Spelling suggestions: "subject:"content protection"" "subject:"ccontent protection""
1 |
Digital Rights Management on an IP-based set-top box / Digital Rights Managemnet för en IP-baserad set-top boxHallbäck, Erik January 2005 (has links)
<p>Digital Rights Management (DRM) is a technology that allows service and content providers to distribute and sell digital content in a secure way. The content is encrypted and packaged with a license that is enforced before playback is allowed.</p><p>This thesis covers how a DRM system works and gives some cryptographic background. It also shows how Microsoft DRM for Network Devices can be implemented on an ip-based set-top box.</p>
|
2 |
Digital Rights Management on an IP-based set-top box / Digital Rights Managemnet för en IP-baserad set-top boxHallbäck, Erik January 2005 (has links)
Digital Rights Management (DRM) is a technology that allows service and content providers to distribute and sell digital content in a secure way. The content is encrypted and packaged with a license that is enforced before playback is allowed. This thesis covers how a DRM system works and gives some cryptographic background. It also shows how Microsoft DRM for Network Devices can be implemented on an ip-based set-top box.
|
3 |
Digital rights management of audio distribution in mobile networksLöytynoja, M. (Mikko) 05 December 2008 (has links)
Abstract
Nowadays, content is increasingly in digital form and distributed in the Internet. The ease of making perfect copies of the digital content has created a need to develop a means to protect it. Digital rights management (DRM) relates to systems designed to protect the intellectual property rights of the digital content. The DRM systems try to enable a secure distribution of digital content to the users and to prevent the unauthorized copying, usage, and distribution of the content. This is usually done in practice using encryption and digital watermarking techniques.
This thesis concentrates on the problem of protecting and distributing multimedia content securely in mobile environment. The research objectives are: (1) to design an overall DRM architecture which allows an easy content distribution to the user in mobile environment; (2) to develop protection methods that can be used in mobile devices with limited computational capabilities to prevent unauthorized usage of the audio content; (3) to create methods for managing and enforcing the user’s rights and restrictions to the content usage; (4) to study a method for providing the users with an easy access to new digital content and services. The research is carried out by first developing an overall DRM platform to mobile environment. The experimental prototype of the platform is implemented on server side to PC environment and the client runs on a mobile phone. The platform is used to test the functionality and complexity of the content protection methods developed which are based on digital watermarking and encryption techniques.
The main results of the thesis are: (1) a DRM platform for mobile devices that supports peer-to-peer networking and license negotiation; (2) audio protection methods utilizing digital watermarking and encryption techniques which support content superdistribution and content preview; (3) methods for counting offline how many times content has been played on the user’s terminal using watermarking and hash chains; (4) a method for adding metadata, such as a web link, into audio content, so that it survives digital to analog to digital transformation and recording with a mobile phone.
|
4 |
Digital watermarking of images towards content protectionNasir, Ibrahim Alsonosi January 2010 (has links)
With the rapid growth of the internet and digital media techniques over the last decade, multimedia data such as images, video and audio can easily be copied, altered and distributed over the internet without any loss in quality. Therefore, protection of ownership of multimedia data has become a very significant and challenging issue. Three novel image watermarking algorithms have been designed and implemented for copyright protection. The first proposed algorithm is based on embedding multiple watermarks in the blue channel of colour images to achieve more robustness against attacks. The second proposed algorithm aims to achieve better trade-offs between imperceptibility and robustness requirements of a digital watermarking system. It embeds a watermark in adaptive manner via classification of DCT blocks with three levels: smooth, edges and texture, implemented in the DCT domain by analyzing the values of AC coefficients. The third algorithm aims to achieve robustness against geometric attacks, which can desynchronize the location of the watermark and hence cause incorrect watermark detection. It uses geometrically invariant feature points and image normalization to overcome the problem of synchronization errors caused by geometric attacks. Experimental results show that the proposed algorithms are robust and outperform related techniques found in literature.
|
5 |
Digital Watermarking of Images towards Content Protection.Nasir, Ibrahim A. January 2010 (has links)
With the rapid growth of the internet and digital media techniques over the last decade, multimedia data such as images, video and audio can easily be copied, altered and distributed over the internet without any loss in quality. Therefore, protection of ownership of multimedia data has become a very significant and challenging issue. Three novel image watermarking algorithms have been designed and implemented for copyright protection. The first proposed algorithm is based on embedding multiple watermarks in the blue channel of colour images to achieve more robustness against attacks. The second proposed algorithm aims to achieve better trade-offs between imperceptibility and robustness requirements of a digital watermarking system. It embeds a watermark in adaptive manner via classification of DCT blocks with three levels: smooth, edges and texture, implemented in the DCT domain by analyzing the values of AC coefficients. The third algorithm aims to achieve robustness against geometric attacks, which can desynchronize the location of the watermark and hence cause incorrect watermark detection. It uses geometrically invariant feature points and image normalization to overcome the problem of synchronization errors caused by geometric attacks.
Experimental results show that the proposed algorithms are robust and outperform related techniques found in literature.
|
6 |
Codes de traçage de traîtres pour la protection de contenus numériques / Traitor tracing codes for digital content protectionDesoubeaux, Mathieu 14 October 2013 (has links)
En traçage de traîtres, plusieurs copies d'un même contenu sont personnalisées avant distribution pour identifier d'éventuelles fuites d'informations. Dans le contexte de la distribution de contenus multimédia, cette personnalisation repose sur une construction jointe d'un code composé d'identifiants uniques et d'un algorithme de dissimulation d'informations. Une des problématiques majeure de cette construction est de conserver des propriétés d'identification même en cas d'attaques par collusion d'une coalition de traîtres, c'est-à-dire lorsque plusieurs copies d'utilisateurs (les traîtres) sont utilisées pour créer une copie pirate inconnue du système. Ces attaques doivent être contrées d'une part, au niveau du code traçant et d'autre part au niveau de l'algorithme d'insertion. Pour une distribution de contenus à grande échelle, il est nécessaire d'aborder le problème de la génération des identifiants de manière probabiliste. Le code de Gabor Tardos est alors l'approche la plus performante pour un alphabet binaire. Cependant, pour des identifiants à valeurs réelles respectant une contrainte de distorsion à l'insertion, ces identifiants binaires ne sont plus optimaux en terme d'erreur de décodage. Dans cette thèse, nous avons proposé un décodeur MAP non informé pour améliorer le décodage du code de Tardos. Nous nous sommes aussi intéressés à combiner les approches de codes à valeurs binaires et réelles afin d'améliorer les performances de traçage. Enfin, nous avons abordé le problème de la complexité de décodage avec une approche hiérarchique de codes à deux niveaux. / In Traitor Tracing, preventing leaks of a digital content comes with the personalization of each delivered copy. For multimedia content distribution, such as video on demand applications, the personalization depends on a joint construction between a code of unique sequences and a data hiding tool. The major issue is to keep tracing properties even in case of collusion attacks proceed by a coalition of traitors. Collusion attacks have to be counteract both on the code layer with anti-collusion construction and on the data hiding layer with robust watermarking. For large scale multimedia content distribution, it is necessary to tackle the problem of the code generation in a probabilistic manner. The binary code of Gabor Tardos is actually the best approach of probabilistic traitor tracing codes. However, for real valued signals prone to distortion constraint, which is the context in multimedia digital watermarking, Tardos binary fingerprints are no longer optimal in term of decoding error. Our work concerns several aspects of probabilistic codes construction. Firstly, we gives new accusation functions in the Tardos tracing framework with a non informed MAP (Maximum A Posteriori) decoder leading to decrease errors probabilities. Secondly, we proposed a joint construction of binary and real values codes so as to improve collusion robustness. Finally we focus on a hierarchical two layers codes construction which reduces the Tardos decoding complexity.
|
7 |
Neviditelné značení digitálních signálů / Invisible watermarking of digital signalsPacura, Dávid January 2016 (has links)
Cílem téhle práce je navrhnutí nových technik pro robustní neviditelné značení digitálních signálů. Nejdříve je prezentován současný stav tohoto odvětví a dostupné softwarové řešení. Poté následuje návrh několika algoritmů pro neviditelné značení, přičemž každý z nich je založen na jiném principu. Dále je připravena sada digitálních testovacích signálů společně s testovacím softwarem pro otestování navržených řešení a jejích porovnání s vybraným dostupným softwarem. Poté následuje srovnání naměřených výsledků, výkonu a jejích diskuze.
|
Page generated in 0.1354 seconds