Skip to content

The Battle for Viewers: Competing Against Piracy – Monitoring & Traceability

Content protection and anti-piracy solutions go hand-in-hand as part of a layered security approach, especially for ultra-high value content, and when attached to a timeframe, like live sports or online theatrical releases. Forensic watermarking helps identify the source of unauthorized streams or copies by tracing them back to the last authorized recipient. Once illegal sources are identified, they can be shut down, thus protecting key revenue streams for the service provider.

There are three main points  where piracy can happen in video delivery:

  • In the distribution workflow from post production to the distributor
  • Between the distributor and the end consumer
  • Redirected from the end device

Each of these use cases requires a different type of watermarking: 

Post production to distributor – Forensic watermarking is embedded by the content owner, like a movie studio, during encoding from the origin server, also called a B2B origin mark. This is primarily used for theatrical release content and can be used to trace back where a specific content version came from when content is distributed to post production houses or distribution channels. 

Distributor to end consumer – The server-side watermark is done during encoding and can be placed on the adaptive bitrate stream at the head-end for HLS and DASH content, which is required by the multi-device OTT world (iOS, Android, web and streaming device permutations). Server-side watermarking meets studio requirements for higher resolution content and is easier to implement. Plus the watermark logic is done within the server and this makes it virtually untouchable. 

This cloud based service introduces a small amount of latency and comes with some additional costs, but it is well-suited in a low-latency requirement that live sports demands.

End consumer – A watermark is embedded within a stream in order to identify unauthorized streams. The client-side version of this is done on the device at the video player level and requires more upfront integration work.  

Watermarks can be inserted at any or all of these main points along the content supply chain – depending on your business need and where you are experiencing the most piracy. Watermarking is an essential component to anti-piracy methods because it allows service providers to identify where the leak happened, and take further identification, disconnection and/or legal actions.

While watermarking enables the traceability of pirated content, monitoring is the other piece to the puzzle to find – and ideally prevent – illegal redistribution. For example, machine learning is used to identify usage by device, location, and help identify irregular consumption patterns that may otherwise go unnoticed.  

This is Part III of a five-part series dedicated to helping streaming service providers understand where their security vulnerabilities exist and what security methods will best protect, and ultimately enhance, their businesses in the most cost-efficient manner. Revisit Parts I and II

Do you have questions about applications and content security?

Book a call with one of our experts

Want to keep up with Verimatrix news?

Sign up to the newsletter

Recent Posts

Mobile Apps Are at Risk for Static and Dynamic Attacks

Mobile apps have become an ubiquitous presence in our lives. We use them to check our investment portfolios, order meals, and even find dating partners. But as we increasingly rely on these apps to manage our personal and professional lives, businesses struggle to prevent cyber attacks originating from within the app, and from the billions of app-connected devices.

chat gpt

ChatGPT: Friend or Foe?

The reward of engaging with a loyal customer base doesn’t come without risk. Hackers, often highly resourced cybercriminal gangs, recognize that mobile apps provide a gateway into the enterprise. As awareness grows about this risk, enterprises are increasingly seeking solutions to secure and protect their mobile apps.

Mobile RASP vs Shielding vs In-App Protection

The reward of engaging with a loyal customer base doesn’t come without risk. Hackers, often highly resourced cybercriminal gangs, recognize that mobile apps provide a gateway into the enterprise. As awareness grows about this risk, enterprises are increasingly seeking solutions to secure and protect their mobile apps.

Mobile Apps Are at Risk for Static and Dynamic Attacks

Mobile Apps Are at Risk for Static and Dynamic Attacks

Mobile apps have become an ubiquitous presence in our lives. We use them to check our investment portfolios, order meals, and even find dating partners.…
Rock Concerts, Blind Spots and a Widening Attack Surface

Rock Concerts, Blind Spots and a Widening Attack Surface

We are living in a mobile-first world, and the explosion of mobile applications is nothing short of remarkable. We're talking about 6-7 million apps on…
ChatGPT: Friend or Foe?

ChatGPT: Friend or Foe?

The reward of engaging with a loyal customer base doesn’t come without risk. Hackers, often highly resourced cybercriminal gangs, recognize that mobile apps provide a…
Want to take a deep dive?

Connect with us

Video Protection & Anti-Piracy