Client, Victim of Piracy, Wants Copy Protection Against ALL forms of copying

I have a client who produces instructional videos, and due to his fame and demand for these videos, the traditional DVDs have been pirated and he stopped production this year upon discovery.
This summer, his manager talked him into doing the videos again, but this time only releasing them online, through his web site, using heavy copy protection, perhaps something like Artiscope. While this can thwart most digital copying, my client also wants to prevent copying with a camcorder off the screen. I don't believe there is currently any rendering technology that can do this, and Googling the topic found nothing but encrypting against digital copying.
So my question is whether anyone knows of a company that makes a product that causes video to be viewable to the naked eye, but not recordable with a camcorder?
I have been thinking about ways to implement this myself, and my thoughts are along the lines of the methods used to protect checks (microprinting) and currency from copying. The protection results in a severely degraded copy, perhaps revealing a watermark, when the copying resolution is not the same as the original printing.
For a video, something like a 50% checkerboard matrix of pixels with the video and another with reversed video colors, where the video could be viewed normally, but the slight blurring of a camcorder lens would blend the pixels together and result in a grey solid area instead of video. Obviously there is a fundamental flaw with this, in that the naked eye would see a confusing image, even if it could decipher it, but I'm bringing it up just to show you what direction my thinking is taking on this.
If it is possible, and there is a product, my client wants to know where he can get it and how much it will cost. If not, I need a credible source to state that such technology is impossible in the current state of the art and that he's wasting his time with any such efforts.
So what do you embedded video experts think? Is there tech on the horizon that can address camcorder copying AND encryption? Or will this be way too far in the future?

As far as I know you can't prevent screen capturing (In almost all cases), I think he really needs to understand that when people are determined to steal it, they are going to do it.
The only thing I know of that can even come close to being able to prevent using a camera to record something (then being able to actually watch the recording) is "cinavia". It can also detect if you try to screen capture it (then play it back) and it also can detect if you encode it to another format. Basically when you try to play it back it checks for differences in audio and if it detects it then it stops playing.
Here is a article that explains it go towards the bottom to see how it stops using camcorders. The catch is though it only actually works when the media is attempted to be played back on devices that support it's tech. Which at the moment isn't much, except PS3's and some Blu-ray players.
http://www.anandtech.com/show/5693/cinavia-drm-how-i-learned-to-stop-worrying-and-love-blu rays-selfdestruction/3+
I'd really recommend checking out that entire article.
Basically though as far as I know I don't think you'll actually have a chance at being able to use this option, because I think you probably would have to spend silly sums of cash to do it. Someone else here might have more insight than me about this though.

Similar Messages

  • How too optimized firefox/using microsoft,to protect against all attackes

    i was told to have this s/e optimized to block all attackes,i have found when i use firefox i end up with intrusions, when i use panda 2011 to elimanate and block all attemps of my p/c,when using ie .i stil get freezes and need to restart.

    I understand the inconvenience you are experiencing when working with Office 2013.
    If you have any feedback about Office 2013 product, click the and submit to Microsoft.
    Microsoft will decide how to fix the problem for all customers.
    For the activation mechanism, it intends to protect customers of their rights and interests.
    For a retail version of Office, if it was purchased with a disk, Microsoft account is not necessary during the installation.
    For volume license of Office, refer to the following link to deploy Office suites can be much efficient:
    http://technet.microsoft.com/en-us/library/cc178982.aspx
    For the problem Office 2013 keep crashing, check the following link to check:
    http://support.microsoft.com/kb/2813143/en-us
    http://support.microsoft.com/kb/2758592/en-us
    Thanks,
    Tyor Wang
    Forum Support
    Come back and mark the replies as answers if they help and unmark them if they provide no
    help.
    If you have any feedback on our support, please click
    here

  • Target client is productive and protected against client copy

    when copy 000 with tran code sccl its give error
    Message no. TA133
    Target client is productive and protected against client copy

    Hi Rahul,
    I mean:
    Execute SCC4.
    Push the "Edit" icon at the top (pencil).
    Double-click the target client.
    At the new screen, change the Client Role (you can select "Test").
    Change the combo "Protection Level" to Level 0.
    Save changes.
    After the Client Copy, you can revert all these changes to the original status.
    Regards,
    JC Llanes.

  • Obfuscation Tools ~ Protection against Decompilers

    I want to suggest Adobe provide a really good set of tools for Protection Against Decompilers.
    I realize it's a loaded quesion/topic of which there are various opinions.
    To provide Tools for Obfuscation od SWFs I tink would be great.
    Maybe there's a way to build a special loader that is further secure and possible be able to disable logging of files that are loaded, and encryting them on the client side cache etc.
    What are the best practices and free solutions availible today?

    I know there's other "after market" solutions. They are relatively cheap, so charging for it seems unessecary from an Adobe perspective I would think. It seems something that potentially sides on the responsibility of Adobe to be included in my opinion. So I'm putting it out there and on here for that reason.
    The issues are in observing or simply asking for all dynamicaly loaded content and either generating an "do not" obsfucate lists or matching up the scrambling of cross reference stuff.
    I started one a work in progress myself but I found a serializer desierializer library say half a year ago to work with and it seemed to fail to putting out the same bytes from one to the next. I believe it was in the doubles list, which was pretty early on and a pretty low level problem I'd planned to get back to communicating my issue to them.

  • Each time I start Firefox it says: "URGENT! Your version of Firefox is no longer protected against online attacks. Get the upgrade - it's fast and free!" I am using ver. 3.6.13 and upgrading "successfully" only stays on 3.6.13 with same URGENT message.

    Each time I start Firefox it says:
    "URGENT! Your version of Firefox is no longer protected against online attacks. Get the upgrade - it’s fast and free!"
    I am using ver. 3.6.13 and upgrading "successfully" only stays on 3.6.13 with same URGENT message.

    Your UserAgent string in Firefox is messed up and needs to be reset. <br />
    [http://en.wikipedia.org/wiki/User_Agent]
    type '''about:config''' in the URL bar and hit Enter <br />
    ''If you see the warning, you can confirm that you want to access that page.'' <br />
    Filter ='''general.useragent.''' <br />
    Right-click the preferences that are '''bold''', one line at a time, and select ''' ''Reset'' ''', <br />
    Then restart Firefox

  • SCC4 - Protection against SAP upgrade

    Hello guys,
    i have a question regarding to the "Protection against SAP upgrade" flag in SCC4 for the client settings.
    I know that this flag will make a client unusable in case of an upgrade (for example from ERP2004 to ERP2005), but what is about applying support packages?
    Is this flag also valid for support packages?
    The documentation about this parameter does not make a statement to this point:
    > If this flag is set, the client is no longer supplied with data during SAP upgrades. After an SAP upgrade, it is not possible to work actively in the client. The flag can only be set for a test client or an SAP reference client (Early Watch).
    Does SAP understand "applying support packages" as an upgrade?
    Answers will be rewarded.
    Regards
    Stefan

    No.
    Applying SP is not SAP upgrade.
    -Pinkle

  • How best to save photos?  I want to protect my photos (15,000 of them) by putting them on a portable drive and storing it in my safety deposit box.  Is it better to export them all, drag the Photo file, use Time Machine – or are there better alternatives?

    I am a 'newby' to the discussion world.  Hope I am doing this right.  How best to save photos?  I want to protect my photos (15,000 of them) by putting themon a portable drive and storing it in my safety deposit box.  Is it better to export them all, dragthe Photo file, use Time Machine – or are there better alternatives?

    Welcome to the discussions! You can use Time Machine and I would also recommend for you to manually copy your iPhoto Library (on your Pictures folder) to an external drive/thumb drive so you can restore it from there should you loose your TM backup. Exporting them from iPhoto would not preserve the libraries' integrity neither your originals, should you choose to edit them in iPhoto.
    Regards.

  • What are the most common/important DB firewall intrusion methods Security Admins need to protect against?

    Hi everyone,
    I was curious about the top methods attackers are using to breach Oracle DB firewalls.  We are running Oracle 11.2.0.4 DB running on RedHat Linux 5.3 and using the standard IP tables/firewall for Linux turned on.  We have all the ports closed that were recommended by our security auditing company.  However, we just wanted to know if there were specific attack methods that are commonly being used which we should additionally protect against.
    Thanks in advance for any info.

    Anybody? Bueller?  Bueller?

  • Lightswitch Security, Protection against SQL Injection attacks etc.

    Hi all,
    I have been hunting around for some kind of documentation that explains how Lightwitch handles typical web application vunerabilities such as SQL injection attacks.
    In the case of injection attacks it is my understanding the generated code will submit data to the database via names parameters to protect against such things but it would be good to have some official account of how Lightswitch handles relevant OWASP
    issues to help provide assurance to businesses that by relying on a framework such as Lightswitch does not introduce security risks.
    Is anyone aware of such documentation? I found this but it barely scratches the surface:
    http://msdn.microsoft.com/en-us/library/gg481776.aspx?cs-save-lang=1&cs-lang=vb#code-snippet-1
    There is this which describes best practices but nothing to say that these practices are adopte within Lightswitch
    http://msdn.microsoft.com/en-us/library/gg481776.aspx?cs-save-lang=1&cs-lang=vb#code-snippet-1
    Thanks for any help, I am amazed that it is so difficult to find?

    LS is a tool built in top of other technologies including Entity Framework.
    Here is a security doc about EF.
    http://msdn.microsoft.com/en-us/library/vstudio/cc716760(v=vs.100).aspx
    LS uses Linq to Entities and therefore is not susceptible to SQL injection.
    HTH,
    Josh
    PS... the only vulnerability that I'm aware of is when a desktop app is deployed as 2-tier instead of 3-tier.  In that case, the web.config which contains connection strings is on the client machine, which is a risk.  Here is a discussion related
    to db security & 2 vs 3-tier.
    https://social.msdn.microsoft.com/Forums/vstudio/en-US/93e035e0-0d2e-4405-a717-5b3207b3ccac/can-sql-server-application-roles-be-used-in-conjunction-with-lightswitch?forum=lightswitch

  • What is the best protection against virus

    what is best protection against any virus.

    what is best protection against any virus.
    You.
    There will always be threats to your information security associated with using any Internet - connected communications tool:
    You can mitigate those threats by following commonsense practices
    Delegating that responsibility to software is an ineffective defense
    Assuming that any product will protect you from those threats is a hazardous attitude that is likely to result in neglecting point #1 above.
    OS X already includes everything it needs to protect itself from viruses and malware. Keep it that way with software updates from Apple.
    A much better question is "how should I protect my Mac":
    Never install any product that claims to "clean up", "speed up",  "optimize", "boost" or "accelerate" your Mac; to "wash" it, "tune" it, or to make it "shiny". Those claims are absurd.Such products are very aggressively marketed. They are all scams.
    Never install pirated or "cracked" software, software obtained from dubious websites, or other questionable sources.
    Illegally obtained software is almost certain to contain malware.
    "Questionable sources" include but are not limited to spontaneously appearing web pages or popups, download hosting sites such as C net dot com, Softonic dot com, Soft pedia dot com, Download dot com, Mac Update dot com, or any other site whose revenue is primarily derived from junk product advertisements.
    If you need to install software that isn't available from the Mac App Store, obtain it only from legitimate sources authorized by the software's developer.
    Don’t supply your password in response to a popup window requesting it, unless you know what it is and the reason your credentials are required.
    Don’t open email attachments from email addresses that you do not recognize, or click links contained in an email:
    Most of these are scams that direct you to fraudulent sites that attempt to convince you to disclose personal information.
    Such "phishing" attempts are the 21st century equivalent of a social exploit that has existed since the dawn of civilization. Don’t fall for it.
    Apple will never ask you to reveal personal information in an email. If you receive an unexpected email from Apple saying your account will be closed unless you take immediate action, just ignore it. If your iCloud, iTunes, or App Store account becomes disabled for valid reasons, you will know when you try to buy something or log in to this support site, and are unable to.
    Don’t install browser extensions unless you understand their purpose. Go to the Safari menu > Preferences > Extensions. If you see any extensions that you do not recognize or understand, simply click the Uninstall button and they will be gone.
    Don’t install Java unless you are certain that you need it:
    Java, a non-Apple product, is a potential vector for malware. If you are required to use Java, be mindful of that possibility.
    Java can be disabled in System Preferences.
    Despite its name JavaScript is unrelated to Java. No malware can infect your Mac through JavaScript. It’s OK to leave it enabled.
    Beware spontaneous popups: Safari menu > Preferences > Security > check "Block popup windows".
    Popup windows are useful and required for some websites, but unsolicited popups are commonly used to deceive people into installing unwanted software they would never intentionally install.
    Popups themselves cannot infect your Mac, but many contain resource-hungry code that will slow down Internet browsing.
    If you ever receive a popup window indicating that your Mac is infected with some ick or that you won some prize, it is 100% fraudulent. Ignore it.
    The same goes for a spontaneously appearing dialog insisting that you upgrade your video player right this instant. Such popups are frequently associated with sites that promise to deliver "free" movies or other copyrighted content that is not normally "free".
    The more insistent it is that you upgrade or install something, the more likely it is to be a scam. Close the window or tab and forget it.
    Ignore hyperventilating popular media outlets that thrive by promoting fear and discord with entertainment products arrogantly presented as "news". Learn what real threats actually exist and how to arm yourself against them:
    The most serious threat to your data security is phishing. Most of these attempts are pathetic and are easily recognized, but that hasn't stopped prominent public figures from recently succumbing to this age-old scam.
    OS X viruses do not exist, but intentionally malicious or poorly written code, created by either nefarious or inept individuals, is nothing new.
    Never install something without first knowing what it is, what it does, how it works, and how to get rid of it when you don’t want it any more.
    If you elect to use "anti-virus" software, familiarize yourself with its limitations and potential to cause adverse effects, and apply the principle immediately preceding this one.
    Most such utilities will only slow down and destabilize your Mac while they look for viruses that do not exist, conveying no benefit whatsoever - other than to make you "feel good" about security, when you should actually be exercising sound judgment, derived from accurate knowledge, based on verifiable facts.
    Do install updates from Apple as they become available. No one knows more about Macs and how to protect them than the company that builds them.
    Summary: Use common sense and caution when you use your Mac, just like you would in any social context. There is no product, utility, or magic talisman that can protect you from all the evils of mankind.

  • Firefox 3 says I no longer have protection against online attacks

    firefox 3.6.13 says I no longer have protection against online attacks. Version 4 will not run because I don't have "enough previledges for some itms.'''
    '''

    The Firefox 3.5.x branch has reached end-of-life and is no longer maintained.<br />
    You will no longer receive security updates.<br />
    You can update Firefox via "Help > Check for Updates" or download and install the latest Firefox 3.6.x or 4.0.x version.<br />
    <br />
    Download a new copy of the Firefox program and save the DMG file to the desktop
    * Firefox 4.0.x: http://www.mozilla.com/en-US/firefox/all.html
    * Firefox 3.6.x: http://www.mozilla.com/en-US/firefox/all-older.html
    * Trash the current Firefox application to do a clean (re-)install
    * Install the new version that you have downloaded
    Your profile data is stored elsewhere in the [http://kb.mozillazine.org/Profile_folder_-_Firefox Firefox Profile Folder], so you won't lose your bookmarks and other personal data.

  • Protection against Decompilers

    Hello, I have been searching the internet over code
    protection for my flash and action script code against the nasty
    DECOMPILERS. But I do not know on what to belive but Adobe
    personel. What should I do to have my code and effort protected
    against the decompilers?

    Flash OwnerGuard is the ultimate DRM , Security, Copy
    Protectiion, Licensing and Distribution Management solution for
    Adobe Flash SWF and FLV Video Files.
    Flash OwnerGuard provides a brand new DRM technology called
    Inline DRM which allows the protected files to be accessible within
    any container including Your Website and Web Navigators ( Internet
    Explorer, AOL Explorer ) , Office Documents, PDF Documents, Flash
    Player Programs or even Your Own Applications.
    With Flash OwnerGuard you can :
    * Lock your Flash SWF and FLV video files to specific
    computer(s).
    * Protect your Flash SWF and FLV video files from
    decompilation and illegal distributions.
    * Define High Security Expiration Dates or Working Times for
    your drm protected Flash SWF and FLV video files.
    * Use full features of Adobe Flash Player for your drm
    protected Flash SWF and FLV video files.
    * Control and apply all required limitations for your users
    using a very small user side DRM manager ( OwnerGuard License
    Manager ).
    * Minimize your users DRM hassles by letting them access your
    DRM protected Flash SWF , FLV files offline.
    * Distribute and Sell your Flash Files easily while
    you’ve got full control over them.
    http://www.armjisoft.com/?page=flashownerguard

  • Protection against Password reset

    i was wondering if its possible to have some kind of protection against the password recet process which starts with pressing the comand button on start up and ends with resetting the password and restarting the device ..
    as in the link below
    http://www.coolestguyplanettech.com/reset-forgotten-admin-password-osx-10-8-moun tain-lion/

    what i mean is ..
    when you forget your password .. there is a way to recover it and that is by clicking on the command button + the R key when starting the PC or Laptop and by following the steps in the link
    http://www.coolestguyplanettech.com/reset-forgotten-admin-password-osx-10-8-moun tain-lion/
    this will cause any person who doesnt know my password to have the opportunity to open my Laptop .. i want to know if i can have a protection against that

  • Selection from T-list giving error 'Fied is protected against update'

    hii all,,
    i have manged to make charater based search, for this
    i am accepting characters 'as user types-in' in a text item 'vchar' .
    As the user types in characters,the t-list item (vlist) gets populated with the matching characters
    typed by the user .
    i am testing it on on a non-db block (jmaster) fields..
    Once i make any selection from the tlist,i want the field 'vchar' to hold the value/label selected from the
    t-list (vlist).
    the problem is when i click enter and make selection from the t-list
    populated elements, and navigate to next field 'tcode'
    'vchar' remains blank and the error... 'Fied is protected against update' gets displayed on the status bar.
    here are my triggers ;
    PRE-FORM  at form-level
    SET_ITEM_PROPERTY('VLIST',DISPLAYED,PROPERTY_FALSE);
    WHEN-TIMER-EXPIRED at form-level
    If GET_APPLICATION_PROPERTY(TIMER_NAME) = 'COUNT_TIMER' Then
    SET_ITEM_PROPERTY('VLIST',DISPLAYED,PROPERTY_TRUE);
    :GLOBAL.M_SRCH := :VCHAR;
    declare
    v_char varchar2(200) := 'select VLIST,VLIST
                             from JRNY_MASTER
                             WHERE VLIST like '||'''%'||:GLOBAL.M_SRCH||'%''';
    v_rg_id recordgroup;
    v_err NUMBER:= 0;
    BEGIN
    v_rg_id := create_group_from_query('recgrp1',v_char);
    v_err:= populate_group(v_rg_id);
    clear_list('JMASTER.VLIST');
    populate_list('JMASTER.VLIST',v_rg_id);
    DELETE_GROUP(v_rg_id);
    END;
    Synchronize;
    End if ;
    WHEN-NEW-ITEM-INSTANCE for field 'vchar'
    DECLARE
      timer_id Timer;
    BEGIN
      :GLOBAL.M_SRCH := :VCHAR;
      SET_ITEM_PROPERTY('VLIST',DISPLAYED,PROPERTY_TRUE);
      SET_ITEM_PROPERTY('VLIST',ENABLED,PROPERTY_TRUE);
      SET_ITEM_PROPERTY('VLIST',UPDATE_ALLOWED,PROPERTY_TRUE);
      timer_id := CREATE_TIMER('COUNT_TIMER', 500, REPEAT);
    END;
    POST-TEXT-ITEM for field 'vchar'
    :vchar := :JMASTER.VLIST;
    Delete_Timer('COUNT_TIMER');
    SET_ITEM_PROPERTY('VLIST',DISPLAYED,PROPERTY_FALSE);
    WHEN-VALIDATE-ITEM for tlist item 'vlist'
    :vchar := :VLIST;Please if some1 have understood my problem, so kindly reply me
    what went wrong in my logic...
    TY

    Andreas Weiden wrote:
    For the VLISt-item, you should set also INSERT_ALLOWED to true, as it is a new record.
    also for the VLIST-item, you should Mouse-Navigable to false.yes it worked this time...Thanks Andreas...
    but one thing..i also would like to add a new value in 'vchar',
    in case, if i don't find a value typed in 'vchar' in 'vlist'.
    when i try to enter new value in 'vchar' and navigate to the next item,
    so based on my above codes..especially the 1 in POST-TEXT-ITEM
    where i am assigning ;
    :vchar := :JMASTER.VLIST;
    'vchar' becomes NULL, as soon as i leave the 'vchar' and branch to the next item.
    please suggest..whats should be changed...
    TY once again...
    Edited by: user10967485 on 25-Oct-2010 07:13
    Edited by: user10967485 on 25-Oct-2010 11:29

  • In the report level user wants two persons against each work center.

    Hi Experts,
    Please let me know the solution, I have provided scenario below.
    check the query which the user is referring to report:
    Example
    Work center     Person
    KNE33102     44003850
    According to the user, the names for the Work centers should be as follows:
    Work center          Person
    KNE33102         44003850,
    KNE33102        44003603
    I have check the data in T-code-CR03, each work center getting two persons, as can be shown below.
    Work center        Person
    KNE33102           44003850,
    KNE33102           44003603
    In RSA3 it can be seen that both the records are being extracted
    Work center     Start date     End date     Person
    KNE33102     09.02.2009     31.12.2009     44003850
    KNE33102     09.02.2009     31.12.2009     44003603
    In BI , when checking in PSA, it can be seen that the data is also being loaded to BI (Two persons loaded against Work center-KNE33102)
    Work center     Start date     End date     Person
    KNE33102     09.02.2009     31.12.2009     44003850
    KNE33102     09.02.2009     31.12.2009     44003603
    But when loading to the Info Object, one person has deleted. Because of this, in the report level displaying one person.
    Note:-Please let me know what is the procedure, in the report level user wants two persons against each work center.

    Hi,
    As you said in your post the data has mentioned up to 2009. can you try execute the query till to date .
    Regards
    sivaraju

Maybe you are looking for

  • Problem in Restricting a Query

    Hi All ,   I have a scenario where we have a Keyfigure say A . In Query the user gives the input for CALWEEK which is mandatory. Let say he gives the Input B . I want to display the result as "the values for A in Calweek (B-1)" i.e. one week before t

  • Why is my music missing from my library and not my iPod?

    I am thankful It has not erased on my iPod but how do I get it back into the library.  Syncing doesn't work and I am afraid if I touch one more button I will lose everything for good!  Please help.

  • Photoshop cs6 won't work because of creative cloud

    Hi everyone, I bought indesign on february 2nd, and now my old photoshop won't work. I had photoshop CS6. They will not help me in chat and I cannot figure it out. I know there is a way to go into my desktop applications and change some code thing be

  • Integrate workshop 10 with integration server 9.2

    Hi All Can anyone please tell me whether it is possible to integrate Workshop 10.0 with integration server 9.2? If possible how can it be done? I am using the Weblogic server 10, so all the components i.e portal and workshop are the latest version. o

  • Cfg files

    This question was posted in the past but I could not find any response. The directory: C:\Documents and Settings\All Users\Application Data\Hewlett-Packard\HP Print Settings contains 14,000 cfg files all beginning with HP then followed by a series of