Consumer Strategies for Deterring Illegal File-Sharing Using Digital Serial Numbers

The Digital Watermark Alliance (DWA) released last month the results of a survey it commissioned. The purpose was to evaluate what the impact of using Digital Serial Number (DSN) would have on piracy. Digital Serial Number embeds through watermark a unique identifier of the device that rendered the content. This allows to trace back the origin of an eventual leakage.

The answer is obviously that it would have an effect. About half of the responders admitted that they would stop file sharing. This is probably not a surprise for anybody.

A more interesting output is the reasons why about half responders would not stop file sharing.

– I don’t download enough to be caught.
– The online community will remove DSNs.
– DSNs will not be enforced strongly enough to make a difference.
– My downloading would remain the same as a statement of principle.
– The BitTorrent community can avoid sharing files with DSNs.
– The risk is worth it.

The document also highlights that DSN is deterrent only if users are aware of it.

The document is available here.

PS: THOMSON is member of DWA.

DRM free music

The movement towards DRM free music continues. The biggest event is of course iTunes that announces that its complete catalog will be available as DRM free songs. iTunes announced also a new price list adding $0.69 songs (in addition to $0.99 and $1.29)

Warner France followed this movement. It announced that its two sites Fnac Music and Virgin Media will sell DRM free songs in 2009. Nevertheless, it is a trial and the final decision will be taken in 2010.

DRM free music is a trend that will not stop. Will it extend to other fields such as games or video? I am not sure. of course, customers would like it. DRM free distribution with a session watermark to detect eventual illegal distribution is promoted, for instance by the Digital Watermark Alliance.. Nevertheless, there are several differences with music. According to me, the biggest one is that the investments are far huger than music. In the case of video, the release windows strategy and commercial agreements are also problems.

We will continue to monitor this trend in 2009.

Civolution

Civolution is a new spinoff of Philips. Civolution will manage all the identification solutions from Philips. It encompasses MediaHedge the platform dedicated to content identification on Internet (based on fingerprinting technology) and Teletrax the platform for broadcast metering (based on the watermark technology). Of course all the watermarking activities, for instance DCI, are part of Civolution.

The new company was launched on 20th October 2008. It would be interesting to know if all the corresponding team of Natlabs did follow. In any case, HAITSMA Jaap followed. He is the CTO of the new entity.

Watermark and privacy

The Center for Democracy & Technology (CDT) issued an interesting paper titled “Privacy principles for digital watermarking“. CDT published similar principles of other technologies such as RFID or DRM.

The document proposes eight principles:
1. Privacy by design; Interestingly in this principle, CDT recommends that the digital watermark technology providers imposes, by contract binding, to the application designer to respect privacy issues. This is highly ethical but is it realistic in business environment?
2. Avoid embedding independently useful identifying information directly in watermark; in other words the payload should look random without access to relevant information
3. Provide notice to end-users; CDT provides an interesting rationale to inform end users if the watermark is used against copyright infringement. End user should secure his/her content to avoid theft by third parties; else they may suffer from legal actions.
4. Control access to reading capability
5. Respond appropriately when algorithms are compromised; Their recommendations is not to renew the algorithms as technologists would recommend. Rather, CDT recommends to publish a notice if the hack allows watermark forging. I am not sure that this will be loved by technology provider
6. Provide security and access control for back-end databases
7. Limit uses for secondary purposes
8. Provide reasonable access and correction procedures for personally identifiable information

The principles are sound and many of them apply to other security related techniques. Of course, in view of the goal of its editor, some recommendations are Utopian. This document is worth reading.