Copyright protection for the electronic distribution of text documents

被引:202
作者
Brassil, JT
Low, S
Maxemchuk, NF
机构
[1] AT&T Bell Labs, Lucent Technol, Murray Hill, NJ 07974 USA
[2] Univ Melbourne, Dept Elect & Elect Engn, Parkville, Vic 3052, Australia
[3] AT&T Bell Labs, Shannon Lab, Florham Park, NJ 07932 USA
关键词
computer crime; copyright protection; document delivery; document marking; electronic publishing; privacy; subliminal channels;
D O I
10.1109/5.771071
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Each copy of a rest document can be made different in a nearly invisible may by repositioning or modifying the appearance of different elements of text, i.e., lines, words, or characters. A unique copy can be registered with its recipient, so that subsequent unauthorized copies that are retrieved can be traced back to the original ou nei. In this paper Mle describe and compare sever al mechanisms for marking documents and several other mechanisms for decoding the mal ks after documents have been subjected to common types of distortion. The marks are intended to protect documents of limited value that are owned by individuals who would rather possess a legal than an illegal copy if they can be distinguished. We will describe attacks that remove the marks and countermeasures to those attacks. An architecture is described for distributing a large number of copies without burdening the publisher with creating and transmitting the unique documents. The architecture also allows the publisher to determine the identity of a recipient who has illegally,redistributed the document, without compromising the privacy of individuals who are not operating illegally. Two experimental systems ar e described. One was used to distribute all issue of the IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, and the second was used to mark copies of company private memoranda.
引用
收藏
页码:1181 / 1196
页数:16
相关论文
共 14 条
  • [1] [Anonymous], 1968, SER DETECTION ESTIMA
  • [2] Baird H.S., 1992, Structured Document Image Analysis, P546
  • [3] SEPTEMBER - Secure electronic publishing trial
    Brassil, J
    Choudhury, AK
    Kristol, DM
    Lapone, A
    Low, S
    Maxemchuk, NF
    OGorman, L
    [J]. IEEE COMMUNICATIONS MAGAZINE, 1996, 34 (05) : 48 - 55
  • [4] ELECTRONIC MARKING AND IDENTIFICATION TECHNIQUES TO DISCOURAGE DOCUMENT COPYING
    BRASSIL, JT
    LOW, S
    MAXEMCHUK, NF
    OGORMAN, L
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1995, 13 (08) : 1495 - 1504
  • [5] UNTRACEABLE ELECTRONIC MAIL, RETURN ADDRESSES, AND DIGITAL PSEUDONYMS
    CHAUM, DL
    [J]. COMMUNICATIONS OF THE ACM, 1981, 24 (02) : 84 - 88
  • [6] CROWCROFT J, 1995, IEEE J SELECT AREAS, V13
  • [7] FLANAGAN D, 1996, JAVA NUTSHELL
  • [8] Low S. H., 1994, P 2 ACM C COMP COMM, P108
  • [9] Performance comparison of two text marking methods
    Low, SH
    Maxemchuk, NF
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (04) : 561 - 572
  • [10] Document identification for copyright protection using centroid detection
    Low, SH
    Maxemchuk, NF
    Lapone, AM
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 1998, 46 (03) : 372 - 383