Copyright protection for the electronic distribution of text documents

被引:199
|
作者
Brassil, JT
Low, S
Maxemchuk, NF
机构
[1] AT&T Bell Labs, Lucent Technol, Murray Hill, NJ 07974 USA
[2] Univ Melbourne, Dept Elect & Elect Engn, Parkville, Vic 3052, Australia
[3] AT&T Bell Labs, Shannon Lab, Florham Park, NJ 07932 USA
关键词
computer crime; copyright protection; document delivery; document marking; electronic publishing; privacy; subliminal channels;
D O I
10.1109/5.771071
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Each copy of a rest document can be made different in a nearly invisible may by repositioning or modifying the appearance of different elements of text, i.e., lines, words, or characters. A unique copy can be registered with its recipient, so that subsequent unauthorized copies that are retrieved can be traced back to the original ou nei. In this paper Mle describe and compare sever al mechanisms for marking documents and several other mechanisms for decoding the mal ks after documents have been subjected to common types of distortion. The marks are intended to protect documents of limited value that are owned by individuals who would rather possess a legal than an illegal copy if they can be distinguished. We will describe attacks that remove the marks and countermeasures to those attacks. An architecture is described for distributing a large number of copies without burdening the publisher with creating and transmitting the unique documents. The architecture also allows the publisher to determine the identity of a recipient who has illegally,redistributed the document, without compromising the privacy of individuals who are not operating illegally. Two experimental systems ar e described. One was used to distribute all issue of the IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, and the second was used to mark copies of company private memoranda.
引用
收藏
页码:1181 / 1196
页数:16
相关论文
共 50 条
  • [1] Watermarking chinese text documents for copyright protection
    Zhou, Xinmin
    Tan, Lina
    Pan, Li
    Information Technology Journal, 2013, 12 (19) : 4946 - 4952
  • [2] A robust zero-watermarking algorithm for copyright protection of text documents
    Jalil, Zunera
    Mirza, Anwar Majid
    JOURNAL OF THE CHINESE INSTITUTE OF ENGINEERS, 2013, 36 (02) : 180 - 189
  • [3] A Comparative Analysis of Information Hiding Techniques for Copyright Protection of Text Documents
    Ahvanooey, Milad Taleby
    Li, Qianmu
    Shim, Hiuk Jae
    Huang, Yanyan
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [4] JOURNAL FULL TEXT - COPYRIGHT ISSUES IN ELECTRONIC DISTRIBUTION
    HUNTER, K
    ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 1991, 202 : 46 - CINF
  • [5] Watermarking of Electronic Text Documents
    Kankanhalli, Mohan S.
    Hau, K.F.
    Electronic Commerce Research, 2002, 2 (1-2) : 169 - 187
  • [6] TEXT TO SCREEN REVISITED - COPYRIGHT IN THE ELECTRONIC AGE
    GARRETT, JR
    ONLINE, 1991, 15 (02): : 22 - 24
  • [7] Research on information copyright protection based on text document
    Hu, Zhiyuan
    Qi, Ting
    Su, Peng
    Jisuanji Gongcheng/Computer Engineering, 2002, 28 (01):
  • [8] A Distribution System of Document Medium with Copyright Protection
    Odagiri, Kazuya
    Ishii, Naohiro
    Yaegashi, Rihito
    Tadauchi, Masaharu
    SNPD 2009: 10TH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCES, NETWORKING AND PARALLEL DISTRIBUTED COMPUTING, PROCEEDINGS, 2009, : 207 - 212
  • [9] Database Design Scheme for Copyright Protection Using Multimedia Documents Authentication
    Lee, Jae-Woo
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2007, 1 (01): : 73 - 82
  • [10] A Tamper Proofing Text Watermarking Shift Algorithm for Copyright Protection
    Eid, Amira
    Emran, Ahmed A.
    Morsy, Ahmed Y.
    ARAB JOURNAL OF NUCLEAR SCIENCES AND APPLICATIONS, 2019, 52 (03): : 126 - 133