Title :
Copyright protection for the electronic distribution of text documents
Author :
Brassil, Jack T. ; Low, Steven ; Maxemchuk, Nicholas F.
Author_Institution :
Lucent Technol., Bell Labs., Murray Hill, NJ, USA
fDate :
7/1/1999 12:00:00 AM
Abstract :
Each copy of a text document can be made different in a nearly invisible way by repositioning or modifying the appearance of different elements of text, i.e., lines, words, or characters. A unique copy can be registered with its recipient, so that subsequent unauthorized copies that are retrieved can be traced back to the original owner. In this paper we describe and compare several mechanisms for marking documents and several other mechanisms for decoding the marks after documents have been subjected to common types of distortion. The marks are intended to protect documents of limited value that are owned by individuals who would rather possess a legal than an illegal copy if they can be distinguished. We describe attacks that remove the marks and countermeasures to those attacks. An architecture is described for distributing a large number of copies without burdening the publisher with creating and transmitting the unique documents. The architecture also allows the publisher to determine the identity of a recipient who has illegally redistributed the document, without compromising the privacy of individuals who are not operating illegally. Two experimental systems are described. One was used to distribute an issue of the IEEE Journal on Selected Areas in Communications, and the second was used to mark copies of company private memoranda
Keywords :
copy protection; copyright; document image processing; electronic publishing; security of data; company private memoranda; copyright protection; distortion; document marking; document protection; electronic text document distribution; illegal document redistribution; mark decoding; mark removal attacks; privacy; unique copy registration; Computer crime; Computer networks; Copyright protection; Decoding; Document delivery; IP networks; Information security; Law; Legal factors; Privacy;
Journal_Title :
Proceedings of the IEEE