968 results on '"Copy protection"'
Search Results
2. Unclonable Cryptography with Unbounded Collusions and Impossibility of Hyperefficient Shadow Tomography
- Author
-
Çakan, Alper, Goyal, Vipul, Goos, Gerhard, Series Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Boyle, Elette, editor, and Mahmoody, Mohammad, editor
- Published
- 2025
- Full Text
- View/download PDF
3. Data Hiding: Steganography and Watermarking
- Author
-
Mohamed, Khaled Salah and Mohamed, Khaled Salah
- Published
- 2020
- Full Text
- View/download PDF
4. Micropictures for Copy Protection
- Author
-
Safonov, Ilia V., Kurilin, Ilya V., Rychagov, Michael N., Tolstaya, Ekaterina V., Celebi, Emre, Series Editor, Chen, Jingdong, Series Editor, Gopi, E. S., Series Editor, Neustein, Amy, Series Editor, Poor, H. Vincent, Series Editor, Safonov, Ilia V., Kurilin, Ilya V., Rychagov, Michael N., and Tolstaya, Ekaterina V.
- Published
- 2019
- Full Text
- View/download PDF
5. On-the-Fly Microtext Generation
- Author
-
Safonov, Ilia V., Kurilin, Ilya V., Rychagov, Michael N., Tolstaya, Ekaterina V., Celebi, Emre, Series Editor, Chen, Jingdong, Series Editor, Gopi, E. S., Series Editor, Neustein, Amy, Series Editor, Poor, H. Vincent, Series Editor, Safonov, Ilia V., Kurilin, Ilya V., Rychagov, Michael N., and Tolstaya, Ekaterina V.
- Published
- 2019
- Full Text
- View/download PDF
6. Inter‐frame forgery detection and localisation in videos using earth mover's distance metric.
- Author
-
Selvaraj, Priyadharsini and Karuppiah, Muneeswaran
- Abstract
Video forensics is one of the hot topics in multimedia forensics. Nowadays, spreading fake videos across the internet is becoming a profession mainly in politics and entertainment. In this study, a novel two‐stage inter‐frame video forgery detection technique is proposed. The first stage analyses spatio‐temporal feature flow consistency to detect suspicious tamper points. Identifying the type of forgery and validating the recovered video are done in the second stage. Earth mover's distance is used as a similarity metric in both stages. The authors concentrate on a robust inter‐frame forgery detection approach which can be applied for any challenging video. Compression at a higher rate, noise addition, and filtering are the anti‐forensic tricks used by forgers to fool forensic techniques. However, most of the literature in video forgery detection has handled these issues as post‐processing attacks and reported lesser accuracies for it. Hence the authors propose a robust and efficient forgery detection technique capable of identifying all kinds of inter‐frame forgeries in videos. Experimental evaluation of the public video data set shows that the proposed approach outperforms existing approaches with an improved rate of robustness. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
7. The Magnificence of the Disaster: Reconstructing the Sony Bmg Rootkit Incident
- Author
-
Mulligan, Deirdre and Perzanowski, Aaron K.
- Subjects
DRM ,TPM ,copy protection ,HCI-Sec ,rootkit ,copyright ,DMCA ,security - Abstract
Late in 2005, Sony BMG released millions of Compact Discs containing digital rights management technologies that threatened the security of its customers' computers and the integrity of the information infrastructure more broadly. This Article aims to identify the market, technological, and legal factors that appear to have led a presumably rational actor toward a strategy that in retrospect appears obviously and fundamentally misguided.The Article first addresses the market-based rationales that likely influenced Sony BMG's deployment of these DRM systems and reveals that even the most charitable interpretation of Sony BMG's internal strategizing demonstrates a failure to adequately value security and privacy. After taking stock of the then-existing technological environment that both encouraged and enabled the distribution of these protection measures, the Article examines law, the third vector of influence on Sony BMG's decision to release flawed protection measures into the wild, and argues that existing doctrine in the fields of contract, intellectual property, and consumer protection law fails to adequately counter the technological and market forces that allowed a self-interested actor to inflict these harms on the public.The Article concludes with two recommendations aimed at reducing the likelihood of companies deploying protection measures with known security vulnerabilities in the consumer marketplace. First, Congress should alter the Digital Millennium Copyright Act (DMCA) by creating permanent exemptions from its anti-circumvention and antitrafficking provisions that enable security research and the dissemination of tools to remove harmful protection measures. Second, the Federal Trade Commission should leverage insights from the field of human computer interaction security (HCI-Sec) to develop a stronger framework for user control over the security and privacy aspects of computers.
