Loading...
Search for: copy-protection
0.01 seconds

    Java applets copy protection by steganography

    , Article 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2006, Pasadena, CA, 18 December 2006 through 20 December 2006 ; 2006 , Pages 388-391 ; 0769527450 (ISBN); 9780769527451 (ISBN) Shirali Shahreza, M ; Sharif University of Technology
    IEEE Computer Society  2006
    Abstract
    Following the expansion of Internet, many software were produced that could launch through Internet without prior installation on computers. This included game software and software that deal with financial affairs. These softwares are mainly in Java language and can be found on web pages as Java Applets. Some software owners want that their products only able to execute through their own web pages so that no one could put them on other web pages. In this paper, a new method has been presented to protect Java Applets from copying by using "Steganography in HTML web pages" method. In this method, a special 8-character string is hidden in the HTML page by a secret key. The string and the... 

    Unsupervised, fast and efficient colour-image copy protection

    , Article IEE Proceedings: Communications ; Volume 152, Issue 5 , 2005 , Pages 605-616 ; 13502425 (ISSN) Abadpour, A ; Kasaei, S ; Sharif University of Technology
    2005
    Abstract
    The ubiquity of broadband digital communications and mass storage in modern society has stimulated the widespread acceptance of digital media. However, easy access to royalty-free digital media has also resulted in a reduced perception in society of the intellectual value of digital media and has promoted unauthorised duplication practices. To detect and discourage the unauthorised duplication of media, researchers have investigated watermarking methods to embed ownership data into media. However, some authorities have expressed doubt over the efficacy of watermarking methods to protect digital media. The paper introduces a novel method to discourage unauthorised duplication of digital...