Verimatrix: Forensic Watermarking | Verimatrix

By: Verimatrix  09-12-2011
Keywords: Video, Digital Video, Revenue Security

The Challenge – Evolving Media Landscape

Managing digital content throughout an ever more complex - yet increasingly compressed - media lifecycle, while attempting to maximize the associated asset monetization, is presenting rights owners with new opportunities as well as threats. After the costly loss of control of recorded music distribution, the motion picture industry has also become severely impacted by content piracy. Worldwide loss of business for that particular industry and other content owners presents significant challenges not only to established distribution channels, but now even more so given that content increasingly finds its way beyond the traditional outlets. The media lifecycle is constantly morphing in often unpredictable ways, raising the bar for rights owners and technology providers alike.

The Promise of Watermarking

In response to the ever-shifting media monetization challenges, a variety of techniques are being developed and deployed to help address the protection of video content over its full lifecycle. One of the most promising of these techniques is “forensic watermarking.” The use of watermarking for digital video content, which draws on long established technologies combined with new and innovative approaches, has many promising aspects that directly address key challenges in the fight to maintain and enhance the revenue potential in content distribution systems.

A Powerful Solution – Digital Watermarking

Digital watermarking is a technology that seeks to securely, robustly and imperceptibly embed identifying information within copies of media content. These aspects benefit from some amplification:

  • Imperceptible marking is required to preserve the quality of the viewer experience and avoid any implication that the delivery channel that uses watermarking reduces the integrity of the original material. Imperceptible marking draws a specific contrast to some visible overlay techniques used to help trace illegitimate channel rebroadcasting.
  • Security is necessary to preserve the integrity of the inserted information, and especially to prevent any modification of embedded watermark information as copies are distributed.
  • Robustness ensures that the watermark remains readable through any reasonable manipulation or transformation of the media. The most robust watermarks will survive multiple transitions from digital to analog format and be unaffected by filtering and distortion.

In comparison to other digital media such as audio, digitally distributed movies and other high value content can be protected particularly well by digital watermarking. Digital video is a composition of many individual images, with a much larger amount of data than other media files. Therefore it offers more scope to robustly embed information, when suitable technologies are applied. With advanced methods that make use of the density of information to insert watermarking payloads, video can be more effectively secured than audio or textual media. The relative sizes of content and payload make it difficult to remove by processing, re-encoding or even targeted filtering attacks.

Video Watermarking for Forensic Tracking

A specific application is the so-called user-specific forensic tracking, the goal of which is to help identify the source of unauthorized copies of media files and trace them back to the last authorized recipient or the legitimate content owner. User-specific forensic watermarking is an application that embeds a timestamp and identifying data, e.g. the service operator, content, transaction and end-user ID. This establishes a virtual “chain of custody” for content that accurately identifies the source of unauthorized copies, and which hence provides a valuable tool in potential legal actions against the perpetrator. Moreover, the presence of an identifying watermark will no doubt serve to deter piracy if the user is made aware - beforehand - that the content is traceable to the last authorized recipient. Thus, forensic watermarking is a key component of a layered content and revenue protection strategy.

Forensic Watermarking in the Media Value Chain

The application of watermarking is not limited to a single insertion point in the value chain. Instead, watermarking can be applied at various stages during the content distribution cycle: in the studio, in the distribution network, and finally in the receiver.

Moreover, multiple watermarks from different sources can in principle be applied to the same content and extracted individually later. Forensic tracing is thus enabled at multiple stages in the value chain, with the possibility to trace lost content to its last authorized user.

Verimatrix Watermarking Innovations and Solutions

Verimatrix has been investing in watermarking R&D for more than 10 years and is a global leader in the practical application and commercialization of forensic video watermarking solutions as a component of the company's layered content and revenue security strategy. After pioneering watermark insertion in the video output of set-top boxes (STBs) and PCs, Verimatrix introduced another innovative revenue security tool, distribution network watermarking. Common to both is an emphasis on invisible payloads, without impacting the consumer experience, while supporting the full range of features that rights owners require, including legally defensible identification.

Verimatrix VideoMark™

The patented VideoMark technology (US patent no. 7430302) is designed to embed watermarks in client devices. Using only a fraction of the device CPU power, VideoMark enables real-time insertion of a payload within the baseband video output of the client device. The payload is present in all digital and analog output signals while invisible to the viewer. VideoMark insertion can be controlled on a program by program basis through information embedded in the transport stream alongside other video copy control parameters. The approach taken in the insertion process means very little information is changed on a frame-by-frame basis, making the watermark extremely robust against attacks by re-compression, aspect ratio manipulation and filtering. In practice, the VideoMark payload can still be extracted from extremely low grade analog copies of the original content, and the information contained can be used to determine the time and place where the copy was originally made.

VideoMark is an integrated component of the Verimatrix ViewRight® STB for IPTV and PC Player clients, and an optional component of the Verimatrix Video Content Authority Systems (VCAS™) for IPTV. It can also be deployed as a complementary security technology in existing broadcasting systems. .

Verimatrix StreamMark™

StreamMark™, a patent pending Verimatrix revenue security innovation, is a user-specific forensic watermarking technology that uses a highly efficient server-side embedding process to uniquely mark compressed content files during delivery, even when these content files already are encrypted. Mass delivery of uniquely marked content offers a valuable tool to combat revenue leakage in the latest video consumption models, such as over-the-top (OTT) delivery to standard CE devices.

Product Characteristics VideoMark StreamMark
Common Characteristics Session based, user specific, forensic, robust, invisible watermarking. Robust against analog-digital conversion, recompression and other filtering. Security reviewed by third-party and accepted by major studios.
Insertion Point Client device. Distribution network.
Content Marking Characteristics Marking of baseband content during transcoding or playback. Pixel modification. Independent of compression format. Marking of compressed content using compressed replacement data.
Payload Extraction Original file not required. Original file required as reference.
Media Pre-Processing Not required. Required.

Verimatrix/Reveal™ Service

The Verimatrix/Reveal™ Service is offered in order to extract and interpret the embedded payload, thus providing convenience for VideoMark and StreamMark customers and, importantly, security against arbitrary verification.

Keywords: Digital Video, Revenue Security, Video, Video Watermarking,

Other products and services from Verimatrix

09-12-2011

Verimatrix: VCAS for Cable IPTV

The key challenge for operators then becomes the architecting of the video service infrastructure in such a way that content security requirements can be satisfied no matter what approach is taken. Thanks to the system architecture and efficient form factor, VCAS is inherently cost effective for the smallest deployment while scaling easily to pay-TV operations with millions of subscribers.


09-12-2011

Verimatrix: VCAS for DVB | Verimatrix

It is a modular solution supporting multiple network topologies from a single head-end: cable, satellite and terrestrial broadcast networks without a return channel, hybrid networks with IP return channel supporting higher value subscribers with interactive capabilities and video-on-demand, as well as combinations of broadcast and hybrid networks.


09-12-2011

Verimatrix: MultiRights | Verimatrix | Solutions

Maximizing the monetization of content across a multi-network, multi-screen delivery environment comes with several challenges: when the operator wants to reach beyond its managed network to various types of mobile devices, including over-the-top video streaming delivery, the issue of multiple and vertical Digital Rights Management systems arises.


09-12-2011

Verimatrix: VCAS for IPTV | Verimatrix

In the VCAS for IPTV software-based content security solution, Verimatrix eliminates the vulnerabilities related to smart card based architectures through the leverage of mature, proven two-way Internet security protocols, a Public Key Infrastructure public/private key pair system and X.509 digital certificates.


09-12-2011

Verimatrix: Digital Rights Management For Video | Verimatrix

VCAS for DVB, employing DVB Simulcrypt in conjunction with cryptographic and e-commerce technologies proven on the Internet, supports the use of a unified protection system for content delivered through DVB and IP segments of a hybrid pay-TV network and can be extended to offer smart card-less security for one way architectures.


09-12-2011

Verimatrix: Pay TV Encryption | Verimatrix

The core VCAS for Internet TV security components for HLS adaptive bitrate streaming services: ACSM supports authentication, key distribution and user control and acts as the root Certificate Authority in a PKI hierarchy, while MultiCAS/Adaptive exchanges content encryption keys with third-party AES scramblers.


09-12-2011

Verimatrix: VCAS for Internet TV | Verimatrix

Furthermore, VCAS for Internet TV can be deployed either as a standalone solution for dedicated OTT services, or as part of a multi-network solution including IPTV, DVB, Hybrid, and other network topologies under a unified VCAS 3 security head-end.