000021997 000__ 03007cam\a2200493\i\4500 000021997 001__ 21997 000021997 003__ SzGeWIPO 000021997 005__ 20210318104849.0 000021997 008__ 970327s1997\\\\maua\\\\rb\\\\001\0\eng\\ 000021997 020__ $$a0127887717$$qacidfree paper 000021997 020__ $$z9780127887715$$qacid-free paper 000021997 035__ $$a(wipo)(CD )98-0294 000021997 035__ $$a(OCoLC)37004369 000021997 040__ $$aSzGeWIPO$$beng$$erda$$cSzGeWIPO$$dCaBNVSL 000021997 043__ $$an-us--- 000021997 05000 $$aQA76.9.A25$$bW39 1997 000021997 08204 $$a005.8$$221 000021997 08204 $$a341.75820285$$221 000021997 084__ $$aN 631 WAY.D 000021997 090__ $$c23786$$d23786 000021997 1001_ $$aWayner, Peter,$$d1964-$$eauthor. 000021997 24510 $$aDigital copyright protection /$$cPeter Wayner. 000021997 264_1 $$aBoston, Mass. :$$bAP Professional,$$cc1997. 000021997 300__ $$axi, 227 pages :$$billustrations ;$$c24 cm 000021997 336__ $$atext$$btxt$$2rdacontent 000021997 337__ $$aunmediated$$bn$$2rdamedia 000021997 338__ $$avolume$$bnc$$2rdacarrier 000021997 504__ $$aIncludes bibliographical references (pages 215-221) and index. 000021997 5050_ $$a1. Copyright Battles -- 2. Cryptography -- 3. Subliminal Signatures -- 4. Compression -- 5. Codes and Errors -- 6. Locking Data -- 7. White Space -- 8. Mimic Functions -- 9. Pixel Modification -- 10. Grouping Bits -- 11. Wave Techniques -- 12. Copyright Software -- 13. Original Conundrums -- A. Permission -- B. Important Patents -- C. Bibliography. 000021997 520__ $$a"Digital Copyright Protection describes how to defend copyrighted material in an age when digital technology makes copying cheap and easy. In this highly acclaimed book, Wayner has composed a thorough guide to watching, tracing, and locking up copyrighted material, making this book a necessity for anyone planning on controlling their work in the modern digