From Implementing Value-Added Telecom Services

4.7 Content Protection

Companies whose business is content generally want to protect it against piracy and abuse. Piracy is not a new problem. It has been around for as long as there have been printed books, radio, and tape recorders. Piracy is a complex phenomenon, as it seems to harm and nourish the content industry at the same time.

The video recorder, and all the piracy that came with it, has not killed the movie business. Quite the contrary, it created a new market that is now bigger than that of movie theaters. A well-known software company is known to live by the philosophy that "If you are going to pirate any software, make sure it is ours."

But the Internet has lifted piracy to an unprecedented global scale, and has made illegal content sharing almost frictionless. The content industry is trying to answer with digital rights management (DRM) technology.

4.7.1 Many Options

There are many ways to protect content and manage digital rights, depending on the type of content, the level of protection it requires, and the way it is delivered. Some of the methods used are:

  • Watermarking: This technique consists of adding some invisible information to the content that allows it to be recognized and tracked. The watermark is transparent to the rendering software, but can be detected with special tracking tools. Watermarking can be quite complex, as the watermark must be protected against manipulation. [6]

  • Copy protection: Techniques to protect software to be copied have...

Copyright Artech House, Inc. 2006 under license agreement with Books24x7

Products & Services
Security Software
Security software programs are used to restrict access to data, files and users on a computer or server.
Digital Asset Management Software
Digital asset management software (DAM) is used to catalog, store, and retrieve digital assets such as audio and video files, logos and line art, and marketing materials.
Anti-malware Software
Anti-malware software is designed to protect and repair computer systems against damage from malicious software code that is installed without the owner’s consent. Anti-malware applications provide real-time protection against malware such as viruses, worms, trojan horses, spyware, and adware.
Content Management Software
Content management software (CM) is used to collaboratively create, edit, review, index, search, translate, publish and archive various types of digital media and electronic text.
Video Cameras
Video cameras record live-action scenes that are available for viewing via a stored or transmitted video feed. This allows the user to create a permanent and detailed chronicle of events. Video cameras record dozens of pictures (or frames) a second that when viewed in succession, clearly distinguish the translation of an object or person over time.

Topics of Interest

Piracy is Illegal? I am a personal friend of Tyson from Newfoundland, Canada I just called his house about 20 minutes ago and his mom told me that he was taken away by the police. They took five or...

I have seen it from both sides, I have seen piracy in a way that only few people have. I have been among the scene and I have become friends with many crackers and suppliers. I know the scene buzz,...

Software Piracy Exposed Exploring the personalities and motivations of those behind much of the illegal software distribution on the Internet, this book delves into the inner depths of the software...

Chapter List Chapter 1: An Introduction to Watermarking Techniques Chapter 2: Neuro-Fuzzy Learning Theory Chapter 3: Evolutionary Algorithms Chapter 4: A Tutorial on Meta-Heuristics for...

Overview The content business is complex. Although companies like Disney, Time Warner, and Virgin have built empires on content, it is not an easy business. The value of content is difficult to...