Stevenson Ranch, California, United States
Contact Info
13K followers
500+ connections
About
Articles by Reza
-
pAI OS Architecture: A Powerful Platform for Developers🚀✨
pAI OS Architecture: A Powerful Platform for Developers🚀✨
By Reza Rassool
-
20 Ideas to build @ Techstars Startup Weekend PAI Palooza Tour: Unleashing the Power of Personal AI 🌟
20 Ideas to build @ Techstars Startup Weekend PAI Palooza Tour: Unleashing the Power of Personal AI 🌟
By Reza Rassool
Contributions
Activity
-
In this video, I explore and explain that the price of your product or your service matters in how you select or target your customers. Set the price…
In this video, I explore and explain that the price of your product or your service matters in how you select or target your customers. Set the price…
Liked by Reza Rassool
-
Great to have worked with Eurochambres and International Chamber of Commerce on this new joint paper. At the OECD, we get asked a lot about how…
Great to have worked with Eurochambres and International Chamber of Commerce on this new joint paper. At the OECD, we get asked a lot about how…
Liked by Reza Rassool
Experience & Education
Volunteer Experience
Publications
-
How Generative AI will Change Your Career
Advance / ArkusNexus
Generative AI - Explore the exciting possibilities and potential impacts of this groundbreaking technology across various industries.
-
EDGE BIOMETRICS COMBINED WITH MOBILE CREDENTIAL TECHNOLOGY TO IMPROVE ACCESS CONTROL
Security Middle East Magazine
Recently, the SPA Team had the opportunity to interview Reza Rassool, CTO of RealNetworks, who shared his thoughts on combining Edge Biometrics with Mobile Technology, as a means of creating more effective Access Control. Find out more about Edge Biometrics and the importance of smooth access control on the SAFR from RealNetworks website.
-
Touch-less Authentication – How the pandemic accelerates Face recognition adoption
3rd Annual Facial Recognition & Biometrics Summit
Touchless Authentication – How the pandemic accelerates Face recognition adoption
Existing authentication solutions including queuing to present physical credentials or even touching a communal biometric reader are antithetical to guidelines for reducing infection.
Benefits of touchless authentication
Vision of a touchless future where your face is your username -
How to Engineer Ethics into AI: Combating Bias in Facial Recognition
COV-IRT International Symposium
Abstract—The growth of facial recognition (FR) technology is accompanied by consistent assertions (as catalogued by Georgetown University[i]) that demographic dependencies could lead to accuracy variations and potential bias. In the current pandemic response, AI-powered smart cameras are being used increasingly in mask-checking, occupancy-counting and fever-screening applications. Camera technology has a well-documented history of bias in its treatment of skin tone. While engineers have…
Abstract—The growth of facial recognition (FR) technology is accompanied by consistent assertions (as catalogued by Georgetown University[i]) that demographic dependencies could lead to accuracy variations and potential bias. In the current pandemic response, AI-powered smart cameras are being used increasingly in mask-checking, occupancy-counting and fever-screening applications. Camera technology has a well-documented history of bias in its treatment of skin tone. While engineers have benefited from the increased availability of AI and machine learning tools, allowing them to train their models to ever higher accuracy, the fairness and ethics of their algorithms have often been an afterthought. Modern digital algorithms are similarly susceptible to asymmetric representation and treatment of face types. This paper draws from the National Institute of Standards and Technology (NIST) report which dissects these demographic dependencies of over 100 FR algorithms and then details the strategies and techniques needed, to not only reduce bias, but deliberately design for fairness and socially responsible outcomes. Furthermore, it shows that a model trained for low-bias actually delivers higher performance.
-
How to Engineer Ethics into AI: Combating Bias in Facial Recognition
SMPTE
The growth of facial recognition (FR)
technology is accompanied by consistent assertions (as
catalogued by Georgetown University1) that demographic
dependencies could lead to accuracy variations and
potential bias. Film and video technology has a welldocumented
history of bias in its treatment of skin tone.
While engineers have benefited from the increased
availability of AI and machine learning tools, allowing
them to train their models to ever higher accuracy…The growth of facial recognition (FR)
technology is accompanied by consistent assertions (as
catalogued by Georgetown University1) that demographic
dependencies could lead to accuracy variations and
potential bias. Film and video technology has a welldocumented
history of bias in its treatment of skin tone.
While engineers have benefited from the increased
availability of AI and machine learning tools, allowing
them to train their models to ever higher accuracy, the
fairness and ethics of their algorithms have often been an
afterthought. Modern digital algorithms are similarly
susceptible to asymmetric representation and treatment
of face types. This paper draws from the National
Institute of Standards and Technology (NIST) report
which dissects these demographic dependencies of over
100 FR algorithms and then details the strategies and
techniques needed, to not only reduce bias, but
deliberately design for fairness and socially responsible
outcomes. Furthermore, it shows that a model trained for
low-bias actually delivers higher performance. -
FACE RECOGNITION DEMOGRAPHIC EFFECTS: ENGINEERING FOR ETHICS
IBC
The growth of face recognition (FR) technology is accompanied by
consistent assertions (as catalogued by Georgetown University1) that
demographic dependencies could lead to accuracy variations and potential
bias. While engineers have benefited from the increased availability of AI
and machine learning tools, allowing them to train their models to ever
higher accuracy, the fairness and ethics of their algorithms have often been
an afterthought. This paper draws from the…The growth of face recognition (FR) technology is accompanied by
consistent assertions (as catalogued by Georgetown University1) that
demographic dependencies could lead to accuracy variations and potential
bias. While engineers have benefited from the increased availability of AI
and machine learning tools, allowing them to train their models to ever
higher accuracy, the fairness and ethics of their algorithms have often been
an afterthought. This paper draws from the National Institute of Standards
and Technology (NIST) report2 which dissects these demographic
dependencies of over 100 FR algorithms and then details the strategies and
techniques needed, to not only reduce bias, but deliberately design for
fairness and socially responsible outcomes. Further, it details the lessons
learned from a leading facial recognition algorithm (SAFR) that NIST
consistently scored high for accuracy, speed, model compactness and
fairness. -
Leading the OTT Charge: What We Can Learn from China's Massive OTT Deployment
SMPTE 2018
While the streaming media market is rapidly evolving throughout the world, China is clearly leading the way in OTT deployment. With over 738 Million users, China leads the world in Internet users. (Compare this to the United States with fewer than 300 Million users.) Internet penetration in China is growing very rapidly--growing from a mere 16 percent in 2007 to over 55 percent in 2015. This large and rapid growth in Internet users has subsequently spawned a tremendous demand for OTT video. An…
While the streaming media market is rapidly evolving throughout the world, China is clearly leading the way in OTT deployment. With over 738 Million users, China leads the world in Internet users. (Compare this to the United States with fewer than 300 Million users.) Internet penetration in China is growing very rapidly--growing from a mere 16 percent in 2007 to over 55 percent in 2015. This large and rapid growth in Internet users has subsequently spawned a tremendous demand for OTT video. An estimated 229 Chinese people with watch video via an OTT streaming subscription in 2018. Fueled by such demand, China is putting OTT into practice more rapidly than anyone else. This rapid rollout in China has encountered several important challenges. Chinese providers have had to develop OTT solutions that function equally well in exceptionally dense metropolitan areas facing bandwidth overload as well as very rural areas with sparse and occasionally unreliable broadband connections. In addition, China is a complex regulatory and licensing environment with stakeholders from government, industry and the military.
-
Guest Editorial Special Issue on Quality of Experience for Advanced Broadcast Services
IEEE Transactions on Broadcasting ( Volume: 64 , Issue: 2 , June 2018 )
During the last decade, the evolution of the TV market has been remarkable. Broadcasters have been facing fresh challenges to cope with an increasing user demand for new services. With second-screen adoption and the increase of real-time news consumption via social channels, the broadcast landscape underwent a major transformation in recent years: viewers have begun to demand highly customized experiences that meet their individual needs.
-
China OTT
Content Delivery Summit
Streaming media infrastructure is rapidly evolving, and no one is putting the future into practice more than China's OTT services. Chinese OTT providers have had to quickly develop solutions for both dense metro areas facing bandwidth overload and rural areas facing slow and spotty broadband connections. These challenges have led to leading-edge solutions being rolled out on a broad scale. This talk will discuss how the Chinese market is integrating proprietary codecs for a more streamlined…
Streaming media infrastructure is rapidly evolving, and no one is putting the future into practice more than China's OTT services. Chinese OTT providers have had to quickly develop solutions for both dense metro areas facing bandwidth overload and rural areas facing slow and spotty broadband connections. These challenges have led to leading-edge solutions being rolled out on a broad scale. This talk will discuss how the Chinese market is integrating proprietary codecs for a more streamlined system that performs well in challenging environments and how companies globally can take a cue from these efforts to provide a better, more-cost-effective content viewing experience.
-
T-Commerce - one-click buying from your TV
HPA 2018
This, undoubtedly attractive, idea has been around for a while. You’re watching your favorite sitcom or celebrity show and you see it — the perfect blouse or purse or watch. Wouldn’t it be great if you could just aim your remote at the TV, push one button, and buy it? The attraction is undeniable. You get instant gratification, buying the objects you see on your favorite shows. And content creators would get extra revenue — profiting directly from the desires they have long cultivated in their…
This, undoubtedly attractive, idea has been around for a while. You’re watching your favorite sitcom or celebrity show and you see it — the perfect blouse or purse or watch. Wouldn’t it be great if you could just aim your remote at the TV, push one button, and buy it? The attraction is undeniable. You get instant gratification, buying the objects you see on your favorite shows. And content creators would get extra revenue — profiting directly from the desires they have long cultivated in their audiences. While this notion, sometimes called Enhanced TV, Shopification, or T-commerce has been around for decades, it has never been fully realized. Now thanks to cord-cutters, the shift to OTT, and the release of some futuristic new technologies, T-commerce may (finally) be just a click away.
-
VMAF reproducibility: Validating a perceptual practical video quality metric
2017 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB)
Measuring video quality with standard metrics ensures that operators can deliver to consumers the desired quality of experience (QoE) at an optimal cost. Such metrics also allow CODEC engineers to optimize the performance of their encoding algorithms. This paper briefly surveys existing video quality metrics and then presents results of the new Video Multi-Method Assessment Fusion (VMAF) metric [1] proposed by Netflix. The author and colleagues used VMAF to measure the quality of a 4K dataset…
Measuring video quality with standard metrics ensures that operators can deliver to consumers the desired quality of experience (QoE) at an optimal cost. Such metrics also allow CODEC engineers to optimize the performance of their encoding algorithms. This paper briefly surveys existing video quality metrics and then presents results of the new Video Multi-Method Assessment Fusion (VMAF) metric [1] proposed by Netflix. The author and colleagues used VMAF to measure the quality of a 4K dataset encoded with the RealMedia video CODEC at a range of bitrates. They also gathered subjective quality assessments from a group of viewers for the same dataset. The paper presents findings of correlation between subjective and objective results.
-
RealMediaHD: The Case for a Proprietary CODEC - a breakfast roundtable
HPA SMPTE
Abstract
As the industry ponders the upgrade from h.264 to h.265 a new contender enters the market. At Streaming Media East 2016 RealNetworks unveiled the 11th version of RealVideo CODEC called RMHD. This paper places RMHD in the landscape of its competitors and outlines market opportunities and adoption challenges facing this proprietary video encoding technology.
· Compression vs h.264
· Encoding speed
· Low end-to-end latency
·…Abstract
As the industry ponders the upgrade from h.264 to h.265 a new contender enters the market. At Streaming Media East 2016 RealNetworks unveiled the 11th version of RealVideo CODEC called RMHD. This paper places RMHD in the landscape of its competitors and outlines market opportunities and adoption challenges facing this proprietary video encoding technology.
· Compression vs h.264
· Encoding speed
· Low end-to-end latency
· Stream-ability
· Index-ability
· License
· China
· Proprietary advantage
The conversation could be broader – considering the challenge VP9 faces against the incumbent CODEC.
-
Focus on the Future: Emerging Technologies Panel
APEX
APEX Insight: APEX TECH’s closing session brought together a panel of remarkable people to brainstorm and investigate emerging and future technologies. In setting the stage, APEX’s Rich Salter says “The thinking was that technologies are changing so fast that we needed to bring together a panel to look 5 to 15 years in the future. The Emerging Tech Advisory Panel will get together periodically during the year. The panel is open to APEX and non-APEX members.” - See more at:…
APEX Insight: APEX TECH’s closing session brought together a panel of remarkable people to brainstorm and investigate emerging and future technologies. In setting the stage, APEX’s Rich Salter says “The thinking was that technologies are changing so fast that we needed to bring together a panel to look 5 to 15 years in the future. The Emerging Tech Advisory Panel will get together periodically during the year. The panel is open to APEX and non-APEX members.” - See more at: http://apex.aero/2015/11/18/emerging-technology-panel-apex-tec#sthash.jkHbV3nm.dpuf
When it comes to the quality of video content, Kwaai Oak’s Reza Rassool believes that encoding technology needs improvement, automatically adapting to displays, whether embedded or on passengers’ PEDs. “We still have dragons to slay in video compression. There’s a whole lot more that can be done. With an encode that can understand the size of the screen and adjust appropriately, we’ll get a consistent quality of experience,” says Rassool. - See more at: http://apex.aero/2015/11/18/emerging-technology-panel-apex-tec#sthash.jkHbV3nm.dpuf -
District Six: Lest We Forget
Kwaai Oak
The context is Cape Town, South Africa of the 1930s as seen through the pre-teen eyes of the author, Yousuf ‘Joe’ Rassool when ‘life was one interminable summer’. No. 7 Buitencingle Street, the unoccupied and shuttered ancestral family home of the Gools, is opened to their relatives, the Rassools, as temporary accommodation. The house, now run down, spoke of a former grandeur, of lost nobility and wealth. It was once the venue of dignitaries, politicians, and intellectuals including Dr Abdulla…
The context is Cape Town, South Africa of the 1930s as seen through the pre-teen eyes of the author, Yousuf ‘Joe’ Rassool when ‘life was one interminable summer’. No. 7 Buitencingle Street, the unoccupied and shuttered ancestral family home of the Gools, is opened to their relatives, the Rassools, as temporary accommodation. The house, now run down, spoke of a former grandeur, of lost nobility and wealth. It was once the venue of dignitaries, politicians, and intellectuals including Dr Abdulla Abdurahman, Henry Sylvester Williams, and MK Gandhi. Gool’s association with Gandhi also led to a romance between Gool’s daughter Timmie and Manilal, Gandhi’s son. Gandhi eventually vetoed their marriage proposal citing the marriage between a Hindu and Muslim would be like ‘putting two swords in one sheath.’
Other authors -
-
HyperElasticity(tm) - Handling Spike Events
DCIA Cloud Computing West
Kwaai Oak CTO, Reza Rassool, keynotes a session at the DCIA Cloud Computing West 2013 in Las Vegas on Monday October 28, 2013.
Elasticity affects the bottom line of any ecommerce platform. While normal auto-scaling mechanisms handle slowly varying loads, a whole new approach is required to handle spike events. Spike events typically occur when a public message such as a tweet from a celebrity or a televised speech from a president send a large audience to a website. The ensuing traffic…Kwaai Oak CTO, Reza Rassool, keynotes a session at the DCIA Cloud Computing West 2013 in Las Vegas on Monday October 28, 2013.
Elasticity affects the bottom line of any ecommerce platform. While normal auto-scaling mechanisms handle slowly varying loads, a whole new approach is required to handle spike events. Spike events typically occur when a public message such as a tweet from a celebrity or a televised speech from a president send a large audience to a website. The ensuing traffic spike is higher and rises faster than the normal daily fluctuation of visitors.
Spikes stretch cloud platforms beyond their 'elastic limit' often into a failure mode.
Rassool, presents some findings from work on the Gathr Films platform and discusses techniques and choices in the pursuit of HyperElasticity(tm) - the fine-grained auto-scaling aimed at maximizing the conversion of sudden traffic spikes.
Kwaai Oak is a Los Angeles technology consultancy that powers many startups through the 'CTO-as-a-service.' -
Clouds Here, Clouds There, Clouds Everywhere
SXSW
There’s definitely something going on with all of this cloud talk, but what does it mean for you? If you’re involved with a gaming, entertainment or digital company, it could mean the difference of getting your product or idea to market faster without too much capital investment or being able to beat out the traditional players stuck in their old school ways. You’re cutting edge, right? So why not take advantage of cutting edge technology for your business? Josh Fraser will help peel away the…
There’s definitely something going on with all of this cloud talk, but what does it mean for you? If you’re involved with a gaming, entertainment or digital company, it could mean the difference of getting your product or idea to market faster without too much capital investment or being able to beat out the traditional players stuck in their old school ways. You’re cutting edge, right? So why not take advantage of cutting edge technology for your business? Josh Fraser will help peel away the layers of how you can use cloud computing, addressing the key differences of clouds and how to choose the best cloud computing infrastructure for your company. Josh will be joined by Reza Rassool, CTO of Music Mastermind, who will share with you how the company started and launched their music application on the cloud. Attend this session to get a view of why companies such as Music Mastermind, Zynga, EA, and Big Fish Games are all running on the cloud.
Other authorsSee publication -
MUSIC-MAKING FOR THE MASSES: MORE PERFORMANCE FOR LESS COST IN COMMERCIAL CLOUD ENVIRONMENTS USING IBM IDATAPLEX IN THE ZYA CLOUD
the Edison Group
This technical white paper shows how application service provider Music Mastermind delivers its suite of products and services more economically and with greater growth potential than it could on an exclusively public cloud environment such as Amazon Web Services (AWS). Cloud solution provider Micro Strategies evaluated several options to design the most cost-effective cloud-based environment and determined that the best solution to reliably satisfy Music Mastermind’s computing requirements…
This technical white paper shows how application service provider Music Mastermind delivers its suite of products and services more economically and with greater growth potential than it could on an exclusively public cloud environment such as Amazon Web Services (AWS). Cloud solution provider Micro Strategies evaluated several options to design the most cost-effective cloud-based environment and determined that the best solution to reliably satisfy Music Mastermind’s computing requirements would be a hybrid cloud-based environment, utilizing IBM iDataPlex systems in the private cloud. By moving its data center workloads from AWS to the private cloud environment, Music Mastermind could run its cloud-based application with as much as five times the performance per dollar. They also were able to expand their business reach to geographic regions where reliance on a public cloud is not possible.
Other authors -
-
Timely and Secure – Real-time Performance Challenges in Content Security
SMPTE
Content encryption, subscriber authentication, and secure key distribution are the mainstays of digital rights management (DRM) and conditional access (CA) systems in modern entertainment networks. In the traditional DVB CA security model , entitlement control messages and entitlement management messages are inserted into an encrypted MPEG stream. These messages are received in a timely manner by a subscriber device, to enable it to access the stream data. In more modern delivery networks…
Content encryption, subscriber authentication, and secure key distribution are the mainstays of digital rights management (DRM) and conditional access (CA) systems in modern entertainment networks. In the traditional DVB CA security model , entitlement control messages and entitlement management messages are inserted into an encrypted MPEG stream. These messages are received in a timely manner by a subscriber device, to enable it to access the stream data. In more modern delivery networks, watermarking, fingerprinting, and digital copy protection are additional processes that have been inserted into the pipeline to secure the business of on-line entertainment. All these security processes introduce measurable temporal distortions in bandwidth, latency, and jitter to the smooth flowing of entertainment content to subscribers. While fundamental real-time requirements stem from linear broadcast applications, file-based delivery imposes a new set of constraints that challenge engineers to deliver content in a secure and timely manner. File-based distribution calls for security processing that scales, persists and is faster than real-time. This paper quantifies the potential temporal distortions in the DVB CA security model, detailing the perceptible effects on channel change time, temporal jitter and latency. Furthermore, it explores the challenges introduced by the signal processing of more modern schemes securing both linear and non-linear delivery and goes on to describe some technical approaches to their solution.
-
Protecting Your Intellectual Property
Digital Hollywood
-
Scaling Watermarking for IPTV
SMPTE, VidTrans
Video and Audio watermarking is a relatively new technology that has been used in post-production to mark some movie content and is planned to be used in digital cinema applications. There are significant challenges of scalability, performance, and economy in adapting the same technology to today’s home entertainment (HE) content delivery networks (CDN). This paper describes how partitioning the watermarking process into a client-server architecture allows the application of session-based…
Video and Audio watermarking is a relatively new technology that has been used in post-production to mark some movie content and is planned to be used in digital cinema applications. There are significant challenges of scalability, performance, and economy in adapting the same technology to today’s home entertainment (HE) content delivery networks (CDN). This paper describes how partitioning the watermarking process into a client-server architecture allows the application of session-based watermarking to be scaled economically to the largest content delivery networks. Further, the paper describes how watermarking must be implemented within the security envelope of a conditional access or DRM system.
-
Video On Demand – Now!
SMPTE
-
Thorny Issues in Asset Management
GSAM
-
Anti-piracy Trends and Technology
IBC, Lecture at Pomona College, Panel session at Streaming Media West
In 2001 the movie and television industry was reportedly anxious about the
‘Napsterization’ (1) of their valuable content. While the peer-to-peer sharing
phenomenon on the Internet has dramatically changed the business of the
music industry (2) the picture domain bares many differences. The rise in
piracy of entertainment content has given rise to an arms race of technology
and process between the pirates and the Internet policing services. This
paper presents some of…In 2001 the movie and television industry was reportedly anxious about the
‘Napsterization’ (1) of their valuable content. While the peer-to-peer sharing
phenomenon on the Internet has dramatically changed the business of the
music industry (2) the picture domain bares many differences. The rise in
piracy of entertainment content has given rise to an arms race of technology
and process between the pirates and the Internet policing services. This
paper presents some of the findings of a yearlong anti-piracy operation that
has focused on tracking motion pictures on the Internet. It presents new
metrics for quantifying piracy, reports on the observed behaviour patterns of
the pirates and specific results for the well-known titles of the last year. The
paper further discusses the various technologies including encryption,
watermarking and fingerprinting being used in anti-piracy and explores the
trends going forward. -
Trick Play in Compressed AV streams
IBC
When A/V material is stored on disk storage we gain the non-linear functionality that tape cannot provide.
We must, however, not lose the much-cherished functionality of tape. The term ‘trick play’ describes the
operation of accessing A/V material from a stored stream in a sequence and rate other than forward at
unity speed. It includes VCR-like features such as slow motion, reverse play, fast forward and rewind. It
is a significant engineering challenge to provide trick play…When A/V material is stored on disk storage we gain the non-linear functionality that tape cannot provide.
We must, however, not lose the much-cherished functionality of tape. The term ‘trick play’ describes the
operation of accessing A/V material from a stored stream in a sequence and rate other than forward at
unity speed. It includes VCR-like features such as slow motion, reverse play, fast forward and rewind. It
is a significant engineering challenge to provide trick play features for disk-based digitally stored material.
This paper reviews the requirements of trick play for editing systems, video servers and consumer playback
systems. Firstly, it lays out the essential attributes of an ideal solution including bandwidth conservation,
storage efficiency, file system simplicity, decodeability and buffer memory conservation. The paper rates
some existing solutions with respect to these attributes. Secondly, it proposes a novel, high-scoring solution
based on formatting the movie material in generic isochronous frequency intervals, GIFIs. In many existing
playback systems, the buffering mechanisms segment and reassemble the stream of movie material. Simple
buffering schemes segment the stream into equal size chunks of memory. More sophisticated schemes
segment into isochronous (equal time) chunks. This paper suggests that in order to provide an ideal solution
for trick-play the buffering scheme should segment the movie material in both time and frequency. The paper
then goes on to describe the method in which these segments should be arranged on a disk in order to
support trick-play. This paper then discusses how the GIFI concept could be applied to MPEG movies stored
on disc or CD-ROM. -
Networked storage
Tribune Engineering Conference NAB
-
RAID storage
Digital Video Storage Conference
-
Video Disk Recorder Generations
IBC '97, Broadcast Engineering
The video disk recorder (VDR) has over the years found many applications in the post production and broadcast industry. At NAB '97 an exciting array of new VDRs and hybrid recorders was launched contrasting the paucity of new VTR product offerings. This paper seeks to categorize the generations of VDR and specifically describes how the third generation of embedded disk recorders are best suited to meet a diversity of market requirements. The paper then suggests how a 4th generation of VDR may…
The video disk recorder (VDR) has over the years found many applications in the post production and broadcast industry. At NAB '97 an exciting array of new VDRs and hybrid recorders was launched contrasting the paucity of new VTR product offerings. This paper seeks to categorize the generations of VDR and specifically describes how the third generation of embedded disk recorders are best suited to meet a diversity of market requirements. The paper then suggests how a 4th generation of VDR may evolve into a LAN attached media port with strong data serving capabilities
-
AV Drives the Next Generation
World Media Expo
-
Video Servers Implementation and Technology
NAB '96, Computer Technology Review
-
Non-linear Editing
Royal Television Society
-
Brushing in Paint Systems
Crosfield Electronics
-
Survey of Real-time Kernels
Crosfield Electronics
-
Short and Sweet: The Rise of Multichannel Networks (MCNs) and Personalization
ETCA 2016 Panel
Unnoticed by some in mainstream video media, the Multi-Channel Network (MCN)–YouTube phenomena has grown to become a significant source of online video content. MCNs are becoming a driving force in generating new programming models, as well as direct contact to viewers, working with individual video creators on YouTube to provide product, funding, cross-promotion, partner management, digital rights management, monetization/sales, and/or audience development in exchange for a percentage of the…
Unnoticed by some in mainstream video media, the Multi-Channel Network (MCN)–YouTube phenomena has grown to become a significant source of online video content. MCNs are becoming a driving force in generating new programming models, as well as direct contact to viewers, working with individual video creators on YouTube to provide product, funding, cross-promotion, partner management, digital rights management, monetization/sales, and/or audience development in exchange for a percentage of the ad revenue from the channel. Indeed, there are 18-year olds making millions of dollars creating shopping and makeup video blogs on MCNs. Their content is aimed at Generation Z, who consume far less television than their parents, and what video they consume is generally viewed on a smaller screen (e.g., PCs, laptops, tablets, smartphones, etc.). A shift is in process. There are two business-technical issues worth examining that could have an impact of SMPTE members: (1) the effort to move their content to more platforms than just YouTube and (2) the production of more sophisticated and longer form video content. This panel will examine where the MCN/MPN video phenomenon is headed and the impact it will have mainstream television and movie production companies
Other authorsSee publication -
T-commerce — one-click buying
Medium
This, undoubtedly attractive, idea has been around for a while. You’re watching your favorite sitcom or celebrity show and you see it — the perfect blouse or purse or watch. Wouldn’t it be great if you could just aim your remote at the TV, push one button, and buy it? The attraction is undeniable. You get instant gratification, buying the objects you see on your favorite shows. And content creators would get extra revenue — profiting directly from the desires they have long cultivated in their…
This, undoubtedly attractive, idea has been around for a while. You’re watching your favorite sitcom or celebrity show and you see it — the perfect blouse or purse or watch. Wouldn’t it be great if you could just aim your remote at the TV, push one button, and buy it? The attraction is undeniable. You get instant gratification, buying the objects you see on your favorite shows. And content creators would get extra revenue — profiting directly from the desires they have long cultivated in their audiences. While this notion, sometimes called Enhanced TV, Shopification, or T-commerce has been around for decades, it has never been fully realized. Now thanks to cord-cutters, the shift to OTT, and the release of some futuristic new technologies, T-commerce may (finally) be just a click away.
Patents
-
Intelligent metadata service for video enhancement
Issued US-11544826-B2
Embodiments are directed towards metadata service for video enhancement. An example method includes receiving a request for metadata applicable to instruct a display device to transform low dynamic range (LDR) video content to high dynamic range (HDR) video content, determining availability of candidate metadata, and responsive to determining that no candidate metadata is available, providing options for generating the metadata applicable to instruct the display device. The example method can…
Embodiments are directed towards metadata service for video enhancement. An example method includes receiving a request for metadata applicable to instruct a display device to transform low dynamic range (LDR) video content to high dynamic range (HDR) video content, determining availability of candidate metadata, and responsive to determining that no candidate metadata is available, providing options for generating the metadata applicable to instruct the display device. The example method can also include causing generation of the metadata based at least one of the options, and providing the generated metadata to the display device.
