APLawrence.com -  Resources for Unix and Linux Systems, Bloggers and the self-employed

Watermarks


© December 2005 Anthony Lawrence

The concept of watermarks for video content (it's harder to get away with in audio) is really just serialization. Think of somebody stamping a serial number into the DVD you just purchased. That serial number travels with any copies you make, so if it ends up in a BitTorrent someday, it can be traced right back to you.

Great idea, or at least so think some.

Some problems come to mind, though. The first one is theft. Let's say I legitimately transfer a TivoToGo show to my PC. For realism, let's make it my Microsoft PC. I have done due diligence with regard to anti-virus and anti-spyware software on this PC, but dag-nabbit, the fool thing gets infected because of a zero day exploit. Not that anything like that would ever happen, of course. Nothing to worry about, right? Anyway, this takeover of my machine transfers everything of value out to a server in some other country, and of course that includes all the Tivo content, which immediately is offered for download at cut-rate prices. Is that my fault? My bet is that the movie studio and Tivo would look at it that way.

Another scenario is my watermark appearing and I don't think I ever owned the movie in question. Quite naturally, I'd like some proof that the studio or Tivo or whoever really is absolutely certain that this watermark belongs to me. In other words, I and my attorney would like to see the source code that produces the watermark. Do you think the offended parties will just hand that over willingly? Somehow I doubt it - I bet that would be considered extremely proprietary, because letting out the code would make reverse engineering with an eye toward removal that much easier.

But why would it be that hard anyway? I would think that if you wanted to steal this stuff, all you'd need to do is compare a number of copies of the same content and see where they differ. Sure, there will be red herrings in the bits, but with enough copies, couldn't you figure out what was going on - at least enough to obfuscate the watermark? Of course the people developing watermarks are trying to avoid those problems.

My gut feeling is that the pirates will win this battle.


Got something to add? Send me email.





(OLDER)    <- More Stuff -> (NEWER)    (NEWEST)   

Printer Friendly Version

->
-> Watermarks


Inexpensive and informative Apple related e-books:

El Capitan: A Take Control Crash Course

iOS 10: A Take Control Crash Course

Take Control of Pages

Take Control of Apple Mail, Third Edition

Take control of Apple TV, Second Edition




More Articles by © Anthony Lawrence




Printer Friendly Version

Have you tried Searching this site?

This is a Unix/Linux resource website. It contains technical articles about Unix, Linux and general computing related subjects, opinion, news, help files, how-to's, tutorials and more.

Contact us


Printer Friendly Version





I think a nerd is a person who uses the telephone to talk to other people about telephones. And a computer nerd therefore is somebody who uses a computer in order to use a computer. (Douglas Adams)




Linux posts

Troubleshooting posts


This post tagged:

Security



Unix/Linux Consultants

Skills Tests

Unix/Linux Book Reviews

My Unix/Linux Troubleshooting Book

This site runs on Linode