Patents by Inventor Mehmet Utku Celik
Mehmet Utku Celik has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10779059Abstract: A method of and system for distributing a content item, having a plurality of segments. A composite content item is created by concatenating segments from different content items from different agencies. A segment of the composite content item may or may not already comprise a previously embedded segment watermark carrying a previously embedded segment payload. The method comprises determining if the segment already comprises a previously embedded segment watermark, and if so, logging the previously embedded segment payload in a watermark transaction log associated with the new segment payload; otherwise, embedding the new segment payload as a watermark in the segment. In the case that the segment already comprises a previously embedded segment payload, the previously embedded payload is logged in a watermark transaction log, and the previously embedded segment payload is replaced with a new segment watermark that represents the new segment payload.Type: GrantFiled: December 10, 2013Date of Patent: September 15, 2020Assignee: TELETRAX B.V.Inventors: Valery Stepanovich Kot, Mehmet Utku Celik, John Pierre Jacobus Verhagen
-
Patent number: 10028035Abstract: In a method of distributing content in plural fragments, each fragment being no longer than a given maximum fragment length, a method of watermarking the content prior to fragmenting the content into the plural fragments, comprising watermarking a given payload symbol from a given alphabet in a given segment of the content, and treating a segment prior to or following the given segment as an intermediary segment, the length of this intermediary segment being substantially equal to or greater than the maximum fragment length.Type: GrantFiled: July 21, 2014Date of Patent: July 17, 2018Assignee: Civolution B.V.Inventors: Mehmet Utku Celik, Martijn Maas
-
Patent number: 9514505Abstract: A method for detecting a payload embedded using watermarking in a content stream, the payload being different in a first and a second segment of the content stream, a payload in the second segment having a predetermined relationship with a payload in the first segment, is described. The method selects a point in the content stream where the first segment is likely to end and the second segment to being, samples the stream to obtain a first set of samples that is before the chosen point and a second set of samples that is after the chosen point, and detects the payload on a combination of the first set and a transformation of the second set, where the transformation is based on the assumption that the second set is from the second segment and exploits the relationship that exists between the payloads in the first and second segments.Type: GrantFiled: October 9, 2012Date of Patent: December 6, 2016Assignee: Civolution B.V.Inventors: Martijn Maas, Mehmet Utku Celik
-
Publication number: 20160316279Abstract: A method of and system for distributing a content item, having a plurality of segments. A composite content item is created by concatenating segments from different content items from different agencies. A segment of the composite content item may or may not already comprise a previously embedded segment watermark carrying a previously embedded segment payload. The method comprises determining if the segment already comprises a previously embedded segment watermark, and if so, logging the previously embedded segment payload in a watermark transaction log associated with the new segment payload; otherwise, embedding the new segment payload as a watermark in the segment. In the case that the segment already comprises a previously embedded segment payload, the previously embedded payload is logged in a watermark transaction log, and the previously embedded segment payload is replaced with a new segment watermark that represents the new segment payload.Type: ApplicationFiled: December 10, 2013Publication date: October 27, 2016Inventors: Valery Stepanovich KOT, Mehmet Utku CELIK, John Pierre Jacobus VERHAGEN
-
Publication number: 20160156994Abstract: In a method of distributing content in plural fragments, each fragment being no longer than a given maximum fragment length, a method of watermarking the content prior to fragmenting the content into the plural fragments, comprising water-marking a given payload symbol from a given alphabet in a given segment of the content, and treating a segment prior to or following the given segment as an intermediary segment, the length of this intermediary segment being substantially equal to or greater than the maximum fragment length.Type: ApplicationFiled: July 21, 2014Publication date: June 2, 2016Applicant: CIVOLUTION B.V.Inventors: Mehmet Utku CELIK, Martijn MAAS
-
Patent number: 9276739Abstract: A method of encrypting data using a first key and multiple encryption keys at least in part based on the first key. The method includes encoding the data into a redundant representation by distributing the information content of the data among a number of groups, each group being associated with a respective encryption key of the multiple encryption keys, each encryption key being associated with at least one group, the redundant representation allowing recovery of the data in the absence of the groups associated with the at least one of the multiple encryption keys, and encrypting each group by the respective associated encryption key.Type: GrantFiled: June 29, 2007Date of Patent: March 1, 2016Assignee: KONINKLIJKE PHILIPS N.V.Inventors: Mehmet Utku Celik, Boris Skoric, Pim Theo Tuyls
-
Patent number: 8959202Abstract: Client terminals report an easy-to-calculate identifier such as the Internet URL or a cryptographic hash of the content to a server. The server collects and counts the reported identifiers so as to obtain preliminary statistics. By aggregating these reported identifiers into the preliminary statistics, identifiers are revealed that are likely popular content. The server selects one or more identifiers from the preliminary statistics and makes these available to at least a subset of clients. The clients that obtain these one or more identifiers then access content and compute the easy-to-calculate identifiers as usual. If the computed identifier matches one of the identifiers obtained from the server, the client will additionally extract a watermarked identifier or compute a digital fingerprint of the content in question and report this to the server. The server then uses the received identifier or fingerprint to create final statistics by aggregating the preliminary statistics.Type: GrantFiled: March 18, 2009Date of Patent: February 17, 2015Assignee: Civolution B.V.Inventors: Jaap Andre Haitsma, Gerrit Cornelis Langelaar, Mehmet Utku Celik, Martijn Maas
-
Publication number: 20140270340Abstract: A method for detecting a payload embedded using watermarking in a content stream, the payload being different in a first and a second segment of the content stream, a payload in the second segment having a predetermined relationship with a payload in the first segment, is described. The method selects a point in the content stream where the first segment is likely to end and the second segment to being, samples the stream to obtain a first set of samples that is before the chosen point and a second set of samples that is after the chosen point, and detects the payload on a combination of the first set and a transformation of the second set, where the transformation is based on the assumption that the second set is from the second segment and exploits the relationship that exists between the payloads in the first and second segments.Type: ApplicationFiled: October 9, 2012Publication date: September 18, 2014Inventors: Martijn Maas, Mehmet Utku Celik
-
Publication number: 20140196071Abstract: A device for rendering content from a first source comprising a first input for receiving the content from the first source, a second input for receiving a substitution content item from a second source, a substitution module for substituting a segment of the content with the substitution content item, and rendering means for rendering the content wherein the segment is substituted with the substitution content item. The rendering device has monitoring module for monitoring the reception of the segment, and controlling the substitution module dependent on whether the segment is being received, such that the substitution module ceases the substitution upon failure to receive the segment.Type: ApplicationFiled: June 20, 2012Publication date: July 10, 2014Applicant: CIVOLUTION B.V.Inventors: Alex Dick Terpstra, Martijn Maas, Mehmet Utku Celik, Jaap Andre Haitsma
-
Publication number: 20110066723Abstract: Client terminals report an easy-to-calculate identifier such as the Internet URL or a cryptographic hash of the content to a server. The server collects and counts the reported identifiers so as to obtain preliminary statistics. By aggregating these reported identifiers into the preliminary statistics, identifiers are revealed that are likely popular content. The server selects one or more identifiers from the preliminary statistics and makes these available to at least a subset of clients. The clients that obtain these one or more identifiers then access content and compute the easy-to-calculate identifiers as usual. If the computed identifier matches one of the identifiers obtained from the server, the client will additionally extract a watermarked identifier or compute a digital fingerprint of the content in question and report this to the server. The server then uses the received identifier or fingerprint to create final statistics by aggregating the preliminary statistics.Type: ApplicationFiled: March 18, 2009Publication date: March 17, 2011Applicant: Civolution B.V.Inventors: Jaap Andre Haitsma, Gerrit Cornelis Langelaar, Mehmet Utku Celik, Martijn Maas
-
Publication number: 20100287201Abstract: This invention relates to a method and a system for identifying elementary content portions from an edited content. A log is generated indicating the elementary content portions used in the edited content. Fingerprints are obtained from the elementary content portions as indicated in the log. Characteristic information is determined about the elementary content portions by comparing the fingerprints to fingerprints of registered content having associated characteristic information.Type: ApplicationFiled: December 15, 2008Publication date: November 11, 2010Applicant: KONINKLIJKE PHILIPS ELECTRONICS N.V.Inventors: Marijn Christian Damstra, Mehmet Utku Celik
-
Publication number: 20100177888Abstract: A secure forensic watermarking system is disclosed that distributes the same encrypted content to all users. The decryption key is different for each user, so that the decrypted content differs slightly from the original, i.e. is watermarked. Forensic tracking is possible by distributing unique decryption keys to individual users. The invention allows a forensic mark to be securely embedded in the compressed domain signal. In an embodiment of this invention, the content (x) and an encryption sequence (r) are entropy encoded using a homomorphic Huffman table. A homomorphic Huffmann table is a table H having the property that there exists an operation f( ) such that H-1 (f(H(a),H(b)))=a+b.Type: ApplicationFiled: July 1, 2008Publication date: July 15, 2010Applicant: KONINKLIJKE PHILIPS ELECTRONICS N.V.Inventors: Aweke Negash Lemma, Mehmet Utku Celik, Minne Van Der Veen, Stefan Katzenbeisser
-
Publication number: 20100082478Abstract: The present invention relates to methods and apparatus for digital content distribution. A method of transferring digital content from a first entity (60) to a second entity (70) includes the steps of: a transfer control entity (50) transmitting a transmission key (KA) to the first entity, the first entity storing content data comprising digital content embedded with a first watermark (WA). The first entity applies the transmission key to the content data to remove the first watermark from the digital content and encrypt the digital content. The first entity transmits the encrypted digital content (CX) to the second entity. The transfer control entity transmits a receive key (KB) to the second entity and the second entity applies the receive key to the encrypted digital content to generate decrypted data comprising the decrypted digital content embedded with a second watermark (WB).Type: ApplicationFiled: March 10, 2008Publication date: April 1, 2010Applicant: KONINKLIJKE PHILIPS ELECTRONICS N.V.Inventors: Minne Van Der Veen, Aweke Negash Lemma, Stefan Katzenbeisser, Mehmet Utku Celik
-
Publication number: 20100058065Abstract: The invention relates to extracting and embedding auxiliary data from and to a host signal. In an embodiment, the auxiliary data relates to remotely control of an application or a device, such as an interactive toy. Auxiliary data are extracted from a host signal, by periodically (32A-32C) with a predetermined first period searching a first section (33A-33C) of the host signal for a first watermark (34); and, upon detection of the first watermark, searching the host signal for a second watermark (35). In embodiments, information relating to timing and type of action to be performed by a remotely controlled device may be conveyed by the watermarks.Type: ApplicationFiled: December 5, 2007Publication date: March 4, 2010Applicant: KONINKLIJKE PHILIPS ELECTRONICS N.V.Inventors: Mehmet Utku Celik, Aweke Negash Lemma, Jaap Andre Haitsma
-
Publication number: 20090208019Abstract: The present invention relates to a method and apparatus for encrypting data (105) by means of a first key (115), and a method and apparatus for decrypting encrypted data by means of a second key (185). The present invention alleviates the need for exact key information by allowing encryption of data (105) by means of a first key (115) and subsequent decryption of the encrypted data by means of a second key (185) without the need for the first key (115), provided that the first key (115) and the second key (185) form a sufficient estimate of an encryption/decryption key pair. During encryption, multiple encryption keys (135), at least in part based on the first key (115), are used to encrypt a redundant representation (122) of the data (105). The encrypted data (124) may subsequently be decrypted by using multiple decryption keys (165) based on the second key (185), without the need for the first key (115), provided that the second key (185) forms a sufficient estimate of the first key (115).Type: ApplicationFiled: June 29, 2007Publication date: August 20, 2009Applicant: Koninklijke Philips Electronics N.V.Inventors: Mehmet Utku Celik, Boris Skoric, Pim Theo Tuyls
-
Publication number: 20090136026Abstract: The invention relates to embedding a spread spectrum watermark in a data signal as well as to detection of the embedded watermark. A data signal (4) is encrypted (15) or received in the form of an encrypted data signal (9), the signal being encrypted by modifying (3) it in accordance with one or more entries of a look-up-table (2) in which an encryption table (6) is stored. The encryption is carried out by a first computing device (15) such as a server device. The watermark is actually embedded while decrypting (13) the signal. This takes place in a second computing device (16), possibly in a client device, in a similar manner The client device employs a decryption table (8), which is a modified (i.e. watermarked) version of the encryption table (6). The decryption table may generated by the server and securely communicated to the client. The data signal is decrypted in accordance with entries of a look-up-table (12).Type: ApplicationFiled: March 29, 2007Publication date: May 28, 2009Applicant: KONINKLIJKE PHILIPS ELECTRONICS N.V.Inventors: Mehmet Utku Celik, Aweke Negash Lemma, Minne Van Der Veen
-
Publication number: 20090013188Abstract: The invention relates to a method of searching for a watermark in a data signal, and to a watermark detector, such as a copy-control watermark detector. The search is conducted in order to find a watermark in content which possibly has been attacked and/or altered. The search is conducted by the steps of determining or setting a search space for the data signal, selecting a subspace of the search space, and searching for the presence of the watermark in the subspace. The subspace may be selected from a multitude of regions, the selection e.g. being based on a deterministic or probabilistic function.Type: ApplicationFiled: January 29, 2007Publication date: January 8, 2009Applicant: KONINKLIJKE PHILIPS ELECTRONICS N.V.Inventors: Mehmet Utku Celik, Aweke Negash Lemma, Minne Van Der Veen
-
Publication number: 20080310629Abstract: The invention relates to embedding auxiliary data in the form of a multibit payload in a host signal, and encrypting the associated detection key. Moreover, the invention relates to extracting the auxiliary data in the form of the multibit payload from a data signal. Auxiliary data is embedded in a host signal by the following steps. First a reference watermark is provided, subsequently an encrypted detection key associated only with the reference watermark is generated. The encrypted detection key may be a scrambled version of the watermark. In a further step, the multibit watermark is generated and a multibit payload is encoded into the reference watermark. Finally, the multibit watermark is embedded into the host signal.Type: ApplicationFiled: November 10, 2006Publication date: December 18, 2008Applicant: Kpmomklijke Phillips Electroncis N.V.Inventors: Minne Van Der Veen, Aweke Negash Lemma, Mehmet Utku Celik
-
Publication number: 20080250240Abstract: A system and a method for secure remote informed watermark detection making use of a side-information. The system in overview comprises a remote detector and a server computing system wherein a database with side-information assigned to specific descriptors of data signals is stored at the server computing system and wherein a remote detector intending to identify the watermark of a data signal will derive the descriptor of the data signal and subsequently contact the trusted server computing system in order to obtain the necessary side-information for the informed watermark detection.Type: ApplicationFiled: October 6, 2006Publication date: October 9, 2008Applicant: KONINKLIJKE PHILIPS ELECTRONICS, N.V.Inventors: Mehmet Utku Celik, Minne Van Der Veen, Aweke Negash Lemma
-
Publication number: 20080240435Abstract: Disclosed are a method and a system for secure watermark embedding in a server-client configuration (60,70). The method comprises encrypting (210) the data signal (x) and generating (240) a decryption key wherein a watermark (Wi) is included. The client decrypts (420) the encrypted data signal in order to obtain a watermarked data signal (xw). In accordance with the invention, the encryption mechanism and decryption key are made dependent on a perceptual mask (m1,m2) so as eventually make the embedded watermark more robust.Type: ApplicationFiled: November 6, 2006Publication date: October 2, 2008Inventors: Mehmet Utku Celik, Aweke Negash Lemma, Minne Van Der Veen