48 results on '"Copy protection"'
Search Results
2. Unclonable Cryptography with Unbounded Collusions and Impossibility of Hyperefficient Shadow Tomography
- Author
-
Çakan, Alper, Goyal, Vipul, Goos, Gerhard, Series Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Boyle, Elette, editor, and Mahmoody, Mohammad, editor
- Published
- 2025
- Full Text
- View/download PDF
3. Data Hiding: Steganography and Watermarking
- Author
-
Mohamed, Khaled Salah and Mohamed, Khaled Salah
- Published
- 2020
- Full Text
- View/download PDF
4. Micropictures for Copy Protection
- Author
-
Safonov, Ilia V., Kurilin, Ilya V., Rychagov, Michael N., Tolstaya, Ekaterina V., Celebi, Emre, Series Editor, Chen, Jingdong, Series Editor, Gopi, E. S., Series Editor, Neustein, Amy, Series Editor, Poor, H. Vincent, Series Editor, Safonov, Ilia V., Kurilin, Ilya V., Rychagov, Michael N., and Tolstaya, Ekaterina V.
- Published
- 2019
- Full Text
- View/download PDF
5. On-the-Fly Microtext Generation
- Author
-
Safonov, Ilia V., Kurilin, Ilya V., Rychagov, Michael N., Tolstaya, Ekaterina V., Celebi, Emre, Series Editor, Chen, Jingdong, Series Editor, Gopi, E. S., Series Editor, Neustein, Amy, Series Editor, Poor, H. Vincent, Series Editor, Safonov, Ilia V., Kurilin, Ilya V., Rychagov, Michael N., and Tolstaya, Ekaterina V.
- Published
- 2019
- Full Text
- View/download PDF
6. Inter‐frame forgery detection and localisation in videos using earth mover's distance metric.
- Author
-
Selvaraj, Priyadharsini and Karuppiah, Muneeswaran
- Abstract
Video forensics is one of the hot topics in multimedia forensics. Nowadays, spreading fake videos across the internet is becoming a profession mainly in politics and entertainment. In this study, a novel two‐stage inter‐frame video forgery detection technique is proposed. The first stage analyses spatio‐temporal feature flow consistency to detect suspicious tamper points. Identifying the type of forgery and validating the recovered video are done in the second stage. Earth mover's distance is used as a similarity metric in both stages. The authors concentrate on a robust inter‐frame forgery detection approach which can be applied for any challenging video. Compression at a higher rate, noise addition, and filtering are the anti‐forensic tricks used by forgers to fool forensic techniques. However, most of the literature in video forgery detection has handled these issues as post‐processing attacks and reported lesser accuracies for it. Hence the authors propose a robust and efficient forgery detection technique capable of identifying all kinds of inter‐frame forgeries in videos. Experimental evaluation of the public video data set shows that the proposed approach outperforms existing approaches with an improved rate of robustness. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
7. Protection
- Author
-
Aycock, John and Aycock, John
- Published
- 2016
- Full Text
- View/download PDF
8. A practical method for watermarking Java programs
- Author
-
Monden, Akito, Iida, Hajimu, Matsumoto, Kenichi, Inoue, Katsuro, Torii, Koji, Monden, Akito, Iida, Hajimu, Matsumoto, Kenichi, Inoue, Katsuro, and Torii, Koji
- Abstract
Java programs distributed through the Internet are now suffering from program theft. This is because Java programs can be easily decomposed into reusable class files and even decompiled into source code by program users. We propose a practical method that discourages program theft by embedding Java programs with a digital watermark. Embedding a program developer's copyright notation as a watermark in Java class files will ensure the legal ownership of class files. Our embedding method is indiscernible by program users, yet enables us to identify an illegal program that contains stolen class files. The result of the experiment to evaluate our method showed most of the watermarks (20 out of 23) embedded in class files survived two kinds of attacks that attempt to erase watermarks: an obfuscactor attack, and a decompile-recompile attack., COMPSAC2000 : 24th Annual International Computer Software and Applications Conference, 25-27 Oct. 2000, Taipei, Taiwan
- Published
- 2023
9. Enhanced copy–paste forgery detection in digital images using scale‐invariant feature transform.
- Author
-
Selvaraj, Priyadharsini and Karuppiah, Muneeswaran
- Abstract
Image forgery detection and localisation is one of the principal problems in digital forensics. Copy–paste forgery in digital images is a type of forgery in which an image region is copied and pasted at another location within the same image. In this work, the authors propose a methodology to detect and localise copy‐pasted regions in images based on scale‐invariant feature transform (SIFT). Existing copy‐paste forgery detection in images using SIFT and clustering techniques such as hierarchical agglomerative and density‐based spatial clustering of applications with noise resulted many false pixel detections. They have introduced sensitivity‐based clustering along with SIFT features to identify copy–pasted pixels and disregard the false pixels. Experimental evaluation on public image datasets MICC‐F220, MICC‐F2000 and MICC‐F8 multi shows that the proposed method is showing improved performance in detecting and localising copy‐paste forgeries in images than the existing works. Also the proposed work detects multiple copy–pasted regions in the images and is robust to attacks such as geometrical transformation of copied regions such as scaling and rotation. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
10. Copy Protection in Jet Set Willy: developing methodology for retrogame archaeology
- Author
-
John Aycock and Andrew Reinhard
- Subjects
methodology ,video game ,computer game ,technology ,copy protection ,Jet Set Willy ,ZX Spectrum ,reverse engineering ,experimental archaeology ,retrogaming ,Archaeology ,CC1-960 - Abstract
Video games, and more generally computer games, are unquestionably technological artefacts that have cultural significance. Old computer games in particular had to function under technical constraints that would be alien to many modern programmers, while at the same time providing something novel and at first foreign to consumers. How did their creators accomplish their technical feats, and what impact did that have for the player-consumer? The study of 'retro' computer games' implementation is one topic within the nascent area of archaeogaming. Digital rights management (DRM) continues to be a major issue in the protection and distribution of content in electronic form. In this article, we study an early example of the implementation of copy protection in the 1984 game Jet Set Willy, something that comprises both physical and digital artefacts. It acts as a vehicle to illustrate a number of methods that we used to understand game implementation, culminating in a full reconstruction of the technique. The methods we cover include: 'traditional' research, along with its limitations in this context; code and data analysis; hypothesis testing; reconstruction. Through this positivist experimental approach, our results are both independently verifiable and repeatable. We also approach the complex context of early DRM, its hacks and workarounds by the player community, and what precipitated the design choices made for this particular game.
