throbber
WO 98/02864
`
`,
`
`PCT/US97/11455-
`
`OPTIMIZATION METHODSFORTHE INSERTION, PROTECTION
`AND DETECTION OF DIGITAL WATERMARKSIN DIGITIZED DATA
`
`
`RELATED APPLICATIONS
`
`This application is related to patent applications entitled
`“Steganographic Method and Device”, Serial No. 08/489, 172 filed on June
`7, 1995; “Method for Human-Assisted Random Key Generation and
`Application for Digital Watermark System’, Serial No. 08/587,944 filed on
`January 17, 1996; “Method for Stega-Cipher Protection of Computer Code”,
`Serial No. 08/587943 filed on January 17, 1996; “Digital Information
`
`Commodities Exchange”, Serial No. 08/365,454 filed on December28,
`
`1994, which is a continuation of Serial No. 08/083,593 filed on June 30,
`1993; and “Exchange Mechanismsfor Digital Information Packages with |
`
`10
`
`Bandwidth Securitization, Multichannel Digital Watermarks, and Key
`
`. Management’, Serial No. 08/674,726filed on July 2, 1996. These related
`applications are all incorporated herein by reference.
`This application is also related to U.S. Patent No. 5,428,606,
`“Digital Information Commodities Exchange”, issued on June 27, 1995,
`
`15
`
`which is incorporated herein by reference.
`
`
`BACKGROUNDOF THE INVENTION
`
`20
`
`The presentinvention relates to digital watermarks.
`Digital watermarks exist at a convergence point where creators and
`publishers ofdigitized multimedia content demand localized, secured
`
`DISH-Blue Spike-602
`Exhibit 1006, Page 0731
`
`DISH-Blue Spike-602
`Exhibit 1006, Page 0731
`
`

`

`WO 98/02864
`
`PCT/US97/11455
`
`identification and authentication of that content. Because existence of
`piracy is clearly a disincentive to the digital distribution of copyrighted
`works, establishment of responsibility for copies and derivative copies of
`such worksis invaluable.
`In considering the various forms of multimedia
`content, whether "master," stereo, NTSC video, audio tape or compactdisc,
`_ tolerance of quality degradation will vary with individuals and affect the
`underlying commercial and aesthetic value of the content.
`it is desirable to
`
`tie copyrights, ownership rights, purchaser information or some combination
`
`of these and related data to the content in such a mannerthat the content
`
`10
`
`must undergo damage,and therefore a reduction in value, with subsequent,
`
`unauthorized distribution of the content, whetherit be commercial or
`
`otherwise.
`Legal recognition and attitude shifts, which recognize the importance
`__ Of digital watermarks as a necessary component of commercially distributed
`
`15
`
`content (audio, video, game, etc.}, will further the development of
`acceptable parameters for the exchange of such content by the various
`parties engagedin the commercial distribution of digital content. These
`parties mayinclude artists, engineers, studios, INTERNET access
`providers, publishers, agents, on-line service providers, aggregators of
`
`20
`
`contentfor various forms of delivery, on-line retailers, individuals and
`
`parties that participate in the transfer of funds to arbitrate the actual delivery
`
`of content to intended parties.
`Since the characteristics of digital recordings vary widely,it is a
`
`worthwhile goal to provide tools to describe an optimized envelope of
`
`25
`
`parameters for inserting, protecting and detecting digital watermarks in a
`given digitized sample (audio, video,virtual reality, etc.) stream. The
`optimization techniques described hereinafter make unauthorized removal
`
`of digital watermarks containing these parameters a significantly costly
`
`operation in terms of the absolute given projected economic gain from
`
`30
`
`undetected commercial distribution. The optimization techniques, at the
`
`least, require significant damage to the content signal, as to make the
`
`2
`
`DISH-Blue Spike-602
`Exhibit 1006, Page 0732
`
`DISH-Blue Spike-602
`Exhibit 1006, Page 0732
`
`

`

`WO 98/02864
`
`PCT/US97/1 1455
`
`“
`
`unauthorized copy commercially worthless,if the digital watermarkis
`removed, absent the use of extremely expensive tools.
`_
`Presumably, the commercial value of some workswill dictate some
`
`level of piracy not detectable in practice and deemed “reasonable”byrights
`holders given the overall economic return: For example, there will always
`be fake $100bills, LEVI jeans, and GUCCI bags, given the sizes of the
`overall markets and potential economic returns for pirates in these markets--
`as there also will be unauthorized copies of works of music, operating
`systems (Windows95,etc.), video and future multimedia goods.
`However, whatdifferentiates the "digital marketplace" from the
`physical marketplaceis the absence of any schemethat establishes
`responsibility and trust in the authenticity of goods. For physical products,
`corporations and governments mark the goods and monitor manufacturing
`
`capacity and sales to estimate loss from piracy. There also exist reinforcing
`
`10
`
`15
`
`mechanisms,including jegal, electronic, and informational campaignsto
`
`better educate consumers.
`
`SUMMARYOF THE INVENTION
`
`The present invention relates to implementations of digitai
`
`20
`
`watermarksthat are optimally suited to particular transmission, distribution
`
`and storage mediumsgiven the nature of digitally-sampled audio, video,
`
`and other multimedia works.
`
`25
`
`30
`
`The present invention also relates to adapting watermark application
`parametersto the individual characteristics of a given digital sample stream.
`The present invention additionally relates to the implementation of
`
`digital watermarks that are feature-based. That is, a system where
`
`watermark information is not carried in individual samples, but is carried in
`
`the relationships between multiple samples, such as in a waveform shape.
`
`The present invention envisions natural extensions for digital watermarks
`
`that may also separate frequencies (color or audio), channels in 3D while
`utilizing discretenessin feature-based encoding only known to those with
`3
`
`DISH-Blue Spike-602
`Exhibit 1006, Page 0733
`
`DISH-Blue Spike-602
`Exhibit 1006, Page 0733
`
`

`

`WO 98/02864
`
`PCT/US97/11455
`
`pseudo-random keys(i.e., cryptographic keys) or possibly tools to access
`such information, which may one day exist on a quantum level.
`The present invention additionally relates to a method for obtaining
`
`;
`
`more optimal models to design watermark systemsthat are tamper-resistant
`
`given the number and breadth of existent digitized-sample options with
`
`differing frequency and time components (audio, video, pictures, multimedia,
`
`virtual reality, etc.).
`To accomplish thesegoals, the present invention maintains the
`highest quality of a given content signal as it was mastered, withits
`
`10
`
`watermarks suitably hidden, taking into account usageofdigitalfilters and
`
`error correction presently concerned solely with the quality of content
`
`signais.
`
`The present invention additionally preserves quality of underlying
`content signals, while using methods for quantifying this quality to identify
`and highlight advantageous locations for the insertion of digital watermarks.
`
`The present invention integrates the watermark, an information
`
`signal, as closely as possible to the content signal, at a maximal level, to
`
`force degradation of the content signal when attempts are made to remove
`
`the watermarks.
`The present invention relates to a method for amplitude independent
`encoding of digital watermark information in a signal including steps of
`.
`determining in the signal a sample window having a minimum and a
`maximum, determining a quantization interval of the sample window,
`normalizing the sample window, normalizing the sample window to provide
`normalized samples, analyzing the normalized samples, comparing the
`normalized samples to messagebits, adjustingthe quantization level of the
`sample window to correspond to the messagebit when a bit conflicts with
`the quantization level and de-normalizing the analyzed samples.
`The present invention also relates to a method for amplitude
`independent decoding of digital watermark informationin a signal including
`steps of determining in the signal a sample window having a minimum and a
`
`15
`
`20
`
`25
`
`30
`
`4
`
`DISH-Blue Spike-602
`Exhibit 1006, Page 0734
`
`DISH-Blue Spike-602
`Exhibit 1006, Page 0734
`
`

