Log in

Irdeto, Scenarist Introduce Security System for 4K Ultra HD Blu-ray

12 Sep, 2016 By: John Latchem

Irdeto, a digital platform security agency, and Scenarist, developer of Hollywood-standard multi-format authoring tools, have partnered to provide content owners with access to forensic watermarking for Ultra HD Blu-ray discs. The partnership combines Irdeto TraceMark, a method for tracking pirated content, with Scenarist’s Ultra HD Blu-ray authoring system.

Irdeto and Scenarist closely collaborated with 20th Century Fox to develop the technology and ensure the integration helps content owners meet the MovieLabs Specification for Enhanced Content Protection (ECP) with greater confidence in delivering high bandwidth Ultra HD and high dynamic range on disc.

“We are pleased to work with Irdeto and Scenarist to successfully implement a forensic watermarking solution seamlessly with the Ultra HD Blu-ray authoring process,” said Hanno Basse, chief technical officer for 20th Century Fox Film. “We wanted to ensure the technology added to our comprehensive security strategy and give our content the protections needed to best manage piracy, which allows us to more readily release premium content consumers crave.”

“Combating piracy and enhancing security strategies is key for studios like 20th Century Fox to keep premium content secure,” said Lawrence Low, VP of business development and sales for Irdeto. “This is especially important to protect the highest quality content and most valuable experience available to consumers. Our goal was to provide studios with premium watermarking capabilities that are easy to incorporate and can work with other existing watermarking technologies.”

Via the integration with Scenarist, Irdeto TraceMark provides a unique, robust and invisible mark embedded to identify each individual content stream. TraceMark works in conjunction with Irdeto’s online piracy detection and rights enforcement services that provide content owners and broadcasters a quick and easy mechanism to trace back to the source of a security breach. The solution is tamper resistant and does not impact the end-user experience.

About the Author: John Latchem

Bookmark it:
Add Comment