نتایج جستجو برای: copy protection

تعداد نتایج: 227907  

2001
Scott Craver Min Wu Bede Liu Adam Stubblefield Ben Swartzlander Dan S. Wallach Drew Dean Edward W. Felten

The Secure Digital Music Initiative is a consortium of parties interested in preventing piracy of digital music, and to this end they are developing architectures for content protection on untrusted platforms. SDMI recently held a challenge to test the strength of four watermarking technologies, and two other security technologies. No documentation explained the implementations of the technolog...

2006
Nodir Adilov

This paper formally explores the optimal length of copyright protection when the value of an intellectual work changes over time due to depreciation and value-enhancing ex-post investments. The first main finding is that in the case of a single project granting infinitely-lived copyright protection maximizes social welfare when the return on ex-post investments is high relative to the return on...

2004

This paper demonstrates that there is a strategic reason why software firms have followed consumers’ desire to drop software protection. We analyze software protection policies in a price-setting duopoly software industry selling differentiated software packages, where consumers’ preference for particular software is affected by the number of other consumers who ( ) legally or illegally use the...

2015
Jobin Abraham

Digital data is flexible in that it can be easily copied and translated to any format. The primary aim of watermarking is copy prevention using data hiding mechanisms. In digital watermarking a mark is imperceptibly embedded in the source media to be protected. To resolve disputes in future over ownerships, the hidden watermark can be extracted as a legally standing proof. Watermarking though i...

Journal: :I. J. Network Security 2016
Hui Xiao Hongbin Wang Meitong Lin

With the development of information technology and the application of information technology jumped into popularity, the electronic document was used as a form of information transmission and data storage, more and more electronic documents are facing the risk of being illegally acquired and viewed. In order to solve this problem, this paper proposes a novel file content protection method, whic...

Journal: :Int. Arab J. Inf. Technol. 2013
Venus Samawi Adeeb Sulaiman

Application Service Provider (ASP) is a business that makes computer-based services (small and medium sized businesses) available to clients over a network. The usual ASP sells a large application to large enterprises, but also, provides a pay-as-you-go model for smaller clients. One of the main problems with ASP is the insufficient security to resist attacks and guarantee pay-as-you-go. Functi...

2006
Ash Asudeh

ing away from certain complications that we explore in subsequent sections, we derive the meaning in (102b) for the the copy raising example in (102a) and the meaning in (103b) for the related perceptual resemblance example in (103a): (102) a. John seems to me like he’s upset. b. ∃s .seem(s , upset(john)) ∧ PSOURCE = john ∧ PGOAL = speaker (103) a. John sounds to me like he’s upset. b. ∃s .soun...

Journal: :Computer and Information Science 2010
Yin Leng Theng Wee Teck Tan May O. Lwin Schubert Foo

Software piracy and counterfeiting is a global problem that has resulted in huge economic losses worldwide. This paper proposes a theory-based approach to study the key factors contributing to piracy and counterfeiting issues. We first developed a theoretical model linking the antecedents into the key factors using information acquired from an extended literature review. We then undertook a sur...

1998
Jean-Paul M. G. Linnartz Marten van Dijk

In some applications of electronic watermarks, the device that detects whether content contains a watermark or not is in public domain. Attackers can misuse such detector as an oracle that reveals up to one bit of information about the watermark in each experiment. An information-theoretical analysis of the information leakage is provided, and a method is proposed to reduce the information leak...

2008
Sevinc Bayram Husrev Taha Sencar Nasir Memon

Copy-move forgery is a specific type of image tampering where a part of the image is copied and pasted on another part generally to conceal unwanted portions of the image. Hence, the goal in detection of copy-move forgeries is to detect image areas that are same or extremely similar. In this paper, we review several methods proposed to achieve this goal. These methods in general use block-match...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید