Protecting Digital Property:
Algorithms to Solutions
Outline
What are we trying to
protect?
Usage Rights
Tools: Technological
Encryption: Private Key
(Symmetric)
Private Key Encryption
Encryption: Public Key
Encryption: Public Key cont.
Copyright Law
Title 17 Section 106
Cont’d
Copyright
Sec. 107. Limitations on
exclusive rights: Fair use
Fair Use
Case Study: eBooks
Encryption Scheme Broken
Case Study: DVD’s
Set-up
DVD’s cont.
DVD’s cont.
DVD’s cont.
Watermarking
Uses for Watermarking
Invisible Watermarks
E-Commerce Image Content
Pressures
Security Challenges
The MediaBin Platform
MediaBin Platform Benefits
Core Image Asset model
Typical Path for Web Image
Content
Web Image Content via
MediaBin
MediaBin Overview
Ford Enterprise Image
Catalog
“Just-in-time” Image
Production
Image Composition
Auto
configurations managed by layers
Slide 37
E-business Collateral
Auto-composition
MediaBin Overview
Distributed Access
Task Automation
Image Sourcing
a
patent-pending method of tracking image origin
Conclusions
MediaBin Provides