Two content protection schemes for digital items
Modern techniques make digital articles easy to copy and manipulate. Content protection systems aim at protecting the rights of producers and distributors. These mostly rely on data encryption, digital watermarking, and special-purpose devices. In this paper, we describe two content protection schem...
Elmentve itt :
Szerző: | |
---|---|
Testületi szerző: | |
Dokumentumtípus: | Cikk |
Megjelent: |
2003
|
Sorozat: | Acta cybernetica
16 No. 2 |
Kulcsszavak: | Számítástechnika, Kibernetika |
Tárgyszavak: | |
Online Access: | http://acta.bibl.u-szeged.hu/12725 |
LEADER | 01324nab a2200229 i 4500 | ||
---|---|---|---|
001 | acta12725 | ||
005 | 20220615082743.0 | ||
008 | 161015s2003 hu o 0|| eng d | ||
022 | |a 0324-721X | ||
040 | |a SZTE Egyetemi Kiadványok Repozitórium |b hun | ||
041 | |a eng | ||
100 | 1 | |a Steinby Paula | |
245 | 1 | 0 | |a Two content protection schemes for digital items |h [elektronikus dokumentum] / |c Steinby Paula |
260 | |c 2003 | ||
300 | |a 315-326 | ||
490 | 0 | |a Acta cybernetica |v 16 No. 2 | |
520 | 3 | |a Modern techniques make digital articles easy to copy and manipulate. Content protection systems aim at protecting the rights of producers and distributors. These mostly rely on data encryption, digital watermarking, and special-purpose devices. In this paper, we describe two content protection schemes, both of which make use of tamper-resistant devices and devicer dependent decryption keys. One of the schemes uses a modified El Gamal system, in the other one we combine watermarking with encryption. | |
650 | 4 | |a Természettudományok | |
650 | 4 | |a Számítás- és információtudomány | |
695 | |a Számítástechnika, Kibernetika | ||
710 | |a Conference for PhD Students in Computer Science (3.) (2002) (Szeged) | ||
856 | 4 | 0 | |u http://acta.bibl.u-szeged.hu/12725/1/cybernetica_016_numb_002_315-326.pdf |z Dokumentum-elérés |