A Watermarking System for Adaptive Streaming

Content providers use forensic watermarking, a technique for tracing individuals who illegally redistribute con- tent, as one of the means to fight Internet content redistribution piracy - the top threat for many content providers around the world. As adaptive streaming becomes one of the main mechanisms for delivering premium multimedia content over the Internet, it is essential that watermarking works seamlessly in this environment to remain effective. In this technical paper we describe a solution that uniquely watermarks content for each receiving device using a variety of adaptive streaming applications.

Read More

Dynamic Digital Asset Protection Techniques

Static defenses of digital assets will eventually fall to the powers of determined adversaries. In this paper we argue that defenses that dynamically adjust themselves to new attack scenarios have a much higher chance of long-term survival.

Read More

Evolution of Content Protection

Recent trend towards on‐demand video consumption has caused CA and DRM roles to evolve and merge. This White Paper investigates some of the issues this development raises, focusing on the recent shift in the TV market towards the adoption of DRM‐based content protection solutions, and assesses the main drivers for this change, taking an in‐depth look at the business and technology implications for market players wishing to adopt a DRM approach.

Read More

Introduction to Application Security

Threats to software applications are an on-going challenge and continue to escalate as hacking techniques become more sophisticated.

Read More

Keys & Credentials: The New Linchpin to Success for Pay-TV Service Providers

Until now, service providers have been able to incrementally add operational support for the security processes that are essential to extending premium services to ever more devices, conditions have reached a point where a new solution is called for. This document explains how these new operational challenges are taxing the resources of even the largest pay TV service providers and describes a new approach operators can take to alleviate this burden.

Read More

Sustainable Device Security

An effective security strategy should address integration, attack resistance and attack mitigation.

Read More

Tablets — Pay TV's Next Frontier

Primed by their experiences with smartphones and touch-screen devices, consumers are ready for something bigger, but still portable, on which to watch video where and when they want: tablets fit the bill perfectly. With sales predicted to reach 450 million by 2015, tablets are now an essential part of TV Everywhere planning.

Read More

The Advantages of White-box Cryptography

Conventional cryptographic algorithms used to protect software keys and data are ineffective when operating in white-box environments, where a hacker has full visibility and control over the executing code.

Read More

The New Technologies for Pay TV Content Security

 In this white paper, Bill Rosenblatt, founder of GiantSteps Media Technology Strategies, looks at the history of technologies used to secure digital pay TV, explores the set of techniques that are considered to be today's best practices for pay TV security, and discusses content identification techniques designed to find unauthorized content "in the wild" (on the Internet) and trace it to the users or devices that made it available.

Read More

The Piracy Continuum

Throughout this white paper readers will learn the distinct and subtle differences between the various categories of pirates, understand consumer drivers for piracy, and what opportunities are available to successfully turn pirates into paying customers.

Read More

Using TV Everywhere to Drive Premium TV Services

In this Irdeto-sponsored white paper, Brett Sappington, Director of Research at Parks Associates, discusses how pay TV operators are re-focusing their multi-screen strategies to include premium services to drive incremental revenues, to minimize the effects of cord-cutting and cord-shaving and to combat the continuous assault from competitive OTT services and piracy.

Read More