Copyright Protection of Audio Using Biometrics

Author(s):  
Muhammad Yaasir Khodabacchus

In our global community, the Internet, the issue of copyright is increasing. The International Maritime Bureau (IMB) reported over thousands of incidents this year compared to three hundred only ten years ago. Although laws and other ways have been intended to protect the rights of content developers and describe restrictions that can be placed on copying materials, pirate users always find a way to breach the protection. Base on this fact, a new method has been implemented using biometrics as it is described in the following chapters. This paper was developed taking into consideration one of the most widely used biometrics which is the fingerprint. Precisely, the aim of the system includes embedding the fingerprint into an audio file which can only be read using the fingerprint of the registered user.

2018 ◽  
pp. 894-927
Author(s):  
Muhammad Yaasir Khodabacchus

In our global community, the Internet, the issue of copyright is increasing. The International Maritime Bureau (IMB) reported over thousands of incidents this year compared to three hundred only ten years ago. Although laws and other ways have been intended to protect the rights of content developers and describe restrictions that can be placed on copying materials, pirate users always find a way to breach the protection. Base on this fact, a new method has been implemented using biometrics as it is described in the following chapters. This paper was developed taking into consideration one of the most widely used biometrics which is the fingerprint. Precisely, the aim of the system includes embedding the fingerprint into an audio file which can only be read using the fingerprint of the registered user.


2020 ◽  
Vol 7 ◽  
pp. 94-100
Author(s):  
N. V. Buzova ◽  
◽  
M. M. Karelina ◽  

The final stage of the judicial reform was the creation of new cassation and appeal courts in the system of courts of general jurisdiction that provide additional guarantees for the effective judicial protection of citizens. Russian legislation establishes a mechanism for the protection of infringed copyright and related rights on the Internet. Such a mechanism provides for the imposition of interim measures by the Moscow City Court and the termination by Roskomnadzor of access to the site or page of the site on the Internet, on which information is posted in violation of copyright and related rights. In the case of interim measures, the case decision belongs to competence of the Moscow City Court. As a result of changes in the legislation on the judicial system, the courts of appeal and cassation of general jurisdiction began to work. Consideration of complaints against judicial acts of the Moscow City Court, rendered by them at first instance, are referred to the competence of the new courts. The article notes the stages of development of legislation on copyright protection on the Internet, as well as some problematic aspects of copyright and related rights protection on the Internet.


2014 ◽  
Vol 602-605 ◽  
pp. 3363-3366
Author(s):  
Yi Ming Sun ◽  
Chun Lei Han

In order to automatically identify the mobile phones' reviews that the users comment on the mobile phone on the internet and obtain valuable information from the reviews, this paper presents the process of constructing ontology for the mobile phones' reviews and preliminarily establish a domain ontology of the mobile phones' reviews. The ontology construction adopts the Protégé tool and the Seven Steps method of Stanford University research. The ontology can provide convenience for the semantic information mining on Web mobile phones' reviews, and it can provide a new method to effectively mine the use feelings of the phone from a large number of mobile phone users' reviews.


2021 ◽  
Vol 8 (2) ◽  
pp. 183-212
Author(s):  
Agung Kurniawan Sihombing ◽  
Rika Ratna Permata ◽  
Tasya Safiranita Ramli

In the rapid technological development, physical boundaries have begun to disappear. The internet has created a ‘free culture’. In addition, the era is challenging the copyright concept along with the emergence of ‘digital copyright’. It has become the main commodity of Over-the-Top services providing means of communication and entertainment through the internet. Content streaming service like Netflix uses films, as well as other cinematographic works, as its main commodities. OTT Streaming media helps to protect copyright holders' rights that previously have been violated by illegal streaming sites on the internet. Unfortunately, it also raises a new question: how digital copyright-objects can be protected in this kind of service. Without physical form, copyright object can be distributed easily on the internet, and it may lead to right violations. To answer this problem, the authors aim to describe the digital copyright protection on OTT Streaming Content Media in Indonesia and compare them to the 1998 Digital Millennium Copyright Act (DMCA) of the United States of America using a descriptive-analytical approach. This study employed a normative juridical approach with secondary data. The results of this study indicate that digital copyright protection in Indonesia is still centered on conventional copyright objects, and a sui generis law is needed to provide better protection for digital copyright objects.


Author(s):  
Lenore Bell

Inthe spring of 2012, a major scandal rocked the queer social justice communityon Tumblr. One of its most popular bloggers and activists, a 22 -year-oldtransman named Ira Gray suddenly faced by a deluge of sexual assaultallegations from multiple people via Tumblr. Despite the queer social justicecommunity's pride in being open and accepting, many of its practices are rigid,pedantic and counterproductive. The rise and fall of Ira Gray's celebritystatus has highlighted how truly divided this online community can be.Sexuality and gender identity were not the only lines of contention; mentalillness, race, class and trauma played dominant roles in the discussion. Thevery fact that the accusers had stayed silent for so long is telling. Throughanalysing the tumblr posts of the accused, accusers and othercommentators/spectators, one can see how mental illness, privilege andsexuality are negotiated in this small yet global community. For many queersocial justice tumblr bloggers, graphically detailed posts about theirexperience of sexual trauma lie side-by-side with explicit nude phone cameraportraits of the blogger tagged as "self-care." I argue that theethos created by this corner of the internet does not provide a queer oasis forthe user away from an overbearing, hetero-normative world. Instead, itintroduces a complicated set of rules and mores that presents newcomplications. The combination of naked exposure and online depersonalisationcan prove toxic.


Author(s):  
Kuanchin Chen

Sharing, disseminating, and presenting data in digital format is not just a fad, but it is becoming part of our life. Without careful planning, digitized resources could easily be misused, especially those that are shared across the Internet. Examples of such misuse include use without the owner’s permission, and modification of a digitized resource to fake ownership. One way to prevent such behaviors is to employ some form of copyright protection technique, such as digital watermarks. Digital watermarks refer to the data embedded into a digital source (e.g., images, text, audio, or video recording). They are similar to watermarks in printed materials as a message inserted into the host media typically becomes an integral part of the media. Apart from traditional watermarks in printed forms, digital watermarks may also be invisible, may be in the forms other than graphics, and may be digitally removed.


2008 ◽  
pp. 731-769
Author(s):  
A. G. Acevedo

The recent explosion of the Internet as a collaborative medium has opened the door for people who want to share their work. Nonetheless, the advantages of such an open medium can pose very serious problems for authors who do not want their works to be distributed without their consent. As new methods for copyright protection are devised, expectations around them are formed and sometimes improvable claims are made. This chapter covers one such technology: audio watermarking. First, the field is introduced, and its properties and applications are discussed. Then, the most common techniques for audio watermarking are reviewed, and the framework is set for the objective measurement of such techniques. The last part of the chapter proposes a novel test and a set of metrics for thorough benchmarking of audio watermarking schemes. The development of such a benchmark constitutes a first step towards the standardization of the requirements and properties that such systems should display.


Author(s):  
Anna C. McFadden

The simple nature of podcasting and Really Simple Syndication (RSS) belies the power for change embodied in them, either singly or in tandem. On the surface, podcasting is merely the recording of an audio file in MP3 format for sharing on the Internet, an MP3 player or some other device; this chapter covers the history and technical aspects of that process. Podcasting and the RSS feeds that keep consumers of podcasting connected to the source are examined as part of a larger movement in computer mediated collaboration that centers on mobility, immediacy, and interactivity. Podcasting, as a personal tool or an organizationally managed one is examined in terms of types of podcasts, their current applications and future trends that can be anticipated in their use..


Author(s):  
Giaime Ginesu ◽  
Mirko Luca Lobina ◽  
Daniele D. Giusto

Authentication is the way of identifying an individual. The techniques used to accomplish such practice strongly depend on the involved parties, their interconnection, and the required level of security. In all cases, authentication is used to enforce property protection, and may be specifically intended for the copyright protection of digital contents published on the Internet. This chapter introduces the basic concepts of authentication, explaining their relationship with property protection. The basic functionalities of challenge-response frameworks are presented, together with several applications and the future trends.


Sign in / Sign up

Export Citation Format

Share Document