8,153 research outputs found

    Implementing a Copyright Management System

    Get PDF
    While Copyright Management Information (CMI) is not a new concept, it has not been a universally applied one. This article aims to review the different ways CMI's can be represented as well as the possibility of implementing them via Oracle technologies. Such an approach is justified in the absence of any wide scale, industry accepted, standard for implementation.Copyright Management Information, metadata, document identifiers, watermarking

    Lime: Data Lineage in the Malicious Environment

    Full text link
    Intentional or unintentional leakage of confidential data is undoubtedly one of the most severe security threats that organizations face in the digital era. The threat now extends to our personal lives: a plethora of personal information is available to social networks and smartphone providers and is indirectly transferred to untrustworthy third party and fourth party applications. In this work, we present a generic data lineage framework LIME for data flow across multiple entities that take two characteristic, principal roles (i.e., owner and consumer). We define the exact security guarantees required by such a data lineage mechanism toward identification of a guilty entity, and identify the simplifying non repudiation and honesty assumptions. We then develop and analyze a novel accountable data transfer protocol between two entities within a malicious environment by building upon oblivious transfer, robust watermarking, and signature primitives. Finally, we perform an experimental evaluation to demonstrate the practicality of our protocol

    Protection of Relational Databases by Means of Watermarking: Recent Advances and Challenges

    Get PDF
    Databases represent today great economical and strategic concerns for both enterprises and public institutions. In that context, where data leaks, robbery as well as innocent or even hostile data degradation represent a real danger, and watermarking appears as an interesting tool. Watermarking is based on the imperceptible embedding of a message or watermark into a database in order, for instance, to determine its origin as well as to detect if it has been modified. A major advantage of watermarking in relation to other digital content protection mechanisms is that it leaves access to the data while keeping them protected by means of a watermark, independent of the data format storage. Nevertheless, it is necessary to ensure that the introduced distortion does not perturb the exploitation of the database. In this chapter, we give a general overview of the latest database watermarking methods, focusing on those dealing with distortion control. In particular, we present a recent technique based on an ontological modeling of the database semantics that represent the relationships in between attributes—relationships that should be preserved in order to avoid the appearance of incoherent and unlikely records

    Digital audio watermarking for broadcast monitoring and content identification

    Get PDF
    Copyright legislation was prompted exactly 300 years ago by a desire to protect authors against exploitation of their work by others. With regard to modern content owners, Digital Rights Management (DRM) issues have become very important since the advent of the Internet. Piracy, or illegal copying, costs content owners billions of dollars every year. DRM is just one tool that can assist content owners in exercising their rights. Two categories of DRM technologies have evolved in digital signal processing recently, namely digital fingerprinting and digital watermarking. One area of Copyright that is consistently overlooked in DRM developments is 'Public Performance'. The research described in this thesis analysed the administration of public performance rights within the music industry in general, with specific focus on the collective rights and broadcasting sectors in Ireland. Limitations in the administration of artists' rights were identified. The impact of these limitations on the careers of developing artists was evaluated. A digital audio watermarking scheme is proposed that would meet the requirements of both the broadcast and collective rights sectors. The goal of the scheme is to embed a standard identifier within an audio signal via modification of its spectral properties in such a way that it would be robust and perceptually transparent. Modification of the audio signal spectrum was attempted in a variety of ways. A method based on a super-resolution frequency identification technique was found to be most effective. The watermarking scheme was evaluated for robustness and found to be extremely effective in recovering embedded watermarks in music signals using a semi-blind decoding process. The final digital audio watermarking algorithm proposed facilitates the development of other applications in the domain of broadcast monitoring for the purposes of equitable royalty distribution along with additional applications and extension to other domains

    Gossip Codes for Fingerprinting: Construction, Erasure Analysis and Pirate Tracing

    Full text link
    This work presents two new construction techniques for q-ary Gossip codes from tdesigns and Traceability schemes. These Gossip codes achieve the shortest code length specified in terms of code parameters and can withstand erasures in digital fingerprinting applications. This work presents the construction of embedded Gossip codes for extending an existing Gossip code into a bigger code. It discusses the construction of concatenated codes and realisation of erasure model through concatenated codes.Comment: 28 page

    Watermarking based on DWT and SVD Algorithmin Medical Image

    Get PDF
    Medical images and accompanying reports have requirement of protecting the privacy of patient. The paper deals with the use of watermarking technique to increase the security of medical images and preserve patient?s privacy.The operation of embedding and extraction of watermark are done by using different watermarking algorithmsi.e Discrete Wavelet Transform, Singular Value Decomposition. Watermark is a normal image to be generated every time and which is to be embedded inside medical images. Then the quality of watermarked images which is obtained after embedding the watermark is to be accessed by calculating Peak Signal to Noise Ratio (between original and watermarked image) and Normalized Correlation (between the original watermark and extracted watermark)

    Provenance Tracking in a Commons of Geographic Data

    Get PDF
    Advancement in digital archiving technologies provides researchers with a multitude of methods for sharing their research and data digitally with others. However, when acquiring data from others directly or indirectly the law often imposes an assumption of copyright in the dataset acquired. This creates a difficult legal situation affecting future use and creation of derivative works from the data. A digital commons may be defined as a shared resource in which creators of contributed materials (data) grant a legal right for all others to use the material under the provisions of an open-access license. This thesis hypothesizes that an approach can be developed that automates the intellectual property rights and licensing management for contributors to a commons of geographic data. In addition, an approach can be developed such that contributors receive credit for their data, and the source of the data can be identified even through generations of alteration and reuse. The technological approach presented centers around embedding both visible and hidden identifiers in contributed data files. The identifiers, which remain intact through reuse and derivatives of the data, display the open-access licensing provisions to future users of the data. The research also involves using the identifiers to retrieve standards-compliant metadata records for the data and preserve links between different versions of the data. Because contributors of data are more likely to receive credit and recognition for their contributions of data when used by others and legal clarity is increased, this new approach may provide incentives to contributors to more openly share data and thereby provide greater benefits to the community through its availability
    • …
    corecore