Protecting Digital Property: Algorithms to Solutions

Outline

What are we trying to protect?

Usage Rights

Tools: Technological

Encryption: Private Key (Symmetric)

Private Key Encryption

Encryption: Public Key

Encryption: Public Key cont.

Copyright Law

Title 17 Section 106

Cont’d

Copyright

Sec. 107. Limitations on exclusive rights: Fair use

Fair Use

Case Study: eBooks

Encryption Scheme Broken

Case Study: DVD’s

Set-up

DVD’s cont.

DVD’s cont.

DVD’s cont.

Watermarking

Uses for Watermarking

Invisible Watermarks

E-Commerce Image Content Pressures

Security Challenges

The MediaBin Platform

MediaBin Platform Benefits

Core Image Asset model

Typical Path for Web Image Content

Web Image Content via MediaBin

MediaBin Overview

Ford Enterprise Image Catalog

“Just-in-time” Image Production

Image Composition
Auto configurations managed by layers

Slide 37

E-business Collateral Auto-composition

MediaBin Overview

Distributed Access

Task Automation

Image Sourcing
a patent-pending method of tracking image origin

Conclusions

MediaBin Provides