Privacy and Protection

  • Home
  • Privacy and Protection

Share this page:

Share on facebook
Share on twitter
Share on linkedin
Share on email
Share on print

Overview

Security and protection of video content, as well as subscriber data, is a top priority for content owners, aggregators and distributors across the streaming media value chain. Breaches in security can not only undermine subscriber trust and confidence, but threaten revenue as well. The Privacy and Protection Working Group is focused on defining a variety of content and service-level entitlements that are implemented by the programmer or operator and enforced within the network or client to impose content and network usage rules as well as best practices on handling privacy of consumer information related to streaming video.

Objectives

The Streaming Video Alliance Privacy and Protection Working Group has three objectives. First, to identify critical data elements to collect for subscription-based online streaming video services; second, to describe the different methods by which to safeguard this data during storage and usage; and third, to define best practices for safeguarding video content from unauthorized access or theft.

Chairs

Current Projects

Proof of Concepts

This group has not initiated or completed any proofs of concept.

Presentations

Below are presentations delivered during working group sessions. Click on the presentation name to open it (many files are for members only and will require authentication) and a presenter name to view their profile. Note: if a presenter’s profile is not public, it will redirect to their LinkedIn page.

Carlsbad F2F: Privacy and Protection WG Slides

  

Presented by Kei Foo

Presented by Mike Wilkinson

Costs of Piracy (SVA Lisbon)

  

Presented by Lawrence Low

History of Piracy

  

Presented by Kei Foo

Presented by Mike Wilkinson

Licensing: Setting the Protection Bar

  

Presented by Andy Lucas

Presented by Arthur Cuyugan

Secure the CDN

  

Presented by Jon Herd

Securing Streaming Media Paper Update

  

Presented by Matt Tooley

Sky Security Overview

  

Presented by Kieron Edwards

Watermark Scalability

  

Presented by Jaap Haitsma

Presented by Jean-Philippe Plantevin

Watermarking Latency

  

Presented by Alain Durand

Documents

Published

The ability to prevent piracy, take down illegal content, and act against illegal sources are key objectives of content protection. Meeting these objectives requires the use of a variety of technologies including watermarking, Digital Rights Management (DRM), fingerprinting, and cryptography. This document examines and discusses the streaming video system to provide best practices for protecting and securing streaming video content for both content providers and distributors to ensure content is being used as intended by those who it was intended.

The piracy of online video content is a significant issue for content owners and distributors. This document explains the technology of watermarking and how it can be employed, in various methods, to secure video against theft.

There are many different approaches to associating attributes to an IP address and many different attributes that can apply. There are also several different approaches to delivering that data. This document will focus on attributes that fall into three categories: Identity, Service, and Location. Identity can include a user’s name, the upstream service provider, an enterprise network, university, or department. Services can include attributes such as a W-Fi network, cable, wireless, infrastructure, and enterprise. Finally, location attributes can identify city, state, zip codes, country, region, or geocodes. A collection of attributes would form objects with their associated values, and these objects can be related to an individual IP address or a range of addresses to create an IP addressing object. These IP address objects can also be tied to an IP address object in a parent child relationship to provide as much detail as desired by the source. This document provides a JSON object model and schema to represent how those attributes can be tied to an IP address in a common format for controlling the access to streaming video using geo-location data for IPv4 and IPv6 addressing.

Note: access controls, privacy, and the management of privileged information (PII) will not be defined here and will be left to other efforts.

This document describes key network delivery metrics for streaming Internet video. The Streaming Video Alliance Quality of Experience (QoE) working group (WG) developed these metrics as a common language to describe effectiveness of network delivery. Although many more metrics could have been documented, these particular metrics represent the most common and important metrics according to the QoE WG group membership. It is expected that these metrics can be used across the streaming video ecosystem to provide guidance that can lead to enhancement of QoE.

Draft

Note that to download draft documents, you must be an employee of an active member company with an ARO account. If you are part of a member company and don’t yet have an ARO account, you can request one here.

Securing Streaming Video

The ability to prevent piracy, take down illegal content, and act against illegal sources are key objectives of content protection. Meeting these objectives requires the use of a variety of technologies including watermarking, Digital Rights Management (DRM), fingerprinting, and cryptography. This document examines and discusses the streaming video system to provide best practices for protecting and securing streaming video content for both content providers and distributors to ensure content is being used as intended by those who it was intended.

Participating Companies

Making Streaming Video Better

The Streaming Video Alliance is committed to bringing video streaming companies together to help build a better viewer experience at scale.

© 2015-2020, Streaming Video Alliance
Scroll to Top