Search icone
Search and publish your papers

Privacy protection and copyright issues in networks and on the internet

Or download with : a doc exchange

About the author

Level
Expert

About the document

Published date
Language
documents in English
Format
pdf
Type
term papers
Pages
5 pages
Level
Expert
Accessed
3 times
Validated by
Committee Oboolo.com
0 Comment
Rate this document
  1. Introduction
  2. Privacy issues
  3. The DVD marking concept
  4. Attacks on copyright-marking schemes
  5. Content deniability â€" Steganography
  6. Association deniabilityâ€"Digital cash
  7. Conclusion
  8. Bibliography

Copyright and censorship are access control issues, concerned with limiting access to some information to people in a particular group. In the former case, the group consists of people who have paid for the bits in question; in the latter, they meet some other criterion. Privacy is largely an access control issue. It's about being able to limit the number of people who can see who you're exchanging email with, what you're reading and what music you're listening to. In theory, there is no compelling reason why they should be in conflict, and in the pre-electronic world, they usually weren't Copyright was protected by the cost of small-scale duplication; it was simpler and cheaper to buy a book or a record than to make a single copy, and people who made large numbers of copies could usually be tracked down and prosecuted.

[...] Fig The effect of Stirmark In general, it's not clear how to design marking schemes that will resist a chosen distortion attack, in which the attacker who understands the marking scheme mangles the content in such a way as to cause maximum damage to the mark while doing minimal damage to the marked content Applications of Copyright Marking Scheme The applications of marking techniques are much broader than just DVDs and still pictures distributed on the Net. Radio adverts in the United States are commonly marked with a serial number, to enable auditing agencies to check automatically whether stations are playing them as often as they claim. [...]


[...] Probably the first historical mention is in Herodotus who records tricks used during the wars between the Greeks and the Persians?including hiding a message in the belly of a hare carried by a hunter, tattooing it on the shaven head of a slave whose hair was then allowed to grow back, and writing it on the wooden base under the wax of a writing tablet. Francis Bacon proposed a system that embedded a binary message in a book at one bit per letter by alternating between two different fonts. [...]


[...] 3.1 Content hiding: PGP One of the best-known and widely used privacy tools is encryption of electronic mail. The market-leading product, Pretty Good Privacy has done much to raise public awareness of the issues?especially since the U.S. government harassed its author, Phil Zimmermann, and threatened to prosecute him for allegedly breaking U.S. export controls by making encryption software available on the Net. PGP has a number of features but in its most basic form, each user generates a private/ public keypair. [...]

Similar documents you may be interested in reading.

Internet banking

 Economics & finance   |  Finance   |  Term papers   |  03/05/2009   |   .doc   |   24 pages

The protection of consumers on Internet

 Law & contracts   |  Other law subjects   |  Presentation   |  09/29/2010   |   .doc   |   15 pages

Top sold for journalism

Six feet of the country, by Nadine Gordimer

 Arts & media   |  Journalism   |  Presentation   |  05/07/2009   |   .doc   |   3 pages

Maurice A. Bercof - The Art of Negotiating

 Arts & media   |  Journalism   |  Term papers   |  05/16/2009   |   .doc   |   6 pages