Piracy in the Digital Age (original) (raw)
Related papers
Digital Media Piracy and Control
The paper is meant to create a discussion on techniques developed for prevention of piracy in digital media which can be regarded as one of the biggest obstruction in the growth of digital media sector. The duplication caused by piracy has innumerable problems which are indispensable. Thus it is need of the hour to staidly understand the importance of preventing piracy so as to ensure unhindered growth of the staggering flourishing market of digital media. The fact that it is becoming relatively easy to access anyone's confidential data without any legal permission has led us to carefully think of some kind of innovative ways to protect ourselves and so this paper talks of some of the most effective counter measures. Here described an architecture integrated with different forms i.e. tamper proofing, obfuscation and watermarking that can shield digital media. These techniques are built with the purpose of controlling ever increasing piracy which and are undoubtedly capable of fighting against the hazardous consequences causes by the toughest rival of economy sector. This three layered technique enable us to withstand all most all types of attacks and prevent from Zero Day attacks. These techniques cover both hardware/manufacture level and software/user level protection, and are most affordable, reliable and everlasting counter measures.
1. The Necessity of Protection of Digital Media Assets: Problems and Opportunities
2020
Copyright © 2003, Idea Group Inc. Copying or distributing in print or electronic forms without written permission of Idea Group Inc. is prohibited. ABSTRACT Multimedia assets have to be marked steganographically to protect the rights of the owner. Digital watermarks are inserted as a bit sample or digital signal into the data with an embedding algorithm using a secret key. The embedded information is hidden (in low-value bits or least significant bits of picture pixels, or in frequency space) and connected inseparably with the data. For the optimal application of watermark technology a trade-off has to be made between competing criteria such as robustness, non-perceptibility, non-detectability, and security. Most watermark algorithms cannot tackle to attacks. Even friendly attacks in form of usual file modifications can destroy very easily the watermark or falsify it.
Digital Media & Intellectual Property, Spriger, 2006, pp. XVI-171.
The book provides a comparative and comprehensive analysis of the current technical, commercial and economical development in digital media. It describes the impact of new business and distribution models, the current legal and regulatory framework, social practices and consumer expectations associated with the use, distribution, and control of digital media products. In particular, the author analyzes the anti-circumvention provisions for technological protection measures and digital rights management systems enacted in the United States and in Europe, and their impact on consumer protection policy. The book concludes with an overview of the effects, and the possible solutions, under U.S. and EU law, posed by using contractual arrangements to expand intellectual property rights.
Digital piracy is the act of reproducing, using, or distributing information products, in digital formats and/or using digital technologies, without the authorization of their legal owners.
Chapter 7 Tracing Media Piracy: Current and Future Trends
This chapter assesses the future trends and trajectory of the optical media piracy. It traces briefly the development of media piracy from the VCR technology using the cassette format to the current digital and nanotechnology using the Internet and file sharing protocols. Optical disc piracy will be a transitory phenomenon in developing countries with underdeveloped IP and Internet culture. As the country increases in Internet penetration, the locus of media piracy shifts from the temporal space of the sidewalk stalls selling pirated DVDs or illegal CD-DVD shops to the cyber space of the Internet. The use of discs becomes less popular as media piracy becomes more convenient, easier and cheaper with direct illegal downloading, peer-to-peer sharing, and other evasive techniques using the latest sophisticated hardware and software technologies. This chapter then examines some popular and current online digital piracy such as Peer-to-Peer (P2P) file sharing, cyberlocker, media box, anti-circumvention technology, digital spying and hacking, and other Internet piracy supported by digital, cloud and nanotechnology. This chapter also makes projections on media piracy would look like with the advent of quantum computing and technology. Media piracy follows technological advancement and innovation, thus difficult for authorities to curb as it uses the same technology used by copyright holders which provides infringers with a variety of options to respond regulation. Finally, this chapter examines the difficulty of regulating the Internet and the role and future involvement of China in counterfeiting and media piracy. With the rise of online media piracy, regulating the Internet would then be the main challenge of law enforcement and copyright owners as regulating the Internet to curb piracy would not be easy with legality and illegality becoming more intimately connected with the growing sophistication of technology and conflicting business interests between service providers and content providers, and between copyright industries and top IT and ICT.
Tracing Media Piracy: Current and Future Trends
Sociological Perspectives on Media Piracy in the Philippines and Vietnam, 2016
This chapter assesses the future trends and trajectory of the optical media piracy. Media piracy is an evolving cybercrime which can easily adapt to the current technological and global environment. It traces briefly the development of media piracy from the VCR technology using the cassette format to the current digital and nanotechnology using the Internet and file sharing protocols. Optical disc piracy will be a transitory phenomenon in developing countries with underdeveloped IP and Internet culture. As the country increases in Internet penetration, the locus of media piracy shifts from the temporal space of the sidewalk stalls selling pirated DVDs or illegal CD–DVD shops to the cyberspace of the Internet. The use of discs becomes less popular as media piracy becomes more convenient, easier, and cheaper with direct illegal downloading, peer-to-peer sharing, and other evasive techniques using the latest sophisticated hardware and software technologies. This chapter then examines some popular and current online digital piracy such as peer-to-peer (P2P) file sharing, cyberlocker, media box, anti-circumvention technology, digital spying and hacking, and other Internet piracy supported by digital, cloud, and nanotechnology. It also makes projections on media piracy look like with the advent of quantum computing and technology. Media piracy follows technological advancement and innovation, thus making it difficult for authorities to curb as it uses the same technology used by copyright holders which provides them with a variety of options to respond to regulation. Finally, this chapter examines the difficulty of regulating the Internet and the role and future involvement of China in counterfeiting and media piracy. With the rise of online media piracy, regulating the Internet would then be the main challenge of law enforcement and copyright owners as regulating the Internet to curb piracy would not be easy with legality and illegality becoming more intimately connected with the growing sophistication of technology and conflicting business interests between service providers and content providers and between copyright industries and top IT and ICT.