This book is a thorough guide to watching, tracing, and locking up copyrighted material, making this book a necessity for anyone planning on controlling their work in the modern digital era. This encompassing guide to defending digital copyright includes detailed discussions on network-based key systems, compression-based tagging, and tamper-resistant tagging. Discussions also address key-based systems that lock up information until the right key is entered, embedded information in the images, music or text.* The techniques discusssed focus on tagging documents with messages that indicate the rightful owner of the document and the copyright holder. These tags can be inserted in text files, images, or sound files.* The book also explores key-based systems for keeping data secure until somene purchases it. These keys can be distributed by phone, stores, or the Internet.
Be the first to review this book!