Essential Guide: Protecting Premium Content OTT & VOD Distribution
December 1st 2020 - 09:00 AMThe complexity of modern OTT and VOD distribution has increased massively in recent years. The adoption of internet streaming gives viewers unparalleled freedom to consume their favorite live and pre-recorded media when they want, where they want, and how they want. But these opportunities have also presented content owners with unfortunate challenges, typically piracy and overcoming illegal content copying.
With thousands of streams traversing the Wild West internet, just how do content owners protect their high value media? Encryption is all well and good, but with adaptive bit rate systems such as DASH and HLS, how are the multitude of different bit rates catered for?
Then there’s the affiliates. How do they deal with the security issues that keeps the pirates at bay? Who is responsible for making sure the content doesn’t fall into the wrong hands and how can we stop this?
Piracy is as old as mechanical media itself, but the prevalence of the internet and the viewers demands for high quality video and audio has made secure distribution a top priority for content owners. The question is, how do content owners satisfy their viewers, monetize content through affiliates, yet keep their media safe?
This Essential Guide discusses the challenges content owners face and how they have dealt a blow to piracy. It describes content encryption, tokens and facilitating viewing license directly to viewers.
The sponsors perspective, provided by Verimatrix, discusses at first-hand how modern anti-piracy systems operate including encryption and watermarking.
Download this Essential Guide now if you are an engineer, technologist or their managers and you need to understand OTT and VOD secure distribution, as well as outwitting pirates.
Supported by
You might also like...
Live Sports Production: Part 1 - New Sports Production Workflows
Welcome to Part 1 of ‘Live Sports Production’ - This new multi-part series uses a round table style format to explore the technology of live sports production with some of the industry’s leading system designers. It is a fascinating insight i…
IP Security For Broadcasters: Part 8 - RADIUS Network Access
Maintaining controlled access is critical for any secure network, especially when working with high-value media in broadcast environments.
Microphones: Part 5 - The Variable Directivity Microphone
The variable directivity microphone is very popular for studio work. What goes on inside is very clever and not widely appreciated.
IP Security For Broadcasters: Part 7 - Operating Systems
As well as providing the core functionality of a computer, operating systems have the potential to be a primary issue for security and keeping hackers at bay.
Deep Learning Accelerates Object Tracking In TV Production
Advances in application motion tracking in audiovisual production, both live and recorded, have been slow until recently accelerated by the advent of modern AI techniques associated with neural network based deep learning and mathematical graph theory. These advances have converged…