SlideShare a Scribd company logo
1 of 8
Download to read offline
Copyright & Technology: London 2012



Alex Terpstra, CEO Civolution
19 June 2012
Creating a content-aware digital media ecosystem

  In today’s and tomorrow’s fragmented and increasingly virtual digital media
  world, effective monetization of content relies on a content-aware eco
  system

  Today, major stakeholders                                                                     Advertisers
  use Content Identification




                                                                         Broadcasters, aggregators
                                              Content creators, owners




                                                                                                     Operators, distributors

                                                                                                                               Device manufacturers

                                                                                                                                                      Application providers
  solutions divided over three
  main segments:                      B2B                                                                                                                                     B2C
         Media Protection
         Media Intelligence
         Media Interaction
Content Identification Technologies (1)
Watermarking
   Embedding a unique identifier in audio and/or video, imperceptible to the human ear and eye,
   but can be detected by special software tools.
   Watermarks make each content copy unique when embedding unique data, allowing to track
   unique content copies or the source of (illegal) content copies.




                              Insertion of unique ID tag to
                               individual pieces of content
                                                              Distribution
   Media content
                                                                                 Usage
                                                                             Re-distribution




                                          WM

           Unique watermark                                                     detection
                                        Metadata
Content Identification Technologies (2)
Fingerprinting
   Identifying content by extracting unique features from audio and/or video, which are compared
   with features previously stored in a database
   Fingerprints give content assets and copies thereof a unique identity, allowing efficient high
   volume and real-time identification of content assets and copies thereof.




    Media content                   Distribution                                           Distributed
                                                                                          media content




        Asset            Metadata                                                    Identification of fingerprints
     registration        database                  Comparison and matching             Nbr. 6538964212556….
                                              of fingerprints against fingerprints
                                                    stored into the database
Media Protection – application examples

Forensic watermarking

   Pre-Release: Protects post-production, screeners, distribution and content repurposing.
   Digital Cinema: Watermarking to make in-theatre camcorder copies traceable.
   Pay TV: Consumer-level watermarking to enable Premium Video on Demand.
   Online Media Delivery: Transactional watermarking for online B2B and B2C applications.

Copy protection
   Watermarking-based ‘Play Control’ function on Blu-Ray disk players.

Web search/filtering
   Content Identification to filter videos from being uploaded to User Generated Content websites.
   Content Identification to identify illegal use of content on websites to trigger Takedown notices or
   Graduated Response actions.
Media Intelligence – application examples

Media monitoring & reporting

   TV monitoring: Monitoring broadcast TV content to enable content owners to determine precisely
   when, where and how their content is being aired around the world
   Radio monitoring: Music monitoring on radio stations for reporting to rights collection agencies
   Internet monitoring: Automated monitoring of Internet distribution of (live) media content.



Audience measurement
   Fingerprinting (matching) allows for automated measurement of content consumption.
   Watermarking (coding) allows for more accurate measurement including source and distribution
   path.
   Using audio, both for TV and Radio measurement.
Media Interaction – application examples

Automatic Content Recognition (ACR)

   Music ID: Identify music through a smartphone app taking a sample and match its fingerprint.
   Content discovery: Trigger user experiences and other content through content identification
   2nd Screen: Synchronize 2nd screens to TV or radio content, live, on-demand or recorded.
   Smart TV: Make connected TV’s content-aware and enable new monetization models.
   Smart services: Drive content-triggered functionality on connected devices, such as synced ads.
Solutions for content identification
        and value creation




         www.civolution.com
       Twitter: @Civolution @ADTerpstra

More Related Content

Similar to Copyright and Technology London 2012: Content Identification - Alex Terpstra, Civolution

To DRM or not to DRM?
To DRM or not to DRM?To DRM or not to DRM?
To DRM or not to DRM?Carlos Serrao
 
TheTrendWatch #05
TheTrendWatch #05TheTrendWatch #05
TheTrendWatch #05damoncb
 
EnergyMarketPrice presentation
EnergyMarketPrice presentationEnergyMarketPrice presentation
EnergyMarketPrice presentationEnergyMarketPrice
 
EnergyMarketPrice presentation
EnergyMarketPrice presentationEnergyMarketPrice presentation
EnergyMarketPrice presentationEnergyMarketPrice
 
Cloud based multimedia content protection system
Cloud based multimedia content protection systemCloud based multimedia content protection system
Cloud based multimedia content protection systemjpstudcorner
 
Using Qt to Build Mobile Applications Featuring Social Networking and Monetiz...
Using Qt to Build Mobile Applications Featuring Social Networking and Monetiz...Using Qt to Build Mobile Applications Featuring Social Networking and Monetiz...
Using Qt to Build Mobile Applications Featuring Social Networking and Monetiz...account inactive
 
Productbrief SDL Media Manager with SDL Tridion
Productbrief SDL Media Manager with SDL TridionProductbrief SDL Media Manager with SDL Tridion
Productbrief SDL Media Manager with SDL Tridionwmaagdenberg
 
Digital rights management an essential feature in the digital era
Digital rights management an essential feature in the digital eraDigital rights management an essential feature in the digital era
Digital rights management an essential feature in the digital eraKishor Satpathy
 
Cassandra framework a service oriented distributed multimedia
Cassandra framework  a service oriented distributed multimediaCassandra framework  a service oriented distributed multimedia
Cassandra framework a service oriented distributed multimediaJoão Gabriel Lima
 
Towards Socially Intelligent Media Computing
Towards Socially Intelligent Media ComputingTowards Socially Intelligent Media Computing
Towards Socially Intelligent Media ComputingPaolo Nesi
 
Bertini - Automatic Metadata Extraction in VidiVideo & im3i @EUscreen Mykonos
Bertini - Automatic Metadata Extraction in VidiVideo & im3i @EUscreen MykonosBertini - Automatic Metadata Extraction in VidiVideo & im3i @EUscreen Mykonos
Bertini - Automatic Metadata Extraction in VidiVideo & im3i @EUscreen MykonosEUscreen
 
Corporate tv
Corporate tvCorporate tv
Corporate tvInteract
 
A Survey on Multimedia Content Protection Mechanisms
A Survey on Multimedia Content Protection Mechanisms A Survey on Multimedia Content Protection Mechanisms
A Survey on Multimedia Content Protection Mechanisms IJECEIAES
 
How Open Data Can Enhance Interactive Television
How Open Data Can Enhance Interactive TelevisionHow Open Data Can Enhance Interactive Television
How Open Data Can Enhance Interactive TelevisionLinkedTV
 
Social Media in a Corporate Context 2010 - Luke Aviet, GoViral
Social Media in a Corporate Context 2010 - Luke Aviet, GoViralSocial Media in a Corporate Context 2010 - Luke Aviet, GoViral
Social Media in a Corporate Context 2010 - Luke Aviet, GoViralCommunicate Magazine
 
Memahami etimologi multimedia 1 english
Memahami etimologi multimedia  1 englishMemahami etimologi multimedia  1 english
Memahami etimologi multimedia 1 englishEko Supriyadi
 

Similar to Copyright and Technology London 2012: Content Identification - Alex Terpstra, Civolution (20)

To DRM or not to DRM?
To DRM or not to DRM?To DRM or not to DRM?
To DRM or not to DRM?
 
TheTrendWatch #05
TheTrendWatch #05TheTrendWatch #05
TheTrendWatch #05
 
EnergyMarketPrice presentation
EnergyMarketPrice presentationEnergyMarketPrice presentation
EnergyMarketPrice presentation
 
EnergyMarketPrice presentation
EnergyMarketPrice presentationEnergyMarketPrice presentation
EnergyMarketPrice presentation
 
Cloud based multimedia content protection system
Cloud based multimedia content protection systemCloud based multimedia content protection system
Cloud based multimedia content protection system
 
Using Qt to Build Mobile Applications Featuring Social Networking and Monetiz...
Using Qt to Build Mobile Applications Featuring Social Networking and Monetiz...Using Qt to Build Mobile Applications Featuring Social Networking and Monetiz...
Using Qt to Build Mobile Applications Featuring Social Networking and Monetiz...
 
Productbrief SDL Media Manager with SDL Tridion
Productbrief SDL Media Manager with SDL TridionProductbrief SDL Media Manager with SDL Tridion
Productbrief SDL Media Manager with SDL Tridion
 
Digital rights management an essential feature in the digital era
Digital rights management an essential feature in the digital eraDigital rights management an essential feature in the digital era
Digital rights management an essential feature in the digital era
 
Cassandra framework a service oriented distributed multimedia
Cassandra framework  a service oriented distributed multimediaCassandra framework  a service oriented distributed multimedia
Cassandra framework a service oriented distributed multimedia
 
Towards Socially Intelligent Media Computing
Towards Socially Intelligent Media ComputingTowards Socially Intelligent Media Computing
Towards Socially Intelligent Media Computing
 
Web 2.0 forlæsning
Web 2.0 forlæsningWeb 2.0 forlæsning
Web 2.0 forlæsning
 
Web 2.0 forlæsning
Web 2.0 forlæsningWeb 2.0 forlæsning
Web 2.0 forlæsning
 
Bertini - Automatic Metadata Extraction in VidiVideo & im3i @EUscreen Mykonos
Bertini - Automatic Metadata Extraction in VidiVideo & im3i @EUscreen MykonosBertini - Automatic Metadata Extraction in VidiVideo & im3i @EUscreen Mykonos
Bertini - Automatic Metadata Extraction in VidiVideo & im3i @EUscreen Mykonos
 
Media Pick
Media PickMedia Pick
Media Pick
 
Corporate tv
Corporate tvCorporate tv
Corporate tv
 
A Survey on Multimedia Content Protection Mechanisms
A Survey on Multimedia Content Protection Mechanisms A Survey on Multimedia Content Protection Mechanisms
A Survey on Multimedia Content Protection Mechanisms
 
How Open Data Can Enhance Interactive Television
How Open Data Can Enhance Interactive TelevisionHow Open Data Can Enhance Interactive Television
How Open Data Can Enhance Interactive Television
 
Social Media in a Corporate Context 2010 - Luke Aviet, GoViral
Social Media in a Corporate Context 2010 - Luke Aviet, GoViralSocial Media in a Corporate Context 2010 - Luke Aviet, GoViral
Social Media in a Corporate Context 2010 - Luke Aviet, GoViral
 
0 intro to multimegia
0 intro to multimegia0 intro to multimegia
0 intro to multimegia
 
Memahami etimologi multimedia 1 english
Memahami etimologi multimedia  1 englishMemahami etimologi multimedia  1 english
Memahami etimologi multimedia 1 english
 

More from GiantSteps Media Technology Strategies

Is the CJEU likely to extend the UsedSoft ruling to works other than software?
Is the CJEU likely to extend the UsedSoft ruling to works other than software?Is the CJEU likely to extend the UsedSoft ruling to works other than software?
Is the CJEU likely to extend the UsedSoft ruling to works other than software?GiantSteps Media Technology Strategies
 
Copyright and Technology Conference Observation protocol & impact analysis
Copyright and Technology Conference Observation protocol & impact analysisCopyright and Technology Conference Observation protocol & impact analysis
Copyright and Technology Conference Observation protocol & impact analysisGiantSteps Media Technology Strategies
 
The Carrot or the Stick: Opportunities and Challenges in Rights Technologies
The Carrot or the Stick: Opportunities and Challenges in Rights TechnologiesThe Carrot or the Stick: Opportunities and Challenges in Rights Technologies
The Carrot or the Stick: Opportunities and Challenges in Rights TechnologiesGiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...GiantSteps Media Technology Strategies
 
International Perspectives on Digital Copyright Arthur Hoyle, Univ of Canberra
International Perspectives on Digital Copyright   Arthur Hoyle, Univ of CanberraInternational Perspectives on Digital Copyright   Arthur Hoyle, Univ of Canberra
International Perspectives on Digital Copyright Arthur Hoyle, Univ of CanberraGiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...
Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...
Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...GiantSteps Media Technology Strategies
 
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...GiantSteps Media Technology Strategies
 

More from GiantSteps Media Technology Strategies (20)

Enabling Efficient and Fair Markets for Digital Content
Enabling Efficient and Fair Markets for Digital ContentEnabling Efficient and Fair Markets for Digital Content
Enabling Efficient and Fair Markets for Digital Content
 
Digital Disruption of the Book Publishing Industry
Digital Disruption of the Book Publishing IndustryDigital Disruption of the Book Publishing Industry
Digital Disruption of the Book Publishing Industry
 
Is the CJEU likely to extend the UsedSoft ruling to works other than software?
Is the CJEU likely to extend the UsedSoft ruling to works other than software?Is the CJEU likely to extend the UsedSoft ruling to works other than software?
Is the CJEU likely to extend the UsedSoft ruling to works other than software?
 
Copyright and Technology Conference Observation protocol & impact analysis
Copyright and Technology Conference Observation protocol & impact analysisCopyright and Technology Conference Observation protocol & impact analysis
Copyright and Technology Conference Observation protocol & impact analysis
 
The Carrot or the Stick: Opportunities and Challenges in Rights Technologies
The Carrot or the Stick: Opportunities and Challenges in Rights TechnologiesThe Carrot or the Stick: Opportunities and Challenges in Rights Technologies
The Carrot or the Stick: Opportunities and Challenges in Rights Technologies
 
The landscape of content protection technology
The landscape of content protection technologyThe landscape of content protection technology
The landscape of content protection technology
 
You bought it, but do you own it?
You bought it, but do you own it?You bought it, but do you own it?
You bought it, but do you own it?
 
Standards success factors
Standards success factorsStandards success factors
Standards success factors
 
Rights Technologies for E-Publishing
Rights Technologies for E-PublishingRights Technologies for E-Publishing
Rights Technologies for E-Publishing
 
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
Copyright and Technology London 2012: Multiplatform Video Security - Susanne ...
 
International Perspectives on Digital Copyright Arthur Hoyle, Univ of Canberra
International Perspectives on Digital Copyright   Arthur Hoyle, Univ of CanberraInternational Perspectives on Digital Copyright   Arthur Hoyle, Univ of Canberra
International Perspectives on Digital Copyright Arthur Hoyle, Univ of Canberra
 
Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...
Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...
Copyright and Technology London 2012: Opening Remarks - Bill Rosenblatt, Gian...
 
Copyright and Technology London 2012: Eric Walter, Hadopi
Copyright and Technology London 2012: Eric Walter, HadopiCopyright and Technology London 2012: Eric Walter, Hadopi
Copyright and Technology London 2012: Eric Walter, Hadopi
 
Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...Copyright and Technology London 2012: Content Identification - Werner Strydom...
Copyright and Technology London 2012: Content Identification - Werner Strydom...
 
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
Copyright and Technology London 2012: Rights Registries - Nicholas Bentley, C...
 
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
Copyright and Technology London 2012: Multiplatform Video Security - Jude Ume...
 
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
Copyright and Technology London 2012: Rights Registries - Paul Jessop, County...
 
Copyright and Technology 2011: Ron Wheeler Presentation
Copyright and Technology 2011: Ron Wheeler PresentationCopyright and Technology 2011: Ron Wheeler Presentation
Copyright and Technology 2011: Ron Wheeler Presentation
 
Copyright and Technology 2011: Ron Wheeler Presentation
Copyright and Technology 2011: Ron Wheeler PresentationCopyright and Technology 2011: Ron Wheeler Presentation
Copyright and Technology 2011: Ron Wheeler Presentation
 
Copyright and Technology 2011: Hillel Parness Presentation
Copyright and Technology 2011: Hillel Parness PresentationCopyright and Technology 2011: Hillel Parness Presentation
Copyright and Technology 2011: Hillel Parness Presentation
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Recently uploaded (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Copyright and Technology London 2012: Content Identification - Alex Terpstra, Civolution

  • 1. Copyright & Technology: London 2012 Alex Terpstra, CEO Civolution 19 June 2012
  • 2. Creating a content-aware digital media ecosystem In today’s and tomorrow’s fragmented and increasingly virtual digital media world, effective monetization of content relies on a content-aware eco system Today, major stakeholders Advertisers use Content Identification Broadcasters, aggregators Content creators, owners Operators, distributors Device manufacturers Application providers solutions divided over three main segments: B2B B2C Media Protection Media Intelligence Media Interaction
  • 3. Content Identification Technologies (1) Watermarking Embedding a unique identifier in audio and/or video, imperceptible to the human ear and eye, but can be detected by special software tools. Watermarks make each content copy unique when embedding unique data, allowing to track unique content copies or the source of (illegal) content copies. Insertion of unique ID tag to individual pieces of content Distribution Media content Usage Re-distribution WM Unique watermark detection Metadata
  • 4. Content Identification Technologies (2) Fingerprinting Identifying content by extracting unique features from audio and/or video, which are compared with features previously stored in a database Fingerprints give content assets and copies thereof a unique identity, allowing efficient high volume and real-time identification of content assets and copies thereof. Media content Distribution Distributed media content Asset Metadata Identification of fingerprints registration database Comparison and matching Nbr. 6538964212556…. of fingerprints against fingerprints stored into the database
  • 5. Media Protection – application examples Forensic watermarking Pre-Release: Protects post-production, screeners, distribution and content repurposing. Digital Cinema: Watermarking to make in-theatre camcorder copies traceable. Pay TV: Consumer-level watermarking to enable Premium Video on Demand. Online Media Delivery: Transactional watermarking for online B2B and B2C applications. Copy protection Watermarking-based ‘Play Control’ function on Blu-Ray disk players. Web search/filtering Content Identification to filter videos from being uploaded to User Generated Content websites. Content Identification to identify illegal use of content on websites to trigger Takedown notices or Graduated Response actions.
  • 6. Media Intelligence – application examples Media monitoring & reporting TV monitoring: Monitoring broadcast TV content to enable content owners to determine precisely when, where and how their content is being aired around the world Radio monitoring: Music monitoring on radio stations for reporting to rights collection agencies Internet monitoring: Automated monitoring of Internet distribution of (live) media content. Audience measurement Fingerprinting (matching) allows for automated measurement of content consumption. Watermarking (coding) allows for more accurate measurement including source and distribution path. Using audio, both for TV and Radio measurement.
  • 7. Media Interaction – application examples Automatic Content Recognition (ACR) Music ID: Identify music through a smartphone app taking a sample and match its fingerprint. Content discovery: Trigger user experiences and other content through content identification 2nd Screen: Synchronize 2nd screens to TV or radio content, live, on-demand or recorded. Smart TV: Make connected TV’s content-aware and enable new monetization models. Smart services: Drive content-triggered functionality on connected devices, such as synced ads.
  • 8. Solutions for content identification and value creation www.civolution.com Twitter: @Civolution @ADTerpstra