Cryptography and data security
Cryptography and data security
BT Technology Journal
Cryptography, trusted third parties and escrow
BT Technology Journal
Equitable Conditional Access and Copyright Protection for Image Based on Trusted Third Parties
Proceedings of the Second International COST 237 Workshop on Teleservices and Multimedia Communications
Document marking and identification using both line and word shifting
INFOCOM '95 Proceedings of the Fourteenth Annual Joint Conference of the IEEE Computer and Communication Societies (Vol. 2)-Volume - Volume 2
Electronic marking and identification techniques to discourage document copying
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
The act of breaching copyright is probably the most common civil offence, and is often not considered as being unlawful by the perpetrator. The revenue that is lost by a copyright owner when illegal copying takes place can be significant. Losses may become unacceptably large in the future given the expected explosion of computerised, multimedia services. This paper discusses the problems copyright owners face when trying to maintain cost-effective control of their copyright in a digital age. It then proposes an initial model of a software-based system that provides copyright protection of multimedia information when delivered by Internet-based services.