摘要 |
In what is sometimes referred to as â traitor tracingâ , an arrangement is disclosed for tagging (figure 1), delivering and tracking (figure 6) copies of media files. One or more copies of a media file are digitally watermarked to uniquely identify the original recipient of a watermarked copy. Following delivery of watermarked copies of files to recipients, an online tracking search, preferably automated, is performed. This forensic search is carried out to detect watermarked copies of files and to determine the respective original recipient of a detected watermarked copy. Implicitly, it is the original recipient who must have made the detected copy available and the purpose of the invention is to help protect the rights of the originator against illegal file sharing.
|