Digital representation provides better efficiency and accuracy of copying, storing and distributing content via the internet. This improvement of digital technology helped the data to easily duplicated and rapidly delivered to a big number of users with minimum expense. This technology has become the most popular way to distribute multimedia content. Digital Right Management (DRM) is a technology used by publishers, copyright holders to restrict the illegal media conception, copying and redistribution. But sometimes it is insufficient to protect the multimedia data. Here is the actual use of the digital watermarking technology. Watermarking is a technology in which a hiding a digital data inside the host signal. Thus it will help to verifying the authority or integrity of the host signal.
The traditional two party digital rights management system contains only owner and consumer. But it is insufficient to satisfy today’s business needs and content delivery. Hence, multiparty multilevel digital rights management architecture has been proposed [3]. The term multiparty refers to the multiple parties in the architecture such as the owner, distributors, sub-distributors and consumers and multilevel refers to the multiple levels of distributors/subdistributors, involved in the distribution chain. The DRM system handles media data in a compressed and encrypted format. The owner distributes this compressed and encrypted domain to the buyer through the multilevel distributer network, where the distributers have no access to the original content. However for providing media authentication, traitor tracing or proving the distributorship the distributors needs to watermark this media content.
This paper works on watermarking of compressed...
... middle of paper ...
...[9]. There are two main disadvantages. They are
1) If the encryption is performed on a message size of few bits, the size of the ciphertext may expand and will cause loss of compression efficiency.
2) If the encryption is done on a large message size of few hundreds of bits, to compensate the loss in compression, the payload capacity decreases, where payload capacity is the number of watermark signal bits embedded per encrypted message.
So we select a secure symmetric stream cipher with homomorphic property over secure asymmetric encryption with homomorphic property because of the following two reasons. Symmetric ciphers with homomorphism can be applied on a smaller message size, like a byte, without increasing the compressed data size and achieving a better payload capacity than asymmetric counterparts. So we are using RC4 stream cipher with homomorphism property.
Furthermore, compression techniques that fall into two categories: lossless (reversible, no data loss) and lossy (irreversible, greater data reduction). Effective compression is best achieved with a combination of data reduction techniques such as bit rate reduction and compression. The difference is that bit rate reduction eliminates unnoticeable data, and compression removes unnecessary and excessive data through mathematical algorithms. Due to different forms of redundancy and the fact that the human visual system is unable to detect certain details, information can be altered or removed causing changes that are imperceptible to the human eye or brain.
Along with the development of a file format (MP3) to store digital audio recordings, came one of the new millennium’s most continuous debates – peer-to-peer piracy – file sharing. Internet companies such as Napster and Grokster became involved in notable legal cases in regards to copyright laws in cyberspace. These two cases are similar in nature, yet decidedly different. In order to understand the differences and similarities, one should have an understanding of each case as well as the court’s ruling.
In 1998, the United States Congress passed the Digital Millennium Copyright Act (DMCA). Congress intended the bill to update US copyright laws to deal with digital media. They believed that digital media such as DVDs would be pirated in large numbers due to the fact that digital copies should appear exactly as the original. The solution was encryption and the DMCA was enacted to protect the copyright on digital media that is encrypted. A year later a program called DeCSS emerged, capable of decrypting the encryption of DVDs. The first challenge of the DMCA began, as the Motion Picture Association of America (MPAA) brought suit against individuals who were trafficking the software on the Internet. The ongoing court case raised serious issue about the Internet and the digital age, including topics such as HTML linking, source code as protected free speech, and the consumer's right to fair use.
For some time now companies, copyright owners and Congress have tried to develop a security standard to protect copyrighted works from unauthorized reproduction and distribution, but they have not yet found a thoroughly effective solution. They know that shutting down all P2P networks is not the right response since file sharing is valuable to some extent since its method of sharing and transferring information supports a variety of efficient business models. Instead they want to deal with the copyright infringements that P2P networks facilitate.
This paper describes various forms of DRM (Digital Rights Management), the DMCA (Digital Millennium Copyright Act), and methods of bypassing the afore mentioned subjects. Different forms of transmission of DRM protected material also has a direct relationship with what kind of files are protected by the DMCA and will be discussed. This paper will also discuss how law makers are attempting to halt illegal music sharing and how these attempts are in vain.
It is not unusual to find hostile response of audio-visual industry against a new copying technology. Every time when a new copying technology was invented and introduced into the market, the industry responded argued that the new technology would cause significant damage to them by promoting piracy; It was true with the cases of Xerox, audio tape recorder, video tape recorder, compact disc (CD), and finally with the online file sharing through Peer-to-Peer (P2P) service. Usually, introduction of new copying technology led to series of legal disputes just like what we are witnessing in the current case of the Record Industry Association of America’s (RIAA) lawsuits against KaZaA and its individual members. Quite contrary to the industry’s usual arguments, however, new technologies eventually have proved additional revenues of profit for them so far. (Bettig, 1996)
Steganography is ‘‘covered writing’’. Steganography is the hiding of a secret message within an ordinary message and the extraction of it at its target. Steganography takes cryptography a step farther by hiding an encrypted message so that no one guess it exists. Ideally, anyone scanning your data will fail to know it contains encrypted data.
Different people have different watermark moments in life. In my life, the three different events moved me significantly and those were the family celebration of Dashain in 2007 – the biggest festival in Nepal, the death of my mother in the same year, and the winning of U.S. Green Card Lottery for 2014 by my wife.
Data encryption refers to the process of transforming electronic information into a scrambled form that can only be read by someone who knows how to translate the code. In nowadays business world, it’s the easiest and most practical way to secure the information that we stored and processed, and it’s significant for our sensitive information. For example, as electronic commerce is popular now, the vendors and retailers must protect the customers’ personal information from hackers or competitors. They also have many business files or contracts that need to be strictly protected. Without data encryption, these important information may fall into wrong hands and be misused by others. Besides, data encryption may be used to secure sensitive information that exists on company networks, or create digital signatures, and help to authorize in business. No one should underestimate the importance of encryption. A little mistake in encryption may make sensitive information revealing, or even result in illegal and criminal accuse.
A Worldwide Problem Software piracy is defined as the illegal copying of software for commercial or personal gain. Software companies have tried many methods to prevent piracy, with varying degrees of success. Several agencies like the Software Publishers Association and the Business Software Alliance have been formed to combat both worldwide and domestic piracy. Software piracy is an unresolved, worldwide problem, costing millions of dollars in lost revenue. Software companies have used many different copy protection schemes. The most annoying form of copy protection is the use of a key disk. This type of copy protection requires the user to insert the original disk every time the program is run. It can be quite difficult to keep up with disks that are years old. The most common technique of copy protection requires the user to look up a word or phrase in the program's manual. This method is less annoying than other forms of copy protection, but it can be a nuisance having to locate the manual every time. Software pirates usually have no trouble "cracking" the program, which permanently removes the copy protection. After the invention of CD-ROM, which until lately was uncopyable, most software companies stopped placing copy protection in their programs. Instead, the companies are trying new methods of disc impression. 3M recently developed a new technology of disc impression which allows companies to imprint an image on the read side of a CD-ROM. This technology would not prevent pirates from copying the CD, but it would make a "bootleg" copy differ from the original and make the copy traceable by law enforcement officials (Estes 89). Sometimes, when a person uses a pirated program, there is a "virus" attached to the program. Viruses are self-replicating programs that, when activated, can damage a computer. These viruses are most commonly found on pirated computer games, placed there by some malignant computer programmer. In his January 1993 article, Chris O' Malley points out that if piracy was wiped out viruses would eventually disappear (O' Malley 60). There are ways that a thrifty consumer can save money on software without resorting to piracy. Computer companies often offer discounts on new software if a person has previously purchased an earlier version of the software. Competition between companies also drives prices low and keeps the number of pirated copies down (Morgan 45). People eventually tire or outgrow their software and decide to sell it.
According to Shannon’s rules, if the data we are going to encrypt is much lesser than the key in length and the same key we ...
Data encryption refers to the transformation of data into a structure that makes it unreadable by anyone without a secret decryption key. It ensures that messages can be read only by the planned recipient. Encryption is the procedure of obscuring information to create it unreadable without special information. Only organizations and individuals with an abnormal need for secrecy have actually made good use of it. Nowadays, encryption is one of the most important technologies for maintaining your privacy and the security of important information. This helps out greatly especially when E-Commerce is being used.
The protection of data being transferred between ATMs and the bank, and the use of cell phones is the most common everyday encounter with encryption. To encrypt and decrypt information a cipher is used. In a cipher there is a set of well-defined steps that can be followed to encrypt and decrypt messages. The use of a cipher relies greatly on the use of an encryption key. The key may contain any auxiliary information added to the cipher to produce certain
With the popularity of the Internet, sales for CDs, DVDs, Movies, and many other products have increased. Along with the increase of sales has brought forth an ever increasing problem of illegal media being downloaded. Programs such as Bittorent, Kazaa, and other direct-connect networking programs have allowed the transferring of such illegal media. Downloading song files from the Internet over a free peer to peer network is the moral equivalent of shoplifting music CDs from the local mall.
Information Overload. If you receive a message with too much information, you may tend to put up a barrier because the amount of information is coming so fast that it become difficult and uncomfortable to interpret the information