- Published
- 2008
8. Protection
- Author
-
Aycock, John and Aycock, John
- Published
- 2016
- Full Text
- View/download PDF
9. A practical method for watermarking Java programs
- Author
-
Monden, Akito, Iida, Hajimu, Matsumoto, Kenichi, Inoue, Katsuro, Torii, Koji, Monden, Akito, Iida, Hajimu, Matsumoto, Kenichi, Inoue, Katsuro, and Torii, Koji
- Abstract
Java programs distributed through the Internet are now suffering from program theft. This is because Java programs can be easily decomposed into reusable class files and even decompiled into source code by program users. We propose a practical method that discourages program theft by embedding Java programs with a digital watermark. Embedding a program developer's copyright notation as a watermark in Java class files will ensure the legal ownership of class files. Our embedding method is indiscernible by program users, yet enables us to identify an illegal program that contains stolen class files. The result of the experiment to evaluate our method showed most of the watermarks (20 out of 23) embedded in class files survived two kinds of attacks that attempt to erase watermarks: an obfuscactor attack, and a decompile-recompile attack., COMPSAC2000 : 24th Annual International Computer Software and Applications Conference, 25-27 Oct. 2000, Taipei, Taiwan
- Published
- 2023
10. Enhanced copy–paste forgery detection in digital images using scale‐invariant feature transform.
- Author
-
Selvaraj, Priyadharsini and Karuppiah, Muneeswaran
- Abstract
Image forgery detection and localisation is one of the principal problems in digital forensics. Copy–paste forgery in digital images is a type of forgery in which an image region is copied and pasted at another location within the same image. In this work, the authors propose a methodology to detect and localise copy‐pasted regions in images based on scale‐invariant feature transform (SIFT). Existing copy‐paste forgery detection in images using SIFT and clustering techniques such as hierarchical agglomerative and density‐based spatial clustering of applications with noise resulted many false pixel detections. They have introduced sensitivity‐based clustering along with SIFT features to identify copy–pasted pixels and disregard the false pixels. Experimental evaluation on public image datasets MICC‐F220, MICC‐F2000 and MICC‐F8 multi shows that the proposed method is showing improved performance in detecting and localising copy‐paste forgeries in images than the existing works. Also the proposed work detects multiple copy–pasted regions in the images and is robust to attacks such as geometrical transformation of copied regions such as scaling and rotation. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
11. A Comparative Analysis of Watermarking Techniques for Copy Protection of Digital Images
- Author
-
Shukla, Dolley, Sharma, Manisha, Akan, Ozgur, Series editor, Bellavista, Paolo, Series editor, Cao, Jiannong, Series editor, Dressler, Falko, Series editor, Ferrari, Domenico, Series editor, Gerla, Mario, Series editor, Kobayashi, Hisashi, Series editor, Palazzo, Sergio, Series editor, Sahni, Sartaj, Series editor, Shen, Xuemin (Sherman), Series editor, Stan, Mircea, Series editor, Xiaohua, Jia, Series editor, Zomaya, Albert, Series editor, Coulson, Geoffrey, Series editor, Meghanathan, Natarajan, editor, Chaki, Nabendu, editor, and Nagamalai, Dhinaharan, editor
- Published
- 2012
- Full Text
- View/download PDF
12. Protection of Pre-recorded/Recordable Medium
- Author
-
Diehl, Eric and Diehl, Eric
- Published
- 2012
- Full Text
- View/download PDF
13. Deploying Your Application: Android Market and Beyond
- Author
-
Komatineni, Satya, MacLean, Dave, Komatineni, Satya, and MacLean, Dave
- Published
- 2012
- Full Text
- View/download PDF
14. A Behavioral Modeling Approach to Prevent Unauthorized Large-Scale Documents Copying from Digital Libraries
- Author
-
Ivashko, Evgeny E., Nikitina, Natalia N., Cao, Longbing, editor, and Yu, Philip S., editor
- Published
- 2012
- Full Text
- View/download PDF
15. Copy Protection
- Author
-
Bleumer, Gerrit, van Tilborg, Henk C. A., editor, and Jajodia, Sushil, editor
- Published
- 2011
- Full Text
- View/download PDF
16. Deploying Your Application: Android Market and Beyond
- Author
-
Komatineni, Satya, MacLean, Dave, Hashimi, Sayed Y., Komatineni, Satya, MacLean, Dave, and Hashimi, Sayed Y.
- Published
- 2011
- Full Text
- View/download PDF
17. A Copy Protection Technique Using Multi-level Error Coding
- Author
-
Liao, Chen-Yin, Yeh, Jen-Wei, Kao, Ming-Seng, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Dough, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Rhee, Min Surp, editor, and Lee, Byoungcheon, editor
- Published
- 2006
- Full Text
- View/download PDF
18. Copy Protection in Jet Set Willy: developing methodology for retrogame archaeology
- Author
-
John Aycock and Andrew Reinhard
- Subjects
methodology ,video game ,computer game ,technology ,copy protection ,Jet Set Willy ,ZX Spectrum ,reverse engineering ,experimental archaeology ,retrogaming ,Archaeology ,CC1-960 - Abstract
Video games, and more generally computer games, are unquestionably technological artefacts that have cultural significance. Old computer games in particular had to function under technical constraints that would be alien to many modern programmers, while at the same time providing something novel and at first foreign to consumers. How did their creators accomplish their technical feats, and what impact did that have for the player-consumer? The study of 'retro' computer games' implementation is one topic within the nascent area of archaeogaming. Digital rights management (DRM) continues to be a major issue in the protection and distribution of content in electronic form. In this article, we study an early example of the implementation of copy protection in the 1984 game Jet Set Willy, something that comprises both physical and digital artefacts. It acts as a vehicle to illustrate a number of methods that we used to understand game implementation, culminating in a full reconstruction of the technique. The methods we cover include: 'traditional' research, along with its limitations in this context; code and data analysis; hypothesis testing; reconstruction. Through this positivist experimental approach, our results are both independently verifiable and repeatable. We also approach the complex context of early DRM, its hacks and workarounds by the player community, and what precipitated the design choices made for this particular game.
- Published
- 2017
- Full Text
- View/download PDF
19. Upload or Perish: Pirates
- Author
-
Biggs, John and Biggs, John
- Published
- 2004
- Full Text
- View/download PDF
20. Robust Digital Watermarking Techniques for Copyright Protection of Digital Data: A Survey
- Author
-
Shiafali M. Arora, Nidhi Arora, and Poonam Kadian
- Subjects
Authentication ,Computer science ,Data_MISCELLANEOUS ,Digital data ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,020206 networking & telecommunications ,02 engineering and technology ,computer.software_genre ,Computer Science Applications ,Copy protection ,Information hiding ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,Discrete cosine transform ,020201 artificial intelligence & image processing ,Data mining ,Electrical and Electronic Engineering ,computer ,Digital watermarking - Abstract
Digital watermarking has emerged as a potential solution to the copyright protection related issues of digital data. This paper presents key paradigms of research in robust watermarking techniques for copyright protection, copy protection, and authentication of digital multimedia. The main issues that derive research in robust watermarking schemes are imperceptibility, security, and robustness. The purpose of this paper is to provide a gist of robust watermarking schemes in the transform domain with the help of some brief theories proposed in the literature. Frequency transformation techniques such as DCT, DFT, and DWT, RDWT have been the most widely used methods to develop robust watermarking algorithms in the transform domain. The general framework of the watermarking system, recent application areas, characteristics, classification of information hiding methods, and various performance evaluation parameters considered by researchers have also been presented in this review. Broadly, this study reviews and compare performance summary of the several state-of-art robust watermarking methods available. This survey paper will be beneficial for the researchers keen to contribute to the field of robust digital watermarking particularly in the transform domain.
- Published
- 2021
- Full Text
- View/download PDF
21. HLS Based IP Protection of Reusable Cores Using Biometric Fingerprint
- Author
-
Anirban Sengupta and Mahendra Rathor
- Subjects
Hardware security module ,business.industry ,Computer science ,Time to market ,Fingerprint (computing) ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Hardware_PERFORMANCEANDRELIABILITY ,Integrated circuit design ,Copy protection ,Embedded system ,High-level synthesis ,Hardware_INTEGRATEDCIRCUITS ,Hardware acceleration ,System on a chip ,business - Abstract
Reusable Intellectual property (IP) cores are increasingly being integrated in system-on-chips (SoCs) to reduce the SoC design complexity and satisfy the time to market constraint. However, globalization of design supply chain renders the IP cores such as digital signal processer (DSP) hardware accelerators vulnerable to piracy threat. Additionally, integrated circuits (ICs)/ IPs can be fraudulently claimed by a dishonest user. This letter presents a novel biometric fingerprint based hardware security approach using high level synthesis (HLS) framework to safeguard an IC/ IP against false ownership claim and piracy. The proposed approach embeds the IP vendor's biometric fingerprint into a hardware accelerator in the form of secret security constraints. Results show that the proposed approach outperforms a recent approach in terms of enhanced security.
- Published
- 2020
- Full Text
- View/download PDF
22. Analysis of the Sensitivity Attack against Electronic Watermarks in Images
- Author
-
Linnartz, Jean -Paul M. G., van Dijk, Marten, Goos, Gerhard, Series editor, Hartmanis, Juris, Series editor, van Leeuwen, Jan, Series editor, and Aucsmith, David, editor
- Published
- 1998
- Full Text
- View/download PDF
23. Encryption-Then-Compression-Based Copyright Protection Scheme for E-Governance
- Author
-
Amit Singh and Chandan Kumar
- Subjects
Discrete wavelet transform ,Image quality ,business.industry ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,02 engineering and technology ,Encryption ,Huffman coding ,Contourlet ,Computer Science Applications ,Copy protection ,symbols.namesake ,Hardware and Architecture ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,symbols ,Computer vision ,Artificial intelligence ,business ,Digital watermarking ,Software ,Data compression - Abstract
This article discusses a joint encryption-then-compression-based watermarking scheme for copyright protection and content verification in variety of applications. In this scheme, redundant discrete wavelet transform is first performed to decompose the nonsubsampled contourlet transform host image, and then, the singular value decomposition is applied on transformed coefficients of the host image. Furthermore, same procedure is applied for both watermarks (image and PAN No.). The PAN number is encoded by the quick response (QR) code before hiding into the host image. Finally, 2D hyperchaotic encryption is used to encrypt the watermarked image to make our method more secure against attacks. After this, the encrypted image is then compressed via Huffman compression to reduce the size of the image at an acceptable quality of the reconstructed image. Furthermore, performance outcomes confirm better robustness and security of the method while preserving the image quality.
- Published
- 2020
- Full Text
- View/download PDF
24. Technical Fixes for Legal Uncertainty in the 1980s Software Cracking Scene
- Author
-
James A. Hodges
- Subjects
Commercial software ,General Computer Science ,Computer science ,business.industry ,Copyright law ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,Legislature ,Computer security ,computer.software_genre ,Copy protection ,Software ,History and Philosophy of Science ,business ,computer - Abstract
During the 1980s, many software developers and enthusiasts reacted to software's unclear status within the U.S. copyright law by pursuing technical, rather than legislative fixes. This paper applies forensic methods to recover records of conflict between commercial software developers and the enthusiasts who sought to “crack” commercial programs’ copy protection.
- Published
- 2019
- Full Text
- View/download PDF
25. A DSP Based POD Implementation for High Speed Multimedia Communications
- Author
-
Chang Nian Zhang, Hua Li, Nuannuan Zhang, and Jiesheng Xie
- Subjects
point-of-deployment ,DSP ,cellular automata ,copy protection ,ECDSA ,DH key exchange. ,Telecommunication ,TK5101-6720 ,Electronics ,TK7800-8360 - Abstract
In the cable network services, the audio/video entertainment contents should be protected from unauthorized copying, intercepting, and tampering. Point-of-deployment (POD) security module, proposed by OpenCableTM, allows viewers to receive secure cable services such as premium subscription channels, impulse pay-per-view, video-on-demand as well as other interactive services. In this paper, we present a digital signal processor (DSP) (TMS320C6211) based POD implementation for the real-time applications which include elliptic curve digital signature algorithm (ECDSA), elliptic curve Diffie Hellman (ECDH) key exchange, elliptic curve key derivation function (ECKDF), cellular automata (CA) cryptography, communication processes between POD and Host, and Host authentication. In order to get different security levels and different rates of encryption/decryption, a CA based symmetric key cryptography algorithm is used whose encryption/decryption rate can be up to 75 Mbps. The experiment results indicate that the DSP based POD implementation provides high speed and flexibility, and satisfies the requirements of real-time video data transmission.
- Published
- 2002
- Full Text
- View/download PDF
26. ON APPLICATION OF ALGEBRAIC GEOMETRY CODES OF L-CONSTRUCTION IN COPY PROTECTION
- Author
-
Fganu Nii «Specvuzavtomatika», V. V. Mkrtichyan, and D. V. Zagumennov
- Subjects
Algebra ,Copy protection ,Computational Theory and Mathematics ,Computer science ,Applied Mathematics ,Signal Processing ,Discrete Mathematics and Combinatorics ,Algebraic geometry ,Theoretical Computer Science - Published
- 2019
- Full Text
- View/download PDF
27. Secret sharing based watermarking for copy-protection and ownership control of medical Image
- Author
-
Amit Singh and Ashima Anand
- Subjects
Invisibility ,Computer science ,business.industry ,Watermark ,Cryptography ,computer.software_genre ,Secret sharing ,Contourlet ,Copy protection ,Robustness (computer science) ,Data mining ,business ,computer ,Digital watermarking - Abstract
Medical data transmission and sharing, especially during this COVID-19 pandemic period, on the open channel have become more important for remote diagnosis and treatment purpose. However, the alteration and unauthorized distribution of image data has become easier, and thus the big issue of copy-protection and ownership conflicts has attracted more attention for healthcare research community. Further, large amount of confidential and personal medical records is often stored on cloud environments. However, outsourcing medical data possibly brings the great security and privacy issue, since the confidential records are shared to the third party. In this paper, a robust X-Ray image watermarking is proposed by using Non-Subsampled Contourlet Transform (NSCT) and Multiresolution Singular Value Decomposition (MSVD). For watermark embedding, the maximum entropy component of X-Ray carrier image is firstly decomposed using NSCT. Then, low and high frequency details of carrier and mark image is obtained using MSVD. Further, conceal the watermark detail through modifying the detail of carrier image via the suitable factor. Finally, Shamir's (k, n) secret sharing algorithm is employed to obtain secure marked carrier image. Objective evaluations on 200 X-Ray images of COVID-19 patients demonstrate that the proposed algorithm has not only an excellent invisibility but a strong robustness against the various attacks. The results also show that our algorithm outperforms the related image watermarking algorithms, since it is also suitable for applications in the multi-cloud.
- Published
- 2021
- Full Text
- View/download PDF
28. Securing the UNICODE Data transmission on IoT Environment using Hybrid Encryption Scheme (HES)
- Author
-
A.E. Narayanan and Sundarrajan M
- Subjects
S-box ,business.industry ,Computer science ,Data security ,020206 networking & telecommunications ,Cryptography ,02 engineering and technology ,Encryption ,ASCII ,Unicode ,Copy protection ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Electronic data ,business ,Computer network - Abstract
Data Security offers praxis for the protection of the various forms of information. Information is transmitted in various kinds as ASCII textual content, image, video, audio, UNICODE text, and so on. Various algorithms are recommended by different scientists for dealing with copy protection. The current cryptographic algorithms are concentrating on ASCII textual content. Within the electronic data transmission era, a lot of symmetric cryptographic algorithms are unveiled by using S boxes. S box is a crucial part of certain clusters of cryptographic algorithms. A few cryptographic algorithms rely on a fixed S box, which produces insecurity to electronic information. The current S box idea manages ASCII copy just. This particular study newspaper provides the 2 sets of information that are carried out by AMES, the Hardy wall algorithm, the very first class applied to a concealed procedure. The next class was viewed as a method of each embedding as well as encryption. The information within the 2nd class is cut back towards the scope of enough for the modulation procedure, by removing the high-value properties of its then getting rid of them out of the mother's info trend. The procedure for encrypting the 2 sets of information will come in concert with the Hybrid Encryption Scheme (HES) feature. Algorithms have been designed to conceal as well as encrypt 1 as well as 2-dimensional information. Decryption algorithms have been designed to send back encrypted details to the original forms of theirs, as well as buying the imitation information. Results were satisfied with the security level on data transmission and also this scheme has reduced the number of attacks on comparing with various existing algorithms.
- Published
- 2021
- Full Text
- View/download PDF
29. Secure Software Leasing from Standard Assumptions
- Author
-
Ryo Nishimaki, Takashi Yamakawa, and Fuyuki Kitagawa
- Subjects
Scheme (programming language) ,Software_OPERATINGSYSTEMS ,Cryptographic primitive ,business.industry ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Cryptography ,Computer security ,computer.software_genre ,Public-key cryptography ,Copy protection ,ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,Software ,Quantum state ,business ,computer ,Quantum money ,computer.programming_language - Abstract
Secure software leasing (SSL) is a quantum cryptographic primitive that enables an authority to lease software to a user by encoding it into a quantum state. SSL prevents users from generating authenticated pirated copies of leased software, where authenticated copies indicate those run on legitimate platforms. Although SSL is a relaxed variant of quantum copy protection that prevents users from generating any copy of leased softwares, it is still meaningful and attractive. Recently, Ananth and La Placa proposed the first SSL scheme. It satisfies a strong security notion called infinite-term security. On the other hand, it has a drawback that it is based on public key quantum money, which is not instantiated with standard cryptographic assumptions so far. Moreover, their scheme only supports a subclass of evasive functions.
- Published
- 2021
- Full Text
- View/download PDF
30. New Approaches for Quantum Copy-Protection
- Author
-
Scott Aaronson, Jiahui Liu, Mark Zhandry, Qipeng Liu, and Ruizhe Zhang
- Subjects
Copying ,Theoretical computer science ,Heuristic ,Computer science ,TheoryofComputation_GENERAL ,0102 computer and information sciences ,02 engineering and technology ,01 natural sciences ,Oracle ,Obfuscation (software) ,Copy protection ,010201 computation theory & mathematics ,Quantum state ,020204 information systems ,Computer Science::Multimedia ,0202 electrical engineering, electronic engineering, information engineering ,Digital watermarking ,Quantum money ,Computer Science::Cryptography and Security - Abstract
Quantum copy-protection uses the unclonability of quantum states to construct quantum software that provably cannot be pirated. copy-protection would be immensely useful, but unfortunately, little is known about achieving it in general. In this work, we make progress on this goal, by giving the following results: We show how to copy-protect any program that cannot be learned from its input-output behavior relative to a classical oracle. This construction improves on Aaronson (CCC 2009), which achieves the same relative to a quantum oracle. By instantiating the oracle with post-quantum candidate obfuscation schemes, we obtain a heuristic construction of copy-protection. We show, roughly, that any program which can be watermarked can be copy detected, a weaker version of copy-protection that does not prevent copying, but guarantees that any copying can be detected. Our scheme relies on the security of the assumed watermarking, plus the assumed existence of public-key quantum money. Our construction is publicly detectable and applicable to many recent watermarking schemes.
- Published
- 2021
- Full Text
- View/download PDF
31. Perceptual image hash function via associative memory‐based self‐correcting.
- Author
-
Li, Yuenan, Wang, Dongdong, and Wang, Jingru
- Abstract
Paralleling with the revolutionary development of the Internet, there has been increasing concern about the copyright infringement of digital media. A central problem in copyright protection is to accurately and efficiently identify the illegal copies of copyrighted contents. Perceptual hash function, which summarises the perceptual characteristics of digital media to a short digest, is a low‐cost solution to this problem. Owing to the easy‐to‐manipulate nature of digital media, a major challenge in designing perceptual hash function is to achieve the robustness against distortion. To tackle this problem, an associative memory‐based hash function is introduced. The proposed work repairs the distortions on local image structures via associative memory‐based de‐noising, in the hope of simulating the self‐correcting mechanism in human memory. The shape invariant descriptors of de‐noised structures are then encoded to binary bits. Experimental results confirm that the proposed work outperforms representative algorithms, and it can achieve an equal error rate of 3.30×10−3 in content identification with only 80 bits. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
32. A Novel User-Friendly Automated Framework for FPGA Design Logic Encryption
- Author
-
Guillermo Briceno, Fareena Saqib, Nabila Nan Bousaba, William Halaburda, and Wallace Obey
- Subjects
Hardware security module ,business.industry ,Computer science ,Cryptography ,Integrated circuit design ,Encryption ,Toolchain ,Copy protection ,Logic synthesis ,Embedded system ,Hardware_INTEGRATEDCIRCUITS ,business ,Field-programmable gate array ,Hardware_LOGICDESIGN - Abstract
Hardware security has become an afterthought in the modern IC and FPGA design toolchain. An automated framework for FPGA design logic encryption has been developed that integrates multiple design locking techniques to place IP and user protection at the forethought of chip design.
- Published
- 2020
- Full Text
- View/download PDF
33. Defeating Camcorder Piracy by Temporal Psychovisual Modulation.
- Author
-
Guangtao Zhai and Xiaolin Wu
- Abstract
We present a new video projection technique to defeat camcorder piracy in movie theaters using the newly emerged display paradigm of temporal psychovisual modulation. The technique exploits the difference in image formation mechanisms between human eyes and digital cameras: in the human visual system, images are formed via continuous integration of the light field, whereas digital video acquisition is based on discrete sampling of light sensors. A movie frame is decomposed into multiple so-called shale frames such that, when these shale frames are displayed at a frame rate higher than 60 Hz, the human viewers will experience normal movie presentation without any noticeable artifacts, but the video frames captured by camcorders will contain severe, highly objectionable artifacts, depriving the pirated video contents of any commercial values. [ABSTRACT FROM PUBLISHER]
- Published
- 2014
- Full Text
- View/download PDF
34. Videogames, Consoles and Technological Measures: The Nintendo v PC Box and 9Net Case.
- Author
-
Minero, Gemma
- Subjects
VIDEO game laws ,VIDEO game consoles ,COPYRIGHT of video games ,INTELLECTUAL property ,TECHNOLOGY & law ,EUROPEAN Union law ,LAW ,ACTIONS & defenses (Law) - Abstract
The author discusses the Court of Justice of the European Union's ruling in the 2014 case Nintendo Co. Ltd. and others v. PC Box Srl and 9Net Srl which deals with the legal rights of copyright holders in relation to European Union (EU) intellectual property laws and technological measures to circumvent the copy protection controls that are used in videogames and videogame consoles. EU copyright law is also mentioned. The author argues that videogames are more than mere computer programs.
- Published
- 2014
35. Research on anti plagiarism technology for manuscript washing and false original
- Author
-
Shuwu Zhang, Lidong Xing, Jie Liu, and Lei Chang
- Subjects
Copy protection ,Information retrieval ,Software ,Semantic similarity ,Computer science ,business.industry ,Sentiment analysis ,Profitability index ,Content creation ,Digital economy ,Intellectual property ,business - Abstract
With the rapid development of the digital economy, traffic has become the key to the profitability of self-media, and some self-media use script-washing software to generate pseudo-original content in batches to seek improper benefits, which has seriously damaged the content creation intellectual property ecology. Aiming at the problem that it is difficult to detect pseudo-original manuscripts, this article discusses from a technical level, proposes an anti-plagiarism technology based on the fusion of semantic similarity and emotional tendency, uses topic mining technology to obtain text topic distribution, calculate topic similarity, and uses text representation technology Calculate the semantic similarity of the text, use the sentiment analysis technology to calculate the difference in the emotional tendency of the text, and merge the topic similarity, semantic similarity and emotional tendency to detect plagiarism. The experiment was conducted by collecting data on a public platform. The results show that the accuracy of this method to judge plagiarism is 91.9%, which has certain practical significance in the technical practice of anti-plagiarism.
- Published
- 2020
- Full Text
- View/download PDF
36. Video Game DRM: Analysis and Paradigm Solution
- Author
-
J Karthik, P. P. Amritha, and M. Sethumadhavan
- Subjects
050502 law ,Digital rights management ,Multimedia ,Computer science ,05 social sciences ,ComputingMilieux_PERSONALCOMPUTING ,Copyright infringement ,ComputingMilieux_LEGALASPECTSOFCOMPUTING ,computer.software_genre ,ComputingMilieux_GENERAL ,Copy protection ,Upload ,File sharing ,computer ,Video game ,0505 law - Abstract
Video game piracy is the illegal downloading and sharing of video game content, a type of copyright infringement. It is a major problem faced by video game publishers when selling their games, owing to the ease of downloading games through torrents or DDL websites. Digital Rights Management (DRM) tools are used to hinder piracy. And yet DRM remains a false barrier as crackers invariably break the DRM and release the video game on P2P file sharing platforms and torrent websites within few days of the launch of the video game. This research paper investigates the existing DRM or copy protection methods used in video games and presents new solutions that could be implemented with DRM thereby making the video games harder to crack.
- Published
- 2020
- Full Text
- View/download PDF
37. Editor's Corner
- Author
-
Jr. Dale V. Lally
- Subjects
Copy protection ,Engineering ,business.industry ,Library science ,business - Published
- 2019
- Full Text
- View/download PDF
38. Embedded Security Controller with Copy Protection Chip
- Author
-
Byoung Wook Choi, Raimarius Delgado, Cheonho Lee, and Jaeho Park
- Subjects
Copy protection ,Computer science ,business.industry ,Embedded security ,Embedded system ,Controller (computing) ,Chip ,business - Published
- 2018
- Full Text
- View/download PDF
39. Singular value decomposition and wavelet‐based iris biometric watermarking.
- Author
-
Majumder, Swanirbhar, Jilenkumari Devi, Kharibam, and Sarkar, Subir Kumar
- Abstract
These days, with technological advancement, it is very easy for miscreants to produce illegal multimedia data copies. Various techniques of copyright protection of free data are being developed daily. Digital watermarking is one such technique, where digital embedding of the copyright information/watermark into the data to be protected. The two major ways of doing so are spatial domain and the robust transform domain. In this study, method for watermarking of digital images, with biometric data is presented. The usage of biometric instead of the traditional watermark increases the security of the image data. The biometric used here is iris. After the retinal scan, it is the most unique biometric. In terms of user friendliness in extracting the biometric, it comes after fingerprint and facial scan. The iris biometric template is generated from subject's eye images. The discrete cosine values of templates are extracted through discrete cosine transform and converted to binary code. This binary code is embedded in the singular values of the host image's coefficients generated through wavelet transform. The original image is thus firstly applied with the discrete wavelet transform followed up by the singular value decomposition of the subband coefficients. The algorithm has been tested with popular attacks for analysis of false recognition and rejection of subjects. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
40. THE PROGRESS OF MEDIA TECHNOLOGY IN JAPAN, COLD WAR TO 2011.
- Author
-
WHITE, SHAWN R.
- Subjects
EDUCATIONAL technology ,DIGITAL technology ,MOBILE learning ,HIGH technology - Abstract
The adoption of new technology in Japan, despite its international reputation as a high tech nation and culture has not been a smooth progression, nor has Japan always led the world. There have been leaps forward and times of stagnation. In fact I mean to show how Japan has fallen back and needs to reinvigorate its approach to technology, particularly in regards to education and tablet PCs, an area in which Japan has fallen far behind. In both corporate and government policy, Japan is capable of leaps forward but can get bogged down in a slow and steady incremental approach at times. I will propose a path forward for education media here, a field that is still stuck in paper publishing while most of the world moves into digital. A much more open model based on open principles. (Note; Due to the fast changing nature of this issue, this article includes updated information since the summer 2011 conference in Romania.) [ABSTRACT FROM AUTHOR]
- Published
- 2012
41. Robust Scene-Based Digital Video Watermarking Scheme Using Level-3 DWT: Approach, Evaluation, and Experimentation
- Author
-
Manisha Sharma and Dolley Shukla
- Subjects
Discrete wavelet transform ,business.industry ,Computer science ,Digital video ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Pattern recognition ,Image processing ,Watermark ,02 engineering and technology ,Copy protection ,03 medical and health sciences ,0302 clinical medicine ,0202 electrical engineering, electronic engineering, information engineering ,Jpeg compression ,020201 artificial intelligence & image processing ,Transparency (data compression) ,Artificial intelligence ,Electrical and Electronic Engineering ,business ,Digital watermarking ,030217 neurology & neurosurgery - Abstract
This paper presents a robust digital video-watermarking system for copyright and copy protection. The proposed method applies the combination of discrete wavelet transform (DWT) and scene-change-detector. For better understanding, this approach can be presented in the form of four stages. The first stage is finding the frame where the watermark is to be inserted. The analysis of watermarking using the level-3 decomposition of LL subband withDWTis described in the second stage. Transparency and the robustness have been analyzed under fifteen different attacks in the third stage. Improvement in the robustness and transparency, as compare to watermarking using different levels of LL subband is calculated in terms of the normalized correlation and the structural similarity index in the fourth stage. The experimental result reveal that the proposed method yields the extracted watermark image and watermarked video of good quality and can sustain different image processing, JPEG compression and geometrical attacks. Empirical results prove the improvement in the performance as the decomposition level increases from level-1 to level-3. Comparative analysis with the existing schemes proves the improved robustness, better imperceptibility and the reduced computational time of the proposed scheme.
- Published
- 2018
- Full Text
- View/download PDF
42. Distributed measurement systems - A web system approach: Part 2 [Instrumentation Notes].
- Author
-
Kalicki, A., Makowski, L., Michalski, A., and Staroszczyk, Z.
- Abstract
For pt. 1 see ibid., vol.11, no.2, p.50-56, (2008). This paper provides an explanation of a distributed measurement system based on proprietary software. It describes applications based mainly on free and open source software (FOSS). It is an interesting alternative to proprietary solutions as it offers greater flexibility in software development, better protection of customers' rights, and guaranteed open access to data. FOSS is based on the IEEE standards 1003, also known as POSIX or ISO/IEC 9945. In this paper, it is shown that the same objectives met with proprietary solutions can be achieved with FOSS, if not even better than with proprietary software. [ABSTRACT FROM PUBLISHER]
- Published
- 2008
- Full Text
- View/download PDF
43. Progressive Audio Scrambling in Compressed Domain.
- Author
-
Wei-Qi Yan, Wei-Gang Fu, and Kankanhalli, M.S.
