نتایج جستجو برای: copy protection

تعداد نتایج: 227907  

Journal: :Lecture Notes in Computer Science 2021

Quantum copy-protection uses the unclonability of quantum states to construct software that provably cannot be pirated. would immensely useful, but unfortunately, little is known about achieving it in general. In this work, we make progress on goal, by giving following results: We show how copy-protect any program learned from its input-output behavior relative a classical oracle. This con...

Journal: :Open conference proceedings 2022

In order to achieve good product quality in electroplating, disturbance variables such as the "dog bone" effect must be avoided. this work, approach was used develop a method for marking protection. With defined structure and optimal parameters, it is possible deposit unique visually non-differentiable layers on suitable substrates. The deposited their local distribution were characterized by c...

Journal: :IEEE Computer 2001
Dan S. Wallach

48 Computer Copy Protection Technology Is Doomed A t some fundamental level, seemingly as axiomatic as the speed of light or the conservation of energy, copying information— strings of bits—will always be easy. Historically, systems intended to restrict this fundamental property have always been defeated, and there is no reason they won't continue to be defeated. Copying has always been easy, w...

1999
Jeffrey A Bloom Ingemar J. Cox Ton Kalker Jean-Paul Linnartz Matt L. Miller Brendan Traw

The prospect of consumer digital versatile disk (DVD) recorders highlights the challenge of protecting copyrighted video content from piracy. We describe the copy protection system currently under consideration for DVD. The copy protection system broadly tries to prevent illicit copies from being made from either the analog or digital I/O channels of DVD recorders. An analog copy protection sys...

Journal: :PVLDB 2010
Xin Dong Laure Berti-Équille Yifan Hu Divesh Srivastava

Web technologies have enabled data sharing between sources but also simplified copying (and often publishing without proper attribution). The copying relationships can be complex: some sources copy from multiple sources on different subsets of data; some co-copy from the same source, and some transitively copy from another. Understanding such copying relationships is desirable both for business...

2003
Douglas J. Wiebe

Editor’s note: One in three U.S. households contains at least one firearm. Gun owners cite two main reasons for having a gun: hunting and self-protection. A majority of handgun owners believe that they are protecting their homes and families against violent assaults. But in a country where the majority of homicides and suicides involve a gun, it is reasonable to question whether access to a gun...

Journal: :CoRR 2014
Tanmoy Sarkar Sugata Sanyal

Digital watermarking [1] is the act of hiding information in multimedia data, for the purposes of content protection or authentication. In ordinary digital watermarking, the secret information is embedded into the multimedia data (cover data) with minimum distortion of the cover data. Due to these watermarking techniques the watermark image is almost negligible visible. In this paper we will di...

2003
Antonio Servetti Cristiano Testa Juan Carlos De Martin

The widespread adoption of compressed digital audio increasingly demands effective ways to conjugate ease of distribution with content protection. In this paper a low-complexity partial-encryption scheme for MPEG Audio is presented. The aim is to provide listeners with sample-quality audio material that can be upgraded to full-quality by simply acquiring a key and decrypting a few selected bits...

2007
Zdenek Ceska

Internet is one of the richest encyclopaedias in the world. Students can easily download various free documents and then plagiarize their content. This paper describes the current state of copy detection methods and proposes some new trends. New approaches, closer to nature language processing, can essentially improve identification of hardlydetectable cases of plagiarism, i.e. single-word chan...

2006
Thierry Rayna

This article investigates the relation between the level of publicness of digital goods – i.e. their degree of non-excludability and non-rivalness – and the pirating behaviour of the consumers. The main focus is put on the difference between the ex-ante level of publicness – determined by the anti-piracy strategies of the firms – and the ex-post level of publicness – which is a consequence of e...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید