Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
…
24 pages
1 file
This paper discusses the complex landscape of digital piracy, its motivations, and the historical evolution of media technologies leading into the current digital era. It examines the implications of software development, copyright regulations, and the impact of peer-to-peer technologies like BitTorrent on media distribution and piracy. The assessment highlights that technological advancements facilitating piracy are outpacing legal frameworks, suggesting an ongoing sociopolitical dilemma for copyright holders.
The paper is meant to create a discussion on techniques developed for prevention of piracy in digital media which can be regarded as one of the biggest obstruction in the growth of digital media sector. The duplication caused by piracy has innumerable problems which are indispensable. Thus it is need of the hour to staidly understand the importance of preventing piracy so as to ensure unhindered growth of the staggering flourishing market of digital media. The fact that it is becoming relatively easy to access anyone's confidential data without any legal permission has led us to carefully think of some kind of innovative ways to protect ourselves and so this paper talks of some of the most effective counter measures. Here described an architecture integrated with different forms i.e. tamper proofing, obfuscation and watermarking that can shield digital media. These techniques are built with the purpose of controlling ever increasing piracy which and are undoubtedly capable of fighting against the hazardous consequences causes by the toughest rival of economy sector. This three layered technique enable us to withstand all most all types of attacks and prevent from Zero Day attacks. These techniques cover both hardware/manufacture level and software/user level protection, and are most affordable, reliable and everlasting counter measures.
2020
Copyright © 2003, Idea Group Inc. Copying or distributing in print or electronic forms without written permission of Idea Group Inc. is prohibited. ABSTRACT Multimedia assets have to be marked steganographically to protect the rights of the owner. Digital watermarks are inserted as a bit sample or digital signal into the data with an embedding algorithm using a secret key. The embedded information is hidden (in low-value bits or least significant bits of picture pixels, or in frequency space) and connected inseparably with the data. For the optimal application of watermark technology a trade-off has to be made between competing criteria such as robustness, non-perceptibility, non-detectability, and security. Most watermark algorithms cannot tackle to attacks. Even friendly attacks in form of usual file modifications can destroy very easily the watermark or falsify it.
The book provides a comparative and comprehensive analysis of the current technical, commercial and economical development in digital media. It describes the impact of new business and distribution models, the current legal and regulatory framework, social practices and consumer expectations associated with the use, distribution, and control of digital media products. In particular, the author analyzes the anti-circumvention provisions for technological protection measures and digital rights management systems enacted in the United States and in Europe, and their impact on consumer protection policy. The book concludes with an overview of the effects, and the possible solutions, under U.S. and EU law, posed by using contractual arrangements to expand intellectual property rights.
Digital piracy is the act of reproducing, using, or distributing information products, in digital formats and/or using digital technologies, without the authorization of their legal owners.
This chapter assesses the future trends and trajectory of the optical media piracy. It traces briefly the development of media piracy from the VCR technology using the cassette format to the current digital and nanotechnology using the Internet and file sharing protocols. Optical disc piracy will be a transitory phenomenon in developing countries with underdeveloped IP and Internet culture. As the country increases in Internet penetration, the locus of media piracy shifts from the temporal space of the sidewalk stalls selling pirated DVDs or illegal CD-DVD shops to the cyber space of the Internet. The use of discs becomes less popular as media piracy becomes more convenient, easier and cheaper with direct illegal downloading, peer-to-peer sharing, and other evasive techniques using the latest sophisticated hardware and software technologies. This chapter then examines some popular and current online digital piracy such as Peer-to-Peer (P2P) file sharing, cyberlocker, media box, anti-circumvention technology, digital spying and hacking, and other Internet piracy supported by digital, cloud and nanotechnology. This chapter also makes projections on media piracy would look like with the advent of quantum computing and technology. Media piracy follows technological advancement and innovation, thus difficult for authorities to curb as it uses the same technology used by copyright holders which provides infringers with a variety of options to respond regulation. Finally, this chapter examines the difficulty of regulating the Internet and the role and future involvement of China in counterfeiting and media piracy. With the rise of online media piracy, regulating the Internet would then be the main challenge of law enforcement and copyright owners as regulating the Internet to curb piracy would not be easy with legality and illegality becoming more intimately connected with the growing sophistication of technology and conflicting business interests between service providers and content providers, and between copyright industries and top IT and ICT.
Sociological Perspectives on Media Piracy in the Philippines and Vietnam, 2016
This chapter assesses the future trends and trajectory of the optical media piracy. Media piracy is an evolving cybercrime which can easily adapt to the current technological and global environment. It traces briefly the development of media piracy from the VCR technology using the cassette format to the current digital and nanotechnology using the Internet and file sharing protocols. Optical disc piracy will be a transitory phenomenon in developing countries with underdeveloped IP and Internet culture. As the country increases in Internet penetration, the locus of media piracy shifts from the temporal space of the sidewalk stalls selling pirated DVDs or illegal CD–DVD shops to the cyberspace of the Internet. The use of discs becomes less popular as media piracy becomes more convenient, easier, and cheaper with direct illegal downloading, peer-to-peer sharing, and other evasive techniques using the latest sophisticated hardware and software technologies. This chapter then examines some popular and current online digital piracy such as peer-to-peer (P2P) file sharing, cyberlocker, media box, anti-circumvention technology, digital spying and hacking, and other Internet piracy supported by digital, cloud, and nanotechnology. It also makes projections on media piracy look like with the advent of quantum computing and technology. Media piracy follows technological advancement and innovation, thus making it difficult for authorities to curb as it uses the same technology used by copyright holders which provides them with a variety of options to respond to regulation. Finally, this chapter examines the difficulty of regulating the Internet and the role and future involvement of China in counterfeiting and media piracy. With the rise of online media piracy, regulating the Internet would then be the main challenge of law enforcement and copyright owners as regulating the Internet to curb piracy would not be easy with legality and illegality becoming more intimately connected with the growing sophistication of technology and conflicting business interests between service providers and content providers and between copyright industries and top IT and ICT.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
Critical Arts, 2006
College & Research Libraries News, 2019
Proceedings of the IEEE, 1999
IEEE Annals of The History of Computing, 2009
Journal of Media Economics, 2004
Global Journal of Human Social Science Research, 2010
Harv. JL & Tech., 2006
Studera Press, 2017
New Media & Society, 2016
Optics Express, 1998
2008 IEEE Asia-Pacific Services Computing Conference, 2008