-
Hue-based video enhancement and rendering
Issued US-11544827-B2
Embodiments are directed towards hue-based video enhancement. An example method includes processing low dynamic range (LDR) video content to generate an inverse tone map (ITM) for transforming the LDR video content to high dynamic range (HDR) video content, converting the LDR video content into Hue, Saturation and Lightness (HSY) color space to produce H-channel data, S-channel data, and Y-channel data, de-noising the H-channel data, remapping the de-noised H-channel data, the S-channel data…
Embodiments are directed towards hue-based video enhancement. An example method includes processing low dynamic range (LDR) video content to generate an inverse tone map (ITM) for transforming the LDR video content to high dynamic range (HDR) video content, converting the LDR video content into Hue, Saturation and Lightness (HSY) color space to produce H-channel data, S-channel data, and Y-channel data, de-noising the H-channel data, remapping the de-noised H-channel data, the S-channel data, and the Y-channel data based on the ITM; and rendering the HDR video content based thereon.
-
METHODS AND SYSTEMS FOR FACIAL RECOGNITION USING MOTION VECTOR TRAINED MODEL
Issued US 11,275,928
Systems and methods are provided for determining a candidate identity of a person in video data based on a biometric motion signature corresponding to motion of a face of the person in the video data. Motion information is obtained corresponding to motion of the face in the video data. The motion information is provided as input to a neural network and the neural network generates the biometric motion signature in response. The biometric motion signature is compared with a plurality of…
Systems and methods are provided for determining a candidate identity of a person in video data based on a biometric motion signature corresponding to motion of a face of the person in the video data. Motion information is obtained corresponding to motion of the face in the video data. The motion information is provided as input to a neural network and the neural network generates the biometric motion signature in response. The biometric motion signature is compared with a plurality of biometric signatures stored in data storage. The candidate identity of the person is determined as a result of a correspondence between the biometric motion signature and a stored biometric signature of the plurality of biometric signatures.
-
MULTI-LAYERED VIDEO STREAMING SYSTEMS AND METHODS
Issued US 11,070,846
Systems and methods for enabling a video capture/encoding device to capture frames of a video sequence; obtain feedback from a video decoding/rendering device; divide each frame into an array of patches; select one or more patches of each frame for supplemental processing; cause the frames of the video sequence to be encoded by a video encoding module and cause the selected patches to be processed by one or more supplemental processing module(s); and assemble a multi-layer video transport…
Systems and methods for enabling a video capture/encoding device to capture frames of a video sequence; obtain feedback from a video decoding/rendering device; divide each frame into an array of patches; select one or more patches of each frame for supplemental processing; cause the frames of the video sequence to be encoded by a video encoding module and cause the selected patches to be processed by one or more supplemental processing module(s); and assemble a multi-layer video transport stream wherein, for each frame of the video sequence, a base layer of the transport stream includes data corresponding to an encoded version of the current frame and one or more supplemental layers of the transport stream include meta-data corresponding to the division of the current frame into patches and data corresponding to the output of the supplemental processing of the selected patches of the current frame.
-
System and Method for Generating Musical Tracks Within a Continuously Looping Recording Session
Issued US 9,263,021
An apparatus for creating a musical composition comprising an audio interface, an audio converter and a live looping recording session is disclosed. The audio interface operably receives audio from an input device and outputs audio to an audio output device. The audio converter module is operably connected to the audio interface to convert audio received via the audio interface into an audio track. The recording session module is configured to repeatedly playback a live loop that includes at…
An apparatus for creating a musical composition comprising an audio interface, an audio converter and a live looping recording session is disclosed. The audio interface operably receives audio from an input device and outputs audio to an audio output device. The audio converter module is operably connected to the audio interface to convert audio received via the audio interface into an audio track. The recording session module is configured to repeatedly playback a live loop that includes at least a portion of a first audio track, and to add at least a portion of a second audio track to the live loop during repeated playback. The first audio track may be a pre-existing track stored in a data storage medium. The recording session module may be configured to add at least a portion of a third audio track to the live loop during playback, which may be automatically generated based on one or more musical criteria of the first or second tracks. The apparatus may include a user interface coupled to the recording session module to provide a visual representation illustrating the portion of the live loop that is being played. The audio converter module may include a track partitioner to divide at least one of the first and second audio tracks into one or more partitions, a quantizer that aligns audio with a predetermined beat, and a frequency detector to identify the pitch of one or more sounds leading to their storage as a morphology. A method is also provided.
Other inventors -
-
System and Method for Providing Audio for a Requested Note Using a Render Cache
Issued US 9,257,053
A method for providing audio data corresponding to a requested musical note is disclosed, the method comprising: (a) providing a render cache having a plurality of cache entries, each of the cache entries corresponding to a different note; (b) receiving a request for a first note from a client; (c) identifying a first cache entry corresponding to the first note; (d) determining that a first audio segment corresponding to the first cache entry is not available; (e) identifying a second audio…
A method for providing audio data corresponding to a requested musical note is disclosed, the method comprising: (a) providing a render cache having a plurality of cache entries, each of the cache entries corresponding to a different note; (b) receiving a request for a first note from a client; (c) identifying a first cache entry corresponding to the first note; (d) determining that a first audio segment corresponding to the first cache entry is not available; (e) identifying a second audio segment corresponding to a near-hit cache entry in the render cache; and (f) processing the second audio segment into a third audio segment that is substantially similar to the first audio segment.
Other inventorsSee patent -
System and Method for Applying a Chain of Effects to a Musical Composition
Issued US 8,785,760
A method for applying audio effects to one or more tracks off musical compilation is disclosed. The method comprises identifying a first virtual musician to be associated with a first instrument track; identifying a first virtual producer to be associated with the first instrument track; applying a first series of effects to the first instrument track, the first series of effects being dependent upon the first virtual musician; and applying a second series of effects to the first instrument…
A method for applying audio effects to one or more tracks off musical compilation is disclosed. The method comprises identifying a first virtual musician to be associated with a first instrument track; identifying a first virtual producer to be associated with the first instrument track; applying a first series of effects to the first instrument track, the first series of effects being dependent upon the first virtual musician; and applying a second series of effects to the first instrument track, the second series of effects being dependent upon the first virtual producer.
Other inventorsSee patent -
System and method for producing a more harmonious musical accompaniment
Issued US 8,779,268
A system and process for producing a more harmonious musical accompaniment for a musical compilation, the process comprising determining a plurality of probable key signatures for the musical compilation, creating an interval profiling matrix for each of the probable key signatures, finding products of a major key interval profile matrix with each of the interval profiling matrices, summing each of the major key interval products into a running major key sum, finding a product of a minor key…
A system and process for producing a more harmonious musical accompaniment for a musical compilation, the process comprising determining a plurality of probable key signatures for the musical compilation, creating an interval profiling matrix for each of the probable key signatures, finding products of a major key interval profile matrix with each of the interval profiling matrices, summing each of the major key interval products into a running major key sum, finding a product of a minor key interval profile with each of the interval profiling matrices, summing each of the minor key interval products into a running minor key sum, and selecting the most probable key signature from the plurality of probable key signatures by comparing the minor key sum and the major key sum.
Other inventorsSee patent -
AUDIO/VIDEO IDENTIFICATION WATERMARKING
Issued US 8,683,601
The invention is directed to marking audio/video (A/V) signals for use in tracing content to a source. An ID controller captures an A/V synchronization fingerprint from a master A/V signal, stores the fingerprint in a data store, and provides signals to an ID encoder to have encoded an identifier into a copy of the master A/V signal. The identifier is encoded to be persistent through actions such as capture, compression, and/or transcoding. In one embodiment, the identifier is encoded as a bit…
The invention is directed to marking audio/video (A/V) signals for use in tracing content to a source. An ID controller captures an A/V synchronization fingerprint from a master A/V signal, stores the fingerprint in a data store, and provides signals to an ID encoder to have encoded an identifier into a copy of the master A/V signal. The identifier is encoded to be persistent through actions such as capture, compression, and/or transcoding. In one embodiment, the identifier is encoded as a bit sequence, where each bit is encoded using an encoding technique that is hereinafter called a Mississippi encoding technique. The encoded identifier within the copied A/V signal may later be determined by extracting the fingerprint and comparing it to the stored fingerprint to determine the identifier. The identifier may then be used to trace a source of the copied A/V signal.
-
System and Method for Generating a Musical Compilation Track from Multiple Takes
Issued US 8492634
An apparatus for creating a musical composition comprising an audio interface, and audio converter module, and a multi-track compositor module is disclosed. The audio interface operably receives audio from an audio input device and outputting audio to an audio output device. The audio converter module is operably connected to the audio interface to convert audio received via the audio interface into an audio track having one or more partitions. The multi-track compositor module is configured to…
An apparatus for creating a musical composition comprising an audio interface, and audio converter module, and a multi-track compositor module is disclosed. The audio interface operably receives audio from an audio input device and outputting audio to an audio output device. The audio converter module is operably connected to the audio interface to convert audio received via the audio interface into an audio track having one or more partitions. The multi-track compositor module is configured to receive a first audio track and a second audio track and automatically score each partition of the first and second audio tracks based on one or more criteria. The multi-track compositor module is then configured to construct a third audio track from the partitions of the first and second audio tracks based on the scores for each partition. A method is also provided.
-
System and Method for Producing a Harmonious Musical Accompaniment
Issued US 8338686
An apparatus for enhancing audio comprising a first interface and a harmonizing module is disclosed. The first interface receive a first audio segment from a first source. The harmonizing module is coupled to the first interface. The harmonizing module is configured to identify at least one musical property of the first audio segment; calculate a subset of notes that are harmonious with the first audio segment based on the at least one musical property; and select from the subset of notes to…
An apparatus for enhancing audio comprising a first interface and a harmonizing module is disclosed. The first interface receive a first audio segment from a first source. The harmonizing module is coupled to the first interface. The harmonizing module is configured to identify at least one musical property of the first audio segment; calculate a subset of notes that are harmonious with the first audio segment based on the at least one musical property; and select from the subset of notes to generate an audio track to be played substantially synchronously with the first audio segment. A second interface may also be provided to receive a second audio segment from a second source. In this case, the harmonizing module may be configured to generate the audio track by transforming one or more notes of the second audio segment. A method is also provided.
Other inventors -
-
ENABLING TRANSFERABLE ENTITLEMENTS BETWEEN NETWORKED DEVICES
Issued US 8,325,920
A method, apparatus, and system are directed towards employing transferable entitlements using EMMs for enabling a purchase of content using a mobile device, and redeeming for access the content using a different network device. An existing billing infrastructure may be used during a purchase transaction to identify the purchasing device. Upon billing authorization, a transferable EMM (XEMM) may be sent to the purchasing device. The purchasing device may then provide the XEMM to another network…
A method, apparatus, and system are directed towards employing transferable entitlements using EMMs for enabling a purchase of content using a mobile device, and redeeming for access the content using a different network device. An existing billing infrastructure may be used during a purchase transaction to identify the purchasing device. Upon billing authorization, a transferable EMM (XEMM) may be sent to the purchasing device. The purchasing device may then provide the XEMM to another network device. The other network device may send the XEMM to a redeeming service when requesting access to the content. Upon authorization, an EMM with an access key to the content may be sent to the other network device.
Other inventorsSee patent -
Method and system for end to end securing of content for video on demand
Issued US 7,328,345
A system and method for providing end-to-end security of content over a heterogeneous distribution chain is provided. A content owner provides content to an aggregator that receives the content and processes the content. The processing may involve decrypting the content and associating at least one of a unique fingerprint and a watermark to the decrypted content. The unique fingerprint and a watermark to the decrypted content provide identifying characteristics to the content. Additional…
A system and method for providing end-to-end security of content over a heterogeneous distribution chain is provided. A content owner provides content to an aggregator that receives the content and processes the content. The processing may involve decrypting the content and associating at least one of a unique fingerprint and a watermark to the decrypted content. The unique fingerprint and a watermark to the decrypted content provide identifying characteristics to the content. Additional content-based fingerprints may be used to monitor quality of consumer experience for Video and Audio. The content may be sent in a decrypted state to a client or in an encrypted state. When the content is encrypted the aggregator wraps and encrypts the content with a signature such that an end-to-end flow of the content may be determined. Application Level encryption is used to provide network/distribution medium transparency as well as persistent encryption. When the content is transmitted from a...
Other inventorsSee patent -
Transitioning to secure IP communications for encoding, encapsulating, and encrypting data
Issued US 7817608
An apparatus, system, and method is directed to transcoding broadcast content, such as in a DVB, ATSC, and MPEG based network, to secure content suitable for an Internet Protocol (IP) based network. In one embodiment, a single multifunctional convergence appliance is employed to enable such transcoding actions as encryption, encoding, and/or encapsulation. For example, in one embodiment, an MPEG transport stream associated with the broadcast content may be transcoded to an IP-based transport…
An apparatus, system, and method is directed to transcoding broadcast content, such as in a DVB, ATSC, and MPEG based network, to secure content suitable for an Internet Protocol (IP) based network. In one embodiment, a single multifunctional convergence appliance is employed to enable such transcoding actions as encryption, encoding, and/or encapsulation. For example, in one embodiment, an MPEG transport stream associated with the broadcast content may be transcoded to an IP-based transport stream. In addition, the transport stream may be decrypted, transrated to another rate, and re-encrypted using a different control word for re-encrypting, but a same service key to encrypt the different control word. The system is also enabled to transcode content formatted for the IP-based network to a content format suitable for the broadcast network.
Other inventorsSee patent -
Media tracking system and method
Issued US 7043473
A method for identifying a media file transmitted over a network includes creating a plurality of known media file identifiers, each for a respective one of a plurality of known media files, using an identifier generating algorithm, storing the known media file identifiers in a database, creating a media file identifier for an unknown media file with the identifier generating algorithm and comparing the media file identifier for the unknown media file with known media file identifiers in order…
A method for identifying a media file transmitted over a network includes creating a plurality of known media file identifiers, each for a respective one of a plurality of known media files, using an identifier generating algorithm, storing the known media file identifiers in a database, creating a media file identifier for an unknown media file with the identifier generating algorithm and comparing the media file identifier for the unknown media file with known media file identifiers in order to produce an identification of the unknown media file.
Other inventorsSee patent -
Securely relaying content using key chains
Issued US 7349886
A system, apparatus, and method are directed towards generating chains of encrypted decryption keys for content in a highly distributed environment. In one embodiment, the key chain may be provided within an Entitlement Control Message (ECM). An access key that enables decryption of a current link within the chain of decryption keys may be provided to a downstream recipient using an out-of-band mechanism. Alternatively, the access key may be provided through an in-band mechanism, such as…
A system, apparatus, and method are directed towards generating chains of encrypted decryption keys for content in a highly distributed environment. In one embodiment, the key chain may be provided within an Entitlement Control Message (ECM). An access key that enables decryption of a current link within the chain of decryption keys may be provided to a downstream recipient using an out-of-band mechanism. Alternatively, the access key may be provided through an in-band mechanism, such as through the use of Entitlement Management Message (EMM), or the like. In one embodiment, the access key within the EMM may be further encrypted by another encryption key that may be unique to the downstream recipient.
Other inventorsSee patent -
Video processing methods for improving visual acuity and/or perceived image resolution
Issued US 8,428,741
A method and apparatus for improving visual acuity when providing a visual image from a “high” resolution input device to a “low” resolution output device. The described invention is of particular use when the output device is an array of electrodes as part of a retinal prosthesis used to restore vision to a visually-impaired patient. In that various limitations may, within the foreseeable future, limit the density of such an electrode array (and thus the resolution of the output image), the…
A method and apparatus for improving visual acuity when providing a visual image from a “high” resolution input device to a “low” resolution output device. The described invention is of particular use when the output device is an array of electrodes as part of a retinal prosthesis used to restore vision to a visually-impaired patient. In that various limitations may, within the foreseeable future, limit the density of such an electrode array (and thus the resolution of the output image), the present invention teaches techniques to assign processed pixel subsets of a higher resolution image to a single electrode. By varying the pixel subsets, e.g., by jittering, and/or altering the processing criteria, the perceived visual acuity may be further improved. Alternatively and additionally, such processing may be further extended to drive neighboring electrodes in combination to thus stimulate virtual electrode sites and thus further enhance visual acuity.
Other inventorsSee patent -
Article locator system
Issued US 6,788,199
A system and method for locating objects such as people, pets, and personal articles is described. A transceiver is attached to the person, animal, or item to be tracked and a handheld locator device is employed to transmit a locator signal containing an address code to the transceiver. Upon receipt of a signal, the transceiver compares the address code contained in the locator signal with an address code stored in the transceiver. If the two codes are same, the transceiver sends a return…
A system and method for locating objects such as people, pets, and personal articles is described. A transceiver is attached to the person, animal, or item to be tracked and a handheld locator device is employed to transmit a locator signal containing an address code to the transceiver. Upon receipt of a signal, the transceiver compares the address code contained in the locator signal with an address code stored in the transceiver. If the two codes are same, the transceiver sends a return signal back to the locator device. The locator device uses this return signal to determine the distance and/or direction of the transceiver from the user's location. The system allows a user to select from a multiple number of items to locate and allows multiple users to search for different articles within the same general area without interference.
Other inventorsSee patent -
Method of pre-caching or pre-fetching data utilizing thread lists and multimedia editing systems using such pre-caching
Issued US 6,092,154
A method of pre-caching data using thread lists, and a multi-media editing system using such a pre-caching method, are disclosed. A list of data which will be required by a host application is passed to a data storage device such as a hard disk drive, CDROM drive, or other data storage device. The data storage device locates the data and stores it in its own storage device buffer. Thus, the data is immediately available when requested by the host. The pre-caching method may be used in a…
A method of pre-caching data using thread lists, and a multi-media editing system using such a pre-caching method, are disclosed. A list of data which will be required by a host application is passed to a data storage device such as a hard disk drive, CDROM drive, or other data storage device. The data storage device locates the data and stores it in its own storage device buffer. Thus, the data is immediately available when requested by the host. The pre-caching method may be used in a multimedia or video editing system to quickly retrieve data from storage devices. The thread list may include a video thread, an audio thread and a data access parameter reflecting host data application requirements. The data access parameter may include at least one of data prioritization, cache management, error processing including resend capability, and data supply rate. The thread list may also include data specifying a percentage of the storage device buffer to be reserved for read ahead data...
Other inventors -
-
Image generating apparatus
Issued US 4,954,912
Apparatus for generating a composite image from a plurality of subsidiary images comprises first stores for storing signals representing at least two subsidiary images. Second stores store at least two arrays of mask data, each array having a mask pixel corresponding to each pixel of the composite image. A control system is responsive to each array of mask data to generate for the pixels of the composite image signals defining a weighted sum of the subsidiary images.
Other inventorsSee patent -
REAL-TIME VIDEO ENHANCEMENT AND METADATA SHARING
Filed US-20220351342-A1
Embodiments are directed towards video enhancement in accordance with time constraint. An example method includes determining a time constraint for transforming low dynamic range (LDR) video content to high dynamic range (HDR) video content, processing the LDR video content to generate instructions for transforming to HDR video content in accordance with the time constraint, rendering the HDR video content based on executing the generated instructions; and producing metadata including the…
Embodiments are directed towards video enhancement in accordance with time constraint. An example method includes determining a time constraint for transforming low dynamic range (LDR) video content to high dynamic range (HDR) video content, processing the LDR video content to generate instructions for transforming to HDR video content in accordance with the time constraint, rendering the HDR video content based on executing the generated instructions; and producing metadata including the generated instructions for sharing.
-
SYSTEM AND METHOD OF RECEIVING, ANALYZING AND EDITING AUDIO TO CREATE MUSICAL COMPOSITIONS
Filed EU 10783953.2-2225
An apparatus for creating a musical composition is disclosed. The apparatus includes an audio interface that operably receives audio from an input device and outputs audio to an audio output device, and an audio converter module is operably connected to the audio interface to convert audio received via the audio interface into an audio track. A recording session module may be provided to repeatedly playback a live loop that includes at least a portion of a first audio track, and to add at least…
An apparatus for creating a musical composition is disclosed. The apparatus includes an audio interface that operably receives audio from an input device and outputs audio to an audio output device, and an audio converter module is operably connected to the audio interface to convert audio received via the audio interface into an audio track. A recording session module may be provided to repeatedly playback a live loop that includes at least a portion of a first audio track, and to add at least a portion of a second audio track to the live loop during repeated playback. A multi-track compositor module may also be configured to receive a first audio track and a second audio track, automatically score each partition of the first and second audio tracks, and construct a third audio track based on the scores for each partition.
Other inventorsSee patent -
System and method for motion picture print forensics
Filed US 20060225083
A system, apparatus, and method are directed towards managing motion picture film print marking and tracking using a reel changeover marking (RCM) to encode a unique identifier. In one embodiment, an Encoded RCM (ERCM) is located within a print during a print duplication process. The ERCM is arranged to persist through a variety of transformations, including camming, compression, and so forth. In one embodiment, an identification extraction component is configured to analyze a digital copy…
A system, apparatus, and method are directed towards managing motion picture film print marking and tracking using a reel changeover marking (RCM) to encode a unique identifier. In one embodiment, an Encoded RCM (ERCM) is located within a print during a print duplication process. The ERCM is arranged to persist through a variety of transformations, including camming, compression, and so forth. In one embodiment, an identification extraction component is configured to analyze a digital copy print to extract the unique identifier from within an ERCM. A print tracking component may then search a data store to determine a corresponding source print to the digital copy print based on the extracted unique identifier. A source of piracy may be determined, at least in part, by identifying possible security weaknesses in a distribution chain that may be associated with unauthorized duplication of the film print, and so forth.
-
Piracy prevention system
Filed US 20050163483
System, apparatus, and methods are directed to preventing a media player from playing a pirated media file, such as a pre-release motion picture. The invention treats the pirated media file as an infection and develops an immune system for the media player. The invention may be taught how to recognize an infection by using an immunization record for each media file that is to be treated as an infection. As the media file is played in real-time, a fingerprint is determined. A comparison is…
System, apparatus, and methods are directed to preventing a media player from playing a pirated media file, such as a pre-release motion picture. The invention treats the pirated media file as an infection and develops an immune system for the media player. The invention may be taught how to recognize an infection by using an immunization record for each media file that is to be treated as an infection. As the media file is played in real-time, a fingerprint is determined. A comparison is performed between the immunization records and the determined fingerprint. If a match is determined, then an alert may be provided. The alert may be employed to perform any of a variety of actions, including disabling the media player, sending a message to an owner of a digital right for the media file, and the like.
-
Method for tracing a security breach in highly distributed content
Filed US 20040199771
Method and devices are directed to uniquely identifying content in a highly distributed content delivery system such that an origin of unauthorized content use may be more accurately determined. Content received from a content owner is distributed to a persistent security database and a key manager, which manages encryption and decryption keys for content that may be already encrypted. Decrypted content is fingerprinted or watermarked by a fingerprinter/watermarker module such that a recipient…
Method and devices are directed to uniquely identifying content in a highly distributed content delivery system such that an origin of unauthorized content use may be more accurately determined. Content received from a content owner is distributed to a persistent security database and a key manager, which manages encryption and decryption keys for content that may be already encrypted. Decrypted content is fingerprinted or watermarked by a fingerprinter/watermarker module such that a recipient of content is identifiable, and saved in a separate database. Information about fingerprinted/watermarked content may be reported back to content owner for tracking purposes. A key wrap module wraps and attaches aggregator's encryption key to the content before it is transmitted to downstream service operators or users.
Projects
-
Yottio
WE BELIEVE
We Believe
At Yottio, we strive to make statements that aspire action in the things we do each day that can make life better for our clients and our users.
We believe in the power of shared moments.
We enable transformative mass media.
We strive to create meaningful engagement.
We stand up for authenticity and transparency.
We cheer for inclusive entertainment.
Values
Our core values are those that inspire and motivate us to continually innovate who we…WE BELIEVE
We Believe
At Yottio, we strive to make statements that aspire action in the things we do each day that can make life better for our clients and our users.
We believe in the power of shared moments.
We enable transformative mass media.
We strive to create meaningful engagement.
We stand up for authenticity and transparency.
We cheer for inclusive entertainment.
Values
Our core values are those that inspire and motivate us to continually innovate who we are, and what we can achieve together as a team, and as individuals.
Our Social Commitment is to take actions that create equality, opportunity, and the active improvement of the real-world communities around us.
Our Product Commitment is to deliver the very best products and services that empower media creators and their audiences to connect with each other in more meaningful and measurable ways.
Our Economic Commitment is to operate and grow our Company in a way that delivers increasing value for our stakeholders, enables profitable & sustainable growth, and provides opportunities for the professional development & advancement of our team members.
Home Products Team Contact
Other creatorsSee project -
GrayMeta
Introducing
Haystack
Extract, Explore, Exchange, Execute
Next-generation
Applying cutting edge technology to address ever growing metadata challenges
Extensible
Open-source Magnets library means Haystack gets better every day
Secure
Security is a first-class citizen; Haystack employs the most up-to-date security practices and technologies
Explore
Query and analyze metadata in ways that were not possible beforeOther creatorsSee project -
Visiv Technologies Inc.
Developing Video optimization technology that improves downstream codec efficiency up to 50%
Algorithm enhancement
SaaS implementation
Product Roadmap
Team Building
Strategic planningOther creatorsSee project -
Incroud
Incroud - Entertainment loyalty / rewards platform
Radio App - white-label radio streaming app, ad serving platform
Other creatorsSee project -
Zya
- Present
Zya is the only software that allows you to easily make studio-quality music and even use famous hooks to reimagine hit songs.
Love Music. Create Music.Other creatorsSee project -
Gathr Films
-
"Gathr democratizes theatrical distribution by allowing you, the movie-goer, to 'pull' movies to local theatres, instead of being stuck with the few options currently playing."
What is GATHR?
Gathr is - Theatrical On Demand.®
99% of US theater seats lie empty Monday to Thursday.
Thousands of good films get limited or no theatrical release.
Gathr crowd-sources audiences and matches them with empty theatrical capacity to provide an alternative theatrical distribution…"Gathr democratizes theatrical distribution by allowing you, the movie-goer, to 'pull' movies to local theatres, instead of being stuck with the few options currently playing."
What is GATHR?
Gathr is - Theatrical On Demand.®
99% of US theater seats lie empty Monday to Thursday.
Thousands of good films get limited or no theatrical release.
Gathr crowd-sources audiences and matches them with empty theatrical capacity to provide an alternative theatrical distribution platform for independent movie makers.
Using the very tools of revolution, Gathr is disrupting movie going for everyone.Other creatorsSee project
Languages
-
Afrikaans
-
Organizations
-
COV-IRT
member
- PresentThe COVID-19 International Research Team (COV-IRT) is a community of scientists driving research into COVID-19. This interdisciplinary group from over 75 institutions worldwide is coordinating projects focused specifically on SARS-CoV-2, including determining heterogeneity of the viral genome sequence, analyzing host response to COVID-19 disease, characterizing potential co-infections, and identifying potential therapeutic targets for preclinical and clinical development. COV-IRT connects…
The COVID-19 International Research Team (COV-IRT) is a community of scientists driving research into COVID-19. This interdisciplinary group from over 75 institutions worldwide is coordinating projects focused specifically on SARS-CoV-2, including determining heterogeneity of the viral genome sequence, analyzing host response to COVID-19 disease, characterizing potential co-infections, and identifying potential therapeutic targets for preclinical and clinical development. COV-IRT connects molecular biologists, viral epidemiologists, computational biologists, statisticians, coronavirologists, microbiologists, aerobiologists, and clinicians who are identifying new potential therapeutic targets in RNA-Seq datasets from COVID-19 patients with laboratory research scientists who can validate the suitability of those therapeutic candidates and further drug development. https://www.cov-irt.org/
-
METal
-
- Present -
LAVA
-
- Present -
SMPTE
Member
- Present
Recommendations received
9 people have recommended Reza
Join now to viewMore activity by Reza
-
Blondie and me in London around 1992. I was on my second CEO job.
Blondie and me in London around 1992. I was on my second CEO job.
Liked by Reza Rassool
-
Don't Miss Our Exclusive Event on Governance and Security for GenAI! This event is organized in collaboration with and guidance of Cloud Security…
Don't Miss Our Exclusive Event on Governance and Security for GenAI! This event is organized in collaboration with and guidance of Cloud Security…
Liked by Reza Rassool
-
Not everything is a paradox. Some things in life are self-explanatory— such as the fact that we are human. AI isn't human but humans are the ones…
Not everything is a paradox. Some things in life are self-explanatory— such as the fact that we are human. AI isn't human but humans are the ones…
Liked by Reza Rassool
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Reza Rassool
1 other named Reza Rassool is on LinkedIn
See others named Reza Rassool