`•••;;;•:'• •
`
`• •
`
`'•
`.
`;;:' 14:19
`-.
`. ,Z1`-•-• •1;;?'•11-4,::*
`v..,
`%p.a.` .
` •
`•
`• •:-./:.:••••!...•i i..;-t; • ""••••-••"" •••.:5
`Its*WJ
`%." • -
`r•
`
`71.-.% •
`v •
`
`••..:.•:?-<.-)fa.:' •
`---""iirilf,•
`••
`
`• ..„
`
`• ..17:
`
`-
`
`r.,
`
`s.
`
`.:*-';•-.7••••0
`...E. •
`
`if: 41
`
`Fig. 5. A standard 500 x 480 image of
`a mandrill.
`
`•••
`
`r.
`
`, 4;4 .44
`
`.
`
`''....4.
`
`...V V a.titi&_•• .:F.,
`.',.:
`1,
`
`3
`
`"IP f ..1,
`
`
`
`ii i. f •, ).•
`....• ;N
`:.•
`
`t
`
`%
`
`.
`
`'.. ' W:
`
`t.•ft
`
`1. .
`
`'
`
`' IM11,441
`‘,....j I; "I
`
`.1 tit k
`• . stt.4 ••
`
`. . .
`
`41.
`Ve•
`
`: .?..
`
`Fig. 6. A log polar map of the image of
`a mandrill. The log-polar map employs
`bilinear interpolation and the log-polar
`grid is 600 x 600 samples.
`
`6 Conclusion
`
`This paper has outlined the theory of integral transform invariants and showed
`that this can be used to produce watermarks that are resistant to translation,
`
`15
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1895
`
`
`
`.--
`
`E.-
`,.
`
`t--..- (....4,..,....1.,0
`, 4' i, 'r
`,0
`...",
`
`se
`-.4.".;..
`
`.
`
`'- '7 -`
`,-..
`
`6
`
`'1
`
`.
`
`,'"1.:::Z
`
`1., I'
`
`•:.
`
`- . .-- • I...., ii, -.,,?..
`!
`;
`. % ...c.7. •
`':.zi.' ,4, ; - '
`!Z•t.............)
`• •
`• -
`
`4,
`
`-
`
`'
`
`• .
`
`- ,,,
`
`i
`-.. 1,*
`
`'4%
`
`ien• •••
`• • ,
`••••,—. 4?
`
`.
`
`-- • 1.-7.
`
`.1%-k•g"
`
`.
`" 044
`
`r:
`' •••
`
`Fig. 7. The image of a mandrill recon-
`structed from a log polar map of size
`100 x 100 samples. This reconstruction
`uses nearest neighbour interpolation.
`
`t';', •
`
`r,
`
`• •••
`
`•
`
`•
`
`ti
`
`•
`
`•:;•••:
`,;(..:r•f,.•• •
`: ; : 1!
`:73'?‘"
`• -
`
`.
`
`Nrss
`
`•,*:
`
`•
`
`•,.‘. •
`•
`e. t • 7.
`
`ir;0
`
`,
`
`•.;
`
`et c,.
`'r $
`
`Fig. 8. A watermarked image of a man-
`drill that has been rotated by 143 de-
`grees and scaled by 75%. The embedded
`mark was recovered from this image.
`rotation and scaling. The importance of invertibility of the invariant represen-
`tation was emphasised. One of the significant points is the novel application
`of the Fourier-Mellin transform to digital image watermarking.
`
`16
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1896
`
`
`
`There are several advantages in using integral transform domain marks. The
`main advantage is that the transforms can be computed very quickly (although
`in practice it has been found that the inverse log-polar mapping is a compu-
`tational bottleneck). In addition, transform space contains a large number of
`samples which can be used to hide a spread spectrum signal.
`
`An example of a rotation and scale invariant watermark was presented. As one
`might expect, this proved to be robust to changes in scale and rotation. It was
`also found to be weakly resistant to lossy image compression and cropping. The
`robustness of the embedded mark to these attacks will be greatly improved
`with future work.
