive signals" as they provide information about the
`
`original images, audio or video, but such information is in addition to the original signal. One
`
`traditional, text-based additive signal is title and author information. The title and author, for
`
`example, is information about a book, but it is in addition to the text of the book. If a book is
`
`being duplicated digitally, the title and author could provide one means of monitoring the number
`
`10
`
`of times the text is being duplicated, for example, through an Internet download. The present
`
`invention, however, is directed to the identification of a digital signal—whether text, audio, or
`
`video—using only the digital signal itself and then monitoring the number of times the signal is
`
`duplicated. Reliance on an additive signal has many shortcomings. For example, first, someone
`
`must incorporate the additive signal within the digital data being transmitted, for example, by
`
`15
`
`concatenation or through an embedding process. Such an additive signal, however, can be easily
`
`identified and removed by one who wants to utilize the original signal without paying for its
`usage. If the original signal itself is used to identify the content, an unauthorized user could not
`
`avoid payment of a royalty simply by removing the additive signal—because there is no additive
`
`signal to remove. Hence, the present invention avoids a major disadvantage of the prior art.
`One such additive signal that may be utilized is a digital watermark—which ideally
`
`cannot be removed without perceptually altering the original signal. A watermark may also be
`
`used as a monitoring signal (for example, by encoding an identifier that uniquely identifies the
`original digital signal into which the identifier is being embedded). A digital watermark used for
`monitoring is also an additive signal, and such a signal may make it difficult for the user who
`wants to duplicate a signal without paying a royalty—mainly by degrading the perceptual quality
`of the original signal if the watermark (and hence the additive monitoring signal) is removed.
`
`DC01:244302.5
`
`20
`
`25
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1912
`
`

`

`This is, however, is a different solution to the problem.
`
`- 8 -
`
`The present invention eliminates the need of any additive monitoring signal because the
`
`present invention utilizes the underlying content signal as the identifier itself. Nevertheless, the
`
`watermark may increase the value of monitoring techniques by increasing the integrity of the
`
`5
`
`embedded data and by indicating tampering of either the original content signal or the monitoring
`
`signal. Moreover, the design of a watermarking embedding algorithm is closely related to the
`
`perceptibility of noise in any given signal and can represent an ideal subset of the original signal:
`
`the watermark bits are an inverse of the signal to the extent that lossy compression schemes,
`
`which can be used, for instance, to optimize a watermarking embedding scheme, can yield
`
`to
`
`information about the extent to which a data signal can be compressed while holding steadfast to
`
`the design requirement that the compressed signal maintain its perceptual relationship with the
`
`original, uncompressed signal. By describing those bits that are candidates for imperceptible
`
`embedding of watermark bits, further data reduction may be applied on the candidate watermarks
`
`as an example of retaining a logical and perceptible relationship with the original uncompressed
`
`15
`
`signal.
`
`Of course, the present invention may be used in conjunction with watermarking
`
`technology (including the use - of keys to accomplish secure digital watermarking), but
`
`watermarking is not necessary to practice the present invention. Keys for watermarking may
`
`have many forms, including: descriptions of the original carrier file formatting, mapping of
`
`20
`
`embedded data (actually imperceptible changes made to the carrier signal and referenced to the
`
`predetermined key or key pairs), assisting in establishing the watermark message data integrity
`
`(by incorporation of special one way functions in the watermark message data or key), etc.
`
`Discussions of these systems in the patents and pending patent applications are incorporated by
`
`reference above. The "recognition" of a particular signal or an instance of its transmission, and
`
`25
`
`its monitoring are operations that may be optimized through the use of digital watermark
`
`analysis.
`
`DC01:244302.5
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1913
`
`

`

`- 9 -
`
`A practical difference between the two approaches of using a separate, additive
`
`monitoring signal and using the original signal itself as the monitoring signal is control. If a
`
`separate signal is used for monitoring, then the originator of the text, audio or video signal being
`
`transmitted and the entity doing the monitoring have to agree as to the nature of the separate
`
`5
`
`signal to be used for monitoring—otherwise, the entity doing the monitoring would not know
`
`where to look, for what to look, or how to interpret the monitoring signal once it was identified
`
`and detected. On the other hand, if the original signal is used itself as a monitoring signal, then
`
`no such agreement is necessary. Moreover, a more logical and self-sufficient relationship
`
`between the original and its data-reduced abstract enhances the transparency of any resulting
`
`10
`
`monitoring efforts. The entity doing the monitoring is not looking for a separate, additive
`
`monitoring system, and further, need not have to interpret the content of the monitoring signal.
`
`Monitoring implementations can be handled by robust watermark techniques (those
`
`techniques that are able to, survive many signal manipulations but are not inherently "secure" for
`
`verification of a carrier signal a

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket