Thursday, November 24, 2005

Bushnell 10x40 Tactical Fake

IPR. THE CASE OF THE IMAGES IN WEB USABILITY


The IPR problem. The case of the images on the web

The problem IPR (intellectual property rights, intellectual property rights) is tricky. Intuitively, a website to be quality should comply with the IPR.
What is put on the web is published, that is made publicly available to be read and consulted, not to be reused without the knowledge of the author (who holds the intellectual property right on what he has published). But in the digital copying of content that can be done quickly, and especially without a trace.
For images can come from a partial defense watermarks or steganography.
The watermark (see for example the images provided by the site www.corbis.com )
inserted so visible in the name of the owner of rights of use image (in this case Corbis). It can not be reused freely downloaded in public contexts of production (printing a weekly newspaper, a newspaper, a book) no one knows where it came from.
Not always, however, may use the watermark to protect an image from misuse, because sometimes the picture published on the web must be 'clean': the typical case of a museum that publishes pictures of possessions. In such cases, it makes use of steganography , that the 'writing' into the image of a series of information relating to the owner of rights to the source from which the image comes, and the like. To write into the image takes advantage of the fact that 64 million color shades available in images with color depth of 32 bits are more than the human eye can discriminate: many of these nuances are not distinct. Then a map of pixels corresponding to the characters to write is created by changing a bit with the movement of the value of the pixels of an image.
With the software tools that you download s-at http://www.electronetmodena.it/s-tools4.zip (there are many, this is easy to use and has to be installed) you can try how steganography. Drag the main window image GIF or BMP. Then drag the image to a text file that you want to hide the image. The program asks you to that point, a word or phrase with which to encrypt the text, and the choice of an encryption algorithm. Then you generate a new image that contains within the text file encrypted.
As you can see there are perceptible differences. To extract the text you drag the image steganography in the main s-tools, then click with the secondary button, and then reveal, at which point the program asks you the word or phrase with which you had encrypted steganographic and the text, choose The algorithm used for encryption, and the program extracts the files you have hidden.
Steganography allows you to demonstrate that a digital image has a certain identity, but will not protect against theft.
The issue of respect and protection of intellectual property rights is very thorny and the approach adopted is therefore usually a conservative and defensive approach: the content is not online can not be stolen. It looks like a partial approach that does not solve all the problems. However, it is the only one at the moment, "cheap".

0 comments:

Post a Comment