`
`On its own, the invariant watermark discussed in this paper cannot resist
`changes in aspect ratio or shear transformations. There is no obvious means
`of constructing an integral transform-based operator that is invariant to these
`transformations. However, work is currently in progress to find a means of
`searching for the most likely values of aspect ratio and shear factor, and then
`to apply the necessary corrections during watermark extraction.
`
`In addition to the above, we intend to investigate the possible use of phase-
`based complete invariants. This would have some advantage over only marking
`strong invariants, since a complete invariant presents a maximal number of po-
`tential communications channels through which watermark information may
`be transmitted.
`
`Acknowledgement
`
`We wish to thank Dr David McG. Squire, Sergei Starchik and Dr Feng-Lin
`for their extremely helpful advice on the theory of invariants and Dr A. Z.
`Tirkel for many stimulating conversations and for exchanging many ideas. We
`are also grateful to Dr Alexander Herrigel and Adrian Perrig for their useful
`comments.
`
`References
`
`[1] R. E. Blahut. The theory and practice of error control codes. Addison-Wesley,
`1983.
`[2] R. D. Brandt and F. Lin. Representations that uniquely characterize images
`modulo translation, rotation and scaling. Pattern Recognition Letters, 17:1001-
`1015, August 1996.
`[3] G. Caronni. Assuring Ownership Rights for Digital Images.
`In H. H.
`. Brueggemann and W. Gerhardt-Haeckl, editors, Reliable IT Systems VIS '95.
`Vieweg Publishing Company, Germany, 1995.
`[4] W. G. Chambers. Basics' of Communications and Coding. Oxford Science
`Publications. Clarendon Press Oxford, 1985.
`
`17
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1897
`
`
`
`[5] I. Cox, J. Killian, T. Leighton, and T. Shamoon. Secure spread spectrum
`communication for multimedia. Technical report, N.E.C. Research Institute,
`1995. ftp://ftp.nj.nec.com/pub/ingemar/papers/watermark.ps.Z.
`[6] I. Cox, J. Killian, T. Leighton, and T. Shamoon. Secure spread spectrum
`watermarking for images, audio and video. In Proceedings of the IEEE Int.
`Conf. on Image Processing ICIP-96, pages 243-246, Lausanne, Switzerland,
`September 16-19 1996.
`[7] I. Cox, S. Roy, and S. L. Hingorani. Dynamic histogram warping of image pairs
`for constant image brightness. In Proceedings of the IEEE Int. Conf. on Image
`Processing ICIP-95, Austin, Texas, 1995.
`[8] S. Craver, N. Memon, B. Yeo, and M. Yeung. Can invisible marks resolve
`rightful ownerships?
`In IS€T/SPIE Electronic Imaging '97: Storage and
`Retrieval of Image and Video Databases, 1997.
`[9] P. Davern and M. Scott. Fractal based image steganography. In Ross Anderson,
`editor, Proceedings of the First International Workshop in Information Hiding,
`Lecture Notes in Computer Science, pages 279-294, Cambridge, UK, May/June
`1996. Springer Verlag.
`[10] J.F. Delaigle, C. De Vleeschouwer, and B Macq. A psychovisual approach for
`digital picture watermarking. submitted to the Journal of Electronic Imaging,
`1996.
`[11]'Mario Ferraro and Terry M. Caelli. Lie transform groups, integral transforms,
`and invariant pattern recognition. Spatial Vision, 8(1):33-44, 1994.
`[12] James Gibson. The Senses Considered as Perceptual Systems. Houghton-
`Mifflin, Boston, Massachusetts, 1966.
`[13] K. Matsui and K. Tanaka. Video-Steganography: How to secretly embed a
`signature in a picture. In IMA Intellectual Property Project Proceedings, pages
`187-206, January 1994.
`[14] R. Milanese, S. Gil, and T. Pun. Attentive mechanisms for dynamic and static
`scene analysis. Optical Engineering, 34(8):2428-2434, August 1995.
`[15] J. J. K. 6 Ruanaidh, W. J. Dowling, and F. M. Boland. Phase watermarking
`of digital images. In Proceedings of the IEEE Int. Conf. on Image Processing
`ICIP-96, pages 239-242, Lausanne, Switzerland, September 16-19 1996.
`[16] J. J. K. 6 Ruanaidh, W. J. Dowling, and F. M. Boland. Watermarking digital
`images for copyright protection. IEE Proceedings on Vision, Image and Signal
`Processing, 143(4):250-256, August 1996. Invited paper, based on the paper of
`the same title at the IEE Conference on Image Processing and Its Applications,
`Edinburgh, July 1995.
`[17] A. V. Oppenheim and J. S. Lim. The importance of phase in signals.
`Proceedings of the IEEE, 69(5):529-541, May 1981.
`[18] B Pfitzmann.
`Information hiding terminology.
`In Ross Anderson, editor,
`Proceedings of the First International Workshop in Information Hiding, Lecture
`Notes in Computer Science, pages 347-350, Cambridge, UK, May/June 1996.
`Springer Verlag.
`[19] R. L. Pickholtz, D. L. Schilling, and L. B. Milstein. Theory of spread spectrum
`communications - a tutorial. IEEE Transactions on Communications, COM-
`30(5):855-884, May 1982.
`
`18
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1898
`
`
`
`[20] I Pitas. A method for signature casting on digital images. In Proceedings of
`the IEEE Int. Conf. on Image Processing ICIP-96, pages 215-218, Lausanne,
`Switzerland, September 16-19 1996.
`[21] W.H. Press, S.A. Teukolsky, W.T. Vetterling, and B.P. Flannery. Numerical
`• Recipes in C. Cambridge University Press, second edition, 1992.
`[22] J. Puate and F. Jordan. Using fractal compression scheme to embed a digital
`signature into an image. http://ltswww.epfl.ch/kutter/publications/fvt.html,
`November 1996.
`
`[23] T. H. Reiss. Recognizing planar Objects Using Invariant Image Features.
`Lecture Notes in Computer Science. Springer-Verlag, 1993.
`
`[24] B. Schneier. Applied Cryptography. Wiley, 2nd edition, 1995.
`
`[25] J. Smith and B. Comiskey. Modulation and information hiding in images.
`In Ross Anderson, editor, Proceedings of the First International Workshop
`in Information Hiding, Lecture Notes in Computer Science, pages 207-226,
`Cambridge, UK, May/June 1996. Springer Verlag.
`
`[26] D. McG. Squire. Model-based Neural Networks for Invariant Pattern
`Recognition. PhD thesis, Curtin University of Technology, _Perth, Western
`Australia, October 1996.
`[27] M. D. Swanson, B. Zhu, and A. Tewfik.
`Transparent robust image
`watermarking. In Proceedings of the IEEE Int. Conf. on Image Processing
`ICIP-96, pages 211-214, Lausanne, Switzerland, September 16-19 1996.
`[28] P. Sweeney. Error Control Coding: An Introduction. Prentice-Hall, 1991.
`[29] A. Z. Tirkel, G. A. Rankin, R. G. van Schyndel, W. J. Ho, N. R. A. Mee, and
`C. F. Osborne. Electronic watermark. In Dicta-93, pages 666-672, Macquarie
`University, Sydney, December 1993.
`[30] A. Z. Tirkel, R. G. van Schyndel, and C. F. Osborne. A two-dimensional digital
`watermark. In ACCV'95, pages 378-383, University of Queensland, Brisbane,
`December 6-8 1995.
`[31] A.Z. Tirkel. Image and watermark registration. Submitted to Signal processing,
`January 1997.
`[32] R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne. A digital watermark.
`In IEEE Int. Conf. on Image Processing ICIP-95, pages 86-90, Austin, Texas,
`1994.
`
`[33] R. G. van Schyndel, A. Z. Tirkel, and C. F. Osborne. Towards a robust digital
`watermark. In Dicta-95, pages 504-508, Nanyang Technological University,
`Singapore, December 5-8 1995.
`[34] J. Zhao and E. Koch. Embedding robust labels into images for copyright
`protection. Technical report, Fraunhofer Institute for Computer Graphics,
`Darmstadt, Germany, 1994.
`
`19
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1899
`
`
`
`cocti.0 ON TIFIE ORIGINAL
`
`'44
`
`!.!
`1
`
`.
`:.;•':
`
`. . .
`..
`".,.• cz..k.', .
`1 t ogg„ .
`iotityl i I
`
`$
`
`,
`
`C'
`
`'
`
`\
`
`,
`
`4.
`
`I 0 141
`''' •
`• •••-•0.
`\
`d 5.p., ra\c?
`'ie•-'
`1.. \ '#'45%.ii. 4,
`0 *V
`...
`.•
`kr)
`
`1
`
`• • i ii
`
`.
`
`J., •
`
`•
`
`ta.
`t-5,
`o$
`,
`4'0 $741
`i, • . - wi, i.
`
`,
`
`00c
`
`96 AN ,
`
`wi 6%
`
`Gie
`
`ca'
`
` isl. 6,
`
`4'
`
`SS(Ves)
`
`4
`
`.)V,k4:f+A.
`0e,,4),,,: „,
`
`vir %/51C4V.Y0
`
`•900
`
`/4
`
`:f0
`
`'4.141,?
`
`041.4P°40444
`
`*
`
`woof,
`
`Pay 4001,..1".41784/431.
`140/14/1-131idoklri.)•,..,3
`
`411344..
`
`- ettimanziosaitsw4 11
`arrivoNas•form--
`
`,•&01.4
`ij.P..S„ert
`
`Na °i
`CitAl"Ifia7
`•
`•
`
`• ..ag,f.* 9.11 .0166
`SO' 10 sla
`
`INA. NI (MC"—
`
`Isoatc°*xt`‘*°\
`
`I.Oack
`
`ti
`
`O
`
`SA
`
`.!
`
`7.:
`
`V,*1
`
`h/
`
`
`. •
`
`• .*
`
`4%
`
`tN
`
`tl
`•riti it ill
`
`V:*
`
`w 4s-
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1900
`
`
`
`ti
`
`:•
`
`•
`
`±CC
`
`• .,, •
`I
`
`k.
`
`fi :
`
`o;•
`0
`0.
`
`:•.•.•.•
`
`•
`
`•
`
`•
`
`6 6)
`
`‘444044,V
`•
`.•••= 'sr
`
`•
`
`'''
`:::••74••'''• •
`41-.7
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1901
`
`
`
`-
`
`41,? 614 4
`
`C OA
`
`This
`
`heco
`holt
`tel
`
`cr.
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1902
`
`
`
`4
`
`Phil Collins
`Testify
`SECURITY SERVICE
`INDIVIDUALLY WATERMARKED
`
`Atlantic Records259
`
`40,0""Mtlk,
`
`' tr)
`
`r\,/
`
`:
`
`Id RN
`
`DIGITAL AUDIO
`
`[PROMOTION ONLY. NOT FOR SALE]
`2-83563
`
`Please note: This CD has been individually watermarked with a unique identification number
`entiedded in the music. This number is traceable directly to the authorized recipient, which allows
`us to identify the source of any unauthorized copies or other reproductions of the music contained on
`this CD. The watermark is not changed or destroyed by extracting clips of the music, or by using
`any compression technology such as MP3. The sound quality of the audio playback is not
`affected This CD is intended to be listened to solely oy the authorized recipient ana no portion of
`its contents may be copied or reproduced in any manner, nor made available in any manner to any
`third party (whether by means of streaming, so-called "peer-to-peer" networks or otherwise). This
`CD should not be played in a computer. Thank you in advance for your understanding...Enjoy!
`2002 Atlantic Records, a Time Warner Company
`
`00
`
`Made In U.S.A.
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1903
`
`
`
`a
`
`4.114;
`
`Z.2
`
`64710) \c‘`,\•
`
`4:di;al:C.-
`
`4,,
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1904
`
`
`
`3"
`
`fc^
`
`r'rr
`
`:
`
`14
`
`i()
`
`;A
`
`• r
`
`p
`
`ri
`
`4
`
`-4
`
`Crr
`
`%
`
`AW
`
`4
`
`■
`
`,erto'ccre177:77
`
`tAr
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1905
`
`
`
`1
`
`PATENT
`ATTORNEY DOCKET NO. 066112.0132
`
`5
`
`10
`
`15
`
`20
`
`25
`
`METHOD AND DEVICE FOR MONITORING AND ANALYZING SIGNALS
`
`CROSS-REFERENCE TO RELATED APPLICATIONS
`This application claims the benefit of pending U.S. Patent Application Serial No.
`
`08/999,766, filed July 23, 1997, entitled "Steganographic Method and Device"; pending U.S.
`Patent Application Serial No. 08/772,222, filed December 20, 1996, entitled "Z-Transform
`Implementation of Digital Watermarks"; pending U.S. Patent Application Serial No. 09/456,319,
`filed December 8, 1999, entitled "Transform Implementation of Digital Watermarks"; pending
`U.S. Patent Application Serial No. 08/674,726, filed July 2, 1996, entitled "Exchange
`Mechanisms for Digital Information Packages with Bandwidth Securitization, Multichannel
`Digital. Watermarks, and Key Management"; pending U.S. Patent Application Serial No.
`09/545,589, filed April 7, 2000, entitled "Method and System for Digital Watermarking";
`pending U.S. Patent Application Serial No. 09/046,627, filed March 24, 1998, entitled "Method
`for Combining Transfer Function with Predetermined Key Creation"; pending U.S. Patent
`Application Serial No. 09/053,628, filed April 2, 1998, entitled "Multiple Transform Utilization
`and Application for Secure Digital Watermarking"; pending U.S. Patent Application Serial No.
`09/281,279, filed March 30, 1999, entitled "Optimization Methods for the Insertion, Protection,
`and Detection..."; U.S. Patent Application Serial No.09,594,719, filed June 16, 2000, entitled
`"Utilizing Data Reduction in Steganographic and Cryptographic Systems" (which is a
`continuation-in-part of PCT application No. PCT/US00/06522, filed March 14, 2000, which PCT
`application claimed priority to U.S. Provisional Application No. 60/125,990, filed March 24,
`1999); pending U.S. Application No 60/169,274, filed December 7, 1999, entitled "Systems,
`Methods And Devices For Trusted Transactions"; and PCT Application No. PCT/US00/21189,
`filed August 4, 2000 (which claims priority to U.S. Patent Application Serial No. 60/147,134,
`
`DC01:244302.5
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1906
`
`
`
`- 2 -
`
`filed August 4, 1999, and to US Patent Application No. 60/213,489, filed June 23, 2000, both of
`
`which are entitled, "A Secure Personal Content Server"). The previously identified patents andJor
`
`patent applications are hereby incorporated by reference, in their entireties.
`
`In addition, this application hereby incorporates by reference, as if fully stated herein, the
`
`5
`
`total disclosures of US Patent 5,613,004 "Steganographic Method and Device"; U.S. Patent
`
`5,745,569 "Method for Stega-Cipher Protection of Computer Code"; and U.S. Patent 5,889,868
`
`"Optimization Methods for the Insertion, Protection, and Detection of Digital Watermarks in
`
`Digitized Data."
`
`10
`
`BACKGROUND OF THE INVENTION
`
`1.
`
`'Field of the Invention
`
`The invention relates to the monitoring and analysis of digital information. A method
`
`and device are described which relate to signal recognition to enhance identification and
`
`monitoring activities.
`
`2.
`
`Description of the Related Art
`Many methods and protocols are known for transmitting data in digital form for
`
`multimedia applications (including computer applications delivered over public networks such as
`the intemet or World Wide Web ("WWW"). These methods may include protocols for the
`compression of data, such that it may more readily and quickly be delivered over limited
`bandwidth data lines. Among standard protocols for data compression of digital files may be
`
`mentioned the MPEG compression standards for audio and video digital compression,
`promulgated by the Moving Picture Experts Group. Numerous standard reference works and
`
`patents discuss such compression and transmission standards for digitized information.
`Digital watermarks help to authenticate the content of digitized multimedia information,
`and can also discourage piracy. Because piracy is clearly a disincentive to the digital distribution
`
`• DC01:244302.5
`
`15
`
`20
`
`25
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1907
`
`
`
`- 3 -
`
`of copyrighted content, establishment of responsibility for copies and derivative copies of such
`
`works is invaluable. In considering the various forms of multimedia content, whether "master,"
`
`stereo, NTSC video, audio tape or compact disc, tolerance of quality will vary with individuals
`
`and affect the underlying commercial and aesthetic value of the content. It is desirable to tie
`
`5
`
`copyrights, ownership rights, purchaser information or some combination of these and related
`
`data into the content in such a manner that the content must undergo damage, and therefore
`reduction of its value, with subsequent, unauthorized distribution, commercial or otherwise.
`
`Digital watermarks address many of these concerns. A general discussion of digital
`watermarking as it has been applied in the art may be found in U.S. Patent No. 5,687,236 (whose
`
`10
`
`specification is incorporated in whole herein by reference).
`
`Further applications of basic digital watermarking functionality have also been
`
`developed. Examples of such applications are shown in U.S. Patent No. 5,889,868 (whose
`specification is incorporated in whole herein by reference). Such applications have been drawn,
`for instance, to implementations of digital watermarks that were deemed most suited to particular
`transmissions, or particular distribution and storage mediums, given the nature of digitally
`sampled audio, video, and other multimedia works. There have also been developed techniques
`for adapting watermark application parameters to the individual characteristics of a given digital
`sample stream, and for implementation of digital watermarks that are feature-based - i.e., a
`system in which watermark information is not carried in individual samples, but is carried in the
`relationships between multiple samples, such as in a waveform shape. For instance, natural
`extensions may be added to digital watermarks that may also separate frequencies (color or
`audio), channels in 3D while utilizing discreteness in feature-based encoding 'only known to
`those with pseudo-random keys (i.e., cryptographic keys) or possibly tools to access such
`
`information, which may one day exist on a quantum level.
`A matter of general weakness in digital watermark technology relates directly to
`the manner of implementation of the watermark. Many approaches to digital watermarking leave
`
`DC01:244302.5
`
`15
`
`20
`
`25
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1908
`
`
`
`- 4 -
`
`detection and decode control with the implementing party of the digital watermark, not the
`
`creator of the work to be protected. This weakness removes proper economic incentives for
`
`improvement of the technology. One specific form of exploitation mostly regards efforts to
`
`obscure subsequent watermark detection. Others regard successful over encoding using the same
`
`5
`
`watermarking process at a subsequent time. Yet another way to perform secure digital
`
`watermark implementation is through "key-based" approaches.
`
`SUMMARY OF THE INVENTION
`
`A method for monitoring and analyzing at least one signal is disclosed, which method
`
`10
`
`comprises the steps of: receiving at least one reference signal to be monitored; creating an
`
`abstract of the at least one reference signal; storing the abstract of the at least one reference signal
`
`in a reference database; receiving at least one query signal to be analyzed; creating an abstract of
`
`the at least one query signal; and comparing the abstract of the at least one query signal to the
`
`abstract of the at least one reference signal to determine if the abstract of the at least one query
`
`15
`
`signal matches the abstract of the at least one reference signal.
`
`A method for monitoring a plurality of reference signals is also disclosed, which method
`
`comprises the steps of: creating an abstract for each one of a plurality of reference signals;
`
`storing each of the abstracts in a reference database; receiving at least one query signal to be
`
`analyzed; creating an abstract of each at least one query signal; locating an abstract in the
`
`20
`
`reference database that matches the abstract of each at least one query signal; and recording the
`
`identify of the reference signal whose abstract matched the abstract of each at least one query
`
`signal.
`
`A computerized system for monitoring and analyzing at least one signal is also disclosed,
`which system comprises: a processor for creating an abstract of a signal using selectable criteria;
`a first input for receiving at least one reference signal to be monitored, the first input being
`coupled to the processor such that the processor may generate an abstract for each reference
`
`25
`
`DC01:244302.5
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1909
`
`
`
`- 5 -
`
`signal input to the processor; a reference database, coupled to the processor, for storing abstracts
`of each at least one reference signal; a second input for receiving at least one query signal to be
`analyzed, the second input being coupled to the processor such that the processor may generate
`an abstract for each query signal; and a comparing device, coupled to the reference database and
`to the second input, for comparing an abstract of the at least one query signal to the abstracts
`stored in the reference database to determine if the abstract of the at least one query signal
`
`matches any of the stored abstracts.
`Further, an electronic system for monitoring and analyzing at least one signal is disclosed,
`which system comprises: a first input for receiving at least one reference signal to be monitored,
`a first processor for creating an abstract of each reference signal input to the first processor
`through the first input; a second input for receiving at least one query signal to be analyzed, a
`second processor for creating an abstract of each query signal; a reference database for storing
`abstracts of each at least one reference signal; and a comparing device for comparing an abstract
`of the at least one query signal to the abstracts stored in the reference database to determine if the
`abstract of the at least one query signal matches any of the stored abstracts.
`
`DETAILED DESCRIPTION OF THE INVENTION
`While there are many approaches to data reduction that can be utilized, a primary concern
`is the ability to reduce the digital signal in such a manner as to retain a "perceptual relationship"
`between the original signal and its data reduced version. This relationship may either be
`mathematically discernible or a result of market-dictated needs. The purpose is to afford a more
`consistent means for classifying signals than proprietary, ' related text-based approaches. A
`simple analogy is the way in which a forensic investigator uses a sketch artist to assist in
`determining the identity of a human.
`In one embodiment of the invention, the abstract of a signal may be generated by the
`following steps: 1) analyze the characteristics of each signal in a group of audible/perceptible
`
`DC01:244302.5
`
`5
`
`10
`
`15
`
`20
`
`25
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1910
`
`
`
`- 6 -
`
`variations for the same signal (e.g., analyze each of five versions of the same song—which
`
`versions may have the same lyrics and music but which are sung by different artists); and 2)
`
`select those characteristics which achieve remain relatively constant (or in other words, which
`
`have minimum variation) for each of the signals in the group. Optionally, the null case may be
`
`5
`
`defined using those characteristics which are common to each member of the group of versions.
`
`Lossless and lossy compression schemes are appropriate candidates for data reduction
`
`technologies, as are those subset of approaches that are based on perceptual models, such as
`
`AAC, MP3, TwinVQ, JPEG, GIF, MPEG, etc. Where spectral transforms fail to assist in greater
`
`data reduction of the signal, other signal characteristics can be identified as candidates for further
`
`10
`
`data reduction. Linear predictive coding (LPC), z-transform analysis, root mean square (rms),
`
`signal to peak, may be appropriate tools to measure signal characteristics, but other approaches or
`
`combinations of signal characteristic analysis are contemplated. While such signal
`
`characteristics may assist in determining particular applications of the present invention, a
`
`generalized approach to signal recognition is necessary to optimize the deployment and use of the
`
`15
`
`present invention.
`
`Increasingly, valuable information is being created and stored in digital form. For
`
`example, music, photographs and motion pictures can all be stored and transmitted as a series of
`
`binary digits -- l's and 0's. Digital techniques permit the original information to be duplicated
`
`repeatedly with perfect or near perfect accuracy, and each copy is perceived by viewers or
`
`20
`
`listeners as indistinguishable from the original signal. Unfortunately, digital techniques also
`
`permit the information to • be easily copied without the owner's permission. While digital
`
`representations of analog waveforms may be analyzed by perceptually-based or perceptually-
`
`limited analysis it is usually costly and time-consuming to model the processes of the highly
`
`effective ability of humans to identify and recognize a signal. In those applications where analog
`
`25
`
`signals require analysis, the cost of digitizing the analog signal is minimal when compared to the
`
`benefits of increased accuracy and speed of signal analysis and monitoring when the processes
`
`DC01:244302.5
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1911
`
`
`
`contemplated by this invention are utilized.
`
`7
`
`The present invention relates to identification of digitally-sampled information, such as
`
`images, audio and video. Traditional methods of identification and monitoring of those signals
`
`do not rely on "perceptual quality," but rather upon a separate and additional signal. Within this
`
`5
`
`application, such signals will be called "additive signals" as they provide information about the
`
`original images, audio or video, but such information is in addition to the original signal. One
`
`traditional, text-based additive signal is title and author information. The title and author, for
`
`example, is information about a book, but it is in addition to the text of the book. If a book is
`
`being duplicated digitally, the title and author could provide one means of monitoring the number
`
`10
`
`of times the text is being duplicated, for example, through an Internet download. The present
`
`invention, however, is directed to the identification of a digital signal—whether text, audio, or
`
`video—using only the digital signal itself and then monitoring the number of times the signal is
`
`duplicated. Reliance on an additive signal has many shortcomings. For example, first, someone
`
`must incorporate the additive signal within the digital data being transmitted, for example, by
`
`15
`
`concatenation or through an embedding process. Such an additive signal, however, can be easily
`
`identified and removed by one who wants to utilize the original signal without paying for its
`usage. If the original signal itself is used to identify the content, an unauthorized user could not
`
`avoid payment of a royalty simply by removing the additive signal—because there is no additive
`
`signal to remove. Hence, the present invention avoids a major disadvantage of the prior art.
`One such additive signal that may be utilized is a digital watermark—which ideally
`
`cannot be removed without perceptually altering the original signal. A watermark may also be
`
`used as a monitoring signal (for example, by encoding an identifier that uniquely identifies the
`original digital signal into which the identifier is being embedded). A digital watermark used for
`monitoring is also an additive signal, and such a signal may make it difficult for the user who
`wants to duplicate a signal without paying a royalty—mainly by degrading the perceptual quality
`of the original signal if the watermark (and hence the additive monitoring signal) is removed.
`
`DC01:244302.5
`
`20
`
`25
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1912
`
`
`
`This is, however, is a different solution to the problem.
`
`- 8 -
`
`The present invention eliminates the need of any additive monitoring signal because the
`
`present invention utilizes the underlying content signal as the identifier itself. Nevertheless, the
`
`watermark may increase the value of monitoring techniques by increasing the integrity of the
`
`5
`
`embedded data and by indicating tampering of either the original content signal or the monitoring
`
`signal. Moreover, the design of a watermarking embedding algorithm is closely related to the
`
`perceptibility of noise in any given signal and can represent an ideal subset of the original signal:
`
`the watermark bits are an inverse of the signal to the extent that lossy compression schemes,
`
`which can be used, for instance, to optimize a watermarking embedding scheme, can yield
`
`to
`
`information about the extent to which a data signal can be compressed while holding steadfast to
`
`the design requirement that the compressed signal maintain its perceptual relationship with the
`
`original, uncompressed signal. By describing those bits that are candidates for imperceptible
`
`embedding of watermark bits, further data reduction may be applied on the candidate watermarks
`
`as an example of retaining a logical and perceptible relationship with the original uncompressed
`
`15
`
`signal.
`
`Of course, the present invention may be used in conjunction with watermarking
`
`technology (including the use - of keys to accomplish secure digital watermarking), but
`
`watermarking is not necessary to practice the present invention. Keys for watermarking may
`
`have many forms, including: descriptions of the original carrier file formatting, mapping of
`
`20
`
`embedded data (actually imperceptible changes made to the carrier signal and referenced to the
`
`predetermined key or key pairs), assisting in establishing the watermark message data integrity
`
`(by incorporation of special one way functions in the watermark message data or key), etc.
`
`Discussions of these systems in the patents and pending patent applications are incorporated by
`
`reference above. The "recognition" of a particular signal or an instance of its transmission, and
`
`25
`
`its monitoring are operations that may be optimized through the use of digital watermark
`
`analysis.
`
`DC01:244302.5
`
`DISH - Blue Spike-408
`Exhibit 1010, Page 1913
`
`
`
`- 9 -
`
`A practical difference between the two approaches of using a separate, additive
`
`monitoring signal and using the original signal itself as the monitoring signal is control. If a
`
`separate signal is used for monitoring, then the originator of the text, audio or video signal being
`
`transmitted and the entity doing the monitoring have to agree as to the nature of the separate
`
`5
`
`signal to be used for monitoring—otherwise, the entity doing the monitoring would not know
`
`where to look, for what to look, or how to interpret the monitoring signal once it was identified
`
`and detected. On the other hand, if the original signal is used itself as a monitoring signal, then
`
`no such agreement is necessary. Moreover, a more logical and self-sufficient relationship
`
`between the original and its data-reduced abstract enhances the transparency of any resulting
`
`10
`
`monitoring efforts. The entity doing the monitoring is not looking for a separate, additive
`
`monitoring system, and further, need not have to interpret the content of the monitoring signal.
`
`Monitoring implementations can be handled by robust watermark techniques (those
`
`techniques that are able to, survive many signal manipulations but are not inherently "secure" for
`
`verification of a carrier signal a