scholarly journals Embed digital watermarks in executable program memory

2021 ◽  
Vol 1901 (1) ◽  
pp. 012031
Author(s):  
S V Belim ◽  
S N Munko ◽  
S Yu Belim
2021 ◽  
Author(s):  
Caio J. B. V. Guimaraes ◽  
Matheus F. Torquato ◽  
Macelo A. C. Fernandes

2013 ◽  
Vol 42 (4) ◽  
pp. 204-208
Author(s):  
Jack Scott

AbstractLibraries today face the same challenges that they always have faced, but with the additional dimension that the world of computers engenders. Policies and practices have been developed for deterring theft and for recovering stolen library materials in the analog world, but we are in an incunabula period for doing the same for digital documents-images and pictorial and sound materials. One means of protection for both kinds of materials is marking them indelibly. This can be done in a variety of ways for physical materials, but there is a new world of electronic marking that is in its infancy. This practice, called Steganography, creates digital watermarks that can be hidden, but they may also be detected and erased. This essay discusses attempts to create digital watermarks that resist tampering with.


Author(s):  
Kuanchin Chen

Sharing, disseminating, and presenting data in digital format is not just a fad, but it is becoming part of our life. Without careful planning, digitized resources could easily be misused, especially those that are shared across the Internet. Examples of such misuse include use without the owner’s permission, and modification of a digitized resource to fake ownership. One way to prevent such behaviors is to employ some form of copyright protection technique, such as digital watermarks. Digital watermarks refer to the data embedded into a digital source (e.g., images, text, audio, or video recording). They are similar to watermarks in printed materials as a message inserted into the host media typically becomes an integral part of the media. Apart from traditional watermarks in printed forms, digital watermarks may also be invisible, may be in the forms other than graphics, and may be digitally removed.


Author(s):  
Teemu Laukkarinen ◽  
Lasse Määttä ◽  
Jukka Suhonen ◽  
Timo D. Hämäläinen ◽  
Marko Hännikäinen

Resource constrained Wireless Sensor Networks (WSNs) require an automated firmware updating protocol for adding new features or error fixes. Reprogramming nodes manually is often impractical or even impossible. Current update protocols require a large external memory or external WSN transport protocol. This paper presents the design, implementation, and experiments of a Program Image Dissemination Protocol (PIDP) for autonomous WSNs. It is reliable, lightweight and it supports multi-hopping. PIDP does not require external memory, is independent of the WSN implementation, transfers firmware, and reprograms the whole program image. It was implemented on a node platform with an 8-bit microcontroller and a 2.4 GHz radio. Implementation requires 22 bytes of data memory and less than 7 kilobytes of program memory. PIDP updates 178 nodes within 5 hours. One update consumes under 1‰ of the energy of two AA batteries.


Author(s):  
Tino Jahnke ◽  
Juergen Seitz

In order to solve intellectual property problems of the digital age, two basic procedures are used: “Buy and drop,” linked to the destruction of various peer-to-peer solutions and “subpoena and fear,” as the creation of non-natural social fear by specific legislations. Although customers around the world are willing to buy digital products over networks, the industry is still using conventional procedures to push such a decisive customer impulse back into existing and conventional markets. Digital watermarking is described as a possibility to interface and close the gap between copyright and digital distribution. It is based on steganographic techniques and enables useful right protection mechanisms. Digital watermarks are mostly inserted as a plain bit sample or a transformed digital signal into the source data using a key based embedding algorithm and a pseudo-noise pattern. The embedded information is hidden in low-value bits or least significant bits of picture pixels, frequency or other value domains, and linked inseparably with the source of the data structure. For the optimal application of watermarking technology a trade-off has to be made between competing criteria like robustness, non-perceptibility, non-delectability, and security. Most watermarking algorithms are resistant against selected and application-specific attacks. Therefore, even friendly attacks in the form of usual file and data modifications can destroy easily the watermark or falsify it. This chapter gives an overview in watermarking technologies, classification, methodology, applications and problems.


Author(s):  
Kuanchin Chen

Digital representation of data is becoming popular as technology improves our ways of information dissemination, sharing and presentation. Without careful planning, digitized resources could easily be misused, especially those distributed broadly over the Internet. Examples of such misuse include use without owner’s permission and modification of a digitized resource to fake ownership. One way to prevent such behaviors is to employ some form of authentication mechanism, such as digital watermarks.


2001 ◽  
Vol 48 (5) ◽  
pp. 875-882 ◽  
Author(s):  
Ming-Shing Hsieh ◽  
Din-Chang Tseng ◽  
Yong-Huai Huang

Sign in / Sign up

Export Citation Format

Share Document