Digital video fingerprinting explained

Video fingerprinting or video hashing are a class of dimension reduction techniques[1] in which a system identifies, extracts, and then summarizes characteristic components of a video as a unique or a set of multiple perceptual hashes or fingerprints, enabling that video to be uniquely identified. This technology has proven to be effective at searching and comparing video files.[2] [3]

History and process

Video fingerprinting was first developed into practical use by Philips in 2002.[4]

Different methods exist for video fingerprinting. Van Oostveen relied on changes in patterns of image intensity over successive video frames. This makes the video fingerprinting robust against limited changes in color - or the transformation of color into gray scale of the original video. Others have tried to reduce the size of the fingerprint by only looking around shot changes.[5]

Video fingerprinting does not rely on any addition to the video stream. A video fingerprint cannot be removed, because it is not added. In addition, a reference video fingerprint can be created at any point, from any copy of the video.[6]

Compared to digital watermarking

Video fingerprinting should not be confused with digital watermarking, which relies on inserting identifying features into the content and therefore changing the content. Some watermarks can be inserted in a way that they are imperceptible to a viewer. A robust watermark can be difficult to detect and remove, but the removal of invisible watermarks is a significant weakness.

Since watermarks must be inserted into the video, they only identify copies of the particular video made after that point in time. For example, if a watermark is inserted at broadcast it cannot be used to identify copies of the video made before the broadcast.

Watermarks offer some advantages over fingerprinting. A unique watermark can be added to the content at any stage in the distribution process, and multiple independent watermarks can be inserted into the same video content. This can be particularly useful in tracing the history of a copy of a video. Detecting watermarks in a video can indicate the source of an unauthorized copy.

While video fingerprinting systems must search a potentially large database of reference fingerprints, a watermark detection system only has to do the computation to detect the watermark. This computation can be significant, and when multiple watermark keys must be tested, then watermarking can fail to scale to the volumes required by commercial applications such as user generated video services.

Applications

Rights management and distribution tracking

Video fingerprinting is of interest in the digital rights management (DRM) area, particularly regarding the distribution of unauthorized content on the Internet. Video fingerprinting systems enable content providers (e.g., film studios) or publishers (e.g., user-generated content (UGC) sites) to determine if any of the publisher's files contain content registered with the fingerprint service. If registered content is detected, the publisher can take the appropriate action – remove it from the site, monetize it, add correct attribution, etc.

Video fingerprinting may be used for broadcast monitoring (e.g., advertisement monitoring, news monitoring) and general media monitoring. Broadcast monitoring solutions can inform content providers and content owners with playlists of when and where their video content has been used. A typical application is described in this Video Fingerprinting Use Case for Television Productions and Broadcasters.[7]

From a content provider's point of view, both video and audio fingerprinting need to be used in most applications.[8] Consider the online publication of "mash-ups". Mash-ups can consist of content from several sources that are compiled together and set to a unique audio track. Since the audio track is different from the original version, the copyrighted material in these mash-ups would go undetected using only audio fingerprinting techniques. In other cases, mash-ups consist of the soundtrack from a commercial video source, like a movie, used with a different video stream. In this case, a video fingerprint would not match, but an audio fingerprint would. When the audio and video streams are not from the same masterwork, the question of fair use may arise.

This discrepancy has real applications in the global online community in terms of film distribution. Films shown in countries other than their country of origin are often dubbed into other languages. This change in audio renders the films virtually unrecognizable by audio fingerprinting technologies unless copies of all known versions have been fingerprinted. Employing video fingerprinting, however, enables the content owner to fingerprint just once and have each subsequent version remain recognizable. If the customer wishes to know which language soundtrack is present on a particular video, then an audio fingerprint must be used.

Another use is for companies to track the leak of confidential recordings or videos, or for celebrities to track the presence on the Internet of unauthorized videos (for instance, videos of themselves taken by amateurs using a camcorder or a mobile phone).

Interactive media

Video fingerprinting applied to smart TV is enabling an emerging category of interactive television applications. Television devices integrated with real-time fingerprinting software can automatically recognize the video content on-screen in order to enable interactive features and applications on top of the programming. Entrepreneur Mark Cuban has made investments to leverage this technology to create interactive features for his cable networks HDNet and its successor AXS.[9]

Video fingerprints can also be used to create content-aware video advertising. As one implementation, if a video service provider distributes content that contains a nationally broadcast TV commercial, a localized overlay of text/graphics may be performed on the national commercial. This way, the national commercial will have a local overlay of information specific to that commercial. For example, if the national commercial contains a 15-second spot for a Ford Explorer SUV, through the fingerprint technology, local operators may put an overlay of local dealership information – phone number, promotion, etc. – over the 15-second commercial, creating a localized commercial for the SUV that appears to be targeted only at the local audience.

Criminal investigation

Video fingerprinting is also used by authorities to track the distribution of illegal content such as happy slapping, terrorist, and child sexual abuse related videos.

In 2008 the Dutch company Ziuz, together with the Dutch Police, TNO and University of Amsterdam developed video fingerprinting for detecting child sexual abuse related videos.[10] [11]

In April 2014 the British company Friend MTS Ltd. donated its video fingerprinting technology (known as F1) to the International Centre for Missing & Exploited Children (ICMEC) to help increase the efficiency of child pornography investigations, and to halt the continued sharing of similar files over the internet.[12] [13] ICMEC distributes the technology to law enforcement agencies, software providers, and online service providers to hinder the spread of such material.[14] [15]

See also

Notes and References

  1. Book: Wu . Gengshen . Liu . Li . Guo . Yuchen . Ding . Guiguang . Han . Jungong . Shen . Jialie . Shao . Ling . Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence . Unsupervised Deep Video Hashing with Balanced Rotation . August 2017 . https://eprints.lancs.ac.uk/id/eprint/87898/1/ijcai2017_submission_gengshen.pdf . en . 3076–3082 . 10.24963/ijcai.2017/429 . 9780999241103 . 9 November 2022.
  2. Liong . Venice Erin . Lu . Jiwen . Tan . Yap-Peng . Zhou . Jie . Deep Video Hashing . IEEE Transactions on Multimedia . June 2017 . 19 . +6 . 1209–1219 . 10.1109/TMM.2016.2645404 . 4666560 . 9 November 2022 . en.
  3. 1802.02305. 10.1109/TIP.2018.2814344. Self-Supervised Video Hashing with Hierarchical Binary Auto-Encoder. 2018. Song. Jingkuan. Zhang. Hanwang. Li. Xiangpeng. Gao. Lianli. Wang. Meng. Hong. Richang. IEEE Transactions on Image Processing. 27. 7. 3210–3221. 29641401. 2018ITIP...27.3210S. 3633912.
  4. Oostveen, J., Kalker, T., & Haitsma, J. (2002, March). Feature extraction and a database strategy for video fingerprinting. In International Conference on Advances in Visual Information Systems (pp. 117-128). Springer, Berlin, Heidelberg.
  5. Van Rest, J.H.C. (2002), Video Indexing and retrieval Using Signatures, Master Thesis
  6. Web site: Content Control: Digital Watermarking and Fingerprinting . 2017-07-08 . 2014-11-14 . https://web.archive.org/web/20141114005821/https://www.digimarc.com/docs/default-source/technology-resources/white-papers/rhozet_wp_fingerprinting_watermarking.pdf . dead .
  7. Web site: Video Fingerprinting Technology for Television Productions and Broadcaster. ivitec. August 30, 2017.
  8. Web site: Philips video fingerprints to work side by side with Gracenote's audio. 2021-10-16. Rethink. en.
  9. http://news.cnet.com/8301-1023_3-57425738-93/mark-cuban-flings-funding-at-flingo Mark Cuban flings funding at Flingo - CNET
  10. Eendebak, P., Kraaij, W., Raaijmakers, S., Ranguelova, E., de Rooij, O., Thean, A., & Worring, M. (2008). Visual tools for assisting child pornography investigators. TNO Science and Industry, Delft, University of Amsterdam, the Netherlands.
  11. John Schavemaker, Peter Jan Doets, Werner Bailer, Harald Stiegler, Felix Lee, Helmut Neuschmied, Wessel Kraaij, Paul Brandt, Pieter Eendebak, Elena Ranguelova, and Andy Thean. http://pietereendebak.nl/files/schavemaker-2010-vdFP.pdf, 2010.
  12. Child abuse-tracking tech donated to the world. Wired UK. April 30, 2014. Liat Clark.
  13. Web site: British Company Donates Tech to Fight Child Porn. Jeff Elder. April 30, 2014. The Wall Street Journal.
  14. Web site: New Video Fingerprinting Technology Created to Remove Child Pornography Online. MarketWatch. April 30, 2014.
  15. Web site: Fingerprints Used to Track Abuse Images . Sky News . May 5, 2014 . https://web.archive.org/web/20140508231533/http://www.skynews.com.au/news/tech/2014/05/05/fingerprints-used-to-track-abuse-images.html . May 8, 2014.