Content Armor Watermark
Lighter & Better for Biggest profit solution
ContentArmor™ Seal keeps your valuable content secure throughout your file-based workflow. Our proprietary system enables secure processing, distribution and consumption of high-value videos for post-production and pre-releases.
ContentArmor™ Seal combines digital encryption with forensics watermarking to create a unique security solution that provides:
- › Access control
- › Content protection
- › Piracy deterrence
We guard our client’s valuable digital assets with unrivalled, seamless protection and traitor tracing.
How Does It Work ?
Complementary service
The Packager
The ContentArmor™ Seal packager protects each piece of a client’s valuable content by applying a set of user-defined rules and then managing access authorization.
The ContentArmor™ Seal Packager:
- › Creates a list of authorized recipients
- › Establishes configuration parameters
- › Defines both visible marks and imperceptible watermarks that are applied at playback
- › Uses 128-bit AES to encrypt the content distributed to each authorized recipient
- › Generates a unique password for the recipient’s copy of each particular video asset › Sends an E-mail containing the recipient’s unique password
The Player
The ContentArmor™ Seal packager protects each piece of a client’s valuable content by applying a set of user-defined rules and then managing access authorization.
The content remains encrypted and inaccessible until the user presents his authorized credentials. As the content is decrypted, the player adds another level of security through visible marks and by embedding inaudible and invisible watermarks on each distinct user’s copy. This step helps indicate each individual user’s identity after they have accessed the secure content.
Deployment Scenarios
The ContentArmor™ Seal packager protects each piece of a client’s valuable content by applying a set of user-defined rules and then managing access authorization.
Secure E-Screener
The Secure E-Screener provides tight security for all high-risk screenings whether it’s on a PC, MAC or mobile operating system. The Secure E-Screener enhances the security of internal quality assessment and validation reviews, promotional tools preparation, screeners and promotional viewing for distributors.
Benefits
- › Improved reactivity and reduced production time
- › Secure viewing of content in HD resolution
- › Simplified distribution eliminates the need for physical media transport
- › Inaudible and invisible watermarks specific to each user help deter piracy
Secure Audio Dubbing
Dubbing and subtitling are among the most vulnerable steps in the life cycle of your content, especially since they involve pre-release content and often require third-party contributions.
Benefits
-
- › Eliminates the need to work with degraded video content
- › Shortens time-to-market through automated, digital file-based processing
- › Heightens security by the use of invisible watermarks that are specific to each user
How Does It Work ?
Unique content protection technology
- › Encryption and multiple forensic marking in a single process
- › Imperceptible, robust user-specific audio and video watermarks ensure traceability
- › Cutting-edge encryption and key management
- › Comprehensive technology management, including research, engineering, integration, and investigative services
Unique content protection technology
- › Encryption and multiple forensic marking in a single process
- › Imperceptible, robust user-specific audio and video watermarks ensure traceability
- › Cutting-edge encryption and key management
- › Comprehensive technology management, including research, engineering, integration, and investigative services
Unique content protection technology
- › Encryption and multiple forensic marking in a single process
- › Imperceptible, robust user-specific audio and video watermarks ensure traceability
- › Cutting-edge encryption and key management
- › Comprehensive technology management, including research, engineering, integration, and investigative services
Unique content protection technology
- › Encryption and multiple forensic marking in a single process
- › Imperceptible, robust user-specific audio and video watermarks ensure traceability
- › Cutting-edge encryption and key management
- › Comprehensive technology management, including research, engineering, integration, and investigative services