• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer

mkpeReport

top analysis covering digital cinema, 3-D, HFR, and laser illumination

  • Reports
  • About
  • mkpe.com
  • cinepedia.com

The Anti-Piracy Methods of Cinema

August 2015 by Michael Karagosian

If you can see it, you can copy it. When it comes to anti-piracy methods in cinema, this is an inescapable fact. Digital cinema takes great care to ensure that the light emanating from the lens is the only opportunity for stealing the movie. This report provides an overview of the methods employed in cinema to limit content theft.

Most readers are aware that a Key Delivery Message (KDM) is needed to decrypt a movie on a particular media block. The DCP consists of many files, each file representing one type of essence, such as picture, sound, or subtitles. Further, the essence files are temporal in nature, meaning that each file typically contains only a time-slice of the movie. To provide some organization to the collection of files, the same time-slice is applied to each essence type. We call each time-slice a “reel,” as in a reel of film, the analog of the time-slice concept.

The content owner has the option to encrypt the files of its choice. Typically, all of the files will be encrypted. Each file is encrypted using a unique symmetrical key. Symmetrical means that the key that encrypts the content is also the same key that can be used to decrypt it. The collection of symmetrical keys are then encrypted using an asymmetrical key called a “public” key. With asymmetrical encryption, two keys are employed to encrypt and decrypt, typically called “private” and “public” keys. In the digital cinema case, the public key of the media block’s digital cinema certificate is used to encrypt the symmetrical content keys. Only the private key of the media block can then be used to unlock the symmetrical keys. Once unlocked, the exposed symmetrical keys can be used to decrypt the content for playout. The unlocking of keys in the KDM and the unlocking of the movie itself are performed in the secure processing block within the media block. The secure processing block is tamperproof. An attempt to break into its perimeter will cause erasure of the digital cinema certificate private key and any exposed symmetrical content keys. As one can see, this is a very tight security system. Anyone interested in stealing the movie will expend a lot less effort using a camcorder to steal the light that comes out of the projection lens and onto the screen.

One may be able to steal light from the lens, but not without risking detection. The image and sound captured by a camcorder will be forensically marked with the time of day and the identity of the media block used to play the stolen content. Content owners, upon discovery of pirated copies of their movies, decode the forensic mark and turn over the information to investigators. The investigators then apply other forensic science techniques as they carry out the criminal investigation.

First release motion pictures are highly valued, and the security of this content in digital cinema is taken very seriously. Strong encryption and security management techniques are applied to ensure that digital files cannot be copied. The only way left to steal a movie is the camcorder, but forensic marks will not allow one to do so imperceptibly.

Filed Under: Anti-Piracy Tagged With: Camcorder, Forensic Marks

Primary Sidebar

Search

Topics

  • 3-D
  • Accessibility
  • Alt Content & Advertising
  • Anti-Piracy
  • Color
  • Communications
  • Deployment Entities
  • Distributors
  • Exhibitors
  • Fulfillment
  • High Dynamic Range
  • Higher Frame Rates
  • Installations
  • Patents
  • Projectors
  • Servers and IMBs
  • Sound
  • Technical Bodies
  • Theatre Management Systems
  • Trade Organizations and Shows

Full Archives

a publication of
MKPE Consulting LLC

Footer

Important Stuff

  • About
  • Privacy Policy

Archives

  • Category & Monthly Archives
Archives date back to 2008.

MKPE

mkpeReport is a publication of MKPE, a world-class consultancy building business at the crossroads of cinema and technology.
Learn more about MKPE.

copyright © 2008 - 2026 mkpe consulting llc

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}