Abstract
Movies, advertisements, and promotional videos are Intellectual Property (IP) and are often shared on open access medium as part of the business. Fueled by the advancements in technology, piracy has become more rampant and a widely spread crime in many countries. Movie piracy is more dangerous to mega-budget producers who struggle to receive the maximum profit of their films, making them compete with smaller films, results in the cheapest alternatives, jeopardizing the production of more films, artistic pool, shooting sites, camera equipment, special effects, quality and much more. Apart from the big shrinking of the job market for film jobs, sponsorship, unions, and merchandising get affected greatly. Many advanced technologies, apart from watermarking, such as Infrared based techniques, are used to estimate the position of the pirate and reduce piracy. This paper reviews the enabling technologies in the fight against video piracy, focusing mainly on methods for stopping these emerging methods of piracy in theatres.
Keywords: Audio watermarking, digital video, copy detection, geometric distortion, movie theater, piracy, video watermarking.
Graphical Abstract
[http://dx.doi.org/10.2139/ssrn.2175621]
[http://dx.doi.org/10.1016/j.infoecopol.2006.06.005]
[http://dx.doi.org/10.1111/j.1747-1796.2010.00412.x]
[http://dx.doi.org/10.1109/CSNT.2014.131]
[http://dx.doi.org/10.1109/ICIP.2010.5650525]
[http://dx.doi.org/10.1109/WIFS.2012.6412640]
[http://dx.doi.org/10.1007/978-3-642-28693-3_3]
[http://dx.doi.org/10.1007/978-3-662-46739-8_3]
[http://dx.doi.org/10.1117/12.765430]
[http://dx.doi.org/10.1186/s13640-015-0096-z]
[http://dx.doi.org/10.1109/ICACCE.2015.122]
[http://dx.doi.org/10.1109/TIFS.2016.2603603]
[http://dx.doi.org/10.1016/j.imavis.2018.06.001]
[http://dx.doi.org/10.4018/978-1-5225-0498-6.ch016]
[http://dx.doi.org/10.1117/12.476856]
[http://dx.doi.org/10.1117/12.435395]
[http://dx.doi.org/10.1117/12.477336]
[http://dx.doi.org/10.1117/12.762580]
[http://dx.doi.org/10.1109/TMM.2009.2012938]
[http://dx.doi.org/10.1109/TMM.2010.2061221]
[http://dx.doi.org/10.1017/ATSIP.2012.2]
[http://dx.doi.org/10.1016/j.jvcir.2014.08.009]
[http://dx.doi.org/10.1007/978-3-030-31873-4_10]
[http://dx.doi.org/10.3390/computers9020026]
[http://dx.doi.org/10.1007/s11042-018-6892-6]
[http://dx.doi.org/10.1007/s11042-018-6639-4]
[http://dx.doi.org/10.17485/ijst/2018/v11i40/120482]
[http://dx.doi.org/10.1142/S0219467820500047]
[http://dx.doi.org/10.1109/SPIT.2018.8350858]
[http://dx.doi.org/10.1504/IJCAET.2020.103839]
[http://dx.doi.org/10.1007/s11042-019-08412-4]
[http://dx.doi.org/10.1109/30.663749]
[http://dx.doi.org/10.1007/s11042-016-3902-4]