- Abstract
Audio scrambling can be employed to ensure confidentiality in audio distribution. We first describe scrambling for raw audio using the discrete wavelet transform (DWT) first and then focus on MP3 audio scrambling. We perform scrambling based on a set of keys which allows for a set of audio outputs having different qualities. During descrambling, the number of keys provided and the number of rounds of descrambling performed will decide the audio output quality. We also perform scrambling by using multiple keys on the MP3 audio format. With a subset of keys, we can descramble to obtain a low quality audio. However, we can obtain the original quality audio by using all of the keys. Our experiments show that the proposed algorithms are effective, fast, simple to implement while providing flexible control over the progressive quality of the audio output. The security level provided by the scheme is sufficient for protecting MP3 music content. [ABSTRACT FROM PUBLISHER]
- Published
- 2008
- Full Text
- View/download PDF
44. Paired Subimage Matching Watermarking Method on Ordered Dither Images and Its High-Quality Progressive Coding.
- Author
-
Jing-Ming Guo, Soo-Chang Pei, and Hua Lee
- Abstract
In this paper, we present two novel robust methods for embedding watermarks into dithered halftone images. The first method is named paired subimage matching ordered dithering (PSMOD), of which the decoder is provided with a priori information of the original watermark, and the corresponding application is copyright protection. The other method, blind paired subimage matching ordered dithering (BPSMOD), does not require the knowledge of the original watermark, and the main application is secret communication. Both methods utilize the bit and sub-subimage interleaving preprocesses. The experiments show that both techniques are sufficiently robust to guard against the cropping, tampering, and print-and-scan degradation processes, in either B/W or color dithered images. Both techniques are also sufficiently flexible for various levels of embedded capacities. Furthermore, a novel progressive coding scheme is also presented in this paper for the efficient display of dithered images. After the preprocessing of bit-interleaving, this algorithm utilizes the characteristic of reordered image to determine the transmitting order and then progressively reconstructs the dithered image. Moreover, the dithered images are further compressed by lossy and lossless procedures. The experimental results demonstrate high-quality reconstructions while maintaining low transmitted bit rates. [ABSTRACT FROM PUBLISHER]
- Published
- 2008
- Full Text
- View/download PDF
45. Security Strength Measurement for Dongle-Protected Software.
- Author
-
Piazzalunga, U., Salvaneschi, P., Balducci, F., Jacomuzzi, P., and Moroncelli, C.
- Abstract
This article's objective is to develop a model for measuring the security strength of dongle-protected software. We believe such a measure is important because it can attach a clear, simple, and understandable monetization number to security. Dongles are USB keys or small boxes attached to the host parallel port. The copy-protected application interacts with the dongle and progresses its execution only if the dongle answers appropriately. The interaction between the software and the dongle takes place through calls to the dongle API. [ABSTRACT FROM PUBLISHER]
- Published
- 2007
- Full Text
- View/download PDF
46. An Improved Asymmetric Watermarking Scheme Suitable for Copy Protection.
- Author
-
Boato, G., de Natale, F. G. B., and Fontanari, C.
- Subjects
- *
WATERMARKS , *LINEAR algebra , *COPYING , *MATRICES (Mathematics) , *ALGEBRA - Abstract
A major limitation of some recently proposed asymmetric Watermarking techniques based on linear algebra lies in the strong dependence of the watermark on the original image. The present correspondence suggests an alternative scheme that not only is secure against projection attack but also allows the insertion of arbitrary watermarking sequences. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
47. The Boneh-Shaw fingerprinting scheme is better than we thought.
- Author
-
Schaathun, H.G.
- Abstract
Digital fingerprinting is a forensic method against illegal copying. The distributor marks each individual copy with a unique fingerprint. If an illegal copy appears, it can be traced back to one or more guilty pirates due to this fingerprint. To work against a coalition of several pirates, the fingerprinting scheme must be based on a collusion-secure code. This paper addresses binary collusion-secure codes in the setting of Boneh and Shaw (1995/1998). We prove that the Boneh-Shaw scheme is more efficient than originally proven, and we propose adaptations to further improve the scheme. We also point out some differences between our model and others in the literature. [ABSTRACT FROM PUBLISHER]
- Published
- 2006
- Full Text
- View/download PDF
48. Digital rights management.
- Author
-
Subramanya, S.R. and Yi, B.K.
- Abstract
Digital rights management broadly refers to a set of policies, techniques and tools that guide the proper use of digital content. A DRM plays important roles in several processes that are involved in the flow of content. The major functionalities of this DRM system are: packaging of the raw content for easy distribution and tracking, content protection for tamper-proof transmission, delivery of content offline on CDs and DVDs and delivering content on-demand over peer-to-peer networks. Thus a set of standards related to various aspects of DRM are practiced in order to ensure fairness, interoperability and also for the consumer confidence. [ABSTRACT FROM PUBLISHER]
- Published
- 2006
- Full Text
- View/download PDF
49. Digital rights management, spyware, and security.
- Author
-
Felten, E.W. and Halderman, J.A.
- Abstract
In October 2005, Sysinternals' Mark Russinovich discovered a rootkit on his computer, which he later determined stemmed from a Sony-BMG compact disc. In this article, the authors examine the copy-protection software found on those discs and the implications for digital rights management. [ABSTRACT FROM PUBLISHER]
- Published
- 2006
- Full Text
- View/download PDF
50. A Study on the System Development for Automatic Webtoon Download and Feature Registration
- Author
-
Hee-Don Yoon, Ho-Gab Kang, Tae-Hyun Kim, and Seong-Hwan Cho
- Subjects
Copy protection ,System development ,Identification (information) ,Information retrieval ,Feature (computer vision) ,Computer science ,Download ,business.industry ,Computer vision ,Artificial intelligence ,business - Published
- 2017
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.