Technique for searching pirated data

被引:0
|
作者
Matsui, T [1 ]
Takashima, Y [1 ]
机构
[1] NTT Corp, Human Interface Labs, Chiyoda Ku, Tokyo 100, Japan
来源
NTT REVIEW | 1999年 / 11卷 / 01期
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We propose a technique that efficiently detects whether data are used without permission from the Web browsing activities of ordinary users. The Control Center compares the URLs supplied by end users against a distribution list for each copyright ID which is embedded in the digital data using digital watermarking before distribution.
引用
收藏
页码:134 / 138
页数:5
相关论文
共 50 条
  • [1] Technique for Searching Data in a Cryptographically Protected SQL Database
    Yesin, Vitalii
    Karpinski, Mikolaj
    Yesina, Maryna
    Vilihura, Vladyslav
    Kozak, Ruslan
    Shevchuk, Ruslan
    APPLIED SCIENCES-BASEL, 2023, 13 (20):
  • [2] PIRATED EDITION
    不详
    KRIMINALISTIK, 1986, (12): : 616 - 616
  • [3] Pirated for profit
    Slive, J
    Bernhardt, D
    CANADIAN JOURNAL OF ECONOMICS-REVUE CANADIENNE D ECONOMIQUE, 1998, 31 (04): : 886 - 899
  • [4] Data discovery in grid using content based searching technique
    Renuga, R.
    Sadasivam, Sudha
    Information Technology Journal, 2009, 8 (01) : 71 - 76
  • [5] 'PIRATED VERSION'
    BLASING, R
    POETRY, 1985, 146 (06) : 332 - 333
  • [6] PIRATED POETRY
    不详
    QUINZAINE LITTERAIRE, 1976, (244): : 2 - 2
  • [7] MULTIVARIATE TECHNIQUE FOR CLASSIFICATION RULE SEARCHING Exemplieied by CT Data of Patient
    Deng, Jyhjeng
    ICEIS 2008 : PROCEEDINGS OF THE TENTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS, VOL SAIC: SOFTWARE AGENTS AND INTERNET COMPUTING, 2008, : 278 - 286
  • [8] Cloud Security by LZW Technique and Fast Searching by Genetic Data Clustering
    Jha, Amit Kumar
    Kamble, Megha
    Communications in Computer and Information Science, 2022, 1673 CCIS : 419 - 429
  • [9] REMOTE SEARCHING TECHNIQUE
    LORENT, JP
    ONLINE, 1982, 6 (02): : 4 - 5
  • [10] Trusting Pirated Software
    Kshetri, Nir
    Voas, Jeffrey
    COMPUTER, 2019, 52 (03) : 87 - 90