image
image
user-login
Patent search/

Anti-Piracy Screen Recording System for Movie Piracy Reduction using Steganography Techniques

search

Patent Search in India

  • tick

    Extensive patent search conducted by a registered patent agent

  • tick

    Patent search done by experts in under 48hrs

₹999

₹399

Talk to expert

Anti-Piracy Screen Recording System for Movie Piracy Reduction using Steganography Techniques

ORDINARY APPLICATION

Published

date

Filed on 22 November 2024

Abstract

The innovation introduces a Steganography-based Anti-piracy Recording System for Movie Piracy Reduction. This technology is utilized to conceal information, maintain uniqueness, and track information within the video stream. This method is used to identify unauthorized users who are capturing and sharing screens in real time. Users cannot discover the secret data because it is directly encoded into the video at different places. In the event that content is pirated, the system can retrieve concealed data to locate the pirated material's source and take the necessary action. This method offers a sophisticated and covert way to prevent digital video data piracy

Patent Information

Application ID202441090884
Invention FieldELECTRONICS
Date of Application22/11/2024
Publication Number48/2024

Inventors

NameAddressCountryNationality
Ramya KDepartment of Artificial Intelligence and Machine Learning, Dayananda Sagar College of Engineering, Bangalore-560111IndiaIndia
Anupama V PDepartment of Artificial Intelligence and Machine Learning, Dayananda Sagar College of Engineering, Bangalore-560111IndiaIndia

Applicants

NameAddressCountryNationality
Dayananda Sagar College of EngineeringShavige Malleshwara Hills, Kumaraswamy Layout, BangaloreIndiaIndia

Specification

Description:FIELD OF INVENTION
[001] The domains of digital content protection and Anti-piracy are solidly supported by innovation. Concentrating in particular on Steganography as a technique for encoding data into video material enabling real-time screen capture or monitoring and detection of unauthorized distribution to users.
BACKGROUND AND PRIOR ART
[002] With the growth of software for capturing the screen in real time and the illegal redistribution of content online, Movie Piracy is becoming a daily loss for the entertainment industry and primarily for the producers. Although the conventional approach of water marking procedures used for movie leaks can be prevented or bypassed. The Steganography technique, which conceals information in digital material, provides additional security features that allow unauthorised users to be tracked down without compromising user experience. This idea uses Steganography in a dynamic and adaptable way to efficiently trace and prevent piracy, improving upon previous methods.
SUMMARY OF THE INVENTION
[003] The purpose of the screen recording system is to use Steganography techniques to prevent Movie Piracy. This technology, which doesn't compromise video quality, inserts discrete, one-of-a-kind identifiers at various frames into the video material. The user's IP address, credentials, timestamp, and device ID are examples of hidden data. Whereby the movie distributor is able to track down the source of any content that has been pirated. Digital distribution methods or streaming platforms can incorporate this. Screen recordings allow for the extraction of secret data from pirated content, identifying the source of the illegal activity and providing information for potential legal action or countermeasures.
BRIEF DESCRIPTIONS OF DRAWINGS:
[004] Fig 1: Represents the flowchart of Anti-piracy Screen recording system. The steps involved in an anti-piracy screen recording system's sequence are detailed in the process flow diagram.
[005] Fig. 2: Shows the Anti-piracy system architecture System for Screen Recording

DETAILED DESCRIPTION OF THE INVENTION
[006] The Resistance against Piracy The state-of-the-art Screen Recording System incorporates steganography techniques to detect and trace infringement by embedding secret data into video streams.
[007] Steganography Embedding Module: This module embeds hidden data into the video content using sophisticated algorithms such as Spread Spectrum Steganography, Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT), Patch-Based Image Steganography (PBIS), and Least Significant Bit (LSB) Substitution. The content being viewed and the user's activities affect the hidden data.
[008] Screen Recording Detection Module: This module continuously scans for screen recording attempts and uses frame monitoring techniques to identify behavioral characteristics linked to recording software. Once discovered, the system extracts hidden data from the recorded content.
[009] Component for Piracy Tracking and Data Extraction: After identifying a recording, the system examines the recorded video and extracts the concealed data to identify the source of the pirated content. This is a quick technique that doesn't need human assistance.
[010] Countermeasures: The system keeps an eye out for unusual activity, such as the use of unapproved screen capture software that instantly overlays a visible watermark on the video feed. Initially, the system embeds the hidden data subtly using Least Significant Bit (LSB) or Discrete Cosine Transform (DCT) algorithms. The same strategy might increase the trademark's visibility and make it more noticeable and unavoidable when piracy is detected. [014] A feedstock-catalyst ratio of 10:1 is optimized for higher level of performance. The gases condense into a liquid phase as oil which is then filtered, separated and tested for characteristics.
[011] This system uses steganography techniques to detect unauthorised recordings and hides traceable and hidden information from movies. Here is a thorough breakdown of every step:
[012] Producing the video content that will be distributed is the first stage. The video is now prepared for users to stream, download, or play. However, the system prepares it for an anti-piracy protection before distributing it to consumers. Further necessary data, including the user ID and session ID, are saved to be subsequently incorporated into the video material.
[013] Applying steganography techniques to obscure data in real time: In this stage, data that may be traced back to the original source is hidden within films.
[014] Real-time embedding is the process of enclosing hidden data, including the session ID and user ID, directly into the video at many intervals during distribution or streaming. To guarantee that the user receives a uniquely tagged version of the content, this is done in real time.
[015] Hidden data: The information can be included into the video in a variety of ways, for as by subtly altering its color or frequency of the pixels, rendering it harmless to viewers but still detectable.
[016] Identifying and Tracking Unauthorized Screen Recording: This is an increasingly common method used in piracy, where the system continuously monitors if someone is accessing data without authorization. This approach entails keeping an eye out for and identifying any unauthorized users who are screen recording.
[017] Monitoring tools: The system has access to a number of detection techniques, such as monitoring screen recordings for questionable activity or identifying odd trends that would indicate content has been illegally downloaded.
[018] Action: If the content provider discovers illicit screen recording, they have the right to block, stop or even cease streaming the video.
[019] Extraction of secret data from pirated content to determine the source: A movie is considered pirated if it is streamed online by someone who is not authorised after a screen capture is made. Steganography is a technology that allows for the extraction of hidden data from videos. As a result, the content provider can identify the original source.
[020] Data Extraction: The technology may extract the user-specific data of the original unauthorized user through analysis of the pirated video.
[021] Source Identification: After extracting the secret data, the system is able to identify the individual who recorded and distributed the unauthorised copy can result in measures like a suspension, legal action, or a further investigation.
[022] When streaming or playing content, the Steganography Embedding approach encrypts concealed data into video frames. The viewer cannot see this data, but the system is able to retrieve it. Using algorithms to examine system behaviour, including system resources, the Screen Recording Detection Module may identify whether a screen recording tool is being used.
[023] When the data extraction module detects a recording attempt, it extracts the secret Steganography data from the video that has been recorded. The person or device in charge of the piracy is identified by this data.
[024] When piracy is proven, the Countermeasures module 1 moves quickly to stop it. It may issue alerts, cut off the stream, or gather information before taking further action.
[025] How steganography is used to end a session: Real-time detection: The Screen Recording system of the system keeps an eye on the user's device to detect any abnormal user behaviour or software.
[026] Steganography Based Signatures: A unique piece of information is embedded into the video by the steganography system while it is streaming.
[027] Trigger Event: The steganography module has the ability to alert the countermeasures activation module to stop the user's session if piracy is found.
[028] Notifying the Platform Administrator or Content Distributor: Steganography Tracking: The user's information is integrated into the movie and is contained in the concealed data. The embedded steganography data can be extracted by the system upon detection of an unauthorised recording attempt.
[029] Real-Time Alerting: The content administrator receives a real-time alarm from the system. User information that was taken from the steganography embedded content may be included in the alert. The notice can be received by a number of different methods, including Telegram, SMS, and email.
[030] Centralised Log Storage: Audit logs are used to store all occurrences, including session ends and illegal recording attempts. This log contains detailed data that may be recovered from the buried steganography data, including timestamps, IP addresses, and session IDs. Legal use: Legal action against the pirated user may be taken using the logs and proof gathered. , C , Claims:[031] 1. A system for tracking and real-time detecting unauthorised screen recording attempts while concealing antidote data inside video content using steganography techniques.
[032] 2. The technique of adding user-specific data such as IP addresses, timestamps, and session information into the video frames so that piracy may be tracked back to its original source.
[033] 3. A procedure that employs real-time frame analysis and anomaly detection algorithms to track and identify screen recording efforts and initiate the extraction of steganography data from recorded video.
[034] 4. The capacity to implement automated countermeasures, including account suspension and termination, in the event that it is determined that the video data was unlawfully recorded.
[035] 5. A method of collecting audit logs and proof of piracy based on concealed data extraction that may be exploited in punishment or regulation of the violators.

Documents

NameDate
202441090884-COMPLETE SPECIFICATION [22-11-2024(online)].pdf22/11/2024
202441090884-DRAWINGS [22-11-2024(online)].pdf22/11/2024
202441090884-FORM 1 [22-11-2024(online)].pdf22/11/2024
202441090884-FORM 18 [22-11-2024(online)].pdf22/11/2024
202441090884-FORM-9 [22-11-2024(online)].pdf22/11/2024
202441090884-REQUEST FOR EARLY PUBLICATION(FORM-9) [22-11-2024(online)].pdf22/11/2024
202441090884-REQUEST FOR EXAMINATION (FORM-18) [22-11-2024(online)].pdf22/11/2024

footer-service

By continuing past this page, you agree to our Terms of Service,Cookie PolicyPrivacy Policy  and  Refund Policy  © - Uber9 Business Process Services Private Limited. All rights reserved.

Uber9 Business Process Services Private Limited, CIN - U74900TN2014PTC098414, GSTIN - 33AABCU7650C1ZM, Registered Office Address - F-97, Newry Shreya Apartments Anna Nagar East, Chennai, Tamil Nadu 600102, India.

Please note that we are a facilitating platform enabling access to reliable professionals. We are not a law firm and do not provide legal services ourselves. The information on this website is for the purpose of knowledge only and should not be relied upon as legal advice or opinion.