13.07.2015 Views

What Every Citizen Should Know About DRM, aka - Public Knowledge

What Every Citizen Should Know About DRM, aka - Public Knowledge

What Every Citizen Should Know About DRM, aka - Public Knowledge

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>What</strong> <strong>Every</strong> <strong>Citizen</strong> <strong>Should</strong> <strong>Know</strong> <strong>About</strong> <strong>DRM</strong>,a.k.a. “Digital Rights Management”tent. Assuming that such a database could be built,a fingerprint could serve roughly the same functionas a watermark. 17A Deeper Understanding of the“Persistence” RequirementTo be persistent, a watermark or fingerprint mustbe able to survive any of the digital transformationsthat a would-be infringer might attempt to performon the digital content. A wide range of suchtransformations exists.These include (but are not limited to):❚ Playing the content, then using a recordingdevice such as a microphone or a camera torecapture the played content,❚ Compressing the content using a method suchas MP3 that makes some modifications in thecontent in order to facilitate compression,❚ Adding certain kinds of random noise to thecontent, and❚ Altering the content by making subtle changesin the tempo, timing, pitch, or coloration of thecontent.Many of these changes are often made for legitimatereasons, and there are many useful (and lawful)signal-processing and image-processing toolsthat allow an even broader range of possible transformations.Experts agree that devising a mark orlabel capable of surviving the full range of thesetransformations is much more difficult than a nonexpertmight initially expect.How “Marking” Functions in aCopy-Protection SchemeBy itself, no mark can function as a copy-protectionscheme. Instead, a mark is a building blockthat is used in designing a copy-protection scheme.Though the details of such schemes differ, theyshare certain important characteristics.First, marking schemes rely on widespread markingof copyrighted content, since they cannot hopeto protect content that is not marked. If a “simplemarking” or “watermarking” approach is being used,then of course there is no way to mark content thatwas distributed before the copy protection schemewas adopted. 18 Unmarked unauthorized copies ofcontent could continue to be copied on the Internetand elsewhere, and could continue to be experiencedand manipulated by users, so long as players andother devices that inspect content for marks, but donot find them, continue to be capable of playing orprocessing unmarked content. This is why somecritics of marking-based schemes argue that the onlyway for marking-based schemes to work is if playersand other devices read and play only marked content,and refuse to read or play unmarked content.Second, marking schemes rely on all devices thatread the content to check for the mark and, if themark is found, to obey any corresponding restrictionson use of the content. Of course, devices thatwere sold before the copy-protection scheme wasadopted will not be able to satisfy this requirement.This gives rise to what may be characterized as“the backward-compatibility problem,” which mayundermine attempts to implement industry widecopy protection schemes.The Backward-Compatibility ProblemWhen a new copy protection scheme is launched,it generally isn’t implemented in pre-existingdevices. For example, a new scheme for copy protectingrecorded music generally will not be supportedby existing CD players. This fact posesserious problems for the advocates of copy protection.There are three ways for proponents orimplementers of this scheme to deal with this backwardcompatibility problem, but all three have seriouscosts and other flaws.The first approach is to ignore the problem.This makes the owners of existing devices happy,but the existing devices become a loophole in thesystem, a loophole that is widely available towould-be infringers. This approach is preciselywhat is asked for by proponents of the broadcastflagapproach to <strong>DRM</strong> for digital television broadcasts— existing digital television receivers willcontinue to function regardless of the presence ofthe broadcast-flag bit, which means they can beused to sidestep attempts to limit copying of televisionprograms.The second approach is to require all consumersto upgrade immediately to new players that13

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!