Keeping an eye on piracy civolution viacess orca whitepaper may2014
description
Transcript of Keeping an eye on piracy civolution viacess orca whitepaper may2014
Keeping An Eye On Piracy
Using Advanced Security Solutions to Find, Verify and Fight Today’s New Pirates
White Paper
Viaccess-Orca Copyright 2014
Copyright
The content of this documentation is strictly confidential and the receiver is obliged to use it
exclusively for his or her own purposes as defined in the contractual relationship. No part of Viaccess-
Orca applications or this document may be reproduced or transmitted in any form or by any means,
electronic or mechanical, including photocopying, recording, or by any information storage and
retrieval system, without permission in writing from Viaccess S.A and/or-Orca Interactive.
The information in this document is subject to change without notice. Viaccess S.A nor Orca Interactive
warrant that this document is error free. If you find any problems with this documentation or wish to
make comments, please report them to Viaccess-Orca in writing at [email protected].
Trademarks
Viaccess-Orca is a trademark of Viaccess S.A ® in France and/or other countries. All other product and
company names mentioned herein are the trademarks of their respective owners.
Viaccess S.A and or Orca Interactive may hold patents, patent applications, trademarks, copyrights or
other intellectual property rights over the product described in this document. Unless expressly
specified otherwise in a written license agreement, the delivery of this document does not imply the
concession of any license over these patents, trademarks, copyrights or other intellectual property.
3
This document is Viaccess SA or Orca Interactive intellectual property. Any copy is strictly forbidden.
Table of Contents
Introduction .......................................................................................................................................................................... 4
Current Situation .................................................................................................................................................................. 5
Who Are the New Pirates? ................................................................................................................................................... 7
Mainstream TV security ....................................................................................................................................................... 9
Conditional Access ........................................................................................................................................................... 9
Digital Rights Management ........................................................................................................................................... 10
Other Security Measures ................................................................................................................................................ 11
Current Responses to Piracy .......................................................................................................................................... 11
Piracy Remains a Risk ........................................................................................................................................................ 12
Active Monitoring with Eye on Piracy .............................................................................................................................. 13
NexGuard Video Watermarking Adds Trust Through Verification ................................................................................. 16
Eye on Piracy and NexGuard ............................................................................................................................................. 18
Track and NexGuard ....................................................................................................................................................... 18
Fight and NexGuard ....................................................................................................................................................... 18
The roles of CAS and DRM are Reinforced, Not Diminished .......................................................................................... 19
Conclusion .......................................................................................................................................................................... 19
About Civolution ................................................................................................................................................................ 20
About Viaccess-Orca .......................................................................................................................................................... 20
4
This document is Viaccess SA or Orca Interactive intellectual property. Any copy is strictly forbidden.
Introduction
Revenue losses due to video piracy continue to plague pay TV. Now that the Web is a well-established
channel for video distribution, and the amount of available bandwidth is high enough to ensure good
video quality, pirates have lost no time in making themselves look legitimate; even to the point where
consumers may not know that their favorite online video sources are actually pirate sites. High-value,
high-cost live sports programming is especially at risk for piracy.
Video distributed by these “New Pirates” originates as legitimate content. But if content is captured
and redistributed online after being decrypted and decoded at the point of legitimate consumption,
then the traditional content security frameworks of Conditional Access (CA) and Digital Rights
Management (DRM) would have been insufficient to stop it.
This white paper identifies two supplementary content protection techniques that complement and
reinforce existing CAS and DRM. Active content monitoring can identify live re-streaming of pirated
content in realtime, anywhere in the world. Digital watermarking can then confirm that the suspected
content has indeed been pirated, and even identify the individual pirate.
5
This document is Viaccess SA or Orca Interactive intellectual property. Any copy is strictly forbidden.
Current Situation
Four factors are driving video piracy today: the rising costs of premium content, the rise of OTT and
online distribution, the increasing availability of high bandwidth, and improvements in video
compression.
The high value of live sports programming has made it a high priority for pirates, and revenue lost to
operators and content owners becomes the pirate’s profit. According to PriceWaterhouseCoopers,1
revenues generated by live sports programming in North America alone is expected to grow from
$8.54 billion in 2008, to about $17B in 2017. SNL Kagan says that the cost of sports programming
overall increased by 12% in 2013, to $17.2 billion annually.2 Some of this revenue growth is due to the
increase in the amount of available content, and some is due to the rising cost of the content itself.
In the United States, the ESPN sports network charged operators an average of $5.53 per subscriber
per month in 2013, increasing at an average compound rate of about 20 percent per year.3 In Europe,
BeIN Sports and Canal+ recently obtained the French rights for UEFA Champions League football
(soccer) for the 2015-2018 period. Under the previous agreement, the two companies paid about €111
million per year. The new agreement was said to be about 30% higher.
The second concern is online distribution. There are two groups of premium content stakeholders:
distributors and owners. Both have an interest in security, but for slightly different reasons. Content
distributors (Pay TV operators and premium online storefronts) want to make sure that content is
available only to legitimate end users that pay for it. This situation is evolving: at one time, distributors
didn’t care as much about piracy outside of their networks, because their subscribers were captive.
Now, there is the risk of cord-cutting by these subscribers, which results in lost subscription revenue.
Also, the distributor may have its own stake in online distribution, and want to make sure that all of
that distribution is monetized as well.
In addition, because sports programming is often the single most expensive content component in a
pay TV operator’s overall programming line-up, it’s a major reason that operator margins have been
squeezed. Losses due to piracy can go right to the bottom line.
Content creators (Sports leagues, TV programmers and movie studios) want to minimize piracy so they
can maximize the amount of revenue they can capture for that content, through multiple channels of
distribution. They are certainly aware that piracy occurs after distribution, but historically, there has
been no way to track it, so relatively little has been done about it.
Piracy has even forced some content stakeholders to place limits on legitimate video distribution, to
reduce exposure to piracy. In November 2013, for example, the English Premier Soccer League reduced
the number of matches available for broadcast in the Middle East by Al Jazeera, because pirates were
redistributing that programming back into the UK, cannibalizing distribution through its home market
1 At The Gate And Beyond: Outlook for the sports market in North America through 2017. Page 1. Special Report. November 2013. PriceWaterhouseCoopers. See: http://www.pwc.com/en_US/us/industry/entertainment-media/publications/assets/pwc-sports-outlook-north-america.pdf 2 Sports Rights Costs Increasing Dramatically, Fears Exploding Pay TV, Article. August 13, 2013. Variety. See: https://variety.com/2013/tv/news/sports-fans-to-spend-more-money-to-watch-favorite-teams-1200577215/ 3 To Protect Its Empire, ESPN Stays on Offense, Article. August 26, 2013. The New York Times. See: http://www.nytimes.com/2013/08/27/sports/ncaafootball/to-defend-its-empire-espn-stays-on-offensive.html?pagewanted=all&_r=0
Content owners and distributors know that the theft of their intellectual property may be all that stands between profitability and business failure,
making them highly motivated to protect themselves from piracy
6
This document is Viaccess SA or Orca Interactive intellectual property. Any copy is strictly forbidden.
distribution partners, BT and BSkyB.4 In 2012, the Premier League was shutting down about 75
streams for every match. 5
The third concern is the near-universal availability of broadband access, at speeds that can support
high definition, high quality television distribution. A decade ago, the best available speeds were a few
megabits per second, only over fixed line access. In the early 2000s, the US Federal Communications
Commission had defined “broadband” to be 200 kilobits per second, but what a difference a decade
has made. Today, the FCC recognizes “broadband” as ranging from 200kbps to 30 megabits per
second, and that speeds of up to 100 mbps are now available.6
Also, where switched access over fixed lines was the primary distribution option a decade ago, a wide
range of newer access and transport options are now taken for granted. These range from bonded and
vectored DSL, Ethernet over Fiber, Carrier WiFi, to LTE cellular broadcast. All of these methods
commonly offer ten megabits per second and increase from there.
The fourth concern is the improvement of video quality, enabled by ongoing advances in video
compression technology. A decade ago, the most common compression method was MPEG-2 and the
distribution of standard definition TV required at least 6 megabits per second. High Definition TV was
at the stage that 4K UHD (Ultra High Definition) TV is today: in technical and market trials, with
mainstream availability still about two years away. Early MPEG-4 compression enabled distribution of
high definition TV at about 10 megabits per second, although this has fallen to about 6 megabits per
second, with good video quality. The next generation, High Efficiency Video Coding (HEVC, or H.265)
compression, promises to cut that in half. An acceptable HD video picture can be distributed today at
two megabits per second or less, which is well within the capabilities of most fixed line and many 4G
cellular broadband providers.
Content owners and distributors know that the theft of their intellectual property may be all that stands
between profitability and business failure, making them highly motivated to protect themselves from
piracy.
4 English Premier League Limits Soccer Games Broadcast By Al Jazeera Sports. Article. November 25, 2013. The Wall Street Journal. See: http://online.wsj.com/article/DN-CO-20131125-004334.html 5 English Premier League Closes 30,000 Illegal Streams. Article. August 17, 2012. The Wall Street Journal. See: http://blogs.wsj.com/tech-europe/2012/08/17/english-premier-league-closes-30000-illegal-streams/ 6 Getting Broadband. Informational Web site. US Federal Communications Commission. See: https://www.fcc.gov/guides/getting-broadband
7
This document is Viaccess SA or Orca Interactive intellectual property. Any copy is strictly forbidden.
Who Are the New Pirates?
Over the past decade, a new category of video pirate has emerged, which we identify as the New
Pirate. They know that sports content carries a premium price and understand that piracy of live
broadcast content can be a lucrative business. Unlike the pirates of earlier times, which did not have
the technical resources or the available bandwidth to look legitimate, these New Pirates have the same
easy access to greater bandwidth, better video compression and online production technologies as the
legitimate stakeholders do. Instead of operating in the dark, the New Pirates operate completely in the
open and use high-quality live streaming.
The New Pirates can easily masquerade as legitimate operators. They are highly sophisticated players,
backed with good technical resources and a strong working knowledge of the Internet. They can easily
present a legitimate-looking face to consumers, and look just like pay TV. Zona offers a dedicated
football section.
Figure 1 – Zona User Interface
Source: Zona.ru
This particular service is also a multiscreen service: an Android app is promoted on this site’s home
page. Actual video quality is on par with legitimate online video sources, with high definition video
programming streaming at bit-rates of 3.5 megabits per second. Excellent Quality of Experience has
historically been a major differentiator of Tier 1 pay TV operators, but if the Tier 1s can no longer
demonstrate their superiority, their message starts to ring hollow.
These sites also threaten legitimate online video sites in countries where the pirate does not have a
direct presence. Virtual private networks (VPNs) provide portals between legitimate and illegal use.
They are highly sophisticated players, backed with good technical resources and a strong working knowledge of the Internet
8
This document is Viaccess SA or Orca Interactive intellectual property. Any copy is strictly forbidden.
The content source can be in one country, the hosting of the service in another country, and finally the
CDN provider can be in a third one.
The New Pirates use sophisticated business models, including:
Ad-insertion with ads from major advertisers that don’t know their ad server is linked to a pirate
site. Pre-rolls, mid-rolls, banners, etc.
Consumer-paid subscriptions, where the user thinks it’s a legitimate service that offers the
same programming for a lower price than competing services. Furthermore, a consumer
provides the pirate company with a credit card, and that credit card may be subject to fraud and
abuse by the pirate
For content providers whose business model also involves advertising, loss of ad revenue to pirates
also constitutes a significant risk. A 2014 report released by the Digital Citizens Alliance7 estimated that
video pirate sites captured $227 million in online advertising revenue in 2013, across about 600 Web
sites.
7 New Study Shows Content Theft Sites Hijacking Online Ad Business to Make Hundreds of Millions in Profits. Press Release. February 18, 2014. Digital Citizens Alliance. See: https://media.gractions.com/3DE696054309A422E45E08789A37B98CA008EEE5/3af3edc2-db51-46ee-9274-456636276f55.pdf
9
This document is Viaccess SA or Orca Interactive intellectual property. Any copy is strictly forbidden.
Mainstream TV security
Security and anti-piracy measures are a basic component of all pay TV and premium content services,
and over time, they have grown very sophisticated. Today’s operators must implement a security
ecosystem that addresses of three essential needs: to secure the end-to-end delivery chain, to secure
the content itself, and to ensure secure playback at the consumer device, which includes the secure
transfer of the video from the decoding device (e.g. the set-top box) to the TV screen.
Conditional Access A Conditional Access System (CAS) secures the end-to-end delivery chain and manages the business
rules associated with content, devices, and users. When the consumer requests a content service, a
process of authentication takes place, which grants entitlement to the service or content. A CAS
scrambles (or encrypts) content so it cannot be viewed by unauthorized (unauthenticated) users, and
sends messages (known as ‘keys’) to the consumer’s set-top box to unlock (de-scramble or decrypt) the
content upon authentication.
Figure 2 - Conditional Access System
Source: Viaccess-Orca
Security and anti-piracy measures are a basic component of pay TV and premium content services; over time, they have grown very sophisticated
10
This document is Viaccess SA or Orca Interactive intellectual property. Any copy is strictly forbidden.
In order to perform these functions, both the server-side processes and the client device must be
‘trusted environments’ that are safeguarded both physically and technically from intrusion, so that keys
and other secret data cannot be intercepted. Pay-TV systems have historically used client-side
smartcard hardware modules that enable operators to uniquely identify the set-top boxes connected to
their systems, which, in turn, enable decryption of the video content. More recently, the industry has
developed cardless CAS clients, which are used in IP-connected (IPTV) set-top boxes, some cable TV
set-tops, and in some IP-connected non-set-top devices. Both smartcard- and cardless-based systems
are in use today.
Digital Rights Management Digital Rights Management (DRM) secures the content itself. Similar to conditional access, DRM is
used for the secure licensing of streaming and file-based content, and can control what the consumer
can do with it. Also like CA, DRM systems require a trusted environment both client- and server-side
that is resistant to intrusion or tampering. But unlike CA, DRM embeds security within the content
itself and is device-independent.
Figure 3 – Digital Rights Management System
Source: Viaccess-Orca
In DRM authentication, rights information and usage rules are stored in a centralized location and
associated with an identifier within the content. When someone wants to use it, a transaction occurs
between a content host and a user, to confirm key information within the content, and to impose
conditions for access based on business rules. Each encrypted content file or stream is evaluated as an
unique item (session-based encryption), which must be authenticated before use is permitted. The
authentication process can also be designed to look for unique identifiers in the device (hardware-
based), in which the content would not be unlocked (decrypted) unless there is a match with the
hardware ‘root of trust.’
11
This document is Viaccess SA or Orca Interactive intellectual property. Any copy is strictly forbidden.
Other Security Measures Another widely-used security measure beyond CA and DRM is obfuscation, which is a computationally-
applied process that disguises the characteristics of a software player or client hardware device, to
conceal its purpose. Software obfuscation disguises software executables to make them difficult to
reverse-engineer. Key obfuscation hides the secret cryptographic key embedded within or generated
by the client. Yet another technique is clone detection, which is used to identify whether or not the
content or software client being consumed is the same as what was originated by the content provider.
If not, playback could be disabled.
Another safeguard is the common link-layer protection known as HDCP (High Definition Content
Protection), which secures the connection between a TV set-top box and a high definition television set.
Fingerprinting is another: data extracted from video files can be kept in a database and compared with
video clips encountered in online distribution. If a match is detected, the distributor could be asked to
take the content down from its servers.
Current Responses to Piracy Once piracy has been detected, a number of responses are available to content stakeholders
Responses implemented through technical means include suspending or removing rights to the
content, decommissioning the smartcard in the user’s set-top box, subscriber blacklisting, and device
revocation. Additional responses include sending warning letters, fines, and legal prosecution.
Responses differ from country to country.
12
This document is Viaccess SA or Orca Interactive intellectual property. Any copy is strictly forbidden.
Piracy Remains a Risk
So far, we have seen two approaches to content security. CA systems are designed to protect the
transport of valuable content from a service provider’s facilities to a set-top box or other video end-
device. DRM complements CA by locking the content itself against unauthorized use. Although they
were originally designed for different content distribution situations, CA and DRM happen to
complement one another very well, and are always used together in multiscreen pay TV deployments.
But the nature of video piracy continues to evolve. New Pirates will pursue high quality content any
way that they can. If they can breach an operator’s CAS, they can gain direct access to the highest
quality content. This means that the CAS supplier’s job of keeping the solution robust and secure is
never finished, and that CA and DRM will always be essential elements of an end-to-end content
protection framework.
Existing post-decoding content protection technologies are also at risk. For example, Version 1.0 of the
High Definition Copy Protection (HDCP) link protection technology used to interconnect video
consumer devices such as set-top boxes and game consoles with high definition TV sets (HDMI) was
breached in 2010.8 The current release, Version 2.2, remains secure; but millions of pre-2.2 devices are
currently in use. Also, copy-control rules such as “Copy Once” and “Copy Never” can be applied to
the content, but there is no guarantee that these rules can’t also be circumvented.
Once a legitimate end user has been authenticated and the content has been unlocked and decrypted
at the consumer end device, there is no guarantee that it can’t be redistributed - either immediately, or
later. One content security expert once said “Digital files cannot be made uncopyable, any more than
water can be made not wet.” 9
For this reason, we believe that additional post-consumption safeguards are necessary. Sometimes,
the term “post-consumer” is used in context with recycling, and has little to no value. But it’s not
difficult to argue that pirated content has more value than it did in legitimate distribution. For one
reason, it creates an impression of legitimacy and brand equity for the pirate. For another, unless it’s
put to a halt, pirated content can be recycled endlessly.
The remainder of this paper highlights two additional content protection categories that supplement
CA and DRM: active monitoring and watermarking. Combined, these methods identify streams and
items of content that may have been pirated, and even confirm the identity of the actual pirate. Again,
even though their original purposes were not related to one another, active monitoring and
watermarking happen to complement one another. What’s more, they also complement CA and DRM
extremely well.
8 Intel HDCP HDMI Copy Protection Broken. Article. September 17, 2010. IHS Technology. See: https://technology.ihs.com/402973/intel-hdcp-hdmi-copy-protection-broken 9 Blog posting. Bruce Schneier. May 15, 2001. Schneier on Security. See: https://www.schneier.com/crypto-gram-0105.html#3
The nature of video piracy continues to evolve. New Pirates will pursue high quality content any way that they can
13
This document is Viaccess SA or Orca Interactive intellectual property. Any copy is strictly forbidden.
Active Monitoring with Eye on Piracy
The first new safeguard is active monitoring, which tracks the distribution of content after its
authorized use. Eye on Piracy10 is a service-based solution from Viaccess-Orca (VO) which
complements the security measures enabled by CA and DRM by actively monitoring live video re-
streaming over the Internet. This active security framework works in real-time, to help content owners
and stake-holders find the New Pirates quickly. Eye on Piracy identifies the percentage of content that
is pirated, so operators and content owners can know the degree of risk, and make informed decisions
and decide whether or not to take action.
Eye on Piracy has several key business benefits:
Addresses live re-streaming of exclusive, high-cost, sports content
Protects content that’s beyond the reach of CAS and DRM, after original distribution
Helps operators avoid churn from subscribers that would access the same content from pirate
sites at a lower price
Confirms sources of illicit re-streaming to build the case to revoke services from pirates
Eye on Piracy has three main service components. The first component is Track: Global Marketing
Intelligence and Monitoring. Track helps the content stakeholder better understand the piracy problem.
VO starts by monitoring where piracy occurs, identifies the amount of piracy that is taking place and
determines who is actually watching these illegal broadcasts.
Figure 4 – Eye on Piracy - Monitoring the Number of Pirated Streams, by Pirated Event
Source: Viaccess-Orca
10 Eye on Piracy. Informational Web site. Viaccess-Orca. See: http://www.viaccess-orca.com/security/eye-on-piracy.html
The first new safeguard is active monitoring, which tracks the distribution of
content after its authorized use
14
This document is Viaccess SA or Orca Interactive intellectual property. Any copy is strictly forbidden.
To look at a specific example, VO used Track to monitor the redistribution of a football match between
Liverpool and Chelsea that aired on April 27, 2014, to identify how a particular sporting event went to
worldwide distribution through piracy.
For this match, Eye on Piracy identified widespread distribution through three pirate sites:
Sopcast, a P2P technology, with 27 unique links. Bitrates ranged from 1,500 kbps to 3,500 kbps
Acestream, another (and more recent) P2P technology, with 16 links. Bitrates ranged from 900
kbps to 2,000 kbps
115 instances of streaming unicast distribution, at bitrates ranging from 175 to 815 kbps
The global audience for Unicast viewers was about 68,000 unique viewers, plus about 600,000
viewers over P2P distribution
These statistics clearly demonstrated the piracy for one particular match. Ongoing monitoring could
help content stakeholders determine piracy trends. Track monitors where the live streams are
occurring, and then, based on that information, it crawls the Web to discern the audience. Track can
then create a map to show where the content was being redistributed illegally, as shown in the figure
below.
Figure 5 – Eye on Piracy - Geographical Distribution Map of Video Piracy
Source: Viaccess-Orca
15
This document is Viaccess SA or Orca Interactive intellectual property. Any copy is strictly forbidden.
In addition to identifying the locations and numbers of illegal users, Track also identifies the amount of
bandwidth (bit-rate) available to the illegal users, enabling it to discern the video quality that the users
were receiving.
The knowledge gained through Eye on Piracy also helps content providers fine-tune their business
tactics. Mapping the locations of piracy helps the content provider identify new market opportunities
where it can provide the content itself, legitimately, to capture this previously-lost end user revenue as
well as new revenue associated with advertising. The pirate has unintentionally helped the content
provider by having created awareness for the content already.
Figure 6 – Eye on Piracy – Tracking Illegitemate Content Redistribution
Source: Viaccess-Orca
The second component of Eye on Piracy is Fight: Active Monitoring and Anti-Piracy Solutions. Fight
complements the safeguards provided by the existing CAS after the content has left the operator’s
network. Once Track has detected and pinpointed pirate distribution, Fight adds a layer of deterrence
that includes sending legal notices to pirates to cease and desist. Fight also uses technical methods to
prevent pirates from rebroadcasting premium content. To maximize their effectiveness, Fight can take
these actions during the pirate broadcast, in real-time.
The third component is Prove: Legal Support against Cyber-Piracy. Prove gathers proof of
infringement and legal evidence about the actual pirates and their activities. The VO team looks for
ways to identify who the pirates are and which organizations stand behind them. Then, together with
local law enforcement or government agencies, VO helps close pirate operations.
16
This document is Viaccess SA or Orca Interactive intellectual property. Any copy is strictly forbidden.
NexGuard Video Watermarking Adds Trust Through Verification
A watermark, simply stated, is information that is embedded into a photo or a stream of video content.
Everyone is familiar with video content that has a logo in the corner, identifying the TV network or the
sporting league that distributed or originated the content. These kinds of visible markings can be
removed by scaling or masking the image. The fact that some of the image is lost is often not
significant: the viewer still sees the content and can follow the game or the show.
Civolution’s NexGuard watermarking system improves upon this concept by embedding invisible
watermarks into the content, which are undetectable to human perception and do not interfere with the
content in any way. The embedded information remains associated with the video content even after it
is decoded or decrypted, and even if attempts have been made to eliminate the watermark.
The first publicized use of this form of watermarking was in 2003, when watermarking was used to
pinpoint a jury member for the Academy Awards who had leaked a movie to pirates. Since then,
watermarking has been seen as a deterrent to piracy.
Civolution’s NexGuard Watermark Embedder uses a lightweight software client to insert a unique
identifier at the set-top box, before it is presented to the television set. Later, if there is suspicion of
piracy, the content can be processed forensically by a watermark extraction program, to find the
unique ID; as in the figure below.
Figure 7 – Identifying Suspected Content Using Embedded Watermarks
Source: Civolution
Civolution’s NexGuard watermarking system embeds invisible watermarks into the content, which are undetectable to human perception and
do not interfere with the content in any way
17
This document is Viaccess SA or Orca Interactive intellectual property. Any copy is strictly forbidden.
Figure 8 - Concurrent Watermarking for Multi-screen Streaming
Source: Civolution
Just as piracy has become more sophisticated over the years, so have attempts to breach or remove
watermarks. Therefore, the watermark must be robust, and able to survive vrious attacks, including:
Video processing attacks, such as Digital-to-analog and Analog-to-digital conversions (including
multiple conversions),
Transformation, such as resizing, letterboxing, aperture control, low-pass filtering and anti-
aliasing, frame-swapping, compression, scaling, cropping, overwriting and the addition of
noise,
Format conversion, including the changing of frequencies and spatial resolution of NTSC, PAL
or SECAM, from one to another and back,
Re-sampling and re-quantization (including dithering and recompression),
Signal enhancements to image contrast and color,
Collusion, which is the combining of multiple videos in the attempt to make the watermark
unrecognizable,
Sync separation, the cutting off or damaging of the horizontal and vertical sync signals that are
embedded into a composite (analog) video as well as into a digital video stream.
A pirate using a PC to capture video from the analog output of a set-top box using a video capture card
could certainly re-stream the video, but the video would still include the embedded watermark.
Detailed identification of the piracy source can be made possible for multiscreen services through per-
session or per-device watermarking.
Modern watermarking techniques are an important ingredient in an overall content protection strategy.
They help content owners, distributors and law enforcement agencies identify pirated content and
trace it back to its owners even if a pirate has defeated the conditional access or integrated DRM
system that provided access to the content, because the watermark is part of the content itself.
Watermarks can be applied at any point in the content’s lifecycle: from capture, through production, in
distribution, and even at the consumer end-device. Eye on Piracy complements watermarking for
operators that may still have older set-top boxes in the field, without sufficient resources to
accommodate a watermarking client. Watermarking complements Eye on Piracy by helping verify that
the suspected content was in fact illegitimately distributed; by positively identifying the thief, or at least
identifying the content’s last legitimate point of distribution.
18
This document is Viaccess SA or Orca Interactive intellectual property. Any copy is strictly forbidden.
Eye on Piracy and NexGuard
Traditional Conditional Access and Digital Rights Management provide well-defined frameworks for the
transport and use of premium content. But once the content is delivered through the video end-device,
the content could end up anywhere. Content is like traffic at a busy intersection that has nobody to
direct the traffic. If content is published – legitimately or illegally – it still has to be located and
identified. But nobody will find the content if nobody is looking for it. The New Pirates understand that
the possibility of being caught is low enough that piracy is worth the risk.
Now, someone is looking. Eye on Piracy helps broadcasters and other content stake-holders find
shared content, and then the NexGuard watermark proves the case. Content owners can be more
assured that the distribution of their valuable programming can be kept within legitimate channels,
because instances of suspected piracy can be identified and then confirmed.
Track and NexGuard Eye on Piracy finds a stream that’s suspect of piracy and monitors the content, but does not know
which TV channel it is. A Premier League game is the suspect. The NexGuard watermark that is
embedded at the headend can help identify that the programming came from a specific service
provider or broadcast source.
Track provided the intelligence about the “when” and the “how.” NexGuard added the “where” and
“which channel.” This intelligence shows the content provider how much of the total traffic for this
programming has been pirated, and enables them to decide whether or not this piracy is a significant
risk.
Eye on Piracy then draws a map of the piracy and shows the cities where piracy is most common.
Knowing where the piracy is taking place is important, because it helps them determine the actual loss
of revenue on a market by market basis.
Fight and NexGuard With traditional CAS and DRM, content has been protected up to the set-top box or connected CE
device. After decryption, content is still subject to theft. With Fight, the content stakeholder can know
which content platform is streaming the pirated content. Then a notification can immediately be sent,
to request that the content be taken down.
For other platforms and live P2P sources, content that is suspected of having been pirated can be
processed by extracting an additional watermark inserted at the client device to identify the end-device
and the subscriber based on the subscriber’s ID from the set-top box, or from the identifier of the
conditional access client. If a watermark is present, the information can be provided either live or post-
mortem to the legitimate operators and content owners, so they can take appropriate actions against
the source of redistribution. Depending upon local regulations, some redistribution can only be
stopped after a notification of a Court Judgment. Viaccess-Orca provides anti-piracy legal advising
and prosecution preparation based on its anti-piracy field campaigns and its legal worldwide expertise
in content protection and in anti-piracy cyber-law.
Eye on Piracy helps broadcasters and other content stake-holders find shared content, and then the NexGuard watermark proves the case
19
This document is Viaccess SA or Orca Interactive intellectual property. Any copy is strictly forbidden.
The roles of CAS and DRM are Reinforced, Not Diminished Operators enforce their security policies through the Conditional Access and Digital Rights
Management Systems. All of the personalization data associated with the operator’s TV set-top box or
with other consumer devices that are connected to the operator’s service over IP are linked to the CAS
and DRM to enforce content access and usage rights. Eye on Piracy looks to such systems for guidance
on effectively applying security responses that it can implement through technical means, after piracy
is detected. These were listed earlier in this paper.
Conclusion In the ongoing effort to minimize revenue loss through piracy and illegal redistribution, the
combination of active monitoring and watermarking can be a powerful deterrent. If a pirate shares
content, monitoring will find the corresponding stream. When the stream is found, the watermark is
retrieved and the individual is identified.
In conclusion, the New Pirate can no longer be assured of operating with impunity, and this knowledge
can serve as a powerful deterrent.
20
This document is Viaccess SA or Orca Interactive intellectual property. Any copy is strictly forbidden.
About Civolution Civolution (www.civolution.com) is the leading provider of technology and solutions to identify,
manage and monetize media content. The company offers an extensive portfolio of cutting edge digital
watermarking and fingerprinting based applications for media interaction (Automatic Content
Recognition, Tv-Sync Ads and content triggering), media intelligence (audience measurement and
television monitoring) and media protection (content filtering and forensic watermarking for pre-
release, digital cinema, payTV and streaming).
Follow us on Twitter: @Civolution
About Viaccess-Orca As a leading global provider of content protection, delivery, and discovery solutions, Viaccess-Orca is
shaping the ultimate content experience. Through its integrated range of business-savvy products and
solutions, Viaccess-Orca helps service providers in the cable, DTT, satellite, IPTV, and OTT industries
gain a competitive edge in today’s rapidly evolving multiscreen environment. By enabling service
providers to securely deliver an engaging user experience on any device, Viaccess-Orca is reinventing
the entertainment landscape. Viaccess-Orca is part of the Orange Group.
For more information, visit www.viaccess-orca.com, follow us on Twitter @ViaccessOrca and Linkedin.