A set of technologies that control the access and use of digital works. The technology is usually some sort of digital code.
Denial of Service Attack (DoS)
Prevents the normal use or management of communication services, e.g. a network may be flooded with messages that cause a degradation of service or shutdown.
A term used to describe how the internet can be used to distribute works ignoring the restriction of copyright laws.
If the security is broken on a device then the impact is restricted to that device.
When the digital work can be uniquely identified by a has value calculated from the digital work itself. The 'fuzziness' comes in because minor modifications that do not significantly affect the perception of the work should not change the hash value.
Draconian DRM system
Devices with this system can only handle managed (protected) digital works.
Refers to techniques for embedding marks in digital works to give additional protection by tying copyright information to the server.
A form of copyright marking that includes some means of identifying the original purchaser of the work.
Embedding a detection watermark into digital content which fraudulently generates revenue for someone other than the intended recipient.
In the context of digital watermarking, the copyright info is embedded within the digital work so that the identity of the copyright holders can be identified.
In the context of digital watermarking, a device that reads the watermark to determine the restrictions imposed on the device.
In the context of digital watermarking, the presence of a watermark should not affect the quality of the digital work to a degree that is detectable by humans.
A watermark ability to be able to survive a range of intentional and unintentional degradations. Increasing robustness can decrease perceptual transparency.
A watermark is detected WITHOUT a knowledge of the un-watermarked work.
A watermark is detected WITH a knowledge of the un-watermarked work.
When you use piracy to get hold of a copyrighted works, such as downloading a film from a peer-to-peer website.
Using the original digital works (such as a legitimate CD) in order to copy and distribute illegal copies for financial gain.
The presence of a fragile watermark can indicate that no changes have been made.
An example of 'unauthorised embedding'. The result of the attack gives the appearance of a new watermark being embedded.
An attack with a goal of creating a digital work that is perceptually similar to the original but it doesn't trigger the watermark detection. Alterations made in small steps.
If security is broken once, then the means of attack applies to many devices.
Extracting and decoding watermark info, which may contain sensitive data such as bank details.
making watermarked content indistinguishable from non-watermarked content, allowing unrestricted use, for example.