`

`WO 98/02864
`
`.
`
`PCT/US97/1 1455
`
`maximum, determining a quantization interval of the sample window,
`normalizing the sample window to provide samples, and analyzing the
`quantization level of the samples to determine a messagebit value.
`The present invention additionally relates to a method of encoding
`and decoding watermarksin a signal where, rather than individual! samples,
`insertion and detection of abstract signal features to carry watermark
`
`information in the signal is done.
`The present invention also relates to a method for pre-analyzing a
`digital signal for encoding digital watermarks using an optimaldigitalfilter in
`whichit is determined what noise elements in the digital signal will be
`removed by the optimaldigital filter based on response characteristics of the
`
`filter.
`
`The present invention also relates to a method of error coding
`watermark messagecertificates using cross-interleaved codes which use
`error codes of high redundancy,including codes with Hamming distancesof
`greater than or equalto “n’, wherein “n’” is a numberof bits in a message
`block.
`
`The present invention additionally relates to a method of pre-
`processing a watermark messagecertificate including a step of determining
`anabsolute bit length of the watermark messageasit will be encoded.
`The present invention additionally relates to a method of generating
`watermark pseudo-random key bits using a non-linear (chaotic) generator or
`_ toa method of mapping pseudo-random key and processing state
`
`information to affect an encode/decode map using a non-linear (chaotic)
`
`generator.
`The present invention additionally relates to a method of
`guaranteeing watermark certificate uniquenessincluding a step of attaching
`atime stamporuseridentification dependent hash or message digest of
`
`watermark certificate data to the certificate.
`
`The present invention also relates to a method of generating and
`quantizing a local noise signal to contain watermark information where the
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`DISH-Blue Spike-602
`Exhibit 1006, Page 0735
`
`DISH-Blue Spike-602
`Exhibit 1006, Page 0735
`
`

`

`WO 98/02864
`
`PCT/US97/11455
`
`noise signalis a function of at least one variable which depends on key and
`
`processing state information.
`The presentinvention also relates to a method of dithering watermark
`quantizations such that the dither changes an absolute quantization value,
`but does not change a quantization level or information carried in the
`
`quantization.
`
`10
`
`15
`
`20
`
`The present invention further relates to a method of encoding
`
`watermarksincluding inverting at least one watermark bit stream and
`encoding a watermark including the inverted watermark bit stream.
`The present invention also relates to a method of decoding
`watermarks by considering an original watermark synchronization marker,
`an inverted watermark synchronization marker, and inverted watermarks,
`
`and decoding based on those considerations.
`The present invention also relates to a method of encoding and
`decoding watermarksin a signal using a spread spectrum technique to
`
`encode or decode whereinformation is encoded or decoded at audible
`
`levels and randomized over both frequency and time.
`
`The present invention additionally relates to a method of analyzing
`
`composite digitized signals for watermarks including obtaining a composite
`signal, obtaining an unwatermarked sample signal, time aligning the
`unwatermarked sample signal to the composite signal, gain adjusting the
`
`time aligned unwatermarked sample signal!to the composite signal,
`
`estimating a pre-composite signal using the composite signal and the gain
`
`adjusted unwatermarked sample signa!, estimating a watermarked sample
`signal by subtracting the estimated pre-composite signal for the composite.
`
`25
`
`signal, and scanning the estimated watermark sample signalfor
`watermarks.
`The present invention additionally relates to a method for varying
`watermark encode/decode algorithms automatically during the encoding or
`decoding of a watermark including steps of (a) assigning a list of desired
`
`30
`
`CODECsto a list of corresponding signal characteristics which indicate use
`
`6
`
`DISH-Blue Spike-602
`Exhibit 1006, Page 0736
`
`DISH-Blue Spike-602
`Exhibit 1006, Page 0736
`
`

