JH HSIAO - Academia.edu (original) (raw)

JH HSIAO

Related Authors

Alberto Albuquerque

International Journal  IJRITCC

Jana  Javornik

Gwen Robbins Schug

Gabriel Gutierrez-Alonso

John Sutton

Kevin Arbuckle

Lev Manovich

Lev Manovich

Graduate Center of the City University of New York

Richard Cloutier

Uploads

Papers by JH HSIAO

Research paper thumbnail of Effective content tracking for digital rights management in digital libraries

A usual way for content protection of digital libraries is to use digital watermarks and a DRM-ba... more A usual way for content protection of digital libraries is to use digital watermarks and a DRM-based access-control environment. These methods, however, have limitations. Digital watermarks embedded in digital content could be removed by malicious users via post-processing, whereas DRM-based access-control solutions could be hacked. In this paper, we introduce a content tracking mechanism that we have built for multimedia-content

Research paper thumbnail of Constructing a wrapper-based DRM system for digital content protection in digital libraries

Conventional digital libraries utilize access control and digital watermarking techniques to prot... more Conventional digital libraries utilize access control and digital watermarking techniques to protect their digital content. These methods, however, have drawbacks. First, after passing the identity authentication process, authorized users can easily redistribute the digital assets. Second, it is impractical to expect a digital watermarking scheme to prevent all kinds of attack. Thus, how to enforce property rights after digital content has been released to authorized users is a crucial and challenging issue. In this paper, we propose a wrapper-based approach to digital content protection that integrates digital watermarking, cryptography, information protection technology, and a rights model. In this rights enforcement environment, the behavior of all content players is monitored and digital content can only be accessed after certain usage rules have been satisfied. Furthermore, the proposed architecture can be easily integrated into any digital content player, or even existing DRM systems in digital libraries. With the protection of the proposed DRM system, the abuse of digital content can be drastically reduced.

Research paper thumbnail of Image Copy Detection via Grouping in Feature Space based on Virtual Prior Attacks

In the past, many researches on image copy detection focused on finding a feature that is robust ... more In the past, many researches on image copy detection focused on finding a feature that is robust enough for various kinds of image attacks. But it is difficult to find a globally effective feature that is appropriate for many situations. In this paper, we introduce a classification framework to this problem, instead of solving the feature-selection problem. In our approach,

Research paper thumbnail of Effective content tracking for digital rights management in digital libraries

A usual way for content protection of digital libraries is to use digital watermarks and a DRM-ba... more A usual way for content protection of digital libraries is to use digital watermarks and a DRM-based access-control environment. These methods, however, have limitations. Digital watermarks embedded in digital content could be removed by malicious users via post-processing, whereas DRM-based access-control solutions could be hacked. In this paper, we introduce a content tracking mechanism that we have built for multimedia-content

Research paper thumbnail of Constructing a wrapper-based DRM system for digital content protection in digital libraries

Conventional digital libraries utilize access control and digital watermarking techniques to prot... more Conventional digital libraries utilize access control and digital watermarking techniques to protect their digital content. These methods, however, have drawbacks. First, after passing the identity authentication process, authorized users can easily redistribute the digital assets. Second, it is impractical to expect a digital watermarking scheme to prevent all kinds of attack. Thus, how to enforce property rights after digital content has been released to authorized users is a crucial and challenging issue. In this paper, we propose a wrapper-based approach to digital content protection that integrates digital watermarking, cryptography, information protection technology, and a rights model. In this rights enforcement environment, the behavior of all content players is monitored and digital content can only be accessed after certain usage rules have been satisfied. Furthermore, the proposed architecture can be easily integrated into any digital content player, or even existing DRM systems in digital libraries. With the protection of the proposed DRM system, the abuse of digital content can be drastically reduced.

Research paper thumbnail of Image Copy Detection via Grouping in Feature Space based on Virtual Prior Attacks

In the past, many researches on image copy detection focused on finding a feature that is robust ... more In the past, many researches on image copy detection focused on finding a feature that is robust enough for various kinds of image attacks. But it is difficult to find a globally effective feature that is appropriate for many situations. In this paper, we introduce a classification framework to this problem, instead of solving the feature-selection problem. In our approach,

Log In