Jisc Technology Applications Programme (jtap) — Overview of Watermarks, Fingerprints, and Digital Signatures
نویسنده
چکیده
This paper presents a technical overview of the capabilities and characteristics of technologies proposed for use as a means of providing copyright protection for digital information resources: a) Watermarks and fingerprints provide indication of ownership, and indication of the identity of a licensed user, respectively, by embedding security information in the digital object. This information may be perceptible (as in a backwash image), or, more conventionally, imperceptible. While this technology has some attraction for copyright owners, its security properties are limited. b) 'Digital signature' is a popular term for one of the capabilities of public key cryptosystems (PKCS). As well as providing signature services (origin authentication), this technology supports content confidentiality and content integrity services. These services are reliable ('strong' in the terminology of cryptography), but the technology is not designed for use in environments where data objects are subject to modification (e.g. by compression). Moreover, its deployment would be likely to incur a significant cost. The paper also considers further practical issues both for copyright owners and for the scholarly use of copyrighted material.
منابع مشابه
Human-Computer-Giraffe Interaction: HCI in the Field
This paper presents some findings and proposals for new research that have arisen from our work on the "Mobile Computing in Fieldwork Environments" project at the University of Kent at Canterbury [1]: a project that is sponsored by JTAP (JISC Technology Applications Programme) [2]. Our main research interest is in the development of novel software tools for the mobile fieldworker that exploit e...
متن کاملA review of the technologies application programme - perspectives on teaching and learning
This paper reports on a review of the UK Joint Information Systems Committee (JISC) funded Technologies Applications Programme (JTAP) and in particular focuses on outcomes of relevance for learning and teaching. The review concentrated on 26 of the 117 projects which the programme funded that were deemed to be of particular relevance to learning and teaching. The projects included investigation...
متن کاملCombining digital Watermarks and collusion secure Fingerprints for customer copy monitoring
Digital watermarking is the enabling technology to prove ownershp on copyrighted material, detect originators of illegally made copies, monitor the usage of the copyrighted multimedia data and analyze the spread spectrum of the data over networks and servers. Embedding of unique customer identification as a watermark into data is called fmgerprinting to identify illegal copies of documents. Bas...
متن کاملDigital Watermarking a Technology Overview
The paper introduces the digital watermarking technology which is a data hiding technique that embeds a message into a multimedia work such as an image or text or other digital object. The proposed technique has several important applications; the majorly important is the digital copyrights protection. The digital watermarking system as any other data hiding technique has its own requirements t...
متن کاملProvably Secure Authentication of Digital Media Through Invertible Watermarks
The recent advances in multimedia technology have made the manipulation of digital images, videos or audio files easy. On the one hand the broad availability of these new capabilities enabled numerous new applications. On the other hand, for the same reasons, digital media can easily be forged by almost anyone. To counteract this risk, fragile watermarks were proposed to protect the integrity a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1999