Technique for searching pirated data

被引:0
|
作者
Matsui, T [1 ]
Takashima, Y [1 ]
机构
[1] NTT Corp, Human Interface Labs, Chiyoda Ku, Tokyo 100, Japan
来源
NTT REVIEW | 1999年 / 11卷 / 01期
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We propose a technique that efficiently detects whether data are used without permission from the Web browsing activities of ordinary users. The Control Center compares the URLs supplied by end users against a distribution list for each copyright ID which is embedded in the digital data using digital watermarking before distribution.
引用
收藏
页码:134 / 138
页数:5
相关论文
共 50 条
  • [31] Range searching in categorical data: Colored range searching on grid
    Agarwal, PK
    Govindarajan, S
    Muthukrishnan, S
    ALGORITHMS-ESA 2002, PROCEEDINGS, 2002, 2461 : 17 - 28
  • [32] Range Searching on Uncertain Data
    Agarwal, Pankaj K.
    Cheng, Siu-Wing
    Yi, Ke
    ACM TRANSACTIONS ON ALGORITHMS, 2012, 8 (04)
  • [33] Private searching on streaming data
    Ostrovsky, Rafail
    Skeith, William E., III
    JOURNAL OF CRYPTOLOGY, 2007, 20 (04) : 397 - 430
  • [34] Searching Data Lakes for Nested and Joined Data
    Zhang, Yi
    Chen, Peter Baile
    Ives, Zachary G.
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2024, 17 (11): : 3346 - 3359
  • [35] RESEARCHING DATA AND SEARCHING FOR THEORY
    RAO, KR
    PALMER, J
    BEHAVIORAL AND BRAIN SCIENCES, 1990, 13 (02) : 387 - 389
  • [36] Searching for the sandcone in the GMRG data
    Corbett, LM
    Whybark, DC
    INTERNATIONAL JOURNAL OF OPERATIONS & PRODUCTION MANAGEMENT, 2001, 21 (07) : 965 - 980
  • [37] Searching for relational patterns in data
    Nguyen, SH
    Skowron, A
    PRINCIPLES OF DATA MINING AND KNOWLEDGE DISCOVERY, 1997, 1263 : 265 - 276
  • [38] DATA PROTECTION IN ROUTINE SEARCHING
    LANG, J
    KRIMINALISTIK, 1986, (07): : 340 - 340
  • [39] LOGICAL SEARCHING OF THE LUNAR DATA
    ANDERSON, DL
    MOORE, CB
    PARSONS, ML
    PRATT, DD
    COMPUTERS & GEOSCIENCES, 1978, 4 (02) : 161 - 172
  • [40] Private searching on streaming data
    Ostrovsky, R
    Skeith, WE
    ADVANCES IN CRYPTOLOGY - CRYPTO 2005, PROCEEDINGS, 2005, 3621 : 223 - 240