You still have to deliver the new keys to the clients. As long as the client can decrypt the file, the client can also decrypt and dump it to storage. And if the top pirates keep their methods secret, you can change the keys all you want and not know how they are extracting them each time.