Latent Content Identification for
  Delivery of Premium VOD
Fingerprinting and Watermarking Solutions to Identify, Manage, and
Monetize Content

November 2011




© 2010 Cisco and/or its affiliates. All rights reserved.             Cisco Confidential   1
• New Business Models such as Premium VOD (PVOD) and “TV Everywhere”
     (TVE) initiatives placing content earlier and on more devices.
• Content Piracy concerns remain high priority for content owners and service
     providers, especially in early release windows.
• Advertising platforms and ad-spend models rapidly evolving to web, mobile, etc.

• Second-screen initiatives developing for ancillary content running in parallel to
     main content distribution method.
• Content ownership requirements evolving to require solutions for:
           Identifying content ownership
           Managing the use of that content
           Monitoring where the content is and how it is being viewed (e.g. terrestrial, mobile,
           tablet)
           Gathering statistical consumption data to provide further analytics to the content owner
           and service provider.



© 2010 Cisco and/or its affiliates. All rights reserved.                                     Cisco Confidential   2
• Creates a signal and then INSERTS it invisibly into the content.

• Intrusive as it generates a new version of the original content.

• Designed for robustness to video format change and survive successive
      copies, detected by software.


                                                               +                       =




                Brightness                                 Contrast                  Blurring   Video compression
    Source: 2008 International Conference on Multimedia and Ubiquitous Engineering
                                                                                     Resizing   Frame rate change

© 2010 Cisco and/or its affiliates. All rights reserved.                                                   Cisco Confidential   3
• Unlike Watermarking, which creates a signal and then INSERTS it invisibly into the
content, fingerprinting DERIVES a signature of the content based on characteristics
of that content.
• Fingerprints are unique to that unit of content and independent from video format.
• Fingerprint matching can then be used to locate content, identify ownership, etc.



                                                                      010100101100001...




                                                                                                            Database

                                                                      010100101100001...     01010101...




                                                                      010100101100001...



                                                            Image        Unique            Creation of      Reference
        Original Video
                                                           Sampling   Characteristics      Fingerprint     Fingerprints


© 2010 Cisco and/or its affiliates. All rights reserved.                                                         Cisco Confidential   4
• Traditionally, visible overlays (AKA channel branding) to superimpose
      broadcast ownership logos.
• Visible overlays used to issue “take-down notices”, when content
      appearing on unauthorized websites.
• Watermarks and Fingerprints are complementary to effectively track how
      content is being viewed and to supply information on that usage.
• Effective methods to persist information about the content regardless of
      the format permutation or generation/modification.
• The presence of the fingerprint database ensures that the owner of the
      content can always be identified. Watermark can further identify
      versions, distribution channels or individual recipients.




© 2010 Cisco and/or its affiliates. All rights reserved.                 Cisco Confidential   5
• Each or both can be applied to the following activities. All of these areas
      are encountered in both the traditional broadcasting methodologies as
      well as the latest VOD, OTT and TV Everywhere initiatives:
• Media Management

• Media Tracking

• Media Monitoring
                                                           For content creation,
• Media Filtering                                          promotion, distribution,
• Media Measurement                                        VOD, airing and
                                                           TV Everywhere.
• Media Synchronization

• Media Triggering




© 2010 Cisco and/or its affiliates. All rights reserved.                    Cisco Confidential   6
Watermarking based                                     Fingerprinting based
               w/ asset identifier as watermark payload       Asset management
                    Identify distribution channels                Search for duplicates in a
                    or territories                                video library
                    Identify content versions                     Re-use of video sequences

               w/ source identifier and timestamp             Broadcast monitoring
                    Broadcast monitoring for                      Radio (music, commercials)
                    news, commercials, sport events               TV (episodic and movie catalog)
                    Audience measurement                          Song recognition for rights
                    Synchronization of apps                       collection or apps

               w/ serial numbers as watermark payload         Internet monitoring, filtering
                    Forensic tracking in                      and monetization
                    B2B workflows, D-cinema,                       Filtering upon ingest
                    Premium VOD, Pay TV                            Take down notices



© 2010 Cisco and/or its affiliates. All rights reserved.                                       Cisco Confidential   7
Aggregation, Core Access                                                                                             Nexus
                                                                                                                     7k
• Nexus 7K (DCB, FCoE, VoQ w/ Central Arbitration, Deep Buffers, Density)
• Editing (Nexus 7K is Avid approved)
 * Design guidelines


                                                                                                           NAS


Multi Tier Storage
• SAN Storage – Distributed (1,2,4,8Gbps)                                                                  SAN
• Cisco MDS 9k FC Switch
• NAS – 10Gbps, L2/L3 (NFS, CIFs,…)                                                   Other
                                                                                 (e.g. Avid ISIS)
                                                                                                                    MDS 9k
                                                                                                                   FC Switch

Unified Fabric = Wire Once                                  10G CNA                                                                    10G
                                                                                          10G
• UCS 6k, Nexus 5k, Nexus 2k                                          Ethernet                                                                Nexus
• Data Center Ethernet (DCE)                                                                           UCS 6k FI
                                                                                                                                              5k
• 10 Gbps (Lossless, Low Latency)
                                                                      Fiber
• Converged Network Adapters (CNA)                                    Channel
• Fiber Channel Over Ethernet (FCoE)                                                        DCE/FCoE         N2k FEX


UCS Compute
• Hi Density (B)
• Scalable Compute
(Core Procs, Mem, Net)
• Bare Metal Servers
• Virtual Servers
                                                                                          Cisco UCS-B               CiscoCisco Confidential
                                                                                                                          UCS-C                  8
 © 2010 Cisco and/or its affiliates. All rights reserved.
www.ciscoknowledgenetwork.com




© 2010 Cisco and/or its affiliates. All rights reserved.                             Cisco Confidential   9

Latent Content Identification for Delivery of Premium VOD

  • 1.
    Latent Content Identificationfor Delivery of Premium VOD Fingerprinting and Watermarking Solutions to Identify, Manage, and Monetize Content November 2011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1
  • 2.
    • New BusinessModels such as Premium VOD (PVOD) and “TV Everywhere” (TVE) initiatives placing content earlier and on more devices. • Content Piracy concerns remain high priority for content owners and service providers, especially in early release windows. • Advertising platforms and ad-spend models rapidly evolving to web, mobile, etc. • Second-screen initiatives developing for ancillary content running in parallel to main content distribution method. • Content ownership requirements evolving to require solutions for: Identifying content ownership Managing the use of that content Monitoring where the content is and how it is being viewed (e.g. terrestrial, mobile, tablet) Gathering statistical consumption data to provide further analytics to the content owner and service provider. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
  • 3.
    • Creates asignal and then INSERTS it invisibly into the content. • Intrusive as it generates a new version of the original content. • Designed for robustness to video format change and survive successive copies, detected by software. + = Brightness Contrast Blurring Video compression Source: 2008 International Conference on Multimedia and Ubiquitous Engineering Resizing Frame rate change © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
  • 4.
    • Unlike Watermarking,which creates a signal and then INSERTS it invisibly into the content, fingerprinting DERIVES a signature of the content based on characteristics of that content. • Fingerprints are unique to that unit of content and independent from video format. • Fingerprint matching can then be used to locate content, identify ownership, etc. 010100101100001... Database 010100101100001... 01010101... 010100101100001... Image Unique Creation of Reference Original Video Sampling Characteristics Fingerprint Fingerprints © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
  • 5.
    • Traditionally, visibleoverlays (AKA channel branding) to superimpose broadcast ownership logos. • Visible overlays used to issue “take-down notices”, when content appearing on unauthorized websites. • Watermarks and Fingerprints are complementary to effectively track how content is being viewed and to supply information on that usage. • Effective methods to persist information about the content regardless of the format permutation or generation/modification. • The presence of the fingerprint database ensures that the owner of the content can always be identified. Watermark can further identify versions, distribution channels or individual recipients. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
  • 6.
    • Each orboth can be applied to the following activities. All of these areas are encountered in both the traditional broadcasting methodologies as well as the latest VOD, OTT and TV Everywhere initiatives: • Media Management • Media Tracking • Media Monitoring For content creation, • Media Filtering promotion, distribution, • Media Measurement VOD, airing and TV Everywhere. • Media Synchronization • Media Triggering © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
  • 7.
    Watermarking based Fingerprinting based w/ asset identifier as watermark payload Asset management Identify distribution channels Search for duplicates in a or territories video library Identify content versions Re-use of video sequences w/ source identifier and timestamp Broadcast monitoring Broadcast monitoring for Radio (music, commercials) news, commercials, sport events TV (episodic and movie catalog) Audience measurement Song recognition for rights Synchronization of apps collection or apps w/ serial numbers as watermark payload Internet monitoring, filtering Forensic tracking in and monetization B2B workflows, D-cinema, Filtering upon ingest Premium VOD, Pay TV Take down notices © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
  • 8.
    Aggregation, Core Access Nexus 7k • Nexus 7K (DCB, FCoE, VoQ w/ Central Arbitration, Deep Buffers, Density) • Editing (Nexus 7K is Avid approved) * Design guidelines NAS Multi Tier Storage • SAN Storage – Distributed (1,2,4,8Gbps) SAN • Cisco MDS 9k FC Switch • NAS – 10Gbps, L2/L3 (NFS, CIFs,…) Other (e.g. Avid ISIS) MDS 9k FC Switch Unified Fabric = Wire Once 10G CNA 10G 10G • UCS 6k, Nexus 5k, Nexus 2k Ethernet Nexus • Data Center Ethernet (DCE) UCS 6k FI 5k • 10 Gbps (Lossless, Low Latency) Fiber • Converged Network Adapters (CNA) Channel • Fiber Channel Over Ethernet (FCoE) DCE/FCoE N2k FEX UCS Compute • Hi Density (B) • Scalable Compute (Core Procs, Mem, Net) • Bare Metal Servers • Virtual Servers Cisco UCS-B CiscoCisco Confidential UCS-C 8 © 2010 Cisco and/or its affiliates. All rights reserved.
  • 9.
    www.ciscoknowledgenetwork.com © 2010 Ciscoand/or its affiliates. All rights reserved. Cisco Confidential 9

Editor's Notes

  • #4 PM: simplified, changed ‘’negative’’ wording to focus on properties of a ‘’good’’ watermarking technology; only refer to imperceptible (no visible overlays); focus on video (not audio); changed ‘’still image’’ challenges to ‘’video’’ challenges; changed the watermark pattern from ‘’JP2K multi-resolution encoding’’ to something more ‘’neutral’’ wrt watermarking method.
  • #6 PM: do not confuse the audience with (semi transparent) overlays such as channel branding. Present Watermark and Fingerprint as complementary.