You are on page 1of 1

Solution to Piracy in the Entertainment and

Patricia Andreica, Ethan Kramer, and Rose Meyers


Music Industry
Trends show that the more technology-based our society becomes, the more piracy will thrive
Technologies
The opportunity we identified to combat this issue is to provide software to accurately detect and
prevent piracy. Enabling Technologies

Stakeholders: Content Producers, entertainment industries, and government. • Stenography - designed to secure a specific message by hiding it in another object meaning it
will be kept secret from everyone except the intended recipient (Digital).
Target customer: Content producers
• Blockchain - possible to build a proprietary digital watermarking technology (Reiff). Also allows
The customer needs a solution to help protect their content, and to fairly punish whoever steals it. to embed things like BTC tokens in the content.
• Current digital watermarking algorithms - few developed, such as those that are based on
Solution spatial domain (Yu). It utilizes the most significant and least significant bits to imbed a
Our solution is a watermarking algorithm for customers to place in their content. The customer can watermark.
watermark their content with an invisible watermark in binary that is naked to the human eye and if Milestones
the content is stolen, the system will then identify that the code has been duplicated and
immediately identify the customer of fraudulence. Basics: the internet, networks, coding, stenography, and simple watermarking.
Function Needs: 1) Detection algorithm - requires advanced networking and flexible network topologies
1) Customer uploads content to system
2) System imbeds binary code into content 2) Generation of binary code – includes developing advanced automated algorithms which can be
3) Detection algorithm detects if binary code has been duplicated anywhere in the world done using machine learning and artificial intelligence, both fields that are currently growing in
4) System notifies customer immediately of fraudulence with specific information and deletes stolen knowledge. Thus, there wouldn’t be a need for the human aspect which is prone to error.
content from pirates’ local machine
Features Societal Challenges
• Software alerts customer 30 seconds from when code has been identified
1) Ethical concerns – This technology may raise privacy issues if system is used incorrectly.
• Customers can select what information they want shown, such as IP address, computer network,
etc. 2) Social – Using this system may promote a negative image of the customer.
• Customer is given option to send report to FBI
• Removes pirated content in about 5 seconds from when it has been found including any traces of 3) Economic – Could be costly to implement certain features, including sending report to FBI,
which can also be considered as a political challenge.
it.
Invisible Watermarking Using
Binary Invisible Societal Impact
0101110111010101010101101011 watermark code
1011101010101010110101110111 is placed inside Value Proposition Statement
0101010101011010111011101010 content
For content producers who struggle with content getting stolen, our product is here to help prevent
1010101101011101110101010101
that by protecting it with an embedded watermark that only you will know about.
0110101110111010101010101100
1110111010101010101101011101 Customer’s content 1) Ethical – Reduces piracy which is an unethical act.
 
2) Economic – Helps the economy as there is less revenue loss from content being stolen.
 
 

Your content has been stolen


System Location: Los Angeles, California 3) Social – Content will be posted only by the respective owner which is better for their image.
1010101011010 System alerts
1110111101010 finds Time: 5:00PM EST customer of
duplicated fraudulence
11010 IP Address: 72.104.186.113 “How Digital Watermarking Works.” Digital Watermarking Alliance, 26 Oct. 2016, https://digitalwatermarkingalliance.org/digital-watermarking-works/
code
Browser: Google Chrome
Reiff, Nathan. “How Blockchain Can Fight Piracy.” Investopedia, Investopedia, 17 Nov. 2021, https://www.investopedia.com/tech/how-blockchain-can-fight-piracy/.
Computer: Mac M1
Pirated content . Yu, Bangxi. “A Quick Glance at Digital Watermarking.” A Quick Glance at Digital Watermarking, https://www.cse.wustl.edu/~jain//cse571-11/ftp/watermrk/index.html.

You might also like