INDEX

Content Protection and Watermarking: Video, VR, and OTT


To continue reading:

Log In or Subscribe

Piracy has shifted from key-sharing schemes, which exploit weaknesses in conditional access systems, to content redistribution, which leverages pervasive broadband connectivity in most regions of the world.  New and common forms of piracy included closed IPTV systems operated by pirate ISPs, closed system OTT relying on boxes sold in retail, web-based redistribution using subscriptions or advertising/malware, and file sharing lockers as well as distribution on common social platforms.  Responding to this requires a new mix of content prevention, including piracy monitoring services, prosecution support, password prevention sharing, coordination with ISPs, targeting retailers or piracy and disrupting the money supplies.

Table of Contents: 

  • Common Forms of Piracy Today
  • Estimates of Piracy Value
  • Recent Piracy Example
  • Modern Tools against Piracy
  • End-to-End Piracy Components
  • Attitudes toward Piracy
  • The Piracy Problem: Understanding Recent Piracy Headlines
  • Successful Responses to Piracy
  • Organizing against Piracy
  • Piracy Education
  • Mixed Messages about Piracy
  • Content Protection Business Model Opportunities
  • Fingerprinting and Watermarking
  • Piracy Prevention Workflow Phases
  • Definitions
  • Related Research