Security in Computing (3rd Edition)

Info icon This preview shows pages 1–12. Sign up to view the full content.

View Full Document Right Arrow Icon
Watermarking Doug Tygar
Image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
How can we mark data We want to protect data: Video, sound, music (Digimarc, Intertrust, etc) Programs (Collberg, Thomborson) Statistical data Examples of “traditional” protection methods: False entries in biographical dictionaries Copyright notices Licensing agreements Secure coprocessors
Image of page 2