Security
- Home
- Security
Overview
Objectives
Chairs
Current Projects
Presentations
Below are presentations delivered during working group sessions. Click on the presentation name to open it (many files are for members only and will require authentication) and a presenter name to view their profile. Note: if a presenter’s profile is not public, it will redirect to their LinkedIn page.
Presented by Brian Paxton
Presented by Kei Foo
Presented by Ken Gerstein
Presented by Mike Wilkinson
Documents
Published
SVTA5009: Forensic Watermarking Implementation Considerations for Streaming Media
The piracy of online video content is a significant issue for content owners and distributors. This document explains the technology of watermarking and how it can be employed, in various methods, to secure video against theft.
SVTA5019: Securing Streaming Video
The ability to prevent piracy, take down illegal content, and act against illegal sources are key objectives of content protection. Meeting these objectives requires the use of a variety of technologies including watermarking, Digital Rights Management (DRM), fingerprinting, and cryptography. This document examines and discusses the streaming video system to provide best practices for protecting and securing streaming video content for both content providers and distributors to ensure content is being used as intended by those who it was intended.
SVTA5054: Securing Media Players
This document identifies the vulnerability points inherent in streaming video players and proposes some of the industry best practices to ensure content is protected while not impeding viewer access or a high-quality viewing experience.
SVTA5056: OTT Streaming Security Checklist
As more direct-to-consumer Over-the-Top (OTT) apps are making their way to the marketplace, it is helpful to provide a single checklist that contains a list of the security options in use by contemporary OTT services. This ensures that security options are taken into consideration every step of the way, from design and architecture, to development and test, and finally to live operation. This will also provide an understanding of potential security risks that may be presented when certain security options are foregone.
This document provides an end-to-end security checklist that an OTT service provider, technology vendor, and service developer can reference as they seek to improve content protection on OTT streaming services.
Draft
Note that to download draft documents, you must be an employee of an active member company with an ARO account. If you are part of a member company and don’t yet have an ARO account, you can request one here.
This group does not currently have any draft documents.