The proliferation of 4K and UHD OTT and VoD content has made forensic watermarking an essential tool. There are a variety of piracy attacks, including attacks on the watermarks, that can be countered with this security suite.
Digital rights management (DRM) protects files, but watermarking technology makes them more secure. Invisible watermarks inserted at random intervals in video frames can be used to track down and identify the original source of pirated content. DRM protected content in SDK is embedded with a watermark that does not affect performance. Each video frame can be decoded from the media content using the SDK’s interactive interface. The SDK generates watermarked frames with the same video width, height, and pixel ratio for each input frame. The output media for distribution is encoded by the transcoder with these watermarked frames.
video watermarking can be done online or offline, depending on the codec used, and the technology works regardless of the codec format. The integrity of the original video stream is maintained and the number of output video frames is the same as the original when using an efficient watermarking process. Watermark destruction attempts can be mitigated by using various simulated manipulation attacks.
If a watermark is robust, it can withstand simulated attacks and be recovered to a certain point in time before it becomes unrecoverable.
Simulated attacks include geometric deformations, recompression, merge, and trim attacks, as well as other types of transformations. Upscaling and downscaling video frames, flipping horizontally and vertically, varying rotation angles, fiddling with framerates, HDMI capture, screencasting, capturing video with gadgets, inserting black bars, and reducing bit rates are a few of the techniques that can be used.
The speed at which the watermark can be recovered after being subjected to these simulated attacks makes it an ideal candidate for attacks aimed at illegally capturing and distributing high-priced content.
In order to test the watermark’s ability to withstand real-time pirate attacks, testers use a wide range of simulated attack types on video assets with varying levels of intensity.