The divine comedy "Wild Wolf disco" has exploded, but at the same time, the old man Jewel also has an accident

has no rainbow in his left hand and no dragon in his right hand. Because "Wild Wolf Disco" has a big deal.

things are like this.

Finnish guy ihaksi uploaded a video, first proved his identity, and then said that the accompaniment "MORE SUN" was created by him, and at the same time published his own project files.

calm down with a dazed face, Brother Ji will explain to you.

To put it simply, after a wave of self-certification, this buddy ihaksi told you that the accompaniment of "MORE SUN" was created by me, and I have evidence.

The fact is that this is really fine, and "MORE SUN" is indeed created by this little brother. The point of

is that the accompaniment of "MORE SUN" is the accompaniment of "Wild Wolf Disco". There may be changes in the middle, but the real hammer did not run away.

Hmm, the original intention of this buddy who posted this video is very simple-you violated my copyright!

Later, it also gave a strong evidence.

In the accompaniment of "MORE SUN", the author ihaksi deliberately put his own watermark, which happened to appear on "Wild Wolf Disco". The sound of "V Wow C" that

appeared in the song "Wild Wolf Disco" in about 22 seconds is the watermark of ihaksi's pitch shift, which is actually his own name-ihaksi.

No wonder, when this song is popular, there will always be different sounds in the comment area.

NetEase Cloud.

small break station.

Hmm, Brother Ji also went to check, "MORE SUN" was released on February 1, 2018.

and "Wild Wolf Disco" was released on September 2, 2019.

In this way, the lead singer of "Wild Wolf Disco", "Diamond Old Man", is in the wrong. .

So, this Finnish boy ihaksi picked up a steelyard symbolizing legal justice and threw a paper lawyer's letter to the old uncle.

and hey, it's not just the old uncle who is affected.

Because William Chan also sang the song "Wild Wolf Disco", although it was a magic version, the accompaniment remained the same and was also accused.

was also screened in the same scene with Huawei, because they took the "Wild Wolf Disco" magic change... and then they were also sent a lawyer letter.

After a day or so of trouble, the old man came out to respond.

first published its proof of purchase and contract details.

As you can see from the screenshots, the old man bought "MORE SUN" for $99, and the contract says Unlimited, which means "unlimited". The

machine checked it, the package of 99 dollars is written on the website as commercial.

But, Brother Ji said but huh. Uncle

did not buy the exclusive copyright of "MORE SUN", only the commercial copyright. After

, the old man also kept contacting ihaksi, wanting to buy the exclusive copyright.

However, in the email, ihaksi asked him to buy the commercial copyright. Later, I didn’t know why and suddenly sold the exclusive copyright to a Taiwanese.

As for later, it's very simple. They are all torn around the copyright issue, and then on the hot search.

At present, both sides have reason, it is difficult to say who is right and who is wrong. Although

looks like something in the entertainment industry, the watermark about protecting creation in it has aroused Jige's interest. In addition to the processed ihaksi that

demonstrated at the beginning, in fact, each of his accompaniments will have two "PEW" watermarks at the beginning.

Actually, the music industry has invented many technical methods to protect copyright. The first thing that

thinks of is DRM (Digital Rights Management). When

was still in the CD era, DRM wasNotorious anti-theft technology.

By adding DRM, in addition to restricting copying of songs in CD, it can also restrict that songs can only be played with a specific player. Although

is right to protect the original, DRM has not fulfilled its mission well.

is funny. The cracking of the DRM anti-theft technology is very dramatic. You think that hackers are cracking the code on the computer. In fact, they use "physical" cracking.

affixed an opaque tape the size of a fingernail on the outer edge of the CD to break the DRM. The principle of

is that the DRM software loaded on the CD thinks that the second part is unreadable, that is, the CD is considered to be an ordinary single-sided music CD, so it can be played normally. It doesn't matter if

can't play a protective role. It also caused a lot of trouble: complicated operations and increased monopoly.

Later, Microsoft bigwigs also publicly criticized the DRM anti-theft technology.

pulled away, and talked about the anti-theft problem of the watermark.

Ji brother has introduced anti-infringement watermarks before, and the most common one is image watermarks.

Do you remember Alibaba's moon cake robbing incident? Relying on the hidden watermark in the picture to find the real murderer behind the scenes. This technique of

is hundreds of times stronger than the watermark that can be seen by the naked eye.

The watermark is completely invisible to the naked eye, just like a normal photo.

Even through operations such as cropping, compression, etc., the built-in watermark is still as strong as the camera brother.

And video can also be watermarked, the most awesome is film watermark.

can be pictures and videos, and the music watermark is natural.

Jay Chou, who you are familiar with, has also worked hard to guard against theft. According to

, Jay Chou’s new song will be broadcast on the radio first. Jay Chou prevents anyone from leaking it in advance, adding the sound of water droplets to the accompaniment of the song, and each station is different. If a new song is leaked, find out which radio station leaked through the sound of water droplets.

is more advanced, and some sounds that cannot be heard by human ears will be added as watermarks.

The human ear can perceive hearing range from 20 Hz to 20000 Hz, but machines can. As long as the frequency of

is within this range, we can add a watermark to the music without knowing it.

Moreover, the machine can not only play these sounds, but also obtain them. The most famous one is the "Dolphin Attack".

Researchers from Princeton University and Zhejiang University did an experiment to black out Siri with a dolphin sound. To put it simply,

wakes up Siri with a voice you can’t hear and then commands it.

So, if your Siri, Xiao Ai, Tmall Genie are awakened inexplicably, you have to be careful.

Hmm, brother Ji studied it. Most of them convert text or pictures into sound, and then embed it in audio. There are many similar algorithms in

, such as "time domain audio watermark", "transform domain audio watermark" and so on.

However, the robustness of these watermarks under attacks such as noise, compression, filtering, and resampling is different.

give a professional chestnut.

This is the audio waveform before and after watermarking in the first 10 seconds of Hacken Lee's "Red Sun".

After embedding the watermark, although the waveform is slightly changed, the human ear can hardly distinguish it.

extracts the watermark like this. After re-sampling by Adobe Audition,

extracts the watermark again. The quality of

watermark is severely degraded and cannot be distinguished.

look at another audio watermarking algorithm.

before and after embedding watermark.

this time is to change the data value of the main audio. The

watermark can still be extracted successfully.

Uh-huh, that's all there is to it. Besides, it's a Mansao Gongman, and the young lady wants to shut down brother.

Today, this technology is actually relatively mature and has already been commercialized.

is just this copyright tearing, and finallyIt is difficult to say who will win and who will win. It may take a year or two for this kind of lawsuit to be fruitful.

But no matter what the swelling is, many people are increasingly supporting genuine and copyright, which is a good thing. In the early days of

, in order to support genuine and combat piracy, the methods were much stronger.

's original "Jiangmin KV300 Antivirus Software", like CS 1.6, uses CD-Key for activation verification. But if you use a "circulated CD-Key or "number counter", the logic bomb code inside will be activated. The

software automatically modifies the file allocation table and partition table, and it cannot be booted with a floppy disk or hard disk, which is basically scrap.

Yes, in order to support genuine, if you use pirated anti-virus software, it will become the strongest virus.

These things, Brother Ji will tell you in detail when he is free, the grievances and hatred inside can be interesting.