Copyright protection for the electronic distribution of text documents

被引:199
|
作者
Brassil, JT
Low, S
Maxemchuk, NF
机构
[1] AT&T Bell Labs, Lucent Technol, Murray Hill, NJ 07974 USA
[2] Univ Melbourne, Dept Elect & Elect Engn, Parkville, Vic 3052, Australia
[3] AT&T Bell Labs, Shannon Lab, Florham Park, NJ 07932 USA
关键词
computer crime; copyright protection; document delivery; document marking; electronic publishing; privacy; subliminal channels;
D O I
10.1109/5.771071
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Each copy of a rest document can be made different in a nearly invisible may by repositioning or modifying the appearance of different elements of text, i.e., lines, words, or characters. A unique copy can be registered with its recipient, so that subsequent unauthorized copies that are retrieved can be traced back to the original ou nei. In this paper Mle describe and compare sever al mechanisms for marking documents and several other mechanisms for decoding the mal ks after documents have been subjected to common types of distortion. The marks are intended to protect documents of limited value that are owned by individuals who would rather possess a legal than an illegal copy if they can be distinguished. We will describe attacks that remove the marks and countermeasures to those attacks. An architecture is described for distributing a large number of copies without burdening the publisher with creating and transmitting the unique documents. The architecture also allows the publisher to determine the identity of a recipient who has illegally,redistributed the document, without compromising the privacy of individuals who are not operating illegally. Two experimental systems ar e described. One was used to distribute all issue of the IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, and the second was used to mark copies of company private memoranda.
引用
收藏
页码:1181 / 1196
页数:16
相关论文
共 50 条
  • [31] Agent-based copyright protection architecture for online electronic publishing
    Yi, X
    Kitazawa, S
    Okamoto, E
    Wang, XF
    Lam, KY
    Tu, S
    SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS, 1999, 3657 : 484 - 493
  • [32] Copyright Protection
    Rauer, Nils
    Bibi, Alexander
    TANZ, 2024, (8-9): : 60 - 63
  • [33] Image distribution method with embedded identifier scheme for copyright protection
    Abe, T
    Fujii, H
    Kushima, K
    INFORMATION SECURITY AND PRIVACY, 1997, 1270 : 325 - 336
  • [34] Copyright protection of artistic materials in electronic form. The CITED approach
    Keates, S.L.
    Cornish, G.P.
    Information Services and Use, 1993, 13 (04):
  • [35] An Authorship Protection Technology for Electronic Documents Based on Image Watermarking
    Melman, Anna
    Evsutin, Oleg
    Shelupanov, Alexander
    TECHNOLOGIES, 2020, 8 (04)
  • [36] The evaluation of the proximity of text categories for solving electronic documents classification tasks
    Glazkova, Anna, V
    VESTNIK TOMSKOGO GOSUDARSTVENNOGO UNIVERSITETA-UPRAVLENIE VYCHISLITELNAJA TEHNIKA I INFORMATIKA-TOMSK STATE UNIVERSITY JOURNAL OF CONTROL AND COMPUTER SCIENCE, 2015, 31 (02): : 18 - 25
  • [37] Managing the knowledge contained in electronic documents: a clustering method for text mining
    Iiritano, S
    Ruffolo, M
    12TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2001, : 454 - 458
  • [40] Research on E-book Text Copyright Protection and Anti-tampering Technology
    Chou, Yung-Chen
    Anggriani, Kurnia
    Wu, Nan-I
    Hwang, Min-Shiang
    International Journal of Network Security, 2021, 23 (05): : 739 - 749