SlideShare a Scribd company logo
MULTIMEDIA-DIGITAL PIRACY
Introduction To Digital Piracy
• What is Piracy?
“Unauthorised copying of software,
music or films, so-called digital piracy”

While there are definitions of “pirated copyright
goods”, there is currently no specific legal
definition of digital piracy, which would be more
accurately described as “digital infringement of
copyright”.
What Is Copyright?
• Copyright is a legal concept, enacted by most
governments, giving the creator of an original
work exclusive rights to it, usually for a limited
time, with the intention of enabling the creator of
intellectual wealth (e.g. the photographer of a
photograph or the author of a book) to get
compensated for their work and be able to
financially support themselves. Generally, it is
"the right to copy", but also gives the copyright
holder the right to be credited for the work.
Music Piracy & Video Piracy
• Music Piracy
For music, it is the copying and distributing
of copies of a piece of music for which the
composer, recording artist, or copyright
holding record company did not give consent.
It is a form of copyright infringement(An act
that disregards an agreement or a
right), which is a crime in many countries.
Music Piracy & Video Piracy
• Video Piracy
Whereas for video piracy, a movie is
usually released in several formats and
different versions as the primary sources used
by a group for a particular movie may vary.
Pirated movies are primarily released by these
organized groups, commonly referred to as
scene groups or warez groups. The first
release of a movie is usually of a lower quality
due to a lack of sources, but is eventually
replaced with higher-quality releases as better
sources become available.
Consumer VS Producer
• Producer at a loss
• Producer at benefit
• Consumer at a loss
• Consumer at benefit
Anti-piracy
• Antipiracy in India
EIPR is the first to put India's excellent copyright
and intellectual property rights law to good use,
for the benefit of the manufacturers, artists,
entertainment industry, software developers
scientists intellectuals, creative thinkers, and the
nation of India as a whole.
Who are EIPR ?
EIPR is India's largest investigation agency
specialising in anti-counterfeiting solutions.
Reasons for Supporting Piracy
•
•
•
•
•

We're only hurting big business.
Authors already have a plenty of money.
Digital content is too expensive.
Everyone else is doing it.
We live in a different country so we don't get
movies/books/shows until months later.
Reasons for Going Against Piracy
•
•
•
•

Viruses & Malware
Good Quality Media
Against Law
If You are the producer
Advantages
• Piracy keeps music “alive”
• Drives up the sales of legal music
• Legal online file-sharing services exist at fair
prices and are much safer
Disadvantages
• People are taking the risk of getting caught
and receiving a criminal record when he/she
downloads illegally
• Free file-sharing sites often transmit viruses
• Quality of pirated movies and songs might
not be as accurate and précised as compared
to original copies
APPLICATIONS
• Forensics And Piracy Deterrence
Forensic watermark
• Forensic watermark applications enhance a
content owner's ability to detect and respond
to misuse of its assets. Forensic watermarking
is used not only to gather evidence for
criminal proceedings, but also to enforce
contractual usage agreements between a
content owner and the people or companies
with which it shares its content. It provides
positive, irrefutable evidence of misuse for
leaked content assets.
Deterrence Effects
There will still be a fairly equal amount of
people who are pirates and non pirates
What we can do?

We only can do is to get knowledge about
piracy and defend ourself from piracy
Multimedia digital piracy

More Related Content

What's hot

Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
DebrajKarmakar
 
ETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer EthicsETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer Ethics
Michael Heron
 
Digital gaming ppt
Digital gaming pptDigital gaming ppt
Digital gaming ppt
Kerym Escobar
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
shivu1234
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
Rishabh Kataria
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
zahid_ned
 
Social Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case StudiesSocial Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case Studies
Praetorian
 
Définition du piratage des contenus audiovisuel sur Internet
Définition du piratage des contenus audiovisuel sur InternetDéfinition du piratage des contenus audiovisuel sur Internet
Définition du piratage des contenus audiovisuel sur Internet
wallace04
 
Cybercrime
CybercrimeCybercrime
Cybercrime
promit
 
Cyber crime & cyber security 10
Cyber crime & cyber security 10Cyber crime & cyber security 10
Cyber crime & cyber security 10
Sudeshna Biswas
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
Akhil Nadh PC
 
The Future of Communication Technology
The Future of Communication TechnologyThe Future of Communication Technology
The Future of Communication Technology
anpipt01
 
Social networking privacy issues & exposure
Social networking privacy issues & exposureSocial networking privacy issues & exposure
Social networking privacy issues & exposure
LDdsng
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Worklorensr12
 
Cyberspace Usages Challenges And Disputeresolution Ja
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Ja
utkarshjani
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptx
Malu704065
 

What's hot (20)

Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 
ETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer EthicsETHICS01 - Introduction to Computer Ethics
ETHICS01 - Introduction to Computer Ethics
 
Digital gaming ppt
Digital gaming pptDigital gaming ppt
Digital gaming ppt
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Social Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case StudiesSocial Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case Studies
 
Définition du piratage des contenus audiovisuel sur Internet
Définition du piratage des contenus audiovisuel sur InternetDéfinition du piratage des contenus audiovisuel sur Internet
Définition du piratage des contenus audiovisuel sur Internet
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Network security
Network securityNetwork security
Network security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime & cyber security 10
Cyber crime & cyber security 10Cyber crime & cyber security 10
Cyber crime & cyber security 10
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
 
The Future of Communication Technology
The Future of Communication TechnologyThe Future of Communication Technology
The Future of Communication Technology
 
Social networking privacy issues & exposure
Social networking privacy issues & exposureSocial networking privacy issues & exposure
Social networking privacy issues & exposure
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyberspace Usages Challenges And Disputeresolution Ja
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Ja
 
Network Security
Network SecurityNetwork Security
Network Security
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptx
 

Viewers also liked

Software piracy
Software piracySoftware piracy
Software piracy
Ti-Sun
 
Defense Against the Dark Arts of Game Piracy and Cheating
Defense Against the Dark Arts of Game Piracy and CheatingDefense Against the Dark Arts of Game Piracy and Cheating
Defense Against the Dark Arts of Game Piracy and Cheating
Arka Ray
 
Tata steel anti-counterfeiting and anti-piracy
Tata steel   anti-counterfeiting and anti-piracyTata steel   anti-counterfeiting and anti-piracy
Tata steel anti-counterfeiting and anti-piracy
Munish Sudan
 
Software piracy and copyright infringement
Software piracy and copyright infringementSoftware piracy and copyright infringement
Software piracy and copyright infringement
Abby-Gaye Gordon
 
Pirates presentation
Pirates presentationPirates presentation
Pirates presentation
DCobbVt
 
Software piracy
Software piracySoftware piracy
Software piracy
John Pereless
 
Space mouse[1]
Space mouse[1]Space mouse[1]
Software Piracy
Software PiracySoftware Piracy
Software PiracyByerdavi
 
Credit card fraud detection methods using Data-mining.pptx (2)
Credit card fraud detection methods using Data-mining.pptx (2)Credit card fraud detection methods using Data-mining.pptx (2)
Credit card fraud detection methods using Data-mining.pptx (2)
k.surya kumar
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detectionkalpesh1908
 
Are women safe in India . . .
Are women safe in India . . .Are women safe in India . . .
Are women safe in India . . .SD Paul
 
Women safety in india
Women safety in indiaWomen safety in india
Women safety in india
Mahender Mahi
 
Digital Media Piracy
Digital Media PiracyDigital Media Piracy
Digital Media Piracyguesteb94797
 

Viewers also liked (15)

Software piracy
Software piracySoftware piracy
Software piracy
 
Defense Against the Dark Arts of Game Piracy and Cheating
Defense Against the Dark Arts of Game Piracy and CheatingDefense Against the Dark Arts of Game Piracy and Cheating
Defense Against the Dark Arts of Game Piracy and Cheating
 
Tata steel anti-counterfeiting and anti-piracy
Tata steel   anti-counterfeiting and anti-piracyTata steel   anti-counterfeiting and anti-piracy
Tata steel anti-counterfeiting and anti-piracy
 
Software piracy and copyright infringement
Software piracy and copyright infringementSoftware piracy and copyright infringement
Software piracy and copyright infringement
 
Pirates presentation
Pirates presentationPirates presentation
Pirates presentation
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Space mouse[1]
Space mouse[1]Space mouse[1]
Space mouse[1]
 
Software Piracy
Software PiracySoftware Piracy
Software Piracy
 
Credit card fraud detection methods using Data-mining.pptx (2)
Credit card fraud detection methods using Data-mining.pptx (2)Credit card fraud detection methods using Data-mining.pptx (2)
Credit card fraud detection methods using Data-mining.pptx (2)
 
Safety of women
Safety of womenSafety of women
Safety of women
 
Credit card fraud detection
Credit card fraud detectionCredit card fraud detection
Credit card fraud detection
 
Latest rbi ppt
Latest rbi pptLatest rbi ppt
Latest rbi ppt
 
Are women safe in India . . .
Are women safe in India . . .Are women safe in India . . .
Are women safe in India . . .
 
Women safety in india
Women safety in indiaWomen safety in india
Women safety in india
 
Digital Media Piracy
Digital Media PiracyDigital Media Piracy
Digital Media Piracy
 

Similar to Multimedia digital piracy

Music Piracy
Music PiracyMusic Piracy
Music Piracy
guest7e8645
 
Copyright Presention
Copyright PresentionCopyright Presention
Copyright PresentionDavina Thorne
 
Copyright Presention
Copyright PresentionCopyright Presention
Copyright PresentionDavina Thorne
 
Movie Piracy and its Consequences.pdf
Movie Piracy and its Consequences.pdfMovie Piracy and its Consequences.pdf
Movie Piracy and its Consequences.pdf
Parshant Kumar
 
On Creativity, Copyrights and Commerce
On Creativity, Copyrights  and CommerceOn Creativity, Copyrights  and Commerce
On Creativity, Copyrights and Commerce
Adelphi Consulting
 
What is Copyright?
What is Copyright?What is Copyright?
What is Copyright?
Robert Farrow
 
Copyright in video
Copyright in videoCopyright in video
Copyright in video
Bob182003
 
Copyright 2012
Copyright 2012Copyright 2012
Copyright 2012
Rachel Heyes
 
Copyright infringement
Copyright infringementCopyright infringement
Copyright infringement
wcudsce
 
Piracy and infringement
Piracy and infringement Piracy and infringement
Piracy and infringement HHSome
 
Music Business and Copyright Toronto 2015
Music Business and Copyright Toronto 2015Music Business and Copyright Toronto 2015
Music Business and Copyright Toronto 2015
Kristin Thomson
 
Getting Smart About Intellectual Property
Getting Smart About Intellectual PropertyGetting Smart About Intellectual Property
Getting Smart About Intellectual Property
Gian Fiero
 
CA 260 SOPA and PIPA presentation
CA 260 SOPA and PIPA presentationCA 260 SOPA and PIPA presentation
CA 260 SOPA and PIPA presentationeam704
 
Great ideas in music distribution
Great ideas in music distributionGreat ideas in music distribution
Great ideas in music distribution
Kristin Thomson
 
Copyright and Technology
Copyright and TechnologyCopyright and Technology
Copyright and Technology
Nickkisha Farrell
 
Copyright.pptx
Copyright.pptxCopyright.pptx
Copyright.pptx
PawanTiwari672779
 
Copyright And Intellectual Property Are Still Valid
Copyright And Intellectual Property Are Still ValidCopyright And Intellectual Property Are Still Valid
Copyright And Intellectual Property Are Still Valid
Leslie Lee
 

Similar to Multimedia digital piracy (20)

Music Piracy
Music PiracyMusic Piracy
Music Piracy
 
Copyright Presention
Copyright PresentionCopyright Presention
Copyright Presention
 
Copyright Presention
Copyright PresentionCopyright Presention
Copyright Presention
 
Movie Piracy and its Consequences.pdf
Movie Piracy and its Consequences.pdfMovie Piracy and its Consequences.pdf
Movie Piracy and its Consequences.pdf
 
Piracy
PiracyPiracy
Piracy
 
Music piracy
Music piracyMusic piracy
Music piracy
 
Copyrightbonneversion
CopyrightbonneversionCopyrightbonneversion
Copyrightbonneversion
 
On Creativity, Copyrights and Commerce
On Creativity, Copyrights  and CommerceOn Creativity, Copyrights  and Commerce
On Creativity, Copyrights and Commerce
 
What is Copyright?
What is Copyright?What is Copyright?
What is Copyright?
 
Copyright in video
Copyright in videoCopyright in video
Copyright in video
 
Copyright 2012
Copyright 2012Copyright 2012
Copyright 2012
 
Copyright infringement
Copyright infringementCopyright infringement
Copyright infringement
 
Piracy and infringement
Piracy and infringement Piracy and infringement
Piracy and infringement
 
Music Business and Copyright Toronto 2015
Music Business and Copyright Toronto 2015Music Business and Copyright Toronto 2015
Music Business and Copyright Toronto 2015
 
Getting Smart About Intellectual Property
Getting Smart About Intellectual PropertyGetting Smart About Intellectual Property
Getting Smart About Intellectual Property
 
CA 260 SOPA and PIPA presentation
CA 260 SOPA and PIPA presentationCA 260 SOPA and PIPA presentation
CA 260 SOPA and PIPA presentation
 
Great ideas in music distribution
Great ideas in music distributionGreat ideas in music distribution
Great ideas in music distribution
 
Copyright and Technology
Copyright and TechnologyCopyright and Technology
Copyright and Technology
 
Copyright.pptx
Copyright.pptxCopyright.pptx
Copyright.pptx
 
Copyright And Intellectual Property Are Still Valid
Copyright And Intellectual Property Are Still ValidCopyright And Intellectual Property Are Still Valid
Copyright And Intellectual Property Are Still Valid
 

Recently uploaded

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 

Recently uploaded (20)

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 

Multimedia digital piracy

  • 2. Introduction To Digital Piracy • What is Piracy? “Unauthorised copying of software, music or films, so-called digital piracy” While there are definitions of “pirated copyright goods”, there is currently no specific legal definition of digital piracy, which would be more accurately described as “digital infringement of copyright”.
  • 3. What Is Copyright? • Copyright is a legal concept, enacted by most governments, giving the creator of an original work exclusive rights to it, usually for a limited time, with the intention of enabling the creator of intellectual wealth (e.g. the photographer of a photograph or the author of a book) to get compensated for their work and be able to financially support themselves. Generally, it is "the right to copy", but also gives the copyright holder the right to be credited for the work.
  • 4. Music Piracy & Video Piracy • Music Piracy For music, it is the copying and distributing of copies of a piece of music for which the composer, recording artist, or copyright holding record company did not give consent. It is a form of copyright infringement(An act that disregards an agreement or a right), which is a crime in many countries.
  • 5. Music Piracy & Video Piracy • Video Piracy Whereas for video piracy, a movie is usually released in several formats and different versions as the primary sources used by a group for a particular movie may vary. Pirated movies are primarily released by these organized groups, commonly referred to as scene groups or warez groups. The first release of a movie is usually of a lower quality due to a lack of sources, but is eventually replaced with higher-quality releases as better sources become available.
  • 6. Consumer VS Producer • Producer at a loss • Producer at benefit • Consumer at a loss • Consumer at benefit
  • 7. Anti-piracy • Antipiracy in India EIPR is the first to put India's excellent copyright and intellectual property rights law to good use, for the benefit of the manufacturers, artists, entertainment industry, software developers scientists intellectuals, creative thinkers, and the nation of India as a whole. Who are EIPR ? EIPR is India's largest investigation agency specialising in anti-counterfeiting solutions.
  • 8. Reasons for Supporting Piracy • • • • • We're only hurting big business. Authors already have a plenty of money. Digital content is too expensive. Everyone else is doing it. We live in a different country so we don't get movies/books/shows until months later.
  • 9. Reasons for Going Against Piracy • • • • Viruses & Malware Good Quality Media Against Law If You are the producer
  • 10. Advantages • Piracy keeps music “alive” • Drives up the sales of legal music • Legal online file-sharing services exist at fair prices and are much safer
  • 11. Disadvantages • People are taking the risk of getting caught and receiving a criminal record when he/she downloads illegally • Free file-sharing sites often transmit viruses • Quality of pirated movies and songs might not be as accurate and précised as compared to original copies
  • 12. APPLICATIONS • Forensics And Piracy Deterrence
  • 13. Forensic watermark • Forensic watermark applications enhance a content owner's ability to detect and respond to misuse of its assets. Forensic watermarking is used not only to gather evidence for criminal proceedings, but also to enforce contractual usage agreements between a content owner and the people or companies with which it shares its content. It provides positive, irrefutable evidence of misuse for leaked content assets.
  • 15. There will still be a fairly equal amount of people who are pirates and non pirates What we can do? We only can do is to get knowledge about piracy and defend ourself from piracy