`

`WO 98/02864
`
`PCT/US97/11455
`
`of particular CODECs,(b) during encoding/decoding, analyzing
`characteristics of the current sample framein the signal stream, prior to
`delivering the frame to CODEC, (c) looking up the corresponding CODEC
`from the list of CODECs in step (a) which matches the observed signal
`
`characteristics from step (b), (d) loading and/or preparing the desired
`CODEC,(e) passing the sample frame to the CODECselectedin step(c),
`andf) receiving the output samples from step (e).
`
`The present invention also relates to a method for varying watermark
`encode/decodealgorithms automatically during the encoding or decoding of
`
`10
`
`15.
`
`a watermark, including steps of (a) assigninga list of desired CODECs toa
`list of index values which correspond to values computed to values
`computed asa function of the pseudo-random watermark key and the state
`of the processing framework, (b) during encoding/decoding, computing the
`. pseudo-random key index value for the current sample frame in the signal
`stream, prior to delivering the frame to a CODEC, (c) looking up the
`corresponding CODECfrom thelist of CODECsin step (a) which matches
`the index value from step (b), (d) loading and/or preparing the desired
`
`CODEC, (e) passing the sample frame to the CODECselectedin step (c),
`
`and(f) receiving the output samples from step (e).
`
`20
`
`
`DETAILED DESCRIPTION
`
`The present invention relates to implementations of digital
`
`watermarksthat are optimally suited to particular transmission, distribution
`
`and storage mediums given the nature ofdigitally sampled audio, video, and
`
`25
`
`other multimedia works.
`
`The present invention also relates to adapting watermark application
`parameters to the individual characteristics of a given digital sample stream.
`The present invention additionaliy relates to the implementation of
`digital watermarks that are feature-based. That is, a system where
`
`30
`
`watermark information is not carried in individual samples, but is carried in
`
`the relationships between multiple samples, such as in a waveform shape.
`
`7
`
`DISH-Blue Spike-602
`Exhibit 1006, Page 0737
`
`DISH-Blue Spike-602
`Exhibit 1006, Page 0737
`
`

`

`WO 98/02864
`
`PCT/US97/11455
`
`For example,in the same manner a US $100bill has copy protection
`features including ink type, paper stock,fiber, angles of artwork that distort
`in photocopier machines, inserted magnetic strips, and composite art, the
`presentinvention envisions natural extensions for digital watermarksthat
`may also separate frequencies (color or audio), channels in 3D while
`utilizing discreteness in feature-based encoding only known to those with
`pseudo-random keys(i.e., cryptographic keys) or possibly tools to access
`such information, which may one day exist on a quantum level.
`There are a number of hardware and software approachesin the
`prior art that attempt to provide protection of multimedia content, including
`encryption, cryptographic containers, cryptographic envelopes or
`|
`"eryptolopes", and trusted systems in general. None of these systems
`places control of copy protection in the hands of the content creator as the
`
`content is created, nor provides an economically feasible modelfor-
`exchanging the content to be exchangedwith identification data embedded
`within the content.
`
`Yet, given the existence of over 100 million personal computers and
`many more non-copy-protected consumer electronic goods, copy protection
`seemsto belong within the signals. Afterall, the playing (i.e., using) of the
`content establishes its commercial value.
`
`Generally, encryption and cryptographic containers serve copyright
`holders as a meansto protect data in transit between a publisher or
`distributor and the purchaserof the data (i.e., a meansof securing the
`delivery of copyrighted material from one location to another by using
`variations of public key cryptography or other more centralized
`cryptosystems).
`—
`Cryptolopes are suited specifically for copyrighted text that is time-
`sensitive, such as newspapers, whereintellectual property rights and origin
`data are made a permanentpart of the file. For information on public-key
`cryptosystems see U.S. Patent No. 4,200,770 to Hellmanet al., U.S. Patent
`No. 4,218,582 to Hellman et al., U.S. Patent No. 4,405,829to Rivestetal., -
`
`8
`
`10
`
`15
`
`20
`
`25
`
`30
`
`DISH-Blue Spike-602
`Exhibit 1006, Page 0738
`
`DISH-Blue Spike-602
`Exhibit 1006, Page 0738
`
`

`

`WO 98/02864
`
`PCT/US97/11455
`
`and U.S. Patent No. 4,424,414 to Hellman et al. Systems are proposed by
`
`IBM and Electronic Publishing Resources to accomplish cryptographic
`
`container security.
`Digitally-sampled copyrighted material, that is binary data on a
`fundamentallevel, is a special case becauseofits long term value coupled
`
`with the ease and perfectness of copying and transmission by general
`
`purpose computing and telecommunications devices.
`
`In particular,in
`
`digitally-sampled material, there is no loss of quality in copies and no
`
`identifiable differences between one copy and any other subsequent copy.
`
`10
`
`For creators of content, distribution costs may be minimized with electronic
`
`transmission of copyrighted works. Unfortunately, seeking some form of
`
`informational or commercial return via electronic exchangeisill-advised
`absentthe use of digital watermarksto establish responsibility for specific
`copies and unauthorized copying. Absentdigital watermarks, the unlikely
`instance of a market of trusted parties who report any distribution or
`exchange of unauthorized copiesof the protected work must be relied upon
`for enforcement. Simply, content creators still cannot independently verify
`
`watermarks should they choose to do so.
`
`For a discussion of systems that are oriented around content-based
`
`addresses and directories, see U.S. Patent No. 5,428,606 to Moskowitz.
`In combining steganographic methodsfor insertion of information
`identifying the title, copyright holder, pricing, distribution path, licensed
`owner of a particular copy, or a myriad of other related information, with
`pseudo-random keys (which mapinsertion location of the information)
`similar to those usedin cryptographic applications, randomly placed signals
`(digital watermarks) can be encoded as random noise in a content signal.
`
`Optimal planning of digital watermark insertion can be based on the
`inversion of optimaldigitalfilters to establish or map areascomprising a
`given content signal insertion envelope. Taken further, planning operations
`will vary for different digitized content: audio, video, multimedia, virtual
`reality, etc. Optimization techniques for processes are described in the
`
`9
`
`15
`
`20
`
`25
`
`30
`
`DISH-Blue Spike-602
`Exhibit 1006, Page 0739
`
`DISH-Blue Spike-602
`Exhibit 1006, Page 0739
`
`

`

`PCT/US97/11499
`
`Device" and “Methodfor Human Assisted Random Ke
`Application for Digital Watermark System".
`OptimizationProcessesmusttakeinto consideration thegeneralari
`| ofdigitization SystemswhereSampling andquantizing arefundamental
`physical Parameters. Forinstance, discretetime Sampling has anatural
`limit ifpackets oftimeareused, estimated at 1x10-2Second. Thisprovides
`@ Naturallimit to the Sampling operation. Also, since noise is Preferable to
`
`10
`
`quantization error, burst error, andthe like is done forthe Singulargoal of
`Preserving quality in a Given digitized Sample. Theoretical perfect error
`correction is not efficient, given the requirement ofa hugeallocation of 2"bs
`redundant data to detect and Correct errors.
`In the absence of such
`7
`Overhead,all error correction is still based on data redundancy and requires
`the following operations: error detection to check data validity, error
`- correction to replace erroneous data, and error concealmentto hide large
`errors or substitute data for insufficient data correction. Even with perfect
`fror correction, the goalof a workable digital watermark system for the
`Protection of copyrights would beto distributecopiesthatare lessthan-
`perfect but.aate erceivably-cift
`enlteomthe-criginal. . tronivally,inthie’ *B,
`
`
`presentdistribution ofmultimedia,this is the approach taken by content... _ _
`creators when faced with such distribution mechanismsas the INTERNET.
`As an example,for audio clips commercially exchanged on the World Wide
`Web (WWW), a part of the INTERNET,8 bit sampled audio or audio
`—
`downsampledfrom 44.1 kHz (CD-quality), to 22 kHz and lower. Digital
`filters, however, are not ideal because oftrade-offs between attenuation and
`time-domain response, but provide the engineer or similarly-trained
`individualwith a set of decisions to make about maximizing content quality
`with minimum data overhead and consideration of the ultimate delivery
`10
`
`15
`
`20
`
`25
`
`30
`
`DISH-Blue Spike-602
`Exhibit 1006, Page 0740
`
`DISH-Blue Spike-602
`Exhibit 1006, Page 0740
`
`

`

`WO 98/02864
`
`PCT/US97/11455
`
`mechanism for the content (CDs, cable television, satellite, audio tape,
`stereo amplifier, etc.).
`|
`For audio signals and more generally for other frequency-based
`content, such as video, one method of usingdigitalfilters is to include the
`use of an inputfilter to prevent frequency aliasing higher than the so-called
`
`Nyquist frequencies. The Nyquist theorem specifies that the sampling
`
`frequency must be at least twice the highest signal frequency of the
`
`sampled information (e.g., for the case of audio, human perception of audio
`
`10
`
`frequenciesis in a range between 20 Hz and 20 kHz). Without an input
`filter, aliases can still occur leaving an aliased signal in the original
`bandwidth that cannot be removed.
`
`Even with anti-aliasing filters, quantization error can still cause low
`level aliasing which may be removedwith a dither technique. Dither is a
`
`method of adding random noise to the signal, and is used to de-correlate
`
`15
`
`quantization error from the signal while reducing the audibility of the
`
`remaining noise. Distortion may be removed, but at the cost of adding more
`noise to thefiltered output signal. An important effect is the subsequent
`
`randomization of the quantization error while still leaving an envelope of an
`
`unremovable signaling band of noise. Thus, dither is done at low signal
`
`20
`
`levels, effecting only the least significant bits of the samples. Conversely,
`
`digital watermarks, which are essentially randomly-mappednoise, are
`
`intended to be inserted into samplesof digitized content in a manner such
`
`as to maximize encoding levels while minimizing any perceivable artifacts
`
`25
`
`that would indicate their presence or allow for removalbyfilters, and without
`destroying the content signal. Further, digital watermarks should be
`~
`inserted with processes that necessitate random searching in the content
`signal for watermarksif an attacker lacks the keys. Attempts to over-encode
`
`_
`
`noise into known watermarked signal locations to eliminate the information
`
`signal can be madedifficult or impossible without damaging the content
`
`30
`
`signal by relying on temporal encoding and randomization in the generation
`of keys during digital watermark insertion. As a result, although the
`
`11
`
`DISH-Blue Spike-602
`Exhibit 1006, Page 0741
`
`DISH-Blue Spike-602
`Exhibit 1006, Page 0741
`
`

`

`WO 98/02864
`
`PCT/US97/11455
`
`_watermark occupies only a small percentageof the signal, an attackeris
`forced to over-encode the entire signal at the highest encoding level, which
`creates audible artifacts.
`
`The present invention relates to methods for obtaining more optimal
`models to design watermark systemsthat are tamper-resistant given the
`number and breadth of existent digitized sample options with differing
`frequency and time components (audio, video, pictures, multimedia, virtual
`reality, etc.).
`To accomplish these goals, the present invention maintains the
`
`|
`
`10
`
`highest quality of a given content signal as it was mastered, with its
`
`watermarkssuitably hidden, taking into account usageofdigitalfilters and
`error correction presently concerned solely with the quality of content
`signals.
`
`Additionally, where a watermark location is determined in a random
`
`15
`
`or pseudo-random operation dependent on the creation of a pseudo-random
`key, as described in copendingrelated application entitled "Steganographic
`Method and Device" assigned to the present assignee, and unlike other
`forms of manipulating digitized sample streams to improve quality or encode
`known frequency ranges, an engineer seeking to provide high levels of
`
`20
`
`protection of copyrights, ownership, etc. is concerned with the size of a
`
`given key, the size of the watermark message and the mostsuitable area
`
`and method of insertion. Robustness is improved through highly redundant
`error correction codes andinterleaving, including codes known generally as
`q-ary Bose-Chaudhuri-Hocquenghem (BCH) codes, a subset of Hamming
`coding operations, and codes combining error correction and interleaving,
`
`25
`
`such as the Cross-Interleave Reed-Solomon Code. Using such codesto
`
`store watermark information in the signal increases the numberof changes
`
`required to obliterate a given watermark. Preprocessing the certificate by
`
`considering error correction and the introduction of random data to make
`
`30
`
`watermark discovery moredifficult, prior to watermarking, will heip
`determine sufficient key size. More generally, absolute key size can be
`
`12
`
`DISH-Blue Spike-602
`Exhibit 1006, Page 0742
`
`DISH-Blue Spike-602
`Exhibit 1006, Page 0742
`
`

`

`WO 98/02864
`
`-
`
` PCT/US97/11455
`
`. determined through preprocessing the message and the actualdigital
`watermark (a file including information regarding the copyright owner,
`
`publisher, or some other party in the chain of exchange of the content) to
`
`compute the absolute encodedbit stream andlimiting or adjusting the key
`size parameter to optimize the usage of key bits. The numberof bits in the
`primary key should match or exceed the numberof bits in the watermark
`message,to prevent redundant usageof key bits. Optimally, the number of
`bits in the primary key should exactly match the watermark size, since any
`
`extra bits are wasted computation.
`
`10
`
`15
`
`insertion of informational signals into content signals and ranges from
`applications that originate in spread spectrum techniques have been
`contemplated. More detailed discussions are included in copending related
`applications entitled "Steganographic Method and Device"and entitled
`“Method for Human Assisted Random Key Generation and Application for
`Digital Watermark System".
`.
`The following discussionillustrates some previously disclosed
`systems and their weaknesses.
`
`Typically, previously disclosed systems lack emphasis or
`
`implementation of any pseudo-random operations to determine the insertion
`
`20
`
`location, or map, of information signals relating to the watermarks. Instead,
`
`previous implementations provide “copy protect" flags in obvious, apparent
`
`and easily removable locations. Further, previous implementations do not
`
`emphasize the alteration of the content signal upon removal of the copy
`
`protection.
`
`25
`
`Standardsfor digital audio tape (DAT) prescribe insertion of data
`
`such as ISRC (Industry Standard Recording Codes)codes,title, and time in
`
`sub-code according to the Serial Copy Management System (SCMS)to
`
`prevent multiple copying of the content. One time copying is permitted,
`
`30
`
`however, and systems with AES3 connectors, which essentially override
`copy protection in the sub-code as implemented by SCMS,actually have no
`copylimitations. The present invention provides improvement overthis
`
`13
`
`DISH-Blue Spike-602
`Exhibit 1006, Page 0743
`
`DISH-Blue Spike-602
`Exhibit 1006, Page 0743
`
`

`

`WO 98/02864
`
`PCT/US97/11455
`
`implementation with regard to the ability of unscrupulous users to load
`digital data into unprotected systems, such general computing devices,that
`may store the audio clip in a generalizedfile format to be distributed over an
`on-line system for further duplication. The security of SCMS (Serial Copy
`
`Management System) can only exist as far as the support of similarly-
`
`oriented hardware and the lack of attempts by those skilled in the art to
`
`simply remove the subcode data in question.
`
`Previous methods seek to protect content, but shortcomings are
`
`apparent. U.S. Patent No. 5,319,735 to Preuss et al. discusses a spread
`spectrum method that would allow for over-encoding of the described, thus
`known, frequency range and is severely limited in the amount of data that
`
`can be encoded-- 4.3 8-bit symbols per second. However, with the Preuss
`
`et al. method, randomization attacks will not result in audible artifacts in the
`carrier signal, or degradation of the content as the information signalis in
`the subaudible range.
`It is important to note the difference in application
`
`between spread spectrum in military field use for protection of real-time ©
`
`radio signals, and encoding information into static audio files.
`
`In the
`
`protection of real-time communications, spread spectrum has anti-jam _
`features, since information is sent over several channelsat once.
`Therefore, in order to jam the signal, one has to jam all channels, including
`
`their own.
`
`In a static audio file, however, an attacker has practically
`
`unlimited time and processing power to randomize each sub-channel in the
`signaling band without penalty to themselves, so the anti-jam advantagesof
`spread spectrum do not extend to this domain.
`In a completely different implementation, U.S. Patent No. 5,379,345
`
`to Greenberg seeks enforcementof broadcast contracts using a spread
`
`spectrum modulatorto insert signals that are then confirmed by a spread
`spectrum-capable receiver to establish the timing and length that a given,
`marked advertisement is played. This information is measured against a
`
`10
`
`15
`
`20
`
`25
`
`30
`
`specific master of the underlying broadcast material. The Greenberg patent
`
`does not ensure that real-time downloads of copyrighted content can be
`
`14
`
`DISH-Blue Spike-602
`Exhibit 1006, Page 0744
`
`DISH-Blue Spike-602
`Exhibit 1006, Page 0744
`
`

`

`WO98/02864
`
`PCT/US97/11455
`
`marked with identification information unless all download accesspoints
`(PCs, modems,etc.}, and upload points for that matter, have spread
`spectrum devices for monitoring.
`Other methodsinclude techniques similar to those disclosed in
`related copending patent applications mentioned above by the present
`assignee, but lack the pseudo-random dimension of those patent
`applications for securing the location of the signals inserted into the content.
`One implementation conducted by Michae! Gerzon and Peter Craven, and
`described by Ken Pohimannin the 3rd edition of Principles of Digital Audio,
`illustrates a technology called "buried data technique,” but does not address
`the importance of randomnessin establishing the insertion locations of the
`
`informational signals in a given content signal, as no pseudo-random
`methodsare used as a basis forinsertion. The overriding concern of the
`"buried data techniques" appears to be to provide for a "known channel" to
`
`10
`
`15
`
`be inserted in such a mannerasto leavelittle or no perceivable artifacts in
`
`the content signal while prescribing the exact location of the information
`(i.e., replacing the least significant bits (LSB) in a given information signal).
`In Gerzon and Craven's example, a 20-bit signal gives way to 4-bits of LSBs
`for adding about 27 dB of noise to the music. Per channel data insertion
`reached 176.4 kilobits per second per channel, or 352.8 kbps with stereo
`
`channels. Similarly attempted data insertion by the present inventors using
`
`random data insertion yielded similar rates. The described techniques may
`be invaluable to manufacturers seeking to support improvements in audio,
`video and multimedia quality improvements. These include multiple audio
`channel support, surround sound, compressedinformation on dynamic
`
`range, or any combination of these and similar data to improve quality.
`Unfortunately, this doeslittle or nothing to protect the interests of copyright
`holders from unscrupulouspirates, as they attempt to create unmarked,
`
`20
`
`25
`
`perfect copies of copyrighted works.
`
`30
`
`The present invention also relates to copending patent applications
`
`is
`
`DISH-Blue Spike-602
`Exhibit 1006, Page 0745
`
`DISH-Blue Spike-602
`Exhibit 1006, Page 0745
`
`

`

`WO 98/02864
`
`PCT/US97/11455
`
`entitled “Staganographicc Method and Device”; “Method for Human-
`
`Assisted Random Key Generation and Application for Digital Watermark
`System’. and “Method for Stega-Cipher Protection of Computer Code” as
`mentioned above, specifically addressing the weaknessof inserting
`
`informational signals or digital watermarks

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket