Essential Guide: Protecting Premium Content OTT & VOD Distribution

December 1st 2020 - 09:00 AM
Tony Orme, Editor, The Broadcast Bridge

The complexity of modern OTT and VOD distribution has increased massively in recent years. The adoption of internet streaming gives viewers unparalleled freedom to consume their favorite live and pre-recorded media when they want, where they want, and how they want. But these opportunities have also presented content owners with unfortunate challenges, typically piracy and overcoming illegal content copying.

With thousands of streams traversing the Wild West internet, just how do content owners protect their high value media?  Encryption is all well and good, but with adaptive bit rate systems such as DASH and HLS, how are the multitude of different bit rates catered for?

Then there’s the affiliates.  How do they deal with the security issues that keeps the pirates at bay?  Who is responsible for making sure the content doesn’t fall into the wrong hands and how can we stop this?

Piracy is as old as mechanical media itself, but the prevalence of the internet and the viewers demands for high quality video and audio has made secure distribution a top priority for content owners.  The question is, how do content owners satisfy their viewers, monetize content through affiliates, yet keep their media safe?

This Essential Guide discusses the challenges content owners face and how they have dealt a blow to piracy. It describes content encryption, tokens and facilitating viewing license directly to viewers.

The sponsors perspective, provided by Verimatrix, discusses at first-hand how modern anti-piracy systems operate including encryption and watermarking.

Download this Essential Guide now if you are an engineer, technologist or their managers and you need to understand OTT and VOD secure distribution, as well as outwitting pirates.

Supported by

You might also like...

Essential Guide: Flexible IP Monitoring

Video, audio and metadata monitoring in the IP domain requires different parameter checking than is typically available from the mainstream monitoring tools found in IT. The contents of the data payload are less predictable and packet distribution more tightly defined…

Is Remote Operation Underrated?

A recent Lawo remote activities case study notes, “It should be obvious by now that remote operation has been seriously underrated. For some, it allows to save substantial amounts of money, while others will appreciate the time gained from not…

Improving Negative ARQ Protocols For Internet Delivery

In this article, George Kroon, research broadcast engineer, takes a look at how Negative ARQ protocols similar to those used for internet streaming and contribution can be improved specifically for broadcast television.

Improving Comms With 5GHz - Part 1

As broadcasters strive for more and more unique content, live events are growing in popularity. Consequently, productions are increasing in complexity resulting in an ever-expanding number of production staff all needing access to high quality communications. Wireless intercom systems are…

ATSC 3.0: Right Place, Right Time

Many people and cultures celebrate special New Year dates. Organizations designate fiscal years. Broadcasters traditionally mark their new technology year mid-April, at annual NAB Shows. Old habits die hard.