Reza Rassool

Stevenson Ranch, California, United States Contact Info
13K followers 500+ connections

Join to view profile

About

• Founder and Chair of Kwaai.ai - Developer Community, Democratizing AI, Personal…

Articles by Reza

See all articles

Contributions

Activity

Join now to see all activity

Experience & Education

  • Kwaai

View Reza’s full experience

See their title, tenure and more.

or

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Volunteer Experience

  • AYSO Graphic

    Soccer Coach

    AYSO

    - 6 years

    Children

    Soccer coach in Region 678

Publications

  • How Generative AI will Change Your Career

    Advance / ArkusNexus

    Generative AI - Explore the exciting possibilities and potential impacts of this groundbreaking technology across various industries.

    See publication
  • EDGE BIOMETRICS COMBINED WITH MOBILE CREDENTIAL TECHNOLOGY TO IMPROVE ACCESS CONTROL

    Security Middle East Magazine

    Recently, the SPA Team had the opportunity to interview Reza Rassool, CTO of RealNetworks, who shared his thoughts on combining Edge Biometrics with Mobile Technology, as a means of creating more effective Access Control. Find out more about Edge Biometrics and the importance of smooth access control on the SAFR from RealNetworks website.

    See publication
  • Touch-less Authentication – How the pandemic accelerates Face recognition adoption

    3rd Annual Facial Recognition & Biometrics Summit

    Touchless Authentication – How the pandemic accelerates Face recognition adoption
    Existing authentication solutions including queuing to present physical credentials or even touching a communal biometric reader are antithetical to guidelines for reducing infection.
    Benefits of touchless authentication
    Vision of a touchless future where your face is your username

    See publication
  • How to Engineer Ethics into AI: Combating Bias in Facial Recognition

    COV-IRT International Symposium

    Abstract—The growth of facial recognition (FR) technology is accompanied by consistent assertions (as catalogued by Georgetown University[i]) that demographic dependencies could lead to accuracy variations and potential bias. In the current pandemic response, AI-powered smart cameras are being used increasingly in mask-checking, occupancy-counting and fever-screening applications. Camera technology has a well-documented history of bias in its treatment of skin tone. While engineers have…

    Abstract—The growth of facial recognition (FR) technology is accompanied by consistent assertions (as catalogued by Georgetown University[i]) that demographic dependencies could lead to accuracy variations and potential bias. In the current pandemic response, AI-powered smart cameras are being used increasingly in mask-checking, occupancy-counting and fever-screening applications. Camera technology has a well-documented history of bias in its treatment of skin tone. While engineers have benefited from the increased availability of AI and machine learning tools, allowing them to train their models to ever higher accuracy, the fairness and ethics of their algorithms have often been an afterthought. Modern digital algorithms are similarly susceptible to asymmetric representation and treatment of face types. This paper draws from the National Institute of Standards and Technology (NIST) report which dissects these demographic dependencies of over 100 FR algorithms and then details the strategies and techniques needed, to not only reduce bias, but deliberately design for fairness and socially responsible outcomes. Furthermore, it shows that a model trained for low-bias actually delivers higher performance.

    See publication
  • How to Engineer Ethics into AI: Combating Bias in Facial Recognition

    SMPTE

    The growth of facial recognition (FR)
    technology is accompanied by consistent assertions (as
    catalogued by Georgetown University1) that demographic
    dependencies could lead to accuracy variations and
    potential bias. Film and video technology has a welldocumented
    history of bias in its treatment of skin tone.
    While engineers have benefited from the increased
    availability of AI and machine learning tools, allowing
    them to train their models to ever higher accuracy…

    The growth of facial recognition (FR)
    technology is accompanied by consistent assertions (as
    catalogued by Georgetown University1) that demographic
    dependencies could lead to accuracy variations and
    potential bias. Film and video technology has a welldocumented
    history of bias in its treatment of skin tone.
    While engineers have benefited from the increased
    availability of AI and machine learning tools, allowing
    them to train their models to ever higher accuracy, the
    fairness and ethics of their algorithms have often been an
    afterthought. Modern digital algorithms are similarly
    susceptible to asymmetric representation and treatment
    of face types. This paper draws from the National
    Institute of Standards and Technology (NIST) report
    which dissects these demographic dependencies of over
    100 FR algorithms and then details the strategies and
    techniques needed, to not only reduce bias, but
    deliberately design for fairness and socially responsible
    outcomes. Furthermore, it shows that a model trained for
    low-bias actually delivers higher performance.

    See publication
  • FACE RECOGNITION DEMOGRAPHIC EFFECTS: ENGINEERING FOR ETHICS

    IBC

    The growth of face recognition (FR) technology is accompanied by
    consistent assertions (as catalogued by Georgetown University1) that
    demographic dependencies could lead to accuracy variations and potential
    bias. While engineers have benefited from the increased availability of AI
    and machine learning tools, allowing them to train their models to ever
    higher accuracy, the fairness and ethics of their algorithms have often been
    an afterthought. This paper draws from the…

    The growth of face recognition (FR) technology is accompanied by
    consistent assertions (as catalogued by Georgetown University1) that
    demographic dependencies could lead to accuracy variations and potential
    bias. While engineers have benefited from the increased availability of AI
    and machine learning tools, allowing them to train their models to ever
    higher accuracy, the fairness and ethics of their algorithms have often been
    an afterthought. This paper draws from the National Institute of Standards
    and Technology (NIST) report2 which dissects these demographic
    dependencies of over 100 FR algorithms and then details the strategies and
    techniques needed, to not only reduce bias, but deliberately design for
    fairness and socially responsible outcomes. Further, it details the lessons
    learned from a leading facial recognition algorithm (SAFR) that NIST
    consistently scored high for accuracy, speed, model compactness and
    fairness.

    See publication
  • Leading the OTT Charge: What We Can Learn from China's Massive OTT Deployment

    SMPTE 2018

    While the streaming media market is rapidly evolving throughout the world, China is clearly leading the way in OTT deployment. With over 738 Million users, China leads the world in Internet users. (Compare this to the United States with fewer than 300 Million users.) Internet penetration in China is growing very rapidly--growing from a mere 16 percent in 2007 to over 55 percent in 2015. This large and rapid growth in Internet users has subsequently spawned a tremendous demand for OTT video. An…

    While the streaming media market is rapidly evolving throughout the world, China is clearly leading the way in OTT deployment. With over 738 Million users, China leads the world in Internet users. (Compare this to the United States with fewer than 300 Million users.) Internet penetration in China is growing very rapidly--growing from a mere 16 percent in 2007 to over 55 percent in 2015. This large and rapid growth in Internet users has subsequently spawned a tremendous demand for OTT video. An estimated 229 Chinese people with watch video via an OTT streaming subscription in 2018. Fueled by such demand, China is putting OTT into practice more rapidly than anyone else. This rapid rollout in China has encountered several important challenges. Chinese providers have had to develop OTT solutions that function equally well in exceptionally dense metropolitan areas facing bandwidth overload as well as very rural areas with sparse and occasionally unreliable broadband connections. In addition, China is a complex regulatory and licensing environment with stakeholders from government, industry and the military.

    See publication
  • Guest Editorial Special Issue on Quality of Experience for Advanced Broadcast Services

    IEEE Transactions on Broadcasting ( Volume: 64 , Issue: 2 , June 2018 )

    During the last decade, the evolution of the TV market has been remarkable. Broadcasters have been facing fresh challenges to cope with an increasing user demand for new services. With second-screen adoption and the increase of real-time news consumption via social channels, the broadcast landscape underwent a major transformation in recent years: viewers have begun to demand highly customized experiences that meet their individual needs.

    See publication
  • China OTT

    Content Delivery Summit

    Streaming media infrastructure is rapidly evolving, and no one is putting the future into practice more than China's OTT services. Chinese OTT providers have had to quickly develop solutions for both dense metro areas facing bandwidth overload and rural areas facing slow and spotty broadband connections. These challenges have led to leading-edge solutions being rolled out on a broad scale. This talk will discuss how the Chinese market is integrating proprietary codecs for a more streamlined…

    Streaming media infrastructure is rapidly evolving, and no one is putting the future into practice more than China's OTT services. Chinese OTT providers have had to quickly develop solutions for both dense metro areas facing bandwidth overload and rural areas facing slow and spotty broadband connections. These challenges have led to leading-edge solutions being rolled out on a broad scale. This talk will discuss how the Chinese market is integrating proprietary codecs for a more streamlined system that performs well in challenging environments and how companies globally can take a cue from these efforts to provide a better, more-cost-effective content viewing experience.

    See publication
  • T-Commerce - one-click buying from your TV

    HPA 2018

    This, undoubtedly attractive, idea has been around for a while. You’re watching your favorite sitcom or celebrity show and you see it — the perfect blouse or purse or watch. Wouldn’t it be great if you could just aim your remote at the TV, push one button, and buy it? The attraction is undeniable. You get instant gratification, buying the objects you see on your favorite shows. And content creators would get extra revenue — profiting directly from the desires they have long cultivated in their…

    This, undoubtedly attractive, idea has been around for a while. You’re watching your favorite sitcom or celebrity show and you see it — the perfect blouse or purse or watch. Wouldn’t it be great if you could just aim your remote at the TV, push one button, and buy it? The attraction is undeniable. You get instant gratification, buying the objects you see on your favorite shows. And content creators would get extra revenue — profiting directly from the desires they have long cultivated in their audiences. While this notion, sometimes called Enhanced TV, Shopification, or T-commerce has been around for decades, it has never been fully realized. Now thanks to cord-cutters, the shift to OTT, and the release of some futuristic new technologies, T-commerce may (finally) be just a click away.

    See publication
  • VMAF reproducibility: Validating a perceptual practical video quality metric

    2017 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB)

    Measuring video quality with standard metrics ensures that operators can deliver to consumers the desired quality of experience (QoE) at an optimal cost. Such metrics also allow CODEC engineers to optimize the performance of their encoding algorithms. This paper briefly surveys existing video quality metrics and then presents results of the new Video Multi-Method Assessment Fusion (VMAF) metric [1] proposed by Netflix. The author and colleagues used VMAF to measure the quality of a 4K dataset…

    Measuring video quality with standard metrics ensures that operators can deliver to consumers the desired quality of experience (QoE) at an optimal cost. Such metrics also allow CODEC engineers to optimize the performance of their encoding algorithms. This paper briefly surveys existing video quality metrics and then presents results of the new Video Multi-Method Assessment Fusion (VMAF) metric [1] proposed by Netflix. The author and colleagues used VMAF to measure the quality of a 4K dataset encoded with the RealMedia video CODEC at a range of bitrates. They also gathered subjective quality assessments from a group of viewers for the same dataset. The paper presents findings of correlation between subjective and objective results.

    See publication
  • RealMediaHD: The Case for a Proprietary CODEC - a breakfast roundtable

    HPA SMPTE

    Abstract

    As the industry ponders the upgrade from h.264 to h.265 a new contender enters the market. At Streaming Media East 2016 RealNetworks unveiled the 11th version of RealVideo CODEC called RMHD. This paper places RMHD in the landscape of its competitors and outlines market opportunities and adoption challenges facing this proprietary video encoding technology.
    · Compression vs h.264
    · Encoding speed
    · Low end-to-end latency
    ·…

    Abstract

    As the industry ponders the upgrade from h.264 to h.265 a new contender enters the market. At Streaming Media East 2016 RealNetworks unveiled the 11th version of RealVideo CODEC called RMHD. This paper places RMHD in the landscape of its competitors and outlines market opportunities and adoption challenges facing this proprietary video encoding technology.
    · Compression vs h.264
    · Encoding speed
    · Low end-to-end latency
    · Stream-ability
    · Index-ability
    · License
    · China
    · Proprietary advantage

    The conversation could be broader – considering the challenge VP9 faces against the incumbent CODEC.

    See publication
  • Focus on the Future: Emerging Technologies Panel

    APEX

    APEX Insight: APEX TECH’s closing session brought together a panel of remarkable people to brainstorm and investigate emerging and future technologies. In setting the stage, APEX’s Rich Salter says “The thinking was that technologies are changing so fast that we needed to bring together a panel to look 5 to 15 years in the future. The Emerging Tech Advisory Panel will get together periodically during the year. The panel is open to APEX and non-APEX members.” - See more at:…

    APEX Insight: APEX TECH’s closing session brought together a panel of remarkable people to brainstorm and investigate emerging and future technologies. In setting the stage, APEX’s Rich Salter says “The thinking was that technologies are changing so fast that we needed to bring together a panel to look 5 to 15 years in the future. The Emerging Tech Advisory Panel will get together periodically during the year. The panel is open to APEX and non-APEX members.” - See more at: http://apex.aero/2015/11/18/emerging-technology-panel-apex-tec#sthash.jkHbV3nm.dpuf

    When it comes to the quality of video content, Kwaai Oak’s Reza Rassool believes that encoding technology needs improvement, automatically adapting to displays, whether embedded or on passengers’ PEDs. “We still have dragons to slay in video compression. There’s a whole lot more that can be done. With an encode that can understand the size of the screen and adjust appropriately, we’ll get a consistent quality of experience,” says Rassool. - See more at: http://apex.aero/2015/11/18/emerging-technology-panel-apex-tec#sthash.jkHbV3nm.dpuf

    See publication
  • District Six: Lest We Forget

    Kwaai Oak

    The context is Cape Town, South Africa of the 1930s as seen through the pre-teen eyes of the author, Yousuf ‘Joe’ Rassool when ‘life was one interminable summer’. No. 7 Buitencingle Street, the unoccupied and shuttered ancestral family home of the Gools, is opened to their relatives, the Rassools, as temporary accommodation. The house, now run down, spoke of a former grandeur, of lost nobility and wealth. It was once the venue of dignitaries, politicians, and intellectuals including Dr Abdulla…

    The context is Cape Town, South Africa of the 1930s as seen through the pre-teen eyes of the author, Yousuf ‘Joe’ Rassool when ‘life was one interminable summer’. No. 7 Buitencingle Street, the unoccupied and shuttered ancestral family home of the Gools, is opened to their relatives, the Rassools, as temporary accommodation. The house, now run down, spoke of a former grandeur, of lost nobility and wealth. It was once the venue of dignitaries, politicians, and intellectuals including Dr Abdulla Abdurahman, Henry Sylvester Williams, and MK Gandhi. Gool’s association with Gandhi also led to a romance between Gool’s daughter Timmie and Manilal, Gandhi’s son. Gandhi eventually vetoed their marriage proposal citing the marriage between a Hindu and Muslim would be like ‘putting two swords in one sheath.’

    Other authors
    • Yousuf (Joe) Rassool
    See publication
  • HyperElasticity(tm) - Handling Spike Events

    DCIA Cloud Computing West

    Kwaai Oak CTO, Reza Rassool, keynotes a session at the DCIA Cloud Computing West 2013 in Las Vegas on Monday October 28, 2013.

    Elasticity affects the bottom line of any ecommerce platform. While normal auto-scaling mechanisms handle slowly varying loads, a whole new approach is required to handle spike events. Spike events typically occur when a public message such as a tweet from a celebrity or a televised speech from a president send a large audience to a website. The ensuing traffic…

    Kwaai Oak CTO, Reza Rassool, keynotes a session at the DCIA Cloud Computing West 2013 in Las Vegas on Monday October 28, 2013.

    Elasticity affects the bottom line of any ecommerce platform. While normal auto-scaling mechanisms handle slowly varying loads, a whole new approach is required to handle spike events. Spike events typically occur when a public message such as a tweet from a celebrity or a televised speech from a president send a large audience to a website. The ensuing traffic spike is higher and rises faster than the normal daily fluctuation of visitors.

    Spikes stretch cloud platforms beyond their 'elastic limit' often into a failure mode.

    Rassool, presents some findings from work on the Gathr Films platform and discusses techniques and choices in the pursuit of HyperElasticity(tm) - the fine-grained auto-scaling aimed at maximizing the conversion of sudden traffic spikes.

    Kwaai Oak is a Los Angeles technology consultancy that powers many startups through the 'CTO-as-a-service.'

    See publication
  • Clouds Here, Clouds There, Clouds Everywhere

    SXSW

    There’s definitely something going on with all of this cloud talk, but what does it mean for you? If you’re involved with a gaming, entertainment or digital company, it could mean the difference of getting your product or idea to market faster without too much capital investment or being able to beat out the traditional players stuck in their old school ways. You’re cutting edge, right? So why not take advantage of cutting edge technology for your business? Josh Fraser will help peel away the…

    There’s definitely something going on with all of this cloud talk, but what does it mean for you? If you’re involved with a gaming, entertainment or digital company, it could mean the difference of getting your product or idea to market faster without too much capital investment or being able to beat out the traditional players stuck in their old school ways. You’re cutting edge, right? So why not take advantage of cutting edge technology for your business? Josh Fraser will help peel away the layers of how you can use cloud computing, addressing the key differences of clouds and how to choose the best cloud computing infrastructure for your company. Josh will be joined by Reza Rassool, CTO of Music Mastermind, who will share with you how the company started and launched their music application on the cloud. Attend this session to get a view of why companies such as Music Mastermind, Zynga, EA, and Big Fish Games are all running on the cloud.

    Other authors
    See publication
  • MUSIC-MAKING FOR THE MASSES: MORE PERFORMANCE FOR LESS COST IN COMMERCIAL CLOUD ENVIRONMENTS USING IBM IDATAPLEX IN THE ZYA CLOUD

    the Edison Group

    This technical white paper shows how application service provider Music Mastermind delivers its suite of products and services more economically and with greater growth potential than it could on an exclusively public cloud environment such as Amazon Web Services (AWS). Cloud solution provider Micro Strategies evaluated several options to design the most cost-effective cloud-based environment and determined that the best solution to reliably satisfy Music Mastermind’s computing requirements…

    This technical white paper shows how application service provider Music Mastermind delivers its suite of products and services more economically and with greater growth potential than it could on an exclusively public cloud environment such as Amazon Web Services (AWS). Cloud solution provider Micro Strategies evaluated several options to design the most cost-effective cloud-based environment and determined that the best solution to reliably satisfy Music Mastermind’s computing requirements would be a hybrid cloud-based environment, utilizing IBM iDataPlex systems in the private cloud. By moving its data center workloads from AWS to the private cloud environment, Music Mastermind could run its cloud-based application with as much as five times the performance per dollar. They also were able to expand their business reach to geographic regions where reliance on a public cloud is not possible.

    Other authors
    • EdisonGroup
    See publication
  • Timely and Secure – Real-time Performance Challenges in Content Security

    SMPTE

    Content encryption, subscriber authentication, and secure key distribution are the mainstays of digital rights management (DRM) and conditional access (CA) systems in modern entertainment networks. In the traditional DVB CA security model , entitlement control messages and entitlement management messages are inserted into an encrypted MPEG stream. These messages are received in a timely manner by a subscriber device, to enable it to access the stream data. In more modern delivery networks…

    Content encryption, subscriber authentication, and secure key distribution are the mainstays of digital rights management (DRM) and conditional access (CA) systems in modern entertainment networks. In the traditional DVB CA security model , entitlement control messages and entitlement management messages are inserted into an encrypted MPEG stream. These messages are received in a timely manner by a subscriber device, to enable it to access the stream data. In more modern delivery networks, watermarking, fingerprinting, and digital copy protection are additional processes that have been inserted into the pipeline to secure the business of on-line entertainment. All these security processes introduce measurable temporal distortions in bandwidth, latency, and jitter to the smooth flowing of entertainment content to subscribers. While fundamental real-time requirements stem from linear broadcast applications, file-based delivery imposes a new set of constraints that challenge engineers to deliver content in a secure and timely manner. File-based distribution calls for security processing that scales, persists and is faster than real-time. This paper quantifies the potential temporal distortions in the DVB CA security model, detailing the perceptible effects on channel change time, temporal jitter and latency. Furthermore, it explores the challenges introduced by the signal processing of more modern schemes securing both linear and non-linear delivery and goes on to describe some technical approaches to their solution.

    See publication
  • Protecting Your Intellectual Property

    Digital Hollywood

  • Scaling Watermarking for IPTV

    SMPTE, VidTrans

    Video and Audio watermarking is a relatively new technology that has been used in post-production to mark some movie content and is planned to be used in digital cinema applications. There are significant challenges of scalability, performance, and economy in adapting the same technology to today’s home entertainment (HE) content delivery networks (CDN). This paper describes how partitioning the watermarking process into a client-server architecture allows the application of session-based…

    Video and Audio watermarking is a relatively new technology that has been used in post-production to mark some movie content and is planned to be used in digital cinema applications. There are significant challenges of scalability, performance, and economy in adapting the same technology to today’s home entertainment (HE) content delivery networks (CDN). This paper describes how partitioning the watermarking process into a client-server architecture allows the application of session-based watermarking to be scaled economically to the largest content delivery networks. Further, the paper describes how watermarking must be implemented within the security envelope of a conditional access or DRM system.

    See publication
  • Video On Demand – Now!

    SMPTE

  • Thorny Issues in Asset Management

    GSAM

  • Anti-piracy Trends and Technology

    IBC, Lecture at Pomona College, Panel session at Streaming Media West

    In 2001 the movie and television industry was reportedly anxious about the
    ‘Napsterization’ (1) of their valuable content. While the peer-to-peer sharing
    phenomenon on the Internet has dramatically changed the business of the
    music industry (2) the picture domain bares many differences. The rise in
    piracy of entertainment content has given rise to an arms race of technology
    and process between the pirates and the Internet policing services. This
    paper presents some of…

    In 2001 the movie and television industry was reportedly anxious about the
    ‘Napsterization’ (1) of their valuable content. While the peer-to-peer sharing
    phenomenon on the Internet has dramatically changed the business of the
    music industry (2) the picture domain bares many differences. The rise in
    piracy of entertainment content has given rise to an arms race of technology
    and process between the pirates and the Internet policing services. This
    paper presents some of the findings of a yearlong anti-piracy operation that
    has focused on tracking motion pictures on the Internet. It presents new
    metrics for quantifying piracy, reports on the observed behaviour patterns of
    the pirates and specific results for the well-known titles of the last year. The
    paper further discusses the various technologies including encryption,
    watermarking and fingerprinting being used in anti-piracy and explores the
    trends going forward.

    See publication
  • Trick Play in Compressed AV streams

    IBC

    When A/V material is stored on disk storage we gain the non-linear functionality that tape cannot provide.
    We must, however, not lose the much-cherished functionality of tape. The term ‘trick play’ describes the
    operation of accessing A/V material from a stored stream in a sequence and rate other than forward at
    unity speed. It includes VCR-like features such as slow motion, reverse play, fast forward and rewind. It
    is a significant engineering challenge to provide trick play…

    When A/V material is stored on disk storage we gain the non-linear functionality that tape cannot provide.
    We must, however, not lose the much-cherished functionality of tape. The term ‘trick play’ describes the
    operation of accessing A/V material from a stored stream in a sequence and rate other than forward at
    unity speed. It includes VCR-like features such as slow motion, reverse play, fast forward and rewind. It
    is a significant engineering challenge to provide trick play features for disk-based digitally stored material.
    This paper reviews the requirements of trick play for editing systems, video servers and consumer playback
    systems. Firstly, it lays out the essential attributes of an ideal solution including bandwidth conservation,
    storage efficiency, file system simplicity, decodeability and buffer memory conservation. The paper rates
    some existing solutions with respect to these attributes. Secondly, it proposes a novel, high-scoring solution
    based on formatting the movie material in generic isochronous frequency intervals, GIFIs. In many existing
    playback systems, the buffering mechanisms segment and reassemble the stream of movie material. Simple
    buffering schemes segment the stream into equal size chunks of memory. More sophisticated schemes
    segment into isochronous (equal time) chunks. This paper suggests that in order to provide an ideal solution
    for trick-play the buffering scheme should segment the movie material in both time and frequency. The paper
    then goes on to describe the method in which these segments should be arranged on a disk in order to
    support trick-play. This paper then discusses how the GIFI concept could be applied to MPEG movies stored
    on disc or CD-ROM.

    See publication
  • Networked storage

    Tribune Engineering Conference NAB

  • RAID storage

    Digital Video Storage Conference

  • Video Disk Recorder Generations

    IBC '97, Broadcast Engineering

    The video disk recorder (VDR) has over the years found many applications in the post production and broadcast industry. At NAB '97 an exciting array of new VDRs and hybrid recorders was launched contrasting the paucity of new VTR product offerings. This paper seeks to categorize the generations of VDR and specifically describes how the third generation of embedded disk recorders are best suited to meet a diversity of market requirements. The paper then suggests how a 4th generation of VDR may…

    The video disk recorder (VDR) has over the years found many applications in the post production and broadcast industry. At NAB '97 an exciting array of new VDRs and hybrid recorders was launched contrasting the paucity of new VTR product offerings. This paper seeks to categorize the generations of VDR and specifically describes how the third generation of embedded disk recorders are best suited to meet a diversity of market requirements. The paper then suggests how a 4th generation of VDR may evolve into a LAN attached media port with strong data serving capabilities

    See publication
  • AV Drives the Next Generation

    World Media Expo

  • Video Servers Implementation and Technology

    NAB '96, Computer Technology Review

  • Non-linear Editing

    Royal Television Society

  • Brushing in Paint Systems

    Crosfield Electronics

  • Survey of Real-time Kernels

    Crosfield Electronics

  • Short and Sweet: The Rise of Multichannel Networks (MCNs) and Personalization

    ETCA 2016 Panel

    Unnoticed by some in mainstream video media, the Multi-Channel Network (MCN)–YouTube phenomena has grown to become a significant source of online video content. MCNs are becoming a driving force in generating new programming models, as well as direct contact to viewers, working with individual video creators on YouTube to provide product, funding, cross-promotion, partner management, digital rights management, monetization/sales, and/or audience development in exchange for a percentage of the…

    Unnoticed by some in mainstream video media, the Multi-Channel Network (MCN)–YouTube phenomena has grown to become a significant source of online video content. MCNs are becoming a driving force in generating new programming models, as well as direct contact to viewers, working with individual video creators on YouTube to provide product, funding, cross-promotion, partner management, digital rights management, monetization/sales, and/or audience development in exchange for a percentage of the ad revenue from the channel. Indeed, there are 18-year olds making millions of dollars creating shopping and makeup video blogs on MCNs. Their content is aimed at Generation Z, who consume far less television than their parents, and what video they consume is generally viewed on a smaller screen (e.g., PCs, laptops, tablets, smartphones, etc.). A shift is in process. There are two business-technical issues worth examining that could have an impact of SMPTE members: (1) the effort to move their content to more platforms than just YouTube and (2) the production of more sophisticated and longer form video content. This panel will examine where the MCN/MPN video phenomenon is headed and the impact it will have mainstream television and movie production companies

    Other authors
    See publication
  • T-commerce — one-click buying

    Medium

    This, undoubtedly attractive, idea has been around for a while. You’re watching your favorite sitcom or celebrity show and you see it — the perfect blouse or purse or watch. Wouldn’t it be great if you could just aim your remote at the TV, push one button, and buy it? The attraction is undeniable. You get instant gratification, buying the objects you see on your favorite shows. And content creators would get extra revenue — profiting directly from the desires they have long cultivated in their…

    This, undoubtedly attractive, idea has been around for a while. You’re watching your favorite sitcom or celebrity show and you see it — the perfect blouse or purse or watch. Wouldn’t it be great if you could just aim your remote at the TV, push one button, and buy it? The attraction is undeniable. You get instant gratification, buying the objects you see on your favorite shows. And content creators would get extra revenue — profiting directly from the desires they have long cultivated in their audiences. While this notion, sometimes called Enhanced TV, Shopification, or T-commerce has been around for decades, it has never been fully realized. Now thanks to cord-cutters, the shift to OTT, and the release of some futuristic new technologies, T-commerce may (finally) be just a click away.

    See publication

Patents

  • Intelligent metadata service for video enhancement

    Issued US-11544826-B2

    Embodiments are directed towards metadata service for video enhancement. An example method includes receiving a request for metadata applicable to instruct a display device to transform low dynamic range (LDR) video content to high dynamic range (HDR) video content, determining availability of candidate metadata, and responsive to determining that no candidate metadata is available, providing options for generating the metadata applicable to instruct the display device. The example method can…

    Embodiments are directed towards metadata service for video enhancement. An example method includes receiving a request for metadata applicable to instruct a display device to transform low dynamic range (LDR) video content to high dynamic range (HDR) video content, determining availability of candidate metadata, and responsive to determining that no candidate metadata is available, providing options for generating the metadata applicable to instruct the display device. The example method can also include causing generation of the metadata based at least one of the options, and providing the generated metadata to the display device.

    See patent
  • Hue-based video enhancement and rendering

    Issued US-11544827-B2

    Embodiments are directed towards hue-based video enhancement. An example method includes processing low dynamic range (LDR) video content to generate an inverse tone map (ITM) for transforming the LDR video content to high dynamic range (HDR) video content, converting the LDR video content into Hue, Saturation and Lightness (HSY) color space to produce H-channel data, S-channel data, and Y-channel data, de-noising the H-channel data, remapping the de-noised H-channel data, the S-channel data…

    Embodiments are directed towards hue-based video enhancement. An example method includes processing low dynamic range (LDR) video content to generate an inverse tone map (ITM) for transforming the LDR video content to high dynamic range (HDR) video content, converting the LDR video content into Hue, Saturation and Lightness (HSY) color space to produce H-channel data, S-channel data, and Y-channel data, de-noising the H-channel data, remapping the de-noised H-channel data, the S-channel data, and the Y-channel data based on the ITM; and rendering the HDR video content based thereon.

    See patent
  • METHODS AND SYSTEMS FOR FACIAL RECOGNITION USING MOTION VECTOR TRAINED MODEL

    Issued US 11,275,928

    Systems and methods are provided for determining a candidate identity of a person in video data based on a biometric motion signature corresponding to motion of a face of the person in the video data. Motion information is obtained corresponding to motion of the face in the video data. The motion information is provided as input to a neural network and the neural network generates the biometric motion signature in response. The biometric motion signature is compared with a plurality of…

    Systems and methods are provided for determining a candidate identity of a person in video data based on a biometric motion signature corresponding to motion of a face of the person in the video data. Motion information is obtained corresponding to motion of the face in the video data. The motion information is provided as input to a neural network and the neural network generates the biometric motion signature in response. The biometric motion signature is compared with a plurality of biometric signatures stored in data storage. The candidate identity of the person is determined as a result of a correspondence between the biometric motion signature and a stored biometric signature of the plurality of biometric signatures.

    See patent
  • MULTI-LAYERED VIDEO STREAMING SYSTEMS AND METHODS

    Issued US 11,070,846

    Systems and methods for enabling a video capture/encoding device to capture frames of a video sequence; obtain feedback from a video decoding/rendering device; divide each frame into an array of patches; select one or more patches of each frame for supplemental processing; cause the frames of the video sequence to be encoded by a video encoding module and cause the selected patches to be processed by one or more supplemental processing module(s); and assemble a multi-layer video transport…

    Systems and methods for enabling a video capture/encoding device to capture frames of a video sequence; obtain feedback from a video decoding/rendering device; divide each frame into an array of patches; select one or more patches of each frame for supplemental processing; cause the frames of the video sequence to be encoded by a video encoding module and cause the selected patches to be processed by one or more supplemental processing module(s); and assemble a multi-layer video transport stream wherein, for each frame of the video sequence, a base layer of the transport stream includes data corresponding to an encoded version of the current frame and one or more supplemental layers of the transport stream include meta-data corresponding to the division of the current frame into patches and data corresponding to the output of the supplemental processing of the selected patches of the current frame.

    See patent
  • System and Method for Generating Musical Tracks Within a Continuously Looping Recording Session

    Issued US 9,263,021

    An apparatus for creating a musical composition comprising an audio interface, an audio converter and a live looping recording session is disclosed. The audio interface operably receives audio from an input device and outputs audio to an audio output device. The audio converter module is operably connected to the audio interface to convert audio received via the audio interface into an audio track. The recording session module is configured to repeatedly playback a live loop that includes at…

    An apparatus for creating a musical composition comprising an audio interface, an audio converter and a live looping recording session is disclosed. The audio interface operably receives audio from an input device and outputs audio to an audio output device. The audio converter module is operably connected to the audio interface to convert audio received via the audio interface into an audio track. The recording session module is configured to repeatedly playback a live loop that includes at least a portion of a first audio track, and to add at least a portion of a second audio track to the live loop during repeated playback. The first audio track may be a pre-existing track stored in a data storage medium. The recording session module may be configured to add at least a portion of a third audio track to the live loop during playback, which may be automatically generated based on one or more musical criteria of the first or second tracks. The apparatus may include a user interface coupled to the recording session module to provide a visual representation illustrating the portion of the live loop that is being played. The audio converter module may include a track partitioner to divide at least one of the first and second audio tracks into one or more partitions, a quantizer that aligns audio with a predetermined beat, and a frequency detector to identify the pitch of one or more sounds leading to their storage as a morphology. A method is also provided.

    Other inventors
    • matt serletic
    • Francesco Gerald Capodieci
    See patent
  • System and Method for Providing Audio for a Requested Note Using a Render Cache

    Issued US 9,257,053

    A method for providing audio data corresponding to a requested musical note is disclosed, the method comprising: (a) providing a render cache having a plurality of cache entries, each of the cache entries corresponding to a different note; (b) receiving a request for a first note from a client; (c) identifying a first cache entry corresponding to the first note; (d) determining that a first audio segment corresponding to the first cache entry is not available; (e) identifying a second audio…

    A method for providing audio data corresponding to a requested musical note is disclosed, the method comprising: (a) providing a render cache having a plurality of cache entries, each of the cache entries corresponding to a different note; (b) receiving a request for a first note from a client; (c) identifying a first cache entry corresponding to the first note; (d) determining that a first audio segment corresponding to the first cache entry is not available; (e) identifying a second audio segment corresponding to a near-hit cache entry in the render cache; and (f) processing the second audio segment into a third audio segment that is substantially similar to the first audio segment.

    Other inventors
    See patent
  • System and Method for Applying a Chain of Effects to a Musical Composition

    Issued US 8,785,760

    A method for applying audio effects to one or more tracks off musical compilation is disclosed. The method comprises identifying a first virtual musician to be associated with a first instrument track; identifying a first virtual producer to be associated with the first instrument track; applying a first series of effects to the first instrument track, the first series of effects being dependent upon the first virtual musician; and applying a second series of effects to the first instrument…

    A method for applying audio effects to one or more tracks off musical compilation is disclosed. The method comprises identifying a first virtual musician to be associated with a first instrument track; identifying a first virtual producer to be associated with the first instrument track; applying a first series of effects to the first instrument track, the first series of effects being dependent upon the first virtual musician; and applying a second series of effects to the first instrument track, the second series of effects being dependent upon the first virtual producer.

    Other inventors
    See patent
  • System and method for producing a more harmonious musical accompaniment

    Issued US 8,779,268

    A system and process for producing a more harmonious musical accompaniment for a musical compilation, the process comprising determining a plurality of probable key signatures for the musical compilation, creating an interval profiling matrix for each of the probable key signatures, finding products of a major key interval profile matrix with each of the interval profiling matrices, summing each of the major key interval products into a running major key sum, finding a product of a minor key…

    A system and process for producing a more harmonious musical accompaniment for a musical compilation, the process comprising determining a plurality of probable key signatures for the musical compilation, creating an interval profiling matrix for each of the probable key signatures, finding products of a major key interval profile matrix with each of the interval profiling matrices, summing each of the major key interval products into a running major key sum, finding a product of a minor key interval profile with each of the interval profiling matrices, summing each of the minor key interval products into a running minor key sum, and selecting the most probable key signature from the plurality of probable key signatures by comparing the minor key sum and the major key sum.

    Other inventors
    See patent
  • AUDIO/VIDEO IDENTIFICATION WATERMARKING

    Issued US 8,683,601

    The invention is directed to marking audio/video (A/V) signals for use in tracing content to a source. An ID controller captures an A/V synchronization fingerprint from a master A/V signal, stores the fingerprint in a data store, and provides signals to an ID encoder to have encoded an identifier into a copy of the master A/V signal. The identifier is encoded to be persistent through actions such as capture, compression, and/or transcoding. In one embodiment, the identifier is encoded as a bit…

    The invention is directed to marking audio/video (A/V) signals for use in tracing content to a source. An ID controller captures an A/V synchronization fingerprint from a master A/V signal, stores the fingerprint in a data store, and provides signals to an ID encoder to have encoded an identifier into a copy of the master A/V signal. The identifier is encoded to be persistent through actions such as capture, compression, and/or transcoding. In one embodiment, the identifier is encoded as a bit sequence, where each bit is encoded using an encoding technique that is hereinafter called a Mississippi encoding technique. The encoded identifier within the copied A/V signal may later be determined by extracting the fingerprint and comparing it to the stored fingerprint to determine the identifier. The identifier may then be used to trace a source of the copied A/V signal.

    See patent
  • System and Method for Generating a Musical Compilation Track from Multiple Takes

    Issued US 8492634

    An apparatus for creating a musical composition comprising an audio interface, and audio converter module, and a multi-track compositor module is disclosed. The audio interface operably receives audio from an audio input device and outputting audio to an audio output device. The audio converter module is operably connected to the audio interface to convert audio received via the audio interface into an audio track having one or more partitions. The multi-track compositor module is configured to…

    An apparatus for creating a musical composition comprising an audio interface, and audio converter module, and a multi-track compositor module is disclosed. The audio interface operably receives audio from an audio input device and outputting audio to an audio output device. The audio converter module is operably connected to the audio interface to convert audio received via the audio interface into an audio track having one or more partitions. The multi-track compositor module is configured to receive a first audio track and a second audio track and automatically score each partition of the first and second audio tracks based on one or more criteria. The multi-track compositor module is then configured to construct a third audio track from the partitions of the first and second audio tracks based on the scores for each partition. A method is also provided.

    See patent
  • System and Method for Producing a Harmonious Musical Accompaniment

    Issued US 8338686

    An apparatus for enhancing audio comprising a first interface and a harmonizing module is disclosed. The first interface receive a first audio segment from a first source. The harmonizing module is coupled to the first interface. The harmonizing module is configured to identify at least one musical property of the first audio segment; calculate a subset of notes that are harmonious with the first audio segment based on the at least one musical property; and select from the subset of notes to…

    An apparatus for enhancing audio comprising a first interface and a harmonizing module is disclosed. The first interface receive a first audio segment from a first source. The harmonizing module is coupled to the first interface. The harmonizing module is configured to identify at least one musical property of the first audio segment; calculate a subset of notes that are harmonious with the first audio segment based on the at least one musical property; and select from the subset of notes to generate an audio track to be played substantially synchronously with the first audio segment. A second interface may also be provided to receive a second audio segment from a second source. In this case, the harmonizing module may be configured to generate the audio track by transforming one or more notes of the second audio segment. A method is also provided.

    Other inventors
    • David Mann
    • Francesco Gerald Capodieci
    See patent
  • ENABLING TRANSFERABLE ENTITLEMENTS BETWEEN NETWORKED DEVICES

    Issued US 8,325,920

    A method, apparatus, and system are directed towards employing transferable entitlements using EMMs for enabling a purchase of content using a mobile device, and redeeming for access the content using a different network device. An existing billing infrastructure may be used during a purchase transaction to identify the purchasing device. Upon billing authorization, a transferable EMM (XEMM) may be sent to the purchasing device. The purchasing device may then provide the XEMM to another network…

    A method, apparatus, and system are directed towards employing transferable entitlements using EMMs for enabling a purchase of content using a mobile device, and redeeming for access the content using a different network device. An existing billing infrastructure may be used during a purchase transaction to identify the purchasing device. Upon billing authorization, a transferable EMM (XEMM) may be sent to the purchasing device. The purchasing device may then provide the XEMM to another network device. The other network device may send the XEMM to a redeeming service when requesting access to the content. Upon authorization, an EMM with an access key to the content may be sent to the other network device.

    Other inventors
    See patent
  • Method and system for end to end securing of content for video on demand

    Issued US 7,328,345

    A system and method for providing end-to-end security of content over a heterogeneous distribution chain is provided. A content owner provides content to an aggregator that receives the content and processes the content. The processing may involve decrypting the content and associating at least one of a unique fingerprint and a watermark to the decrypted content. The unique fingerprint and a watermark to the decrypted content provide identifying characteristics to the content. Additional…

    A system and method for providing end-to-end security of content over a heterogeneous distribution chain is provided. A content owner provides content to an aggregator that receives the content and processes the content. The processing may involve decrypting the content and associating at least one of a unique fingerprint and a watermark to the decrypted content. The unique fingerprint and a watermark to the decrypted content provide identifying characteristics to the content. Additional content-based fingerprints may be used to monitor quality of consumer experience for Video and Audio. The content may be sent in a decrypted state to a client or in an encrypted state. When the content is encrypted the aggregator wraps and encrypts the content with a signature such that an end-to-end flow of the content may be determined. Application Level encryption is used to provide network/distribution medium transparency as well as persistent encryption. When the content is transmitted from a...

    Other inventors
    See patent
  • Transitioning to secure IP communications for encoding, encapsulating, and encrypting data

    Issued US 7817608

    An apparatus, system, and method is directed to transcoding broadcast content, such as in a DVB, ATSC, and MPEG based network, to secure content suitable for an Internet Protocol (IP) based network. In one embodiment, a single multifunctional convergence appliance is employed to enable such transcoding actions as encryption, encoding, and/or encapsulation. For example, in one embodiment, an MPEG transport stream associated with the broadcast content may be transcoded to an IP-based transport…

    An apparatus, system, and method is directed to transcoding broadcast content, such as in a DVB, ATSC, and MPEG based network, to secure content suitable for an Internet Protocol (IP) based network. In one embodiment, a single multifunctional convergence appliance is employed to enable such transcoding actions as encryption, encoding, and/or encapsulation. For example, in one embodiment, an MPEG transport stream associated with the broadcast content may be transcoded to an IP-based transport stream. In addition, the transport stream may be decrypted, transrated to another rate, and re-encrypted using a different control word for re-encrypting, but a same service key to encrypt the different control word. The system is also enabled to transcode content formatted for the IP-based network to a content format suitable for the broadcast network.

    Other inventors
    See patent
  • Media tracking system and method

    Issued US 7043473

    A method for identifying a media file transmitted over a network includes creating a plurality of known media file identifiers, each for a respective one of a plurality of known media files, using an identifier generating algorithm, storing the known media file identifiers in a database, creating a media file identifier for an unknown media file with the identifier generating algorithm and comparing the media file identifier for the unknown media file with known media file identifiers in order…

    A method for identifying a media file transmitted over a network includes creating a plurality of known media file identifiers, each for a respective one of a plurality of known media files, using an identifier generating algorithm, storing the known media file identifiers in a database, creating a media file identifier for an unknown media file with the identifier generating algorithm and comparing the media file identifier for the unknown media file with known media file identifiers in order to produce an identification of the unknown media file.

    Other inventors
    See patent
  • Securely relaying content using key chains

    Issued US 7349886

    A system, apparatus, and method are directed towards generating chains of encrypted decryption keys for content in a highly distributed environment. In one embodiment, the key chain may be provided within an Entitlement Control Message (ECM). An access key that enables decryption of a current link within the chain of decryption keys may be provided to a downstream recipient using an out-of-band mechanism. Alternatively, the access key may be provided through an in-band mechanism, such as…

    A system, apparatus, and method are directed towards generating chains of encrypted decryption keys for content in a highly distributed environment. In one embodiment, the key chain may be provided within an Entitlement Control Message (ECM). An access key that enables decryption of a current link within the chain of decryption keys may be provided to a downstream recipient using an out-of-band mechanism. Alternatively, the access key may be provided through an in-band mechanism, such as through the use of Entitlement Management Message (EMM), or the like. In one embodiment, the access key within the EMM may be further encrypted by another encryption key that may be unique to the downstream recipient.

    Other inventors
    See patent
  • Video processing methods for improving visual acuity and/or perceived image resolution

    Issued US 8,428,741

    A method and apparatus for improving visual acuity when providing a visual image from a “high” resolution input device to a “low” resolution output device. The described invention is of particular use when the output device is an array of electrodes as part of a retinal prosthesis used to restore vision to a visually-impaired patient. In that various limitations may, within the foreseeable future, limit the density of such an electrode array (and thus the resolution of the output image), the…

    A method and apparatus for improving visual acuity when providing a visual image from a “high” resolution input device to a “low” resolution output device. The described invention is of particular use when the output device is an array of electrodes as part of a retinal prosthesis used to restore vision to a visually-impaired patient. In that various limitations may, within the foreseeable future, limit the density of such an electrode array (and thus the resolution of the output image), the present invention teaches techniques to assign processed pixel subsets of a higher resolution image to a single electrode. By varying the pixel subsets, e.g., by jittering, and/or altering the processing criteria, the perceived visual acuity may be further improved. Alternatively and additionally, such processing may be further extended to drive neighboring electrodes in combination to thus stimulate virtual electrode sites and thus further enhance visual acuity.

    Other inventors
    See patent
  • Article locator system

    Issued US 6,788,199

    A system and method for locating objects such as people, pets, and personal articles is described. A transceiver is attached to the person, animal, or item to be tracked and a handheld locator device is employed to transmit a locator signal containing an address code to the transceiver. Upon receipt of a signal, the transceiver compares the address code contained in the locator signal with an address code stored in the transceiver. If the two codes are same, the transceiver sends a return…

    A system and method for locating objects such as people, pets, and personal articles is described. A transceiver is attached to the person, animal, or item to be tracked and a handheld locator device is employed to transmit a locator signal containing an address code to the transceiver. Upon receipt of a signal, the transceiver compares the address code contained in the locator signal with an address code stored in the transceiver. If the two codes are same, the transceiver sends a return signal back to the locator device. The locator device uses this return signal to determine the distance and/or direction of the transceiver from the user's location. The system allows a user to select from a multiple number of items to locate and allows multiple users to search for different articles within the same general area without interference.

    Other inventors
    See patent
  • Method of pre-caching or pre-fetching data utilizing thread lists and multimedia editing systems using such pre-caching

    Issued US 6,092,154

    A method of pre-caching data using thread lists, and a multi-media editing system using such a pre-caching method, are disclosed. A list of data which will be required by a host application is passed to a data storage device such as a hard disk drive, CDROM drive, or other data storage device. The data storage device locates the data and stores it in its own storage device buffer. Thus, the data is immediately available when requested by the host. The pre-caching method may be used in a…

    A method of pre-caching data using thread lists, and a multi-media editing system using such a pre-caching method, are disclosed. A list of data which will be required by a host application is passed to a data storage device such as a hard disk drive, CDROM drive, or other data storage device. The data storage device locates the data and stores it in its own storage device buffer. Thus, the data is immediately available when requested by the host. The pre-caching method may be used in a multimedia or video editing system to quickly retrieve data from storage devices. The thread list may include a video thread, an audio thread and a data access parameter reflecting host data application requirements. The data access parameter may include at least one of data prioritization, cache management, error processing including resend capability, and data supply rate. The thread list may also include data specifying a percentage of the storage device buffer to be reserved for read ahead data...

    Other inventors
    • Allen Curtis
    See patent
  • Image generating apparatus

    Issued US 4,954,912

    Apparatus for generating a composite image from a plurality of subsidiary images comprises first stores for storing signals representing at least two subsidiary images. Second stores store at least two arrays of mask data, each array having a mask pixel corresponding to each pixel of the composite image. A control system is responsive to each array of mask data to generate for the pixels of the composite image signals defining a weighted sum of the subsidiary images.

    Other inventors
    See patent
  • REAL-TIME VIDEO ENHANCEMENT AND METADATA SHARING

    Filed US-20220351342-A1

    Embodiments are directed towards video enhancement in accordance with time constraint. An example method includes determining a time constraint for transforming low dynamic range (LDR) video content to high dynamic range (HDR) video content, processing the LDR video content to generate instructions for transforming to HDR video content in accordance with the time constraint, rendering the HDR video content based on executing the generated instructions; and producing metadata including the…

    Embodiments are directed towards video enhancement in accordance with time constraint. An example method includes determining a time constraint for transforming low dynamic range (LDR) video content to high dynamic range (HDR) video content, processing the LDR video content to generate instructions for transforming to HDR video content in accordance with the time constraint, rendering the HDR video content based on executing the generated instructions; and producing metadata including the generated instructions for sharing.

    See patent
  • SYSTEM AND METHOD OF RECEIVING, ANALYZING AND EDITING AUDIO TO CREATE MUSICAL COMPOSITIONS

    Filed EU 10783953.2-2225

    An apparatus for creating a musical composition is disclosed. The apparatus includes an audio interface that operably receives audio from an input device and outputs audio to an audio output device, and an audio converter module is operably connected to the audio interface to convert audio received via the audio interface into an audio track. A recording session module may be provided to repeatedly playback a live loop that includes at least a portion of a first audio track, and to add at least…

    An apparatus for creating a musical composition is disclosed. The apparatus includes an audio interface that operably receives audio from an input device and outputs audio to an audio output device, and an audio converter module is operably connected to the audio interface to convert audio received via the audio interface into an audio track. A recording session module may be provided to repeatedly playback a live loop that includes at least a portion of a first audio track, and to add at least a portion of a second audio track to the live loop during repeated playback. A multi-track compositor module may also be configured to receive a first audio track and a second audio track, automatically score each partition of the first and second audio tracks, and construct a third audio track based on the scores for each partition.

    Other inventors
    See patent
  • System and method for motion picture print forensics

    Filed US 20060225083

    A system, apparatus, and method are directed towards managing motion picture film print marking and tracking using a reel changeover marking (RCM) to encode a unique identifier. In one embodiment, an Encoded RCM (ERCM) is located within a print during a print duplication process. The ERCM is arranged to persist through a variety of transformations, including camming, compression, and so forth. In one embodiment, an identification extraction component is configured to analyze a digital copy…

    A system, apparatus, and method are directed towards managing motion picture film print marking and tracking using a reel changeover marking (RCM) to encode a unique identifier. In one embodiment, an Encoded RCM (ERCM) is located within a print during a print duplication process. The ERCM is arranged to persist through a variety of transformations, including camming, compression, and so forth. In one embodiment, an identification extraction component is configured to analyze a digital copy print to extract the unique identifier from within an ERCM. A print tracking component may then search a data store to determine a corresponding source print to the digital copy print based on the extracted unique identifier. A source of piracy may be determined, at least in part, by identifying possible security weaknesses in a distribution chain that may be associated with unauthorized duplication of the film print, and so forth.

    See patent
  • Piracy prevention system

    Filed US 20050163483

    System, apparatus, and methods are directed to preventing a media player from playing a pirated media file, such as a pre-release motion picture. The invention treats the pirated media file as an infection and develops an immune system for the media player. The invention may be taught how to recognize an infection by using an immunization record for each media file that is to be treated as an infection. As the media file is played in real-time, a fingerprint is determined. A comparison is…

    System, apparatus, and methods are directed to preventing a media player from playing a pirated media file, such as a pre-release motion picture. The invention treats the pirated media file as an infection and develops an immune system for the media player. The invention may be taught how to recognize an infection by using an immunization record for each media file that is to be treated as an infection. As the media file is played in real-time, a fingerprint is determined. A comparison is performed between the immunization records and the determined fingerprint. If a match is determined, then an alert may be provided. The alert may be employed to perform any of a variety of actions, including disabling the media player, sending a message to an owner of a digital right for the media file, and the like.

    See patent
  • Method for tracing a security breach in highly distributed content

    Filed US 20040199771

    Method and devices are directed to uniquely identifying content in a highly distributed content delivery system such that an origin of unauthorized content use may be more accurately determined. Content received from a content owner is distributed to a persistent security database and a key manager, which manages encryption and decryption keys for content that may be already encrypted. Decrypted content is fingerprinted or watermarked by a fingerprinter/watermarker module such that a recipient…

    Method and devices are directed to uniquely identifying content in a highly distributed content delivery system such that an origin of unauthorized content use may be more accurately determined. Content received from a content owner is distributed to a persistent security database and a key manager, which manages encryption and decryption keys for content that may be already encrypted. Decrypted content is fingerprinted or watermarked by a fingerprinter/watermarker module such that a recipient of content is identifiable, and saved in a separate database. Information about fingerprinted/watermarked content may be reported back to content owner for tracking purposes. A key wrap module wraps and attaches aggregator's encryption key to the content before it is transmitted to downstream service operators or users.

    See patent
  • Method and System for the End to End Securing of Content in a Video on Demand Application

    US U.S. 7,328,345

    Other inventors

Projects

  • Yottio

    WE BELIEVE
    We Believe
    At Yottio, we strive to make statements that aspire action in the things we do each day that can make life better for our clients and our users.
    We believe in the power of shared moments.
    We enable transformative mass media.
    We strive to create meaningful engagement.
    We stand up for authenticity and transparency.
    We cheer for inclusive entertainment.
    Values
    Our core values are those that inspire and motivate us to continually innovate who we…

    WE BELIEVE
    We Believe
    At Yottio, we strive to make statements that aspire action in the things we do each day that can make life better for our clients and our users.
    We believe in the power of shared moments.
    We enable transformative mass media.
    We strive to create meaningful engagement.
    We stand up for authenticity and transparency.
    We cheer for inclusive entertainment.
    Values
    Our core values are those that inspire and motivate us to continually innovate who we are, and what we can achieve together as a team, and as individuals.
    Our Social Commitment is to take actions that create equality, opportunity, and the active improvement of the real-world communities around us.
    Our Product Commitment is to deliver the very best products and services that empower media creators and their audiences to connect with each other in more meaningful and measurable ways.
    Our Economic Commitment is to operate and grow our Company in a way that delivers increasing value for our stakeholders, enables profitable & sustainable growth, and provides opportunities for the professional development & advancement of our team members.
    Home Products Team Contact

    Other creators
    See project
  • GrayMeta

    Introducing
    Haystack
    Extract, Explore, Exchange, Execute

    Next-generation
    Applying cutting edge technology to address ever growing metadata challenges

    Extensible
    Open-source Magnets library means Haystack gets better every day

    Secure
    Security is a first-class citizen; Haystack employs the most up-to-date security practices and technologies

    Explore
    Query and analyze metadata in ways that were not possible before

    Other creators
    See project
  • Visiv Technologies Inc.

    Developing Video optimization technology that improves downstream codec efficiency up to 50%
    Algorithm enhancement
    SaaS implementation
    Product Roadmap
    Team Building
    Strategic planning

    Other creators
    See project
  • Incroud

    Incroud - Entertainment loyalty / rewards platform
    Radio App - white-label radio streaming app, ad serving platform

    Other creators
    See project
  • Zya

    - Present

    Zya is the only software that allows you to easily make studio-quality music and even use famous hooks to reimagine hit songs.
    Love Music. Create Music.

    Other creators
    See project
  • Gathr Films

    -

    "Gathr democratizes theatrical distribution by allowing you, the movie-goer, to 'pull' movies to local theatres, instead of being stuck with the few options currently playing."

    What is GATHR?

    Gathr is - Theatrical On Demand.®
    99% of US theater seats lie empty Monday to Thursday.
    Thousands of good films get limited or no theatrical release.
    Gathr crowd-sources audiences and matches them with empty theatrical capacity to provide an alternative theatrical distribution…

    "Gathr democratizes theatrical distribution by allowing you, the movie-goer, to 'pull' movies to local theatres, instead of being stuck with the few options currently playing."

    What is GATHR?

    Gathr is - Theatrical On Demand.®
    99% of US theater seats lie empty Monday to Thursday.
    Thousands of good films get limited or no theatrical release.
    Gathr crowd-sources audiences and matches them with empty theatrical capacity to provide an alternative theatrical distribution platform for independent movie makers.
    Using the very tools of revolution, Gathr is disrupting movie going for everyone.

    Other creators
    See project
  • Widevine Technologies, LLC

    -

    @ Widevine we changed the streaming media industry

    Other creators
    See project

Languages

  • Afrikaans

    -

Organizations

  • COV-IRT

    member

    - Present

    The COVID-19 International Research Team (COV-IRT) is a community of scientists driving research into COVID-19. This interdisciplinary group from over 75 institutions worldwide is coordinating projects focused specifically on SARS-CoV-2, including determining heterogeneity of the viral genome sequence, analyzing host response to COVID-19 disease, characterizing potential co-infections, and identifying potential therapeutic targets for preclinical and clinical development. COV-IRT connects…

    The COVID-19 International Research Team (COV-IRT) is a community of scientists driving research into COVID-19. This interdisciplinary group from over 75 institutions worldwide is coordinating projects focused specifically on SARS-CoV-2, including determining heterogeneity of the viral genome sequence, analyzing host response to COVID-19 disease, characterizing potential co-infections, and identifying potential therapeutic targets for preclinical and clinical development. COV-IRT connects molecular biologists, viral epidemiologists, computational biologists, statisticians, coronavirologists, microbiologists, aerobiologists, and clinicians who are identifying new potential therapeutic targets in RNA-Seq datasets from COVID-19 patients with laboratory research scientists who can validate the suitability of those therapeutic candidates and further drug development. https://www.cov-irt.org/

  • METal

    -

    - Present
  • LAVA

    -

    - Present
  • SMPTE

    Member

    - Present

Recommendations received

More activity by Reza

View Reza’s full profile

  • See who you know in common
  • Get introduced
  • Contact Reza directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Reza Rassool

Add new skills with these courses