Feeds

Napster looks to audio fingerprints to monitor MP3 shares

Licenses Relatable music analysis code

  • alert
  • submit to reddit

Intelligent flash storage arrays

Napster has licensed audio software specialist Relatable's audio analysis technology, called TRM, in a bid to control which music tracks are shared on its network.

Relatable's code creates a unique fingerprint based on a track's acoustics. The fingerprint is the same no matter how high or low the quality of digital encoding used to record the track, Relatable claims. It is also works irrespective of the digital audio format used.

The upshot is that Napster will be able to match tracks to fingerprints, and thus block a given song whatever its filename.

To date, the MP3 sharing company hasn't fared too well at blocking all the songs US District Court Judge Marilyn Patel ordered it to. Napster was ordered to block 135,000 songs, and while it recently claimed to have blocked 275,000 songs hidden behind around six million filenames, the company was still recently censured by Judge Patel for not having worked hard enough to comply with her order.

Napster hopes Relatable's technology will help, but building up a fingerprint database and merging it with its filtering system will take time. The time taken will be worth it, however, since TRM will ultimately be used to monitor which songs are shared. That data can be used to calculate royalties, paid for by the user subscriptions the company is expected to introduce in the summer. ®

Related Stories

Judge threatens 'disgraceful' Napster with closure - again
Napster downloads rocket
Napster blocks 275,000 tracks

Internet Security Threat Report 2014

More from The Register

next story
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
NSA mass spying reform KILLED by US Senators
Democrats needed just TWO more votes to keep alive bill reining in some surveillance
'Internet Freedom Panel' to keep web overlord ICANN out of Russian hands – new proposal
Come back with our internet! cries Republican drawing up bill
What a Mesa: Apple vows to re-use titsup GT sapphire glass plant
Commits to American manufacturing ... of secret tech
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?