Because of the increasing popularity of OTT and VOD content, watermarking solutions that protect content from illicit use and distribution are becoming increasingly popular. As a result, the requirement for ways to recognise specific user accounts or streaming sessions arises in order to utilise watermark detection in order to identify leakers and take the necessary action. Standard watermarking approaches do not meet this demand.
This is where session-based video watermarking enters the equation. Session-based watermarking is viewed as a solution to the problem of the “analogue hole,” which has been exacerbated by the availability of HD monitors and cameras.
It is possible to create a session-based watermark by making two different versions of the same content (called A and B variants). Adaptive bitrate distribution segments the files into chunks, and the playouts follow a specific pattern of As and Bs. In the reveal process, the session identification is derived from the unique sequence of A/Bs. Each chunk used is either from Track A or Track B, and they are then separated into session-based manifests along with segmented lists of the various chunks and combinations. Each session can have its own manifest based on the content’s binary representation in this way.
By using a CDN to cache only two copies of the content, no client-side third-party integrations are required because all the necessary information is already included in the server-side manifests. As a result, there is no longer a requirement to create or store as many content versions as the number of users on a content-sharing platform. Even if the user tries to convert the asset to analogue or re-digitize, re-compress, or trim the asset, session-based watermarks are impossible to erase or tamper with in a well-designed and implemented system.
With session-based watermarking, producers and streaming services can guard against a variety of threats, including collusion and playlist manipulation. Because of the benefit of server-side watermarking, DRM protected content on a variety of devices can be further secured without the need for device integration.
Image-based Here, the scene is represented just by its 2D projection, which are photos acquired by cameras. It is possible to watermark image sequences that record a 3D scene and extract the watermark from any rendered image generated for any arbitrary view angle, as opposed to the first two methods, which only protect the watermark information for the two key components of 3D scene representation (geometry and texture).
If you’re using dynamic watermarking, you may embed information on the video asset while it’s being played back at the user’s end, such as the user’s email, date and time of watching, their IP address, or even their business logo. Because of their dynamic nature, they provide additional protection for confidential content that is not intended to be shared or altered. DAI (dynamic ad insertion) is also activated via dynamic watermarking in order to optimise addressable ad income. DRM video protection techniques such as watermarks are not sufficient on their own, but when used in conjunction with other measures, they can help to safeguard the intellectual property of the content owner and aid to trace the source of any alleged infringement. They also serve as a helpful reminder to users about their own and others’ rights to the content they’re using.