Essential Guide: Protecting Premium Content OTT & VOD Distribution
December 1st 2020 - 09:00 AMThe complexity of modern OTT and VOD distribution has increased massively in recent years. The adoption of internet streaming gives viewers unparalleled freedom to consume their favorite live and pre-recorded media when they want, where they want, and how they want. But these opportunities have also presented content owners with unfortunate challenges, typically piracy and overcoming illegal content copying.
With thousands of streams traversing the Wild West internet, just how do content owners protect their high value media? Encryption is all well and good, but with adaptive bit rate systems such as DASH and HLS, how are the multitude of different bit rates catered for?
Then there’s the affiliates. How do they deal with the security issues that keeps the pirates at bay? Who is responsible for making sure the content doesn’t fall into the wrong hands and how can we stop this?
Piracy is as old as mechanical media itself, but the prevalence of the internet and the viewers demands for high quality video and audio has made secure distribution a top priority for content owners. The question is, how do content owners satisfy their viewers, monetize content through affiliates, yet keep their media safe?
This Essential Guide discusses the challenges content owners face and how they have dealt a blow to piracy. It describes content encryption, tokens and facilitating viewing license directly to viewers.
The sponsors perspective, provided by Verimatrix, discusses at first-hand how modern anti-piracy systems operate including encryption and watermarking.
Download this Essential Guide now if you are an engineer, technologist or their managers and you need to understand OTT and VOD secure distribution, as well as outwitting pirates.
Supported by
You might also like...
Standards: Part 25 - Designing Client-Side Video Players
Here we chart the historical development of client-side video players, describe the building blocks used to create them and the relevant standards.
Microphones: Part 5 - The Variable Directivity Microphone
The variable directivity microphone is very popular for studio work. What goes on inside is very clever and not widely appreciated.
IP Security For Broadcasters: Part 7 - Operating Systems
As well as providing the core functionality of a computer, operating systems have the potential to be a primary issue for security and keeping hackers at bay.
The Creative Challenges Of HDR-SDR Simulcast
HDR can make choices easier - or harder - at every stage of production but the biggest challenge may be just how subjective those choices are.
Building Software Defined Infrastructure: What Is Software Defined Infrastructure?
We begin our new series by asking a simple question; what is Software Defined Infrastructure and why do we need it?