Monetisnig media content in the new digital age

Josserand, Emmanuel
November 2009
IBE: International Broadcast Engineer;Nov/Dec2009, p34
Trade Publication
The article discusses the rights of the content creator and monetising digital content creation and distribution. It states that piracy through illegal downloading has become rampant with the use of the Internet and the creation of peer-to-peer (P2P) networks. Digital watermarking, digital fingerprinting, and transactional watermarking are the methods used to deter piracy. Contextual advertising and content measurement can be used to monetise digital content.


Related Articles

  • Tech Battles To Stop "Stream-Ripping.". Kuhl, Craig; Dickson, Glen // Broadcasting & Cable;12/12/2006, Vol. 136 Issue 49, p18 

    This article describes how content piracy has become a growing problem on the Web. New technologies have given content owners and their delivery partners a tighter grasp of ways to protect their content. However, "stream ripping," the practice of capturing video streams off of the Internet and...

  • Musicians get 'piracy-free' platform with help from a Friend.  // Music Week;9/4/2010, Issue 35, p9 

    The article offers information on the Friend For Music (FFM) technology by Friend For Media which protects audio and video content by embedding unique digital watermarks into every downloaded and purchased content.

  • IMAGE WATERMARKING-A REVIEW. Khurana, Shivani // International Journal of Computer Science Engineering & Technolo;Jul2011, Vol. 1 Issue 6, p327 

    Watermarking is a relatively an active research field. The invent of internet resulted in new opportunities for the creation and delivery of content in digitized form. Different applications can be included that is electronic advertising, real time video and audio delivery and Web publishing. An...

  • Inter-frame Collusion Attack in SS-N Video Watermarking System. Taheri, Yaser Mohammad; Zolghadrasli, Alireza; Yazdi, Mehran // World Academy of Science, Engineering & Technology;Aug2009, Issue 32, p733 

    Video watermarking is usually considered as watermarking of a set of still images. In frame-by-frame watermarking approach, each video frame is seen as a single watermarked image, so collusion attack is more critical in video watermarking. If the same or redundant watermark is used for embedding...

  • A Region-Based Lossless Watermarking Scheme for Enhancing Security of Medical Data. Xiaotao Guo; Tian-ge Zhuang // Journal of Digital Imaging;Feb2009, Vol. 22 Issue 1, p53 

    This paper presents a lossless watermarking scheme in the sense that the original image can be exactly recovered from the watermarked one, with the purpose of verifying the integrity and authenticity of medical images. In addition, the scheme has the capability of not introducing any...

  • Adaptive Image Watermarking Using Multiple Transforms. Gilani, S. A. M.; Skodras, A. N. // International Review on Computers & Software;Nov2007, Vol. 2 Issue 6, p653 

    A novel scheme for the watermarking of color images is presented in this communication. The first objective is to find the most suitable alternative to RGB color space, which is known to be highly correlated. Color spaces linearly related to RGB color space with uncorrelated components are found...

  • Integrating SVM classification with SVD watermarking for intelligent video authentication. Singh, Richa; Vatsa, Mayank; Singh, Sanjay; Upadhyay, Saurabh // Telecommunication Systems;Feb2009, Vol. 40 Issue 1/2, p5 

    In law enforcement applications such as surveillance and forensics, video is often presented as evidence. It is therefore of paramount importance to establish the authenticity and reliability of the video data. This paper presents an intelligent video authentication algorithm which integrates...

  • Geometric-Invariant Image Watermarking by Key-Dependent Triangulation. Hu, Shiyan // Informatica (03505596);Jun2008, Vol. 32 Issue 2, p169 

    Fast and massive dissemination of image data across the Internet imposes great challenges of protecting images against illegal access and unauthorized reproduction. Image watermarking provides a powerful solution for intellectual protection. In this paper, a new image watermarking approach...

  • Methods of synchronizing digital watermarks. N. Koshkina // Cybernetics & Systems Analysis;Jan2008, Vol. 44 Issue 1, p145 

    Abstract  Various methods of synchronizing digital watermarks are described and compared. The methods are grouped into the following two categories: compensation of geometric distortions and extraction of an invariant domain. The methods considered are as follows: template matching,...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics