The paper hosted here discusses the leakage mechanisms for unauthorized copies of major feature films. This paper was presented at TPRC 2003 and at the DRM 2003 workshop at CCS 10 in DC. It will be published in the proceedings of the DRM workshop.
This web page holds further screenshots that show overt evidence of insider leakage of movies. Insider sourced unauthorized copies are important because they are generally far superior to outsider sourced copies in terms of freshness and video quality. Outsider sourced copies tend not to have the combination of freshness and video quality, but may have one or the other. For example this still:
is taken from a potentially outsider leaked copy that hit the Internet at or around the day of cinema release but is very bad video quality compared to most samples we looked at. Specifically this copy was made with a handheld video recording device through air and probably was covertly shot from the side of a cinema judging by the angle the text makes with with the bottom of the image. As a result it is dark, indistinct and an effort to watch.
Often, the evidence that a copy is insider sourced consists of markings present in the copy. The markings involved can be of several different types and can be present in several different ways. Some markings only appear at or before at the start of movie while others can appear and dissappear at any time. Some markings are specifically designed to be a unique watermark and some are just general warnings.
First we show some general warnings that are sometimes found at the start of movies for a few seconds. Every image on this page comes from a small sample of a different unauthorised copy of a movie that appeared in the US Box office top 50 between 1st January 2002 and 27th June 2003. The film buffs among you might like to try and guess the movie that the still is taken from although some are obviously non-trivial, including the first four.
The phrase "For your consideration" and similar sounding text is often
used on copies that are attempting to influence awards judges, and we
note several examples of this type, including these:
A more general use indicated by markers is that of "screener":
Some markers are more vague and simply indicate who the content in
question belongs to:
The following set go to the opposite extreme and have very explicit
instructions on what one is to do upon viewing this content, such as
calling free telephone numbers like (888) 823-2FOX or (800) NO COPYS.
We of course encourage you to obey these instructions at the first
opportunity to do so. We hope more extensive instructions will appear
over time.
Some markers are of a different type altogether. For example many
copies exist with some form of time or frame counter running in the
picture, this is for easy identification of any specific point in the
content during the post-production process and not neccessarily to
mark the copy of the movie itself.
Some markers are unique identifiers of the people to be assumed
responsible for the leakage of a particular content copy, in
otherwords overt watermarks. The people involved in insider leakage
often (and understandably) like to obscure these markers but it is
usually still evident that they were once there. For example the
following screen shot has a counter in shot as well as a blurred out
overt watermark in the top right hand corner.
This image also has a counter and two blurred watermarks, the blurred
regions are on the bottom centre of the picture, they are easier to
spot in the movie itself than in this still.
This image is from a particular unauthorized copy that made the news. It
has black bars that presumably cover two markings on the bottom right:
Finally we note that sometimes an unfinished or otherwise different
copy of the movie may leak out, and there is often evidence in the
copy of this fact. The previous still comes from a copy that shows
evidence of incomplete special effects in other frames. Moving on to
a different movie the following frame shows a boom microphone in shot
at the top that did not appear in the finished film:
In this shot we also see a boom mike in top centre but this copy
also has several other artifacts present in other scenes.
This frame also shows the microphone in top of shot:
There many other hints that the copy might not be the final version but
boom microphones in shot are the easiest to detect in
general. Frequently one would need to view a regular consumer copy of
the movie alongside the suspect copy to find these differences.
We hope you have enjoyed this tour through evidence of successful
insider attacks against the movie industry and will be well equipped
to watch out for it in future with utmost vigilance. The alert
amongst you will already have discovered how to replicate all the
observations made on this page in order to verify our results. We
believe that analyses such as ours that have important consequences
for policy and technology should be verifiable independently and
encourage our readers to partake in this activity.
These are the film titles of the images above in order of appearance.
Red Dragon
Die Another Day The Lord of the Rings: The Two Towers Analyze That Nicholas Nickleby About Schmidt Bowling for Columbine I Am Sam Chicago Gangs of New York The Quiet American Empire Deliver Us From Eva Antwone Fisher Two Weeks Notice Confessions of a Dangerous Mind Cradle 2 the Grave Ali The Rules of Attraction Undercover Brother What a Girl Wants The Lord of the Rings: The Fellowship of the Ring The Good Thief Agent Cody Banks Windtalkers Star Trek: Nemesis City by the Sea Minority Report The Hulk Unfaithful Bruce Almighty Undercover Brother