A Watermarking System for Adaptive Streaming
Content providers use forensic watermarking, a technique for tracing individuals who illegally redistribute con- tent, as one of the means to fight Internet content redistribution piracy - the top threat for many content providers around the world. As adaptive streaming becomes one of the main mechanisms for delivering premium multimedia content over the Internet, it is essential that watermarking works seamlessly in this environment to remain effective. In this technical paper we describe a solution that uniquely watermarks content for each receiving device using a variety of adaptive streaming applications.
Dynamic Digital Asset Protection Techniques
Static defenses of digital assets will eventually fall to the powers of determined adversaries. In this paper we argue that defenses that dynamically adjust themselves to new attack scenarios have a much higher chance of long-term survival.
Evolution of Content Protection
Recent trend towards on‐demand video consumption has caused CA and DRM roles to evolve and merge. This White Paper investigates some of the issues this development raises, focusing on the recent shift in the TV market towards the adoption of DRM‐based content protection solutions, and assesses the main drivers for this change, taking an in‐depth look at the business and technology implications for market players wishing to adopt a DRM approach.
Introduction to Application Security
Threats to software applications are an on-going challenge and continue to escalate as hacking techniques become more sophisticated.
Keys & Credentials: The New Linchpin to Success for Pay-TV Service Providers
Until now, service providers have been able to incrementally add operational support for the security processes that are essential to extending premium services to ever more devices, conditions have reached a point where a new solution is called for. This document explains how these new operational challenges are taxing the resources of even the largest pay TV service providers and describes a new approach operators can take to alleviate this burden.
Sustainable Device Security
An effective security strategy should address integration, attack resistance and attack mitigation.
Tablets — Pay TV's Next Frontier
Primed by their experiences with smartphones and touch-screen devices, consumers are ready for something bigger, but still portable, on which to watch video where and when they want: tablets fit the bill perfectly. With sales predicted to reach 450 million by 2015, tablets are now an essential part of TV Everywhere planning.
The Advantages of White-box Cryptography
Conventional cryptographic algorithms used to protect software keys and data are ineffective when operating in white-box environments, where a hacker has full visibility and control over the executing code.
The New Technologies for Pay TV Content Security
In this white paper, Bill Rosenblatt, founder of GiantSteps Media Technology Strategies, looks at the history of technologies used to secure digital pay TV, explores the set of techniques that are considered to be today's best practices for pay TV security, and discusses content identification techniques designed to find unauthorized content "in the wild" (on the Internet) and trace it to the users or devices that made it available.
The Piracy Continuum
Throughout this white paper readers will learn the distinct and subtle differences between the various categories of pirates, understand consumer drivers for piracy, and what opportunities are available to successfully turn pirates into paying customers.
Using TV Everywhere to Drive Premium TV Services
In this Irdeto-sponsored white paper, Brett Sappington, Director of Research at Parks Associates, discusses how pay TV operators are re-focusing their multi-screen strategies to include premium services to drive incremental revenues, to minimize the effects of cord-cutting and cord-shaving and to combat the continuous assault from competitive OTT services and piracy.