SlideShare a Scribd company logo
1 of 16
MULTIMEDIA-DIGITAL PIRACY
Introduction To Digital Piracy
• What is Piracy?
“Unauthorised copying of software,
music or films, so-called digital piracy”

While there are definitions of “pirated copyright
goods”, there is currently no specific legal
definition of digital piracy, which would be more
accurately described as “digital infringement of
copyright”.
What Is Copyright?
• Copyright is a legal concept, enacted by most
governments, giving the creator of an original
work exclusive rights to it, usually for a limited
time, with the intention of enabling the creator of
intellectual wealth (e.g. the photographer of a
photograph or the author of a book) to get
compensated for their work and be able to
financially support themselves. Generally, it is
"the right to copy", but also gives the copyright
holder the right to be credited for the work.
Music Piracy & Video Piracy
• Music Piracy
For music, it is the copying and distributing
of copies of a piece of music for which the
composer, recording artist, or copyright
holding record company did not give consent.
It is a form of copyright infringement(An act
that disregards an agreement or a
right), which is a crime in many countries.
Music Piracy & Video Piracy
• Video Piracy
Whereas for video piracy, a movie is
usually released in several formats and
different versions as the primary sources used
by a group for a particular movie may vary.
Pirated movies are primarily released by these
organized groups, commonly referred to as
scene groups or warez groups. The first
release of a movie is usually of a lower quality
due to a lack of sources, but is eventually
replaced with higher-quality releases as better
sources become available.
Consumer VS Producer
• Producer at a loss
• Producer at benefit
• Consumer at a loss
• Consumer at benefit
Anti-piracy
• Antipiracy in India
EIPR is the first to put India's excellent copyright
and intellectual property rights law to good use,
for the benefit of the manufacturers, artists,
entertainment industry, software developers
scientists intellectuals, creative thinkers, and the
nation of India as a whole.
Who are EIPR ?
EIPR is India's largest investigation agency
specialising in anti-counterfeiting solutions.
Reasons for Supporting Piracy
•
•
•
•
•

We're only hurting big business.
Authors already have a plenty of money.
Digital content is too expensive.
Everyone else is doing it.
We live in a different country so we don't get
movies/books/shows until months later.
Reasons for Going Against Piracy
•
•
•
•

Viruses & Malware
Good Quality Media
Against Law
If You are the producer
Advantages
• Piracy keeps music “alive”
• Drives up the sales of legal music
• Legal online file-sharing services exist at fair
prices and are much safer
Disadvantages
• People are taking the risk of getting caught
and receiving a criminal record when he/she
downloads illegally
• Free file-sharing sites often transmit viruses
• Quality of pirated movies and songs might
not be as accurate and précised as compared
to original copies
APPLICATIONS
• Forensics And Piracy Deterrence
Forensic watermark
• Forensic watermark applications enhance a
content owner's ability to detect and respond
to misuse of its assets. Forensic watermarking
is used not only to gather evidence for
criminal proceedings, but also to enforce
contractual usage agreements between a
content owner and the people or companies
with which it shares its content. It provides
positive, irrefutable evidence of misuse for
leaked content assets.
Deterrence Effects
There will still be a fairly equal amount of
people who are pirates and non pirates
What we can do?

We only can do is to get knowledge about
piracy and defend ourself from piracy
Multimedia digital piracy

More Related Content

What's hot

Copyright: Law of Copyrights and Infringement / A Presentation at NALSAR Hyde...
Copyright: Law of Copyrights and Infringement / A Presentation at NALSAR Hyde...Copyright: Law of Copyrights and Infringement / A Presentation at NALSAR Hyde...
Copyright: Law of Copyrights and Infringement / A Presentation at NALSAR Hyde...BananaIP Counsels
 
Sting Operation and what is Investigation
Sting Operation and what is InvestigationSting Operation and what is Investigation
Sting Operation and what is InvestigationNEERAJPANGHAL2
 
Internet Service Provider Liability
Internet Service Provider LiabilityInternet Service Provider Liability
Internet Service Provider LiabilityAndres Guadamuz
 
Jurisdiction in cyberspace
Jurisdiction in cyberspaceJurisdiction in cyberspace
Jurisdiction in cyberspaceDr. Arun Verma
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber lawsDr. Prashant Vats
 
Copyright act unitiv ( part i) [compatibility mode]
Copyright act unitiv ( part i) [compatibility mode]Copyright act unitiv ( part i) [compatibility mode]
Copyright act unitiv ( part i) [compatibility mode]sanjeev kumar chaswal
 
Ip rights and parallel imports [compatibility mode]
Ip rights and parallel imports [compatibility mode]Ip rights and parallel imports [compatibility mode]
Ip rights and parallel imports [compatibility mode]sanjeev kumar chaswal
 
Copyright Laws In India
Copyright Laws In IndiaCopyright Laws In India
Copyright Laws In IndiaSarthak Mishra
 
Privacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other lawPrivacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other lawNitya Nand Pandey
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimesatuljaybhaye
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Ambar Deo
 
Intellectual Property Protection In software
Intellectual Property Protection In softwareIntellectual Property Protection In software
Intellectual Property Protection In softwareviralishere
 
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaIntroduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaMaxwell Ranasinghe
 

What's hot (20)

An overview of cyberimes
An overview of cyberimesAn overview of cyberimes
An overview of cyberimes
 
Copyright: Law of Copyrights and Infringement / A Presentation at NALSAR Hyde...
Copyright: Law of Copyrights and Infringement / A Presentation at NALSAR Hyde...Copyright: Law of Copyrights and Infringement / A Presentation at NALSAR Hyde...
Copyright: Law of Copyrights and Infringement / A Presentation at NALSAR Hyde...
 
Sting Operation and what is Investigation
Sting Operation and what is InvestigationSting Operation and what is Investigation
Sting Operation and what is Investigation
 
Internet Service Provider Liability
Internet Service Provider LiabilityInternet Service Provider Liability
Internet Service Provider Liability
 
Jurisdiction in cyberspace
Jurisdiction in cyberspaceJurisdiction in cyberspace
Jurisdiction in cyberspace
 
Common law
Common lawCommon law
Common law
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Fair use of copyright
Fair use of copyrightFair use of copyright
Fair use of copyright
 
Media law in India
Media law in IndiaMedia law in India
Media law in India
 
Copyright act unitiv ( part i) [compatibility mode]
Copyright act unitiv ( part i) [compatibility mode]Copyright act unitiv ( part i) [compatibility mode]
Copyright act unitiv ( part i) [compatibility mode]
 
It act 2000
It act 2000It act 2000
It act 2000
 
Ethics in Cyber Space
Ethics in Cyber SpaceEthics in Cyber Space
Ethics in Cyber Space
 
Ip rights and parallel imports [compatibility mode]
Ip rights and parallel imports [compatibility mode]Ip rights and parallel imports [compatibility mode]
Ip rights and parallel imports [compatibility mode]
 
Copyright Laws In India
Copyright Laws In IndiaCopyright Laws In India
Copyright Laws In India
 
Privacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other lawPrivacy right under it act, 2000 and under other law
Privacy right under it act, 2000 and under other law
 
Introduction to Cyber Crimes
Introduction to Cyber CrimesIntroduction to Cyber Crimes
Introduction to Cyber Crimes
 
Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)Introduction to Cyber law (IT Act 2000)
Introduction to Cyber law (IT Act 2000)
 
Intellectual Property Protection In software
Intellectual Property Protection In softwareIntellectual Property Protection In software
Intellectual Property Protection In software
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaIntroduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
 

Viewers also liked

Software piracy
Software piracySoftware piracy
Software piracyTi-Sun
 
Defense Against the Dark Arts of Game Piracy and Cheating
Defense Against the Dark Arts of Game Piracy and CheatingDefense Against the Dark Arts of Game Piracy and Cheating
Defense Against the Dark Arts of Game Piracy and CheatingArka Ray
 
Tata steel anti-counterfeiting and anti-piracy
Tata steel   anti-counterfeiting and anti-piracyTata steel   anti-counterfeiting and anti-piracy
Tata steel anti-counterfeiting and anti-piracyMunish Sudan
 
Software piracy and copyright infringement
Software piracy and copyright infringementSoftware piracy and copyright infringement
Software piracy and copyright infringementAbby-Gaye Gordon
 
Pirates presentation
Pirates presentationPirates presentation
Pirates presentationDCobbVt
 
Software Piracy
Software PiracySoftware Piracy
Software PiracyByerdavi
 
Credit card fraud detection methods using Data-mining.pptx (2)
Credit card fraud detection methods using Data-mining.pptx (2)Credit card fraud detection methods using Data-mining.pptx (2)
Credit card fraud detection methods using Data-mining.pptx (2)k.surya kumar
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detectionkalpesh1908
 
Are women safe in India . . .
Are women safe in India . . .Are women safe in India . . .
Are women safe in India . . .SD Paul
 
Women safety in india
Women safety in indiaWomen safety in india
Women safety in indiaMahender Mahi
 
Digital Media Piracy
Digital Media PiracyDigital Media Piracy
Digital Media Piracyguesteb94797
 

Viewers also liked (15)

Software piracy
Software piracySoftware piracy
Software piracy
 
Defense Against the Dark Arts of Game Piracy and Cheating
Defense Against the Dark Arts of Game Piracy and CheatingDefense Against the Dark Arts of Game Piracy and Cheating
Defense Against the Dark Arts of Game Piracy and Cheating
 
Tata steel anti-counterfeiting and anti-piracy
Tata steel   anti-counterfeiting and anti-piracyTata steel   anti-counterfeiting and anti-piracy
Tata steel anti-counterfeiting and anti-piracy
 
Software piracy and copyright infringement
Software piracy and copyright infringementSoftware piracy and copyright infringement
Software piracy and copyright infringement
 
Pirates presentation
Pirates presentationPirates presentation
Pirates presentation
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Space mouse[1]
Space mouse[1]Space mouse[1]
Space mouse[1]
 
Software Piracy
Software PiracySoftware Piracy
Software Piracy
 
Credit card fraud detection methods using Data-mining.pptx (2)
Credit card fraud detection methods using Data-mining.pptx (2)Credit card fraud detection methods using Data-mining.pptx (2)
Credit card fraud detection methods using Data-mining.pptx (2)
 
Safety of women
Safety of womenSafety of women
Safety of women
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detection
 
Latest rbi ppt
Latest rbi pptLatest rbi ppt
Latest rbi ppt
 
Are women safe in India . . .
Are women safe in India . . .Are women safe in India . . .
Are women safe in India . . .
 
Women safety in india
Women safety in indiaWomen safety in india
Women safety in india
 
Digital Media Piracy
Digital Media PiracyDigital Media Piracy
Digital Media Piracy
 

Similar to Multimedia digital piracy

Copyright Presention
Copyright PresentionCopyright Presention
Copyright PresentionDavina Thorne
 
Copyright Presention
Copyright PresentionCopyright Presention
Copyright PresentionDavina Thorne
 
Movie Piracy and its Consequences.pdf
Movie Piracy and its Consequences.pdfMovie Piracy and its Consequences.pdf
Movie Piracy and its Consequences.pdfParshant Kumar
 
On Creativity, Copyrights and Commerce
On Creativity, Copyrights  and CommerceOn Creativity, Copyrights  and Commerce
On Creativity, Copyrights and CommerceAdelphi Consulting
 
Copyright in video
Copyright in videoCopyright in video
Copyright in videoBob182003
 
Copyright infringement
Copyright infringementCopyright infringement
Copyright infringementwcudsce
 
Piracy and infringement
Piracy and infringement Piracy and infringement
Piracy and infringement HHSome
 
Music Business and Copyright Toronto 2015
Music Business and Copyright Toronto 2015Music Business and Copyright Toronto 2015
Music Business and Copyright Toronto 2015Kristin Thomson
 
Getting Smart About Intellectual Property
Getting Smart About Intellectual PropertyGetting Smart About Intellectual Property
Getting Smart About Intellectual PropertyGian Fiero
 
CA 260 SOPA and PIPA presentation
CA 260 SOPA and PIPA presentationCA 260 SOPA and PIPA presentation
CA 260 SOPA and PIPA presentationeam704
 
Great ideas in music distribution
Great ideas in music distributionGreat ideas in music distribution
Great ideas in music distributionKristin Thomson
 
Copyright And Intellectual Property Are Still Valid
Copyright And Intellectual Property Are Still ValidCopyright And Intellectual Property Are Still Valid
Copyright And Intellectual Property Are Still ValidLeslie Lee
 
Piracypowerpoint
PiracypowerpointPiracypowerpoint
Piracypowerpointrockinmole
 

Similar to Multimedia digital piracy (20)

Music Piracy
Music PiracyMusic Piracy
Music Piracy
 
Copyright Presention
Copyright PresentionCopyright Presention
Copyright Presention
 
Copyright Presention
Copyright PresentionCopyright Presention
Copyright Presention
 
Movie Piracy and its Consequences.pdf
Movie Piracy and its Consequences.pdfMovie Piracy and its Consequences.pdf
Movie Piracy and its Consequences.pdf
 
Music piracy
Music piracyMusic piracy
Music piracy
 
Copyrightbonneversion
CopyrightbonneversionCopyrightbonneversion
Copyrightbonneversion
 
On Creativity, Copyrights and Commerce
On Creativity, Copyrights  and CommerceOn Creativity, Copyrights  and Commerce
On Creativity, Copyrights and Commerce
 
What is Copyright?
What is Copyright?What is Copyright?
What is Copyright?
 
Copyright in video
Copyright in videoCopyright in video
Copyright in video
 
Copyright 2012
Copyright 2012Copyright 2012
Copyright 2012
 
Copyright infringement
Copyright infringementCopyright infringement
Copyright infringement
 
Piracy and infringement
Piracy and infringement Piracy and infringement
Piracy and infringement
 
Music Business and Copyright Toronto 2015
Music Business and Copyright Toronto 2015Music Business and Copyright Toronto 2015
Music Business and Copyright Toronto 2015
 
Getting Smart About Intellectual Property
Getting Smart About Intellectual PropertyGetting Smart About Intellectual Property
Getting Smart About Intellectual Property
 
CA 260 SOPA and PIPA presentation
CA 260 SOPA and PIPA presentationCA 260 SOPA and PIPA presentation
CA 260 SOPA and PIPA presentation
 
Great ideas in music distribution
Great ideas in music distributionGreat ideas in music distribution
Great ideas in music distribution
 
Copyright and Technology
Copyright and TechnologyCopyright and Technology
Copyright and Technology
 
Copyright.pptx
Copyright.pptxCopyright.pptx
Copyright.pptx
 
Copyright And Intellectual Property Are Still Valid
Copyright And Intellectual Property Are Still ValidCopyright And Intellectual Property Are Still Valid
Copyright And Intellectual Property Are Still Valid
 
Piracypowerpoint
PiracypowerpointPiracypowerpoint
Piracypowerpoint
 

Recently uploaded

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 

Multimedia digital piracy

  • 2. Introduction To Digital Piracy • What is Piracy? “Unauthorised copying of software, music or films, so-called digital piracy” While there are definitions of “pirated copyright goods”, there is currently no specific legal definition of digital piracy, which would be more accurately described as “digital infringement of copyright”.
  • 3. What Is Copyright? • Copyright is a legal concept, enacted by most governments, giving the creator of an original work exclusive rights to it, usually for a limited time, with the intention of enabling the creator of intellectual wealth (e.g. the photographer of a photograph or the author of a book) to get compensated for their work and be able to financially support themselves. Generally, it is "the right to copy", but also gives the copyright holder the right to be credited for the work.
  • 4. Music Piracy & Video Piracy • Music Piracy For music, it is the copying and distributing of copies of a piece of music for which the composer, recording artist, or copyright holding record company did not give consent. It is a form of copyright infringement(An act that disregards an agreement or a right), which is a crime in many countries.
  • 5. Music Piracy & Video Piracy • Video Piracy Whereas for video piracy, a movie is usually released in several formats and different versions as the primary sources used by a group for a particular movie may vary. Pirated movies are primarily released by these organized groups, commonly referred to as scene groups or warez groups. The first release of a movie is usually of a lower quality due to a lack of sources, but is eventually replaced with higher-quality releases as better sources become available.
  • 6. Consumer VS Producer • Producer at a loss • Producer at benefit • Consumer at a loss • Consumer at benefit
  • 7. Anti-piracy • Antipiracy in India EIPR is the first to put India's excellent copyright and intellectual property rights law to good use, for the benefit of the manufacturers, artists, entertainment industry, software developers scientists intellectuals, creative thinkers, and the nation of India as a whole. Who are EIPR ? EIPR is India's largest investigation agency specialising in anti-counterfeiting solutions.
  • 8. Reasons for Supporting Piracy • • • • • We're only hurting big business. Authors already have a plenty of money. Digital content is too expensive. Everyone else is doing it. We live in a different country so we don't get movies/books/shows until months later.
  • 9. Reasons for Going Against Piracy • • • • Viruses & Malware Good Quality Media Against Law If You are the producer
  • 10. Advantages • Piracy keeps music “alive” • Drives up the sales of legal music • Legal online file-sharing services exist at fair prices and are much safer
  • 11. Disadvantages • People are taking the risk of getting caught and receiving a criminal record when he/she downloads illegally • Free file-sharing sites often transmit viruses • Quality of pirated movies and songs might not be as accurate and précised as compared to original copies
  • 12. APPLICATIONS • Forensics And Piracy Deterrence
  • 13. Forensic watermark • Forensic watermark applications enhance a content owner's ability to detect and respond to misuse of its assets. Forensic watermarking is used not only to gather evidence for criminal proceedings, but also to enforce contractual usage agreements between a content owner and the people or companies with which it shares its content. It provides positive, irrefutable evidence of misuse for leaked content assets.
  • 15. There will still be a fairly equal amount of people who are pirates and non pirates What we can do? We only can do is to get knowledge about piracy and defend ourself from piracy