Patents by Inventor Mehmet Utku Celik

Mehmet Utku Celik has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10779059
    Abstract: A method of and system for distributing a content item, having a plurality of segments. A composite content item is created by concatenating segments from different content items from different agencies. A segment of the composite content item may or may not already comprise a previously embedded segment watermark carrying a previously embedded segment payload. The method comprises determining if the segment already comprises a previously embedded segment watermark, and if so, logging the previously embedded segment payload in a watermark transaction log associated with the new segment payload; otherwise, embedding the new segment payload as a watermark in the segment. In the case that the segment already comprises a previously embedded segment payload, the previously embedded payload is logged in a watermark transaction log, and the previously embedded segment payload is replaced with a new segment watermark that represents the new segment payload.
    Type: Grant
    Filed: December 10, 2013
    Date of Patent: September 15, 2020
    Assignee: TELETRAX B.V.
    Inventors: Valery Stepanovich Kot, Mehmet Utku Celik, John Pierre Jacobus Verhagen
  • Patent number: 10028035
    Abstract: In a method of distributing content in plural fragments, each fragment being no longer than a given maximum fragment length, a method of watermarking the content prior to fragmenting the content into the plural fragments, comprising watermarking a given payload symbol from a given alphabet in a given segment of the content, and treating a segment prior to or following the given segment as an intermediary segment, the length of this intermediary segment being substantially equal to or greater than the maximum fragment length.
    Type: Grant
    Filed: July 21, 2014
    Date of Patent: July 17, 2018
    Assignee: Civolution B.V.
    Inventors: Mehmet Utku Celik, Martijn Maas
  • Patent number: 9514505
    Abstract: A method for detecting a payload embedded using watermarking in a content stream, the payload being different in a first and a second segment of the content stream, a payload in the second segment having a predetermined relationship with a payload in the first segment, is described. The method selects a point in the content stream where the first segment is likely to end and the second segment to being, samples the stream to obtain a first set of samples that is before the chosen point and a second set of samples that is after the chosen point, and detects the payload on a combination of the first set and a transformation of the second set, where the transformation is based on the assumption that the second set is from the second segment and exploits the relationship that exists between the payloads in the first and second segments.
    Type: Grant
    Filed: October 9, 2012
    Date of Patent: December 6, 2016
    Assignee: Civolution B.V.
    Inventors: Martijn Maas, Mehmet Utku Celik
  • Publication number: 20160316279
    Abstract: A method of and system for distributing a content item, having a plurality of segments. A composite content item is created by concatenating segments from different content items from different agencies. A segment of the composite content item may or may not already comprise a previously embedded segment watermark carrying a previously embedded segment payload. The method comprises determining if the segment already comprises a previously embedded segment watermark, and if so, logging the previously embedded segment payload in a watermark transaction log associated with the new segment payload; otherwise, embedding the new segment payload as a watermark in the segment. In the case that the segment already comprises a previously embedded segment payload, the previously embedded payload is logged in a watermark transaction log, and the previously embedded segment payload is replaced with a new segment watermark that represents the new segment payload.
    Type: Application
    Filed: December 10, 2013
    Publication date: October 27, 2016
    Inventors: Valery Stepanovich KOT, Mehmet Utku CELIK, John Pierre Jacobus VERHAGEN
  • Publication number: 20160156994
    Abstract: In a method of distributing content in plural fragments, each fragment being no longer than a given maximum fragment length, a method of watermarking the content prior to fragmenting the content into the plural fragments, comprising water-marking a given payload symbol from a given alphabet in a given segment of the content, and treating a segment prior to or following the given segment as an intermediary segment, the length of this intermediary segment being substantially equal to or greater than the maximum fragment length.
    Type: Application
    Filed: July 21, 2014
    Publication date: June 2, 2016
    Applicant: CIVOLUTION B.V.
    Inventors: Mehmet Utku CELIK, Martijn MAAS
  • Patent number: 9276739
    Abstract: A method of encrypting data using a first key and multiple encryption keys at least in part based on the first key. The method includes encoding the data into a redundant representation by distributing the information content of the data among a number of groups, each group being associated with a respective encryption key of the multiple encryption keys, each encryption key being associated with at least one group, the redundant representation allowing recovery of the data in the absence of the groups associated with the at least one of the multiple encryption keys, and encrypting each group by the respective associated encryption key.
    Type: Grant
    Filed: June 29, 2007
    Date of Patent: March 1, 2016
    Assignee: KONINKLIJKE PHILIPS N.V.
    Inventors: Mehmet Utku Celik, Boris Skoric, Pim Theo Tuyls
  • Patent number: 8959202
    Abstract: Client terminals report an easy-to-calculate identifier such as the Internet URL or a cryptographic hash of the content to a server. The server collects and counts the reported identifiers so as to obtain preliminary statistics. By aggregating these reported identifiers into the preliminary statistics, identifiers are revealed that are likely popular content. The server selects one or more identifiers from the preliminary statistics and makes these available to at least a subset of clients. The clients that obtain these one or more identifiers then access content and compute the easy-to-calculate identifiers as usual. If the computed identifier matches one of the identifiers obtained from the server, the client will additionally extract a watermarked identifier or compute a digital fingerprint of the content in question and report this to the server. The server then uses the received identifier or fingerprint to create final statistics by aggregating the preliminary statistics.
    Type: Grant
    Filed: March 18, 2009
    Date of Patent: February 17, 2015
    Assignee: Civolution B.V.
    Inventors: Jaap Andre Haitsma, Gerrit Cornelis Langelaar, Mehmet Utku Celik, Martijn Maas
  • Publication number: 20140270340
    Abstract: A method for detecting a payload embedded using watermarking in a content stream, the payload being different in a first and a second segment of the content stream, a payload in the second segment having a predetermined relationship with a payload in the first segment, is described. The method selects a point in the content stream where the first segment is likely to end and the second segment to being, samples the stream to obtain a first set of samples that is before the chosen point and a second set of samples that is after the chosen point, and detects the payload on a combination of the first set and a transformation of the second set, where the transformation is based on the assumption that the second set is from the second segment and exploits the relationship that exists between the payloads in the first and second segments.
    Type: Application
    Filed: October 9, 2012
    Publication date: September 18, 2014
    Inventors: Martijn Maas, Mehmet Utku Celik
  • Publication number: 20140196071
    Abstract: A device for rendering content from a first source comprising a first input for receiving the content from the first source, a second input for receiving a substitution content item from a second source, a substitution module for substituting a segment of the content with the substitution content item, and rendering means for rendering the content wherein the segment is substituted with the substitution content item. The rendering device has monitoring module for monitoring the reception of the segment, and controlling the substitution module dependent on whether the segment is being received, such that the substitution module ceases the substitution upon failure to receive the segment.
    Type: Application
    Filed: June 20, 2012
    Publication date: July 10, 2014
    Applicant: CIVOLUTION B.V.
    Inventors: Alex Dick Terpstra, Martijn Maas, Mehmet Utku Celik, Jaap Andre Haitsma
  • Publication number: 20110066723
    Abstract: Client terminals report an easy-to-calculate identifier such as the Internet URL or a cryptographic hash of the content to a server. The server collects and counts the reported identifiers so as to obtain preliminary statistics. By aggregating these reported identifiers into the preliminary statistics, identifiers are revealed that are likely popular content. The server selects one or more identifiers from the preliminary statistics and makes these available to at least a subset of clients. The clients that obtain these one or more identifiers then access content and compute the easy-to-calculate identifiers as usual. If the computed identifier matches one of the identifiers obtained from the server, the client will additionally extract a watermarked identifier or compute a digital fingerprint of the content in question and report this to the server. The server then uses the received identifier or fingerprint to create final statistics by aggregating the preliminary statistics.
    Type: Application
    Filed: March 18, 2009
    Publication date: March 17, 2011
    Applicant: Civolution B.V.
    Inventors: Jaap Andre Haitsma, Gerrit Cornelis Langelaar, Mehmet Utku Celik, Martijn Maas
  • Publication number: 20100287201
    Abstract: This invention relates to a method and a system for identifying elementary content portions from an edited content. A log is generated indicating the elementary content portions used in the edited content. Fingerprints are obtained from the elementary content portions as indicated in the log. Characteristic information is determined about the elementary content portions by comparing the fingerprints to fingerprints of registered content having associated characteristic information.
    Type: Application
    Filed: December 15, 2008
    Publication date: November 11, 2010
    Applicant: KONINKLIJKE PHILIPS ELECTRONICS N.V.
    Inventors: Marijn Christian Damstra, Mehmet Utku Celik
  • Publication number: 20100177888
    Abstract: A secure forensic watermarking system is disclosed that distributes the same encrypted content to all users. The decryption key is different for each user, so that the decrypted content differs slightly from the original, i.e. is watermarked. Forensic tracking is possible by distributing unique decryption keys to individual users. The invention allows a forensic mark to be securely embedded in the compressed domain signal. In an embodiment of this invention, the content (x) and an encryption sequence (r) are entropy encoded using a homomorphic Huffman table. A homomorphic Huffmann table is a table H having the property that there exists an operation f( ) such that H-1 (f(H(a),H(b)))=a+b.
    Type: Application
    Filed: July 1, 2008
    Publication date: July 15, 2010
    Applicant: KONINKLIJKE PHILIPS ELECTRONICS N.V.
    Inventors: Aweke Negash Lemma, Mehmet Utku Celik, Minne Van Der Veen, Stefan Katzenbeisser
  • Publication number: 20100082478
    Abstract: The present invention relates to methods and apparatus for digital content distribution. A method of transferring digital content from a first entity (60) to a second entity (70) includes the steps of: a transfer control entity (50) transmitting a transmission key (KA) to the first entity, the first entity storing content data comprising digital content embedded with a first watermark (WA). The first entity applies the transmission key to the content data to remove the first watermark from the digital content and encrypt the digital content. The first entity transmits the encrypted digital content (CX) to the second entity. The transfer control entity transmits a receive key (KB) to the second entity and the second entity applies the receive key to the encrypted digital content to generate decrypted data comprising the decrypted digital content embedded with a second watermark (WB).
    Type: Application
    Filed: March 10, 2008
    Publication date: April 1, 2010
    Applicant: KONINKLIJKE PHILIPS ELECTRONICS N.V.
    Inventors: Minne Van Der Veen, Aweke Negash Lemma, Stefan Katzenbeisser, Mehmet Utku Celik
  • Publication number: 20100058065
    Abstract: The invention relates to extracting and embedding auxiliary data from and to a host signal. In an embodiment, the auxiliary data relates to remotely control of an application or a device, such as an interactive toy. Auxiliary data are extracted from a host signal, by periodically (32A-32C) with a predetermined first period searching a first section (33A-33C) of the host signal for a first watermark (34); and, upon detection of the first watermark, searching the host signal for a second watermark (35). In embodiments, information relating to timing and type of action to be performed by a remotely controlled device may be conveyed by the watermarks.
    Type: Application
    Filed: December 5, 2007
    Publication date: March 4, 2010
    Applicant: KONINKLIJKE PHILIPS ELECTRONICS N.V.
    Inventors: Mehmet Utku Celik, Aweke Negash Lemma, Jaap Andre Haitsma
  • Publication number: 20090208019
    Abstract: The present invention relates to a method and apparatus for encrypting data (105) by means of a first key (115), and a method and apparatus for decrypting encrypted data by means of a second key (185). The present invention alleviates the need for exact key information by allowing encryption of data (105) by means of a first key (115) and subsequent decryption of the encrypted data by means of a second key (185) without the need for the first key (115), provided that the first key (115) and the second key (185) form a sufficient estimate of an encryption/decryption key pair. During encryption, multiple encryption keys (135), at least in part based on the first key (115), are used to encrypt a redundant representation (122) of the data (105). The encrypted data (124) may subsequently be decrypted by using multiple decryption keys (165) based on the second key (185), without the need for the first key (115), provided that the second key (185) forms a sufficient estimate of the first key (115).
    Type: Application
    Filed: June 29, 2007
    Publication date: August 20, 2009
    Applicant: Koninklijke Philips Electronics N.V.
    Inventors: Mehmet Utku Celik, Boris Skoric, Pim Theo Tuyls
  • Publication number: 20090136026
    Abstract: The invention relates to embedding a spread spectrum watermark in a data signal as well as to detection of the embedded watermark. A data signal (4) is encrypted (15) or received in the form of an encrypted data signal (9), the signal being encrypted by modifying (3) it in accordance with one or more entries of a look-up-table (2) in which an encryption table (6) is stored. The encryption is carried out by a first computing device (15) such as a server device. The watermark is actually embedded while decrypting (13) the signal. This takes place in a second computing device (16), possibly in a client device, in a similar manner The client device employs a decryption table (8), which is a modified (i.e. watermarked) version of the encryption table (6). The decryption table may generated by the server and securely communicated to the client. The data signal is decrypted in accordance with entries of a look-up-table (12).
    Type: Application
    Filed: March 29, 2007
    Publication date: May 28, 2009
    Applicant: KONINKLIJKE PHILIPS ELECTRONICS N.V.
    Inventors: Mehmet Utku Celik, Aweke Negash Lemma, Minne Van Der Veen
  • Publication number: 20090013188
    Abstract: The invention relates to a method of searching for a watermark in a data signal, and to a watermark detector, such as a copy-control watermark detector. The search is conducted in order to find a watermark in content which possibly has been attacked and/or altered. The search is conducted by the steps of determining or setting a search space for the data signal, selecting a subspace of the search space, and searching for the presence of the watermark in the subspace. The subspace may be selected from a multitude of regions, the selection e.g. being based on a deterministic or probabilistic function.
    Type: Application
    Filed: January 29, 2007
    Publication date: January 8, 2009
    Applicant: KONINKLIJKE PHILIPS ELECTRONICS N.V.
    Inventors: Mehmet Utku Celik, Aweke Negash Lemma, Minne Van Der Veen
  • Publication number: 20080310629
    Abstract: The invention relates to embedding auxiliary data in the form of a multibit payload in a host signal, and encrypting the associated detection key. Moreover, the invention relates to extracting the auxiliary data in the form of the multibit payload from a data signal. Auxiliary data is embedded in a host signal by the following steps. First a reference watermark is provided, subsequently an encrypted detection key associated only with the reference watermark is generated. The encrypted detection key may be a scrambled version of the watermark. In a further step, the multibit watermark is generated and a multibit payload is encoded into the reference watermark. Finally, the multibit watermark is embedded into the host signal.
    Type: Application
    Filed: November 10, 2006
    Publication date: December 18, 2008
    Applicant: Kpmomklijke Phillips Electroncis N.V.
    Inventors: Minne Van Der Veen, Aweke Negash Lemma, Mehmet Utku Celik
  • Publication number: 20080250240
    Abstract: A system and a method for secure remote informed watermark detection making use of a side-information. The system in overview comprises a remote detector and a server computing system wherein a database with side-information assigned to specific descriptors of data signals is stored at the server computing system and wherein a remote detector intending to identify the watermark of a data signal will derive the descriptor of the data signal and subsequently contact the trusted server computing system in order to obtain the necessary side-information for the informed watermark detection.
    Type: Application
    Filed: October 6, 2006
    Publication date: October 9, 2008
    Applicant: KONINKLIJKE PHILIPS ELECTRONICS, N.V.
    Inventors: Mehmet Utku Celik, Minne Van Der Veen, Aweke Negash Lemma
  • Publication number: 20080240435
    Abstract: Disclosed are a method and a system for secure watermark embedding in a server-client configuration (60,70). The method comprises encrypting (210) the data signal (x) and generating (240) a decryption key wherein a watermark (Wi) is included. The client decrypts (420) the encrypted data signal in order to obtain a watermarked data signal (xw). In accordance with the invention, the encryption mechanism and decryption key are made dependent on a perceptual mask (m1,m2) so as eventually make the embedded watermark more robust.
    Type: Application
    Filed: November 6, 2006
    Publication date: October 2, 2008
    Inventors: Mehmet Utku Celik, Aweke Negash Lemma, Minne Van Der Veen