Syndetics cover image
Image from Syndetics

Digital copyright protection.

By: Material type: TextTextPublication details: London : Academic, 1997.ISBN:
  • 0127887717
Subject(s): DDC classification:
  • 341.75820285 21
Contents:
1. Copyright Battles -- 2. Cryptography -- 3. Subliminal Signatures -- 4. Compression -- 5. Codes and Errors -- 6. Locking Data -- 7. White Space -- 8. Mimic Functions -- 9. Pixel Modification -- 10. Grouping Bits -- 11. Wave Techniques -- 12. Copyright Software -- 13. Original Conundrums -- A. Permission -- B. Important Patents -- C. Bibliography.
Summary: Digital Copyright Protection describes how to defend copyrighted material in an age when digital technology makes copying cheap and easy. In this highly acclaimed book, Wayner has composed a thorough guide to watching, tracing, and locking up copyrighted material, making this book a necessity for anyone planning on controlling their work in the modern digital era. This encompassing guide to defending digital copyright includes detailed discussions on network-based key systems, compression-based tagging, and tamper-resistant tagging. Discussions also address key-based systems that lock up information until the right key is entered, embedding information in the images, music, or text. The techniques discussed focus on tagging documents with messages that indicate the rightful owner of the document and the copyright holder. These tags can be inserted in text files, images, or sound files. The book also explores key-based systems for keeping data secure until someone purchases it. These keys can be distributed by phone, stores, or the Internet.
Holdings
Item type Home library Call number Status Date due Barcode Item holds
Two Week Loan Two Week Loan de Havilland Learning Resources Centre Main Shelves 341.75820285 WAY (Browse shelf(Opens below)) Available 4403914710
Total holds: 0

Enhanced descriptions from Syndetics:

1. Copyright Battles -- 2. Cryptography -- 3. Subliminal Signatures -- 4. Compression -- 5. Codes and Errors -- 6. Locking Data -- 7. White Space -- 8. Mimic Functions -- 9. Pixel Modification -- 10. Grouping Bits -- 11. Wave Techniques -- 12. Copyright Software -- 13. Original Conundrums -- A. Permission -- B. Important Patents -- C. Bibliography.

Digital Copyright Protection describes how to defend copyrighted material in an age when digital technology makes copying cheap and easy. In this highly acclaimed book, Wayner has composed a thorough guide to watching, tracing, and locking up copyrighted material, making this book a necessity for anyone planning on controlling their work in the modern digital era. This encompassing guide to defending digital copyright includes detailed discussions on network-based key systems, compression-based tagging, and tamper-resistant tagging. Discussions also address key-based systems that lock up information until the right key is entered, embedding information in the images, music, or text. The techniques discussed focus on tagging documents with messages that indicate the rightful owner of the document and the copyright holder. These tags can be inserted in text files, images, or sound files. The book also explores key-based systems for keeping data secure until someone purchases it. These keys can be distributed by phone, stores, or the Internet.