Skip to main content
Book cover

Securing Digital Video

Techniques for DRM and Content Protection

  • Book
  • © 2012

Overview

  • The DRM principles and technologies described are applicable to protecting video and also other types of content, such as ebooks, documents and games
  • The book will be of value to industrial researchers and engineers developing related technologies, academics in information security, cryptography and media systems, and engaged consumers
  • The author has over 20 years of experience developing and analyzing related technologies

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (13 chapters)

Keywords

About this book

Content protection and digital rights management (DRM) are fields that receive a lot of attention: content owners require systems that protect and maximize their revenues; consumers want backwards compatibility, while they fear that content owners will spy on their viewing habits; and academics are afraid that DRM may be a barrier to knowledge sharing. DRM technologies have a poor reputation and are not yet trusted. 

This book describes the key aspects of content protection and DRM systems, the objective being to demystify the technology and techniques. In the first part of the book, the author builds the foundations, with sections that cover the rationale for protecting digital video content; video piracy; current toolboxes that employ cryptography, watermarking, tamper resistance, and rights expression languages; different ways to model video content protection; and DRM. In the second part, he describes the main existing deployed solutions, including video ecosystems; how video is protected in broadcasting; descriptions of DRM systems, such as Microsoft's DRM and Apple’s FairPlay; techniques for protecting prerecorded content distributed using DVDs or Blu-ray; and future methods used to protect content within the home network. The final part of the book looks towards future research topics, and the key problem of interoperability. 

While the book focuses on protecting video content, the DRM principles and technologies described are also used to protect many other types of content, such as ebooks, documents and games. The book will be of value to industrial researchers and engineers developing related technologies, academics and students in information security, cryptography and media systems, and engaged consumers.

Reviews

"The book is well written and timely, as content owners are struggling to protect their content and prevent loss of revenue. Much of the book is written in a manner suitable for novices to information security and content protection. The book will be useful for information security practitioners, researchers, faculty, students, and end users. Based on his rich research experience – he holds many patents in the field of digital content security – the author is well qualified to write this book. ... I strongly recommend this book for its intended audience." [S.V. Nagaraj, ACM Computing Reviews, 2013]

Authors and Affiliations

  • , Security & Content Protection Labs, Technicolor, Rennes, France

    Eric Diehl

About the author

The author is the Vice President of the Security and Content Protection Labs at Technicolor (previously known as Thomson), and his main research topics are DRM for professional applications, audio and video watermarking, video fingerprinting, secure distribution of multimedia content, and copy protection. The author has more than 20 years of research experience, he has filed more than 80 patents in the field, and he is involved with the main related academic conferences as an organizer and contributor.

Bibliographic Information

Publish with us