Skip to main content
Top

2012 | OriginalPaper | Chapter

2. Why Protect Video?

Author : Eric Diehl

Published in: Securing Digital Video

Publisher: Springer Berlin Heidelberg

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Digital video is a set of binary information that represents video content in compressed or uncompressed format. Thus, it is intrinsically unprotected. In some cases, it needs protection, or it needs to control access under some defined conditions. A digital video may represent a work protected by some copyright laws. Thus, some technical means should enforce these laws. The digital video may have commercial value, which should also be preserved by technical means. Piracy attempts to break these means. We give a brief overview of piracy.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
The metaphor of the stool has its limits. Indeed, a three-legged stool is rather stable as long as the difference in the lengths of the three legs is not too much. The equilibrium is more difficult in case of content protection. Nevertheless, if one leg is missing, the entire system collapses.
 
2
The same goal is behind the concept of a patent. The inventor may expect to get some royalties if third parties use his invention. This retribution is an incentive to share knowledge for the common good.
 
3
At the time of writing, 88 countries have enforced this treaty [12].
 
4
This levy was already applied on analog audio and video tapes.
 
5
In other words, it is assumed that the more an author is successful, the more this work will be pirated.
 
6
As a simplification, I will often refer to P2P as an illegal network. I would like to underscore that P2P technology per se is not illegal. P2P technology has many legal and beneficial usages. Unfortunately, the largest current usage of P2P networks is illegal sharing of copyrighted content. The same argument holds for direct download (DDL) technology.
 
7
The version used by professional dubbing teams is often of low resolution to limit the risk of leakage. Nevertheless, this version is still better than most early camcorded pirated versions.
 
8
Ibrahim Dawood is the alleged organizer of the 1993 Mumbai bombings. He is the most wanted criminal in India.
 
9
Bulletin Board Systems (BBS) were the first sharing systems. A BBS is mainly a computer connected to one or several phone lines. It was possible to remotely contact this server, load and download files. The Internet has mostly phased out BBS (except in some Third World countries).
 
10
This acceleration may be partly explained by the sharing networks moving from free model to business models, for instance, based on advertisements.
 
11
For instance, Megaupload rewarded its uploading members up to $10,000 if their file was downloaded more than 5,000,000 times [44]. It should be noted that their terms of service banned illegal content. They stated: “You agree to not use Megaupload’s Service to: c. upload, post, e-mail, transmit or otherwise make available any Content that infringes any patent, trademark, trade secret, copyright or other proprietary rights of any party”. However, when shutting down the Megaupload site on 19th January 2012, the FBI claimed among the many indictments that “The conspirators further allegedly offered a rewards program that would provide users with financial incentives to upload popular content and drive Web traffic to the site, often through user-generated websites known as linking sites. The conspirators allegedly paid users whom they specifically knew uploaded infringing content and publicized their links to users throughout the world”.
 
12
A keystone effect is the trapezoidal distortion that occurs when the capturing device is not strictly parallel to the screen. This is often the case with wild capture in theaters.
 
13
Both sites are top 120 websites.
 
Metadata
Title
Why Protect Video?
Author
Eric Diehl
Copyright Year
2012
Publisher
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-642-17345-5_2

Premium Partner