Once the aforementioned (simple yet often very effective!) methods of securing video content are implemented, more technically advanced roadblocks can be placed to stop individuals a wholesale download of the videos. The first possible roadblock is encryption, for example using AES (Advanced Encryption Standard), of the video file. Encryption involves recoding the video using a mathematical algorithm, so that the file is unreadable both in its storage location as well as during its transmission to a user’s computer. Only when the video file reaches the user’s browser is it decoded and played. Therefore, a user could find a way to download the video file from its storage location but would be unable to view the video without a method to decode it. A further measure would be to break up the video (either encrypted or unencrypted) and send it piece by piece to the user to play. This method of video delivery known as “” complicates. Although online services do exist that can quickly stream the pieces and stitch them together into one file, users may be unaware of or may not trust such services.
Finally, very technical methods are available to attempt to secure streamed video content. These are the types of systems used by video streaming services such as Netflix. Before a user can play a protected video on a site, If the user is not authorized to view the video the decryption process will fail and the DRM service will be notified of an unauthorized attempt to stream a video. Furthermore, the decryption keys used to encode and decode the videos can be changed frequently to prevent a once-authorized user from viewing a video after the user’s license for that video has expired. In fact, since each piece can be individually encrypted, a user whose license expires may be stopped from viewing any remaining pieces of a video in play. Keep in mind though that an authorized user can still view the whole video, and any video viewed on a monitor can be recorded. Many free software applications that are created for legitimate purposes, such as recording computer tutorials, can also be used to capture a video (along with its audio) that is playing on the monitor. There is simply no way to stop this type of recording other than not sharing the video. Therefore, such complex methods of video security should be combined with some of the simpler methods described above.
Content producers have a multitude of choices with which to protect their videos online. As in the physical world, however, there is no perfect way to share content in the digital world without the possibility of unauthorized use. Also, limiting how users can interact with content may inconvenience both your users and you. For example, disallowing the download of your content inconveniences legitimate users who want to watch the video when their internet connections are slow, expensive, or unavailable. Another factor: using a DRM server means your system now relies on a third-party server that you don’t control. If the DRM server is unreachable or unstable, this could cause problems for the functioning of your site and your user’s playback experience. Perhaps most pragmatically, each layer of security added will mean an increase in fixed and/or variable costs. You will thus have to decide what level of protection makes economic sense for your organization.
Despite limitations and costs, there are good reasons for controlling how your video content is viewed online. Limiting who can see what and when may be important to your organization’s business or pedagogical plans. Several side benefits may also result from controlling your content. For example, if you decide on streaming of your video content then the users may be able to manually select their desired video quality and / or allow the player to automatically optimize the playback based on current network performance, so-called “dynamic adaptive streaming.” Therefore, you should balance your users’ experience with safeguarding your intellectual property. If you are an LMS-user or prospective LMS-user with video content to embed, we at Web Courseworks would love to discuss your options with you!
Thank you to David Wipperfurth for the technical review.