- Published
- 2017
- Full Text
- View/download PDF
11. Robust Digital Watermarking Techniques for Copyright Protection of Digital Data: A Survey
- Author
-
Shiafali M. Arora, Nidhi Arora, and Poonam Kadian
- Subjects
Authentication ,Computer science ,Data_MISCELLANEOUS ,Digital data ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,020206 networking & telecommunications ,02 engineering and technology ,computer.software_genre ,Computer Science Applications ,Copy protection ,Information hiding ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,Discrete cosine transform ,020201 artificial intelligence & image processing ,Data mining ,Electrical and Electronic Engineering ,computer ,Digital watermarking - Abstract
Digital watermarking has emerged as a potential solution to the copyright protection related issues of digital data. This paper presents key paradigms of research in robust watermarking techniques for copyright protection, copy protection, and authentication of digital multimedia. The main issues that derive research in robust watermarking schemes are imperceptibility, security, and robustness. The purpose of this paper is to provide a gist of robust watermarking schemes in the transform domain with the help of some brief theories proposed in the literature. Frequency transformation techniques such as DCT, DFT, and DWT, RDWT have been the most widely used methods to develop robust watermarking algorithms in the transform domain. The general framework of the watermarking system, recent application areas, characteristics, classification of information hiding methods, and various performance evaluation parameters considered by researchers have also been presented in this review. Broadly, this study reviews and compare performance summary of the several state-of-art robust watermarking methods available. This survey paper will be beneficial for the researchers keen to contribute to the field of robust digital watermarking particularly in the transform domain.
- Published
- 2021
- Full Text
- View/download PDF
12. HLS Based IP Protection of Reusable Cores Using Biometric Fingerprint
- Author
-
Anirban Sengupta and Mahendra Rathor
- Subjects
Hardware security module ,business.industry ,Computer science ,Time to market ,Fingerprint (computing) ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Hardware_PERFORMANCEANDRELIABILITY ,Integrated circuit design ,Copy protection ,Embedded system ,High-level synthesis ,Hardware_INTEGRATEDCIRCUITS ,Hardware acceleration ,System on a chip ,business - Abstract
Reusable Intellectual property (IP) cores are increasingly being integrated in system-on-chips (SoCs) to reduce the SoC design complexity and satisfy the time to market constraint. However, globalization of design supply chain renders the IP cores such as digital signal processer (DSP) hardware accelerators vulnerable to piracy threat. Additionally, integrated circuits (ICs)/ IPs can be fraudulently claimed by a dishonest user. This letter presents a novel biometric fingerprint based hardware security approach using high level synthesis (HLS) framework to safeguard an IC/ IP against false ownership claim and piracy. The proposed approach embeds the IP vendor's biometric fingerprint into a hardware accelerator in the form of secret security constraints. Results show that the proposed approach outperforms a recent approach in terms of enhanced security.
- Published
- 2020
- Full Text
- View/download PDF
13. Encryption-Then-Compression-Based Copyright Protection Scheme for E-Governance
- Author
-
Amit Singh and Chandan Kumar
- Subjects
Discrete wavelet transform ,Image quality ,business.industry ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,02 engineering and technology ,Encryption ,Huffman coding ,Contourlet ,Computer Science Applications ,Copy protection ,symbols.namesake ,Hardware and Architecture ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,symbols ,Computer vision ,Artificial intelligence ,business ,Digital watermarking ,Software ,Data compression - Abstract
This article discusses a joint encryption-then-compression-based watermarking scheme for copyright protection and content verification in variety of applications. In this scheme, redundant discrete wavelet transform is first performed to decompose the nonsubsampled contourlet transform host image, and then, the singular value decomposition is applied on transformed coefficients of the host image. Furthermore, same procedure is applied for both watermarks (image and PAN No.). The PAN number is encoded by the quick response (QR) code before hiding into the host image. Finally, 2D hyperchaotic encryption is used to encrypt the watermarked image to make our method more secure against attacks. After this, the encrypted image is then compressed via Huffman compression to reduce the size of the image at an acceptable quality of the reconstructed image. Furthermore, performance outcomes confirm better robustness and security of the method while preserving the image quality.
- Published
- 2020
- Full Text
- View/download PDF
14. Technical Fixes for Legal Uncertainty in the 1980s Software Cracking Scene
- Author
-
James A. Hodges
- Subjects
Commercial software ,General Computer Science ,Computer science ,business.industry ,Copyright law ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Legislature ,Computer security ,computer.software_genre ,Copy protection ,Software ,History and Philosophy of Science ,business ,computer - Abstract
During the 1980s, many software developers and enthusiasts reacted to software's unclear status within the U.S. copyright law by pursuing technical, rather than legislative fixes. This paper applies forensic methods to recover records of conflict between commercial software developers and the enthusiasts who sought to “crack” commercial programs’ copy protection.
- Published
- 2019
- Full Text
- View/download PDF
15. ON APPLICATION OF ALGEBRAIC GEOMETRY CODES OF L-CONSTRUCTION IN COPY PROTECTION
- Author
-
Fganu Nii «Specvuzavtomatika», V. V. Mkrtichyan, and D. V. Zagumennov
- Subjects
Algebra ,Copy protection ,Computational Theory and Mathematics ,Computer science ,Applied Mathematics ,Signal Processing ,Discrete Mathematics and Combinatorics ,Algebraic geometry ,Theoretical Computer Science - Published
- 2019
- Full Text
- View/download PDF
16. Secret sharing based watermarking for copy-protection and ownership control of medical Image
- Author
-
Amit Singh and Ashima Anand
- Subjects
Invisibility ,Computer science ,business.industry ,Watermark ,Cryptography ,computer.software_genre ,Secret sharing ,Contourlet ,Copy protection ,Robustness (computer science) ,Data mining ,business ,computer ,Digital watermarking - Abstract
Medical data transmission and sharing, especially during this COVID-19 pandemic period, on the open channel have become more important for remote diagnosis and treatment purpose. However, the alteration and unauthorized distribution of image data has become easier, and thus the big issue of copy-protection and ownership conflicts has attracted more attention for healthcare research community. Further, large amount of confidential and personal medical records is often stored on cloud environments. However, outsourcing medical data possibly brings the great security and privacy issue, since the confidential records are shared to the third party. In this paper, a robust X-Ray image watermarking is proposed by using Non-Subsampled Contourlet Transform (NSCT) and Multiresolution Singular Value Decomposition (MSVD). For watermark embedding, the maximum entropy component of X-Ray carrier image is firstly decomposed using NSCT. Then, low and high frequency details of carrier and mark image is obtained using MSVD. Further, conceal the watermark detail through modifying the detail of carrier image via the suitable factor. Finally, Shamir's (k, n) secret sharing algorithm is employed to obtain secure marked carrier image. Objective evaluations on 200 X-Ray images of COVID-19 patients demonstrate that the proposed algorithm has not only an excellent invisibility but a strong robustness against the various attacks. The results also show that our algorithm outperforms the related image watermarking algorithms, since it is also suitable for applications in the multi-cloud.
- Published
- 2021
- Full Text
- View/download PDF
17. Securing the UNICODE Data transmission on IoT Environment using Hybrid Encryption Scheme (HES)
- Author
-
A.E. Narayanan and Sundarrajan M
- Subjects
S-box ,business.industry ,Computer science ,Data security ,020206 networking & telecommunications ,Cryptography ,02 engineering and technology ,Encryption ,ASCII ,Unicode ,Copy protection ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Electronic data ,business ,Computer network - Abstract
Data Security offers praxis for the protection of the various forms of information. Information is transmitted in various kinds as ASCII textual content, image, video, audio, UNICODE text, and so on. Various algorithms are recommended by different scientists for dealing with copy protection. The current cryptographic algorithms are concentrating on ASCII textual content. Within the electronic data transmission era, a lot of symmetric cryptographic algorithms are unveiled by using S boxes. S box is a crucial part of certain clusters of cryptographic algorithms. A few cryptographic algorithms rely on a fixed S box, which produces insecurity to electronic information. The current S box idea manages ASCII copy just. This particular study newspaper provides the 2 sets of information that are carried out by AMES, the Hardy wall algorithm, the very first class applied to a concealed procedure. The next class was viewed as a method of each embedding as well as encryption. The information within the 2nd class is cut back towards the scope of enough for the modulation procedure, by removing the high-value properties of its then getting rid of them out of the mother's info trend. The procedure for encrypting the 2 sets of information will come in concert with the Hybrid Encryption Scheme (HES) feature. Algorithms have been designed to conceal as well as encrypt 1 as well as 2-dimensional information. Decryption algorithms have been designed to send back encrypted details to the original forms of theirs, as well as buying the imitation information. Results were satisfied with the security level on data transmission and also this scheme has reduced the number of attacks on comparing with various existing algorithms.
- Published
- 2021
- Full Text
- View/download PDF
18. Secure Software Leasing from Standard Assumptions
- Author
-
Ryo Nishimaki, Takashi Yamakawa, and Fuyuki Kitagawa
- Subjects
Scheme (programming language) ,Software_OPERATINGSYSTEMS ,Cryptographic primitive ,business.industry ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Cryptography ,Computer security ,computer.software_genre ,Public-key cryptography ,Copy protection ,ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,Software ,Quantum state ,business ,computer ,Quantum money ,computer.programming_language - Abstract
Secure software leasing (SSL) is a quantum cryptographic primitive that enables an authority to lease software to a user by encoding it into a quantum state. SSL prevents users from generating authenticated pirated copies of leased software, where authenticated copies indicate those run on legitimate platforms. Although SSL is a relaxed variant of quantum copy protection that prevents users from generating any copy of leased softwares, it is still meaningful and attractive. Recently, Ananth and La Placa proposed the first SSL scheme. It satisfies a strong security notion called infinite-term security. On the other hand, it has a drawback that it is based on public key quantum money, which is not instantiated with standard cryptographic assumptions so far. Moreover, their scheme only supports a subclass of evasive functions.
- Published
- 2021
- Full Text
- View/download PDF
19. New Approaches for Quantum Copy-Protection
- Author
-
Scott Aaronson, Jiahui Liu, Mark Zhandry, Qipeng Liu, and Ruizhe Zhang
- Subjects
Copying ,Theoretical computer science ,Heuristic ,Computer science ,TheoryofComputation_GENERAL ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Oracle ,Obfuscation (software) ,Copy protection ,010201 computation theory & mathematics ,Quantum state ,020204 information systems ,Computer Science::Multimedia ,0202 electrical engineering, electronic engineering, information engineering ,Digital watermarking ,Quantum money ,Computer Science::Cryptography and Security - Abstract
Quantum copy-protection uses the unclonability of quantum states to construct quantum software that provably cannot be pirated. copy-protection would be immensely useful, but unfortunately, little is known about achieving it in general. In this work, we make progress on this goal, by giving the following results: We show how to copy-protect any program that cannot be learned from its input-output behavior relative to a classical oracle. This construction improves on Aaronson (CCC 2009), which achieves the same relative to a quantum oracle. By instantiating the oracle with post-quantum candidate obfuscation schemes, we obtain a heuristic construction of copy-protection. We show, roughly, that any program which can be watermarked can be copy detected, a weaker version of copy-protection that does not prevent copying, but guarantees that any copying can be detected. Our scheme relies on the security of the assumed watermarking, plus the assumed existence of public-key quantum money. Our construction is publicly detectable and applicable to many recent watermarking schemes.
- Published
- 2021
- Full Text
- View/download PDF
20. Perceptual image hash function via associative memory‐based self‐correcting.
- Author
-
Li, Yuenan, Wang, Dongdong, and Wang, Jingru
- Abstract
Paralleling with the revolutionary development of the Internet, there has been increasing concern about the copyright infringement of digital media. A central problem in copyright protection is to accurately and efficiently identify the illegal copies of copyrighted contents. Perceptual hash function, which summarises the perceptual characteristics of digital media to a short digest, is a low‐cost solution to this problem. Owing to the easy‐to‐manipulate nature of digital media, a major challenge in designing perceptual hash function is to achieve the robustness against distortion. To tackle this problem, an associative memory‐based hash function is introduced. The proposed work repairs the distortions on local image structures via associative memory‐based de‐noising, in the hope of simulating the self‐correcting mechanism in human memory. The shape invariant descriptors of de‐noised structures are then encoded to binary bits. Experimental results confirm that the proposed work outperforms representative algorithms, and it can achieve an equal error rate of 3.30×10−3 in content identification with only 80 bits. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
21. A Novel User-Friendly Automated Framework for FPGA Design Logic Encryption
- Author
-
Guillermo Briceno, Fareena Saqib, Nabila Nan Bousaba, William Halaburda, and Wallace Obey
- Subjects
Hardware security module ,business.industry ,Computer science ,Cryptography ,Integrated circuit design ,Encryption ,Toolchain ,Copy protection ,Logic synthesis ,Embedded system ,Hardware_INTEGRATEDCIRCUITS ,business ,Field-programmable gate array ,Hardware_LOGICDESIGN - Abstract
Hardware security has become an afterthought in the modern IC and FPGA design toolchain. An automated framework for FPGA design logic encryption has been developed that integrates multiple design locking techniques to place IP and user protection at the forethought of chip design.
- Published
- 2020
- Full Text
- View/download PDF
22. Research on anti plagiarism technology for manuscript washing and false original
- Author
-
Shuwu Zhang, Lidong Xing, Jie Liu, and Lei Chang
- Subjects
Copy protection ,Information retrieval ,Software ,Semantic similarity ,Computer science ,business.industry ,Sentiment analysis ,Profitability index ,Content creation ,Digital economy ,Intellectual property ,business - Abstract
With the rapid development of the digital economy, traffic has become the key to the profitability of self-media, and some self-media use script-washing software to generate pseudo-original content in batches to seek improper benefits, which has seriously damaged the content creation intellectual property ecology. Aiming at the problem that it is difficult to detect pseudo-original manuscripts, this article discusses from a technical level, proposes an anti-plagiarism technology based on the fusion of semantic similarity and emotional tendency, uses topic mining technology to obtain text topic distribution, calculate topic similarity, and uses text representation technology Calculate the semantic similarity of the text, use the sentiment analysis technology to calculate the difference in the emotional tendency of the text, and merge the topic similarity, semantic similarity and emotional tendency to detect plagiarism. The experiment was conducted by collecting data on a public platform. The results show that the accuracy of this method to judge plagiarism is 91.9%, which has certain practical significance in the technical practice of anti-plagiarism.
- Published
- 2020
- Full Text
- View/download PDF
23. Video Game DRM: Analysis and Paradigm Solution
- Author
-
J Karthik, P. P. Amritha, and M. Sethumadhavan
- Subjects
050502 law ,Digital rights management ,Multimedia ,Computer science ,05 social sciences ,ComputingMilieux_PERSONALCOMPUTING ,Copyright infringement ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,computer.software_genre ,ComputingMilieux_GENERAL ,Copy protection ,Upload ,File sharing ,computer ,Video game ,0505 law - Abstract
Video game piracy is the illegal downloading and sharing of video game content, a type of copyright infringement. It is a major problem faced by video game publishers when selling their games, owing to the ease of downloading games through torrents or DDL websites. Digital Rights Management (DRM) tools are used to hinder piracy. And yet DRM remains a false barrier as crackers invariably break the DRM and release the video game on P2P file sharing platforms and torrent websites within few days of the launch of the video game. This research paper investigates the existing DRM or copy protection methods used in video games and presents new solutions that could be implemented with DRM thereby making the video games harder to crack.
- Published
- 2020
- Full Text
- View/download PDF
24. Editor's Corner
- Author
-
Jr. Dale V. Lally
- Subjects
Copy protection ,Engineering ,business.industry ,Library science ,business - Published
- 2019
- Full Text
- View/download PDF
25. Embedded Security Controller with Copy Protection Chip
- Author
-
Byoung Wook Choi, Raimarius Delgado, Cheonho Lee, and Jaeho Park
- Subjects
Copy protection ,Computer science ,business.industry ,Embedded security ,Embedded system ,Controller (computing) ,Chip ,business - Published
- 2018
- Full Text
- View/download PDF
26. Robust Scene-Based Digital Video Watermarking Scheme Using Level-3 DWT: Approach, Evaluation, and Experimentation
- Author
-
Manisha Sharma and Dolley Shukla
- Subjects
Discrete wavelet transform ,business.industry ,Computer science ,Digital video ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Pattern recognition ,Image processing ,Watermark ,02 engineering and technology ,Copy protection ,03 medical and health sciences ,0302 clinical medicine ,0202 electrical engineering, electronic engineering, information engineering ,Jpeg compression ,020201 artificial intelligence & image processing ,Transparency (data compression) ,Artificial intelligence ,Electrical and Electronic Engineering ,business ,Digital watermarking ,030217 neurology & neurosurgery - Abstract
This paper presents a robust digital video-watermarking system for copyright and copy protection. The proposed method applies the combination of discrete wavelet transform (DWT) and scene-change-detector. For better understanding, this approach can be presented in the form of four stages. The first stage is finding the frame where the watermark is to be inserted. The analysis of watermarking using the level-3 decomposition of LL subband withDWTis described in the second stage. Transparency and the robustness have been analyzed under fifteen different attacks in the third stage. Improvement in the robustness and transparency, as compare to watermarking using different levels of LL subband is calculated in terms of the normalized correlation and the structural similarity index in the fourth stage. The experimental result reveal that the proposed method yields the extracted watermark image and watermarked video of good quality and can sustain different image processing, JPEG compression and geometrical attacks. Empirical results prove the improvement in the performance as the decomposition level increases from level-1 to level-3. Comparative analysis with the existing schemes proves the improved robustness, better imperceptibility and the reduced computational time of the proposed scheme.
- Published
- 2018
- Full Text
- View/download PDF
27. A Study on the System Development for Automatic Webtoon Download and Feature Registration
- Author
-
Hee-Don Yoon, Ho-Gab Kang, Tae-Hyun Kim, and Seong-Hwan Cho
- Subjects
Copy protection ,System development ,Identification (information) ,Information retrieval ,Feature (computer vision) ,Computer science ,Download ,business.industry ,Computer vision ,Artificial intelligence ,business - Published
- 2017
- Full Text
- View/download PDF
28. Digital movies tracking using scene-based watermarking system
- Author
-
Dolley Shukla and Manisha Sharma
- Subjects
Discrete wavelet transform ,watermarking ,video ,piracy ,copy protection ,Computer science ,business.industry ,020208 electrical & electronic engineering ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,020206 networking & telecommunications ,Watermark ,02 engineering and technology ,Copy protection ,Robustness (computer science) ,0202 electrical engineering, electronic engineering, information engineering ,Bit error rate ,Computer vision ,Noise (video) ,Artificial intelligence ,Electrical and Electronic Engineering ,business ,Digital watermarking ,Change detection - Abstract
Digital watermarking can be used to prevent the illegal piracy of copyrighted digital video content. However to be successful as one of the application in the digital cinema, it must be imperceptibly embedded, reliably retrieved, secure against illicit removal. This paper proposes a novel watermarking technique for digital motion content in light of scene change detection using the discrete wavelet transform (DWT). To reduce the computational time, a watermark has been embedded in scene-changed frame. The scene-changed frames are detected by successive estimation of statistical measure technique, where the correlation is utilized as a measure. The performance of the proposed system has been analyzed using the mean square error, normalized correlation, bit error rate, and the similarity index. Empirical results reveal that the proposed method is greatly improved in comparison with the customary techniques in terms of the imperceptibility, recovery after the show capture with camcorder, speed and robustness under various attacks, such as the noise addition, Gaussian low pass filtering, geometrical shift, sharpening, and video attacks in the application of digital cinema. Since an illegal copy of the movie obtained by camcorder affects the geometrical features, in particular, the system has been tested and found to be resilient against geometrical attacks under various conditions.
- Published
- 2019
29. A survey of color image watermarking: State-of-the-art and research directions
- Author
-
Dhiran Kumar Mahto and Amit Singh
- Subjects
Authentication ,Information retrieval ,General Computer Science ,business.industry ,Computer science ,020206 networking & telecommunications ,02 engineering and technology ,Field (computer science) ,Copy protection ,Color image watermarking ,Control and Systems Engineering ,0202 electrical engineering, electronic engineering, information engineering ,Embedding ,020201 artificial intelligence & image processing ,State (computer science) ,Electrical and Electronic Engineering ,Internet of Things ,business ,Digital watermarking - Abstract
Color image watermarking has achieved great success in various applications such as copy protection, content authentication, tamper detection and recovery, etc. The present paper provides a detailed overview of watermarking along with its characteristics, evaluation metrics, and current applications. We then provide a comprehensive survey of different approaches along with their merits and limitations. Furthermore, we summarize each of the approaches in detail, including objectives, goals, embedding location, evaluation metrics, and weaknesses, and discuss recent challenges and their possible solutions. We believe this paper will provide readers with comprehensive insight into the field of watermarking research.
- Published
- 2021
- Full Text
- View/download PDF
30. The Effect of Piracy and Digital Rights Management on Vertically Related Content Industries
- Author
-
Sang Hoo Bae, Kyeongwon Yoo, and Myungsup Kim
- Subjects
Upstream (petroleum industry) ,Economics and Econometrics ,Digital rights management ,business.industry ,05 social sciences ,Control (management) ,Distribution (economics) ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Intellectual property ,Business model ,Copy protection ,0502 economics and business ,Business ,050207 economics ,Industrial organization ,050205 econometrics ,Downstream (petroleum industry) - Abstract
The purpose of this paper is to investigate how digitalization affects vertically related content industries with the threat of piracy. We construct a model of vertical relationship where an upstream [a downstream] firm is considered as a content provider [a retailer]. Three business models are proposed depending on who has the right to implement digital rights management (DRM): a vertically-integrated entity, an upstream, and a downstream. First, we analyze how different modes of control on DRM affect the optimal prices and the level of copy protection. The results are dependent upon the different control modes of DRM and the degree of opportunistic behavior responding to increasing piracy costs. Second, we analyze the effect of two types of piracy depending on distribution channels (non-digital versus digital). Strengthening intellectual property rights (IPR) protection results in a price hike for both cases, while we have opposite changes in quantities depending on the types of piracy.
- Published
- 2017
- Full Text
- View/download PDF
31. Digital movies tracking using scene-based watermarking system
- Author
-
Shukla, Dolley, Sharma, Manisha, Shukla, Dolley, and Sharma, Manisha
- Abstract
Digital watermarking can be used to prevent the illegal piracy of copyrighted digital video content. However to be successful as one of the application in the digital cinema, it must be imperceptibly embedded, reliably retrieved, secure against illicit removal. This paper proposes a novel watermarking technique for digital motion content in light of scene change detection using the discrete wavelet transform (DWT). To reduce the computational time, a watermark has been embedded in scene-changed frame. The scene-changed frames are detected by successive estimation of statistical measure technique, where the correlation is utilized as a measure. The performance of the proposed system has been analyzed using the mean square error, normalized correlation, bit error rate, and the similarity index. Empirical results reveal that the proposed method is greatly improved in comparison with the customary techniques in terms of the imperceptibility, recovery after the show capture with camcorder, speed and robustness under various attacks, such as the noise addition, Gaussian low pass filtering, geometrical shift, sharpening, and video attacks in the application of digital cinema. Since an illegal copy of the movie obtained by camcorder affects the geometrical features, in particular, the system has been tested and found to be resilient against geometrical attacks under various conditions.
- Published
- 2019
32. Labelling additively manufactured parts by microstructural gradation – advanced copy-proof design
- Author
-
W. Reimche, Dieter Schwarze, Stefan Leuders, Andre Riemer, Hans Jürgen Maier, Mirko Schaper, Thomas Niendorf, and Florian Brenne
- Subjects
Materials science ,business.industry ,Mechanical Engineering ,Mechanical engineering ,02 engineering and technology ,Texture (music) ,021001 nanoscience & nanotechnology ,Microstructure ,Industrial and Manufacturing Engineering ,020501 mining & metallurgy ,law.invention ,Copy protection ,0205 materials engineering ,law ,Nondestructive testing ,Eddy current ,Laser power scaling ,Selective laser melting ,0210 nano-technology ,Material properties ,business - Abstract
Purpose As additive manufacturing techniques, such as selective laser melting, allow for straightforward production of parts on basis of simple computer-aided design files only, unauthorized replication can be facilitated. Thus, identification and tracking of individual parts are increasingly vital in light of globalized competition. This paper aims to overcome the susceptibility of additive manufacturing techniques for product piracy by establishing a method for introducing and reading out product identification markers not visible by naked-eye inspection. Design/methodology/approach Lasers of different nominal power were used for altering the solidification mechanisms during processing in distinct areas of the samples. The resulting local microstructural characteristics and mechanical properties, respectively, were determined by scanning electron microscopy and hardness measurements. The applicability of an advanced eddy current technique for reading out local differences in electro-magnetic properties was examined. Findings The findings show that distinct microstructural features are obtained in dependence of the locally applied laser power. These features manifest themselves not only in terms of grain morphology, texture and hardness but also induce changes in the local electro-magnetic properties. The inscribed pattern can be non-destructively visualized by using an advanced eddy current technique. Originality/value Conventional copy protection basically consists in supplementary labelling or surface modification. In the present study, a new method is proposed for additively manufactured parts, overcoming the drawbacks of the former methods through process-induced microstructure manipulation. Slight alterations in the electro-magnetic material properties can be detected by advanced eddy current method allowing for identification of arbitrary and inimitable component information in additively manufactured parts.
- Published
- 2016
- Full Text
- View/download PDF
33. A Study on Integrated Identification System of Scanned Cartoons and Copyrighted Books
- Author
-
Seong-Hwan Cho, Tae-Hyun Kim, Ho-Gap Kang, and Hee-Don Yoon
- Subjects
Identification technology ,Multimedia ,Computer science ,business.industry ,02 engineering and technology ,Comics ,computer.software_genre ,Identification system ,Copy protection ,Identification (information) ,0202 electrical engineering, electronic engineering, information engineering ,Damages ,020201 artificial intelligence & image processing ,business ,computer - Abstract
This study aims to develop sound ecosystem of scanned cartoons and books through the effective identification technology developed as a part of the project granted from the Korea Copyright Commission (Project title: Identification and Copy Protection Technology of Scanned Text/Comic Books). This study shows a model integrating the scanned book identification system with the existing system that identifies scanned cartoons. The model suggested in this study is expected to give a help in reducing the author`s damages due to the indiscriminate illegal reproduction, which tends to expand with high quality scanners and editing softwares.
- Published
- 2016
- Full Text
- View/download PDF
34. Safe and Policy Oriented Secure Android-Based Industrial Embedded Control System
- Author
-
Byoung Wook Choi, Cheonho Lee, Jaeho Park, and Raimarius Delgado
- Subjects
safety ,Operability ,Computer science ,real-time ,02 engineering and technology ,Security policy ,Computer security ,computer.software_genre ,lcsh:Technology ,lcsh:Chemistry ,0202 electrical engineering, electronic engineering, information engineering ,General Materials Science ,Android (operating system) ,lcsh:QH301-705.5 ,Instrumentation ,Fluid Flow and Transfer Processes ,lcsh:T ,industrial control systems ,Process Chemistry and Technology ,020208 electrical & electronic engineering ,General Engineering ,020206 networking & telecommunications ,EtherCAT ,Industrial control system ,lcsh:QC1-999 ,Computer Science Applications ,policy oriented security ,Copy protection ,lcsh:Biology (General) ,lcsh:QD1-999 ,lcsh:TA1-2040 ,Control system ,lcsh:Engineering (General). Civil engineering (General) ,android ,computer ,lcsh:Physics ,Booting - Abstract
Android is gaining popularity as the operating system of embedded systems and recent demands of its application on industrial control are steadily increasing. However, its feasibility is still in question due to two major drawbacks: safety and security. In particular, ensuring the safe operation of industrial control systems requires the system to be governed by stringent temporal constraints and should satisfy real-time requirements. In this sense, we explore the real-time characteristics of Xenomai to guarantee strict temporal deadlines, and provide a viable method integrating Android processes to real-time tasks. Security is another issue that affects safety due to the increased connectivity in industrial systems provoking a higher risk of cyber and hardware attacks. Herein, we adopted a hardware copy protection chip and enforced administrative security policies in the booting process and the Android application layer. These policies ensure that the developed system is protected from physical tampering and unwanted Android applications. The articulacy of the administrative policies is demonstrated through experiments. The developed embedded system is connected to an industrial EtherCAT motion device network exhibiting operability on an actual industrial application. Real-time performance was evaluated in terms of schedulability and responsiveness, which are critical in determining the safety and reliability of the control system.
- Published
- 2020
- Full Text
- View/download PDF
35. A Study on Content Protection Framework for E-Book DRM-Agnostic based on Readium SDK
- Author
-
Ho-Gab Kang, Tae-Hyun Kim, Hui-Don Yun, and Seong-Hwan Cho
- Subjects
Copy protection ,Computer science ,Interoperability ,Operating system ,Interlock ,Computer security ,computer.software_genre ,computer - Abstract
In order to guarantee the compatibility of e-Book viewers based on EPUB 3, IDPF launched Readium SDK v1.0 in January, 2015, which was followed by research on the implementation of Readium LCP specifications for user-friendly DRM functions. The complexity of the Readium SDK, however, makes difficulties in interlocking Readium SDK with LCP modules. Moreover, from the perspective of the Readium SDK, which tries to maintain the architecture, independently of any specific DRM technologies, the strong interlock with LCP, as a one DRM, is not desirable. This study represents a Content Protection Framework Model for compatibility of Readium-SDK-based e-Book DRM in order to hide the complexity of Readium SDK and implement an easy interlock between plural DRM and Readium SDK.
- Published
- 2016
- Full Text
- View/download PDF
36. On the Political Economy of Copy Protection
- Author
-
Stefan Meretz
- Subjects
Copy protection ,Political economy ,Business - Published
- 2015
- Full Text
- View/download PDF
37. A Study on Identification System for Abnormally Scanned Cartoon Books
- Author
-
Ho-Gab Kang, Tae-Hyun Kim, Hee-Don Yoon, and Seong-Hwan Cho
- Subjects
Copy protection ,Identification (information) ,Identification technology ,Multimedia ,Computer science ,business.industry ,Image identification ,Comics ,business ,computer.software_genre ,computer ,Digital audio ,Identification system - Abstract
In order to solve the problems that fingerprinting technologies and image identification technologies for digital music and videos identification scanned have not yet been enough to identify scanned cartoon books, the copyright project granted from the Korea Copyright Commission(Project title: Identification and Copy Protection Technology of Scanned Text/Comic Books) secured basic solutions for scanned cartoon books. The first result of the research project in 2013 was focused on the identification technology applied to abnormally scanned cartoon books. As subsequent research for the project, studies in the year of 2014 has been to provide solutions to identify cartoon books which abnormally scanned and occurred with transformations and distortions and solutions to protect the system from trials to devitalize functions of the identification system through various attacks. This paper is to propose a model for a system for identifying abnormally scanned cartoon books as a way of enhancing the identification rates for identifying abnormal bookscans and transformation attacks.
- Published
- 2015
- Full Text
- View/download PDF
38. Countermeasures for BadUSB Vulnerability
- Author
-
Jun Choi
- Subjects
Computer science ,Vulnerability management ,USB ,Computer security ,computer.software_genre ,law.invention ,Copy protection ,ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,Countermeasure ,law ,Information leakage ,Malware ,computer ,Vulnerability (computing) ,Hacker - Abstract
To defend against information leakage or malware inflow by USB memory, security technologies such as copy protection and device control have being researched and developed. However, countermeasure are insufficient despite being recognized as a fatal security-hole for BadUSB presented at the Black Hat Security Conference 2014. To solve this problem, the countermeasures for BadUSB vulnerability are proposed.
- Published
- 2015
- Full Text
- View/download PDF
39. A Study on eBook DRM interoperability based on IDPF Readium SDK
- Author
-
Seong-Hwan Cho, Tae-Hyun Kim, Hee-Don Yoon, and Ho-Gab Kang
- Subjects
Reference software ,Copy protection ,World Wide Web ,Computer science ,Interoperability - Abstract
In order to secure the compatibility of eBook viewers based on EPUB 3.0, IDPF launched an open project of Readium in February 2012, which supports the standard platform for eBook viewers and the related SDK that can be implemented on different OSs. The current EPUB standard, however, does not provide DRM standards to protect eBook copyrights. Therefore, the compatibility of Readium SDK cannot be secured. Even though the Readium project has tried to design a standard reference software in order to apply DRM independently of EPUB standards, it still does not definitely solve compatibility problems of plural DRMs. This paper suggests a compatibility model based on Readium SDK and ContentMudule technology, in which eBook viewers can work together with plural DRM technology.
- Published
- 2015
- Full Text
- View/download PDF
40. An optical authentication system based on imaging of excitation-selected lanthanide luminescence
- Author
-
Riikka Arppe, Thomas Just Sørensen, Tom Vosch, and Miguel R. Carro-Temboury
- Subjects
Lanthanide ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Hardware_PERFORMANCEANDRELIABILITY ,02 engineering and technology ,010402 general chemistry ,Encryption ,01 natural sciences ,Image (mathematics) ,Condensed Matter::Materials Science ,Software ,Condensed Matter::Superconductivity ,Encoding (memory) ,Computer Science::Multimedia ,Hardware_INTEGRATEDCIRCUITS ,Research Articles ,Computer Science::Cryptography and Security ,Authentication ,Multidisciplinary ,business.industry ,SciAdv r-articles ,021001 nanoscience & nanotechnology ,0104 chemical sciences ,Copy protection ,ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,Applied Sciences and Engineering ,Condensed Matter::Strongly Correlated Electrons ,0210 nano-technology ,business ,Luminescence ,Computer hardware ,Research Article - Abstract
Random patterns of lanthanide(III) ion–doped zeolites were used to create a tamper-proof optical authentication system., Secure data encryption relies heavily on one-way functions, and copy protection relies on features that are difficult to reproduce. We present an optical authentication system based on lanthanide luminescence from physical one-way functions or physical unclonable functions (PUFs). They cannot be reproduced and thus enable unbreakable encryption. Further, PUFs will prevent counterfeiting if tags with unique PUFs are grafted onto products. We have developed an authentication system that comprises a hardware reader, image analysis, and authentication software and physical keys that we demonstrate as an anticounterfeiting system. The physical keys are PUFs made from random patterns of taggants in polymer films on glass that can be imaged following selected excitation of particular lanthanide(III) ions doped into the individual taggants. This form of excitation-selected imaging ensures that by using at least two lanthanide(III) ion dopants, the random patterns cannot be copied, because the excitation selection will fail when using any other emitter. With the developed reader and software, the random patterns are read and digitized, which allows a digital pattern to be stored. This digital pattern or digital key can be used to authenticate the physical key in anticounterfeiting or to encrypt any message. The PUF key was produced with a staggering nominal encoding capacity of 73600. Although the encoding capacity of the realized authentication system reduces to 6 × 10104, it is more than sufficient to completely preclude counterfeiting of products.
- Published
- 2018
- Full Text
- View/download PDF
41. A robust blind 3-D mesh watermarking based on wavelet transform for copyright protection
- Author
-
Driss Aboutajdine, Mohamed El Haziti, Mohamed Hamidi, Hocine Cherifi, LRIT Associated Unit to the CNRST-URAC n◦ 29, Laboratoire de Recherche Informatique et Télécommunications (LRIT), Université Mohammed V de Rabat [Agdal]-Centre National de la Recherche Scientifique et Technologique (CNRST)-Université Mohammed V de Rabat [Agdal]-Centre National de la Recherche Scientifique et Technologique (CNRST), Université Mohammed V de Rabat [Agdal], Laboratoire d'Electronique, d'Informatique et d'Image [EA 7508] (Le2i), Université de Technologie de Belfort-Montbeliard (UTBM)-Université de Bourgogne (UB)-École Nationale Supérieure d'Arts et Métiers (ENSAM), Arts et Métiers Sciences et Technologies, HESAM Université (HESAM)-HESAM Université (HESAM)-Arts et Métiers Sciences et Technologies, and HESAM Université (HESAM)-HESAM Université (HESAM)-AgroSup Dijon - Institut National Supérieur des Sciences Agronomiques, de l'Alimentation et de l'Environnement-Centre National de la Recherche Scientifique (CNRS)
- Subjects
FOS: Computer and information sciences ,0209 industrial biotechnology ,Computer science ,video watermarking ,02 engineering and technology ,Watermarking ,image watermarking ,020901 industrial engineering & automation ,Wavelet ,copy protection ,vectors ,Robustness (computer science) ,Computer Science::Multimedia ,0202 electrical engineering, electronic engineering, information engineering ,wavelet coefficient vectors ,Controlled Indexing ,Computer vision ,Polygon mesh ,Quantization (image processing) ,Robustness ,Digital watermarking ,ComputingMilieux_MISCELLANEOUS ,Computer Science::Cryptography and Security ,Quantization (signal) ,digital watermarking ,business.industry ,copyright ,edge normal norms ,Wavelet transform ,unauthorized users ,Watermark ,Three-dimensional meshes ,Multimedia (cs.MM) ,mesh generation ,wavelet transforms ,synchronizing primitives ,3D semiregular meshes ,Solid modeling ,robust blind 3D mesh watermarking ,020201 artificial intelligence & image processing ,Artificial intelligence ,Laplacian smoothing ,business ,Copyright protection ,[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processing ,Computer Science - Multimedia ,image resolution ,Digital images - Abstract
Nowadays, three-dimensional meshes have been extensively used in several applications such as, industrial, medical, computer-aided design (CAD) and entertainment due to the processing capability improvement of computers and the development of the network infrastructure. Unfortunately, like digital images and videos, 3-D meshes can be easily modified, duplicated and redistributed by unauthorized users. Digital watermarking came up while trying to solve this problem. In this paper, we propose a blind robust watermarking scheme for three-dimensional semiregular meshes for Copyright protection. The watermark is embedded by modifying the norm of the wavelet coefficient vectors associated with the lowest resolution level using the edge normal norms as synchronizing primitives. The experimental results show that in comparison with alternative 3-D mesh watermarking approaches, the proposed method can resist to a wide range of common attacks, such as similarity transformations including translation, rotation, uniform scaling and their combination, noise addition, Laplacian smoothing, quantization, while preserving high imperceptibility., Comment: 6 pages, 3 figures, International Conference on Advanced Technologies for Signal and Image Processing (ATSIP'2017)
- Published
- 2017
- Full Text
- View/download PDF
42. Analysis of techniques involving data hiding and watermarking
- Author
-
Ananthi Sheshasaayee and D Sujatha
- Subjects
0209 industrial biotechnology ,Steganography ,Computer science ,Digital Watermarking Alliance ,business.industry ,Digital data ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Cryptography ,02 engineering and technology ,Computer security ,computer.software_genre ,Copy protection ,Digital image ,020901 industrial engineering & automation ,Information hiding ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,business ,Digital watermarking ,computer - Abstract
In this modern era, storing and transmitting information is by far done as a digital object. But the greatest disadvantage in digital data transmission is the fact that innumerable copies of the digital file can be made and is susceptible to be misused. This leads to the worldwide problem of copyright protection, copy protection and content authentication. Various Steganographic techniques and algorithms have been developed to find a solution to this problem. One such technique is Digital Watermarking. This paper attempts to discuss the various digital watermarking methods and techniques.
- Published
- 2017
- Full Text
- View/download PDF
43. P2P video streaming method with Copy protection based on SDN technology
- Author
-
Takeshi Ogawa, Manato Oishi, and Noriharu Miyaho
- Subjects
Copy protection ,Client–server model ,Video capture ,business.industry ,Computer science ,Reliability (computer networking) ,Server ,Bandwidth (computing) ,business ,Digital watermarking ,Computer network ,Anonymity - Abstract
In recent years, video streaming services based on the client server (C/S) model have become common. When distributed through these services, video files need to be watermarked with a unique ID to identify clients, so as to deter illegal video capturing. However, the download bandwidth at servers limit the number of clients that can view video files simultaneously. With peer-to-peer (P2P) communication, the bandwidth problem can be resolved, but new problems arise. The first is the problem of assigning unique IDs to shared video files, the second is interruption problem of video viewing when the uploadside clients change. and the last is privacy problem of viewing history. In this paper, a novel method, Copy Protecting P2P video streaming (CPPP), is proposed. With this method, more than 10 million unique watermarks can be produced without requiring embedding and re-encoding. By using CPPP, copyright management, reliability and anonymity become feasible in P2P communication. Copy protecting P2P video streaming services, which has not yet been achieved, becomes possible.
- Published
- 2017
- Full Text
- View/download PDF
44. Helping Protect Software Distribution with PSWD
- Author
-
Sergey Goffman, Edi Shmueli, and Yoram Zahavi
- Subjects
Copy protection ,Guard (information security) ,Software ,Fully automated ,Emerging technologies ,business.industry ,Computer science ,Software deployment ,Operating system ,Software distribution ,business ,computer.software_genre ,computer - Abstract
The success of new technologies depends on whether proper usage models can be found to support them. In this paper we present such a model for Intel's Software Guard Extensions (SGX) -- the leveraging of the technology to provide copy protection to software. We describe the system that we architected, designed and implemented, which transforms, in a fully automated manner, off-the-shelve applications into secured versions that run on top of the enclaves. Our system can be delivered as stand-alone, but also as a layer in existing software copy protection stacks.
- Published
- 2016
- Full Text
- View/download PDF
45. Video watermarking using Dyadic filter and Discrete Wavelet Transform
- Author
-
Manisha Sharma and Dolley Shukla
- Subjects
Discrete wavelet transform ,business.industry ,Stationary wavelet transform ,Second-generation wavelet transform ,Data_MISCELLANEOUS ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,020207 software engineering ,Watermark ,02 engineering and technology ,Peak signal-to-noise ratio ,Copy protection ,Wavelet ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Computer vision ,Artificial intelligence ,business ,Digital watermarking ,Mathematics - Abstract
The invisible watermark has many applications including video authentication, copy protection, broadcast monitoring, fingerprinting, enhanced video coding etc. Digital watermarking is a technology used for the copy protection of digital application. In this paper, a blind video watermarking scheme based on discrete wavelet transform (DWT) is proposed. 2-D DWT is performed in each frame of the original video. Then watermark embed into low frequency coefficients i.e. LL sub bands. Frequency sub divisions are performed by using Dyadic filter. To check effectiveness of the watermarked video, Peak Signal to Noise Ratio, Mean Square Error, Normalized Mean Square, Absolute Mean Square Error parameters are used. The designed system's effectiveness is checked and tested using different wavelets.
- Published
- 2016
- Full Text
- View/download PDF
46. Used distance learning technologies
- Author
-
Inna Herasymenko
- Subjects
Class (computer programming) ,Decision support system ,Service (systems architecture) ,Knowledge management ,CAPTCHA ,business.industry ,Computer science ,Distance education ,Educational technology ,Information technology ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,computer.software_genre ,Copy protection ,Engineering management ,business ,computer - Abstract
This article is devoted to the protection of data systems in support of distance learning. Describes various remedies, such as hardware, software, protective transformations, and organizational protection. The key areas that need protection and suggested possible options for their protection, such as a captcha in the registration, protection class IP address and service of the copy protection are analyzed. The proposed remedies undertaken on the example of e-learning course “Information technology analysis, systems” deployed in the system of decision support based on Moodle.
- Published
- 2016
- Full Text
- View/download PDF
47. Digital Right Management for IP Protection
- Author
-
Mario Barbareschi, Jerome Rampon, Lionel Torres, Giorgio Di Natale, Renaud Perillat, Pascal Benoit, Synplicity, ADAptive Computing (ADAC), Laboratoire d'Informatique de Robotique et de Microélectronique de Montpellier (LIRMM), Centre National de la Recherche Scientifique (CNRS)-Université de Montpellier (UM)-Centre National de la Recherche Scientifique (CNRS)-Université de Montpellier (UM), TEST (TEST), Università degli studi di Napoli Federico II, Rampon, J., Perillat, R., Torres, L., Benoit, P., Di Natale, G., and Barbareschi, M.
- Subjects
Engineering ,License ,Physical unclonable function ,0211 other engineering and technologies ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,02 engineering and technology ,Integrated circuit design ,Software license ,Computer security ,computer.software_genre ,Disk formatting ,Hardware ,Software ,Component (UML) ,0202 electrical engineering, electronic engineering, information engineering ,[SPI.NANO]Engineering Sciences [physics]/Micro and nanotechnologies/Microelectronics ,021110 strategic, defence & security studies ,Digital rights management ,business.industry ,Field programmable gate array ,020202 computer hardware & architecture ,Copy protection ,business ,Copyright protection ,computer ,Radiation detector - Abstract
International audience; The Digital Rights Management (DRM) principle is generally well known for the exchange of files (music, video), or software management. Specialized solutions concerning vprofessional software are behind a business called "Software License Managemen". The concept of DRM can be transposed to other areas, in particular to the design of hardware devices. Although the concept of DRM is allowed and widely used in the field of software, this is not the case for Integrated Circuit design (no industrial solutions to date are actually proposed). We propose into this paper a new approach based on a original way to extract Physically Unclonable Function which is at the heart of the DRM proposal.
- Published
- 2015
- Full Text
- View/download PDF
48. Android App copy protection mechanism with semi-trusted loader
- Author
-
Kuo-Yu Tsai
- Subjects
ComputerSystemsOrganization_COMPUTERSYSTEMIMPLEMENTATION ,business.industry ,Computer science ,Download ,Cryptography ,Data_CODINGANDINFORMATIONTHEORY ,computer.file_format ,computer.software_genre ,Encryption ,Copy protection ,Loader ,JAR ,Data_FILES ,Operating system ,Mobile telephony ,Android (operating system) ,business ,computer ,Mobile device - Abstract
In 2014, Tsai et al. propose an Android App copy protection mechanism based on dynamic loading, in which an Android App is composed of an incomplete main App (IMA for short, such as an APK file) file and a separate essential class (SES for short, such as a Jar file)file. After purchasing an App, a mobile user firstly downloads the APK file from the Android market. Then, the mobile user installs the APK file in his/her mobile device. As the mobile user attempts to run the App, the embedded dynamic loading function will download the Jar file from the market and execute dynamic loading for all functionalities. The dynamic loading function will delete the SES file as all functionalities are loaded. However, the mobile user has to download the Jar file every time as he/she wants to execute all functionalities of the Android App. In addition, the dynamic loading function might be replaced with another malicious loading function. In this paper, we propose an Android App Copy protection mechanism with a semi-trusted loader. In our proposed mechanism, an Android App is also composed of an APK file and a Jar file. At the first execution time, the embedded semi-trusted loader will download the encrypted Jar file from the market and the corresponding decryption key for the Jar file. Then, the semi-trusted loader decrypts the Jar file by using the decryption key and executes the loading for all functionalities. After the loading, the semi-trusted loader will delete the decryption key and store the encrypted Jar file in the mobile device. After that, the semi-trusted loader only download the decryption key from the market as the mobile user wants to execute all functionalities of the App.
- Published
- 2015
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.