Securing Digital Video

Techniques for DRM and Content Protection

  • Eric Diehl

Table of contents

  1. Front Matter
    Pages i-x
  2. Eric Diehl
    Pages 1-3
  3. Eric Diehl
    Pages 5-20
  4. Eric Diehl
    Pages 21-72
  5. Eric Diehl
    Pages 73-88
  6. Eric Diehl
    Pages 89-95
  7. Eric Diehl
    Pages 97-118
  8. Eric Diehl
    Pages 119-146
  9. Eric Diehl
    Pages 173-187
  10. Eric Diehl
    Pages 189-192
  11. Eric Diehl
    Pages 193-227
  12. Eric Diehl
    Pages 229-240
  13. Eric Diehl
    Pages 241-242
  14. Back Matter
    Pages 243-264

About this book

Introduction

Content protection and digital rights management (DRM) are fields that receive a lot of attention: content owners require systems that protect and maximize their revenues; consumers want backwards compatibility, while they fear that content owners will spy on their viewing habits; and academics are afraid that DRM may be a barrier to knowledge sharing. DRM technologies have a poor reputation and are not yet trusted. 

This book describes the key aspects of content protection and DRM systems, the objective being to demystify the technology and techniques. In the first part of the book, the author builds the foundations, with sections that cover the rationale for protecting digital video content; video piracy; current toolboxes that employ cryptography, watermarking, tamper resistance, and rights expression languages; different ways to model video content protection; and DRM. In the second part, he describes the main existing deployed solutions, including video ecosystems; how video is protected in broadcasting; descriptions of DRM systems, such as Microsoft's DRM and Apple’s FairPlay; techniques for protecting prerecorded content distributed using DVDs or Blu-ray; and future methods used to protect content within the home network. The final part of the book looks towards future research topics, and the key problem of interoperability. 

While the book focuses on protecting video content, the DRM principles and technologies described are also used to protect many other types of content, such as ebooks, documents and games. The book will be of value to industrial researchers and engineers developing related technologies, academics and students in information security, cryptography and media systems, and engaged consumers.

Keywords

Audio Watermarking Broadcasting Compliance Content Protection Copy Protection Copyright Cryptography Digital Rights Management (DRM) Information Security Interoperability Multimedia Pay TV Piracy Protecting IP Tamper Resistance Video Video Fingerprinting Video Watermarking Watermarking

Authors and affiliations

  • Eric Diehl
    • 1
  1. 1., Security & Content Protection LabsTechnicolorRennesFrance

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-17345-5
  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-17344-8
  • Online ISBN 978-3-642-17345-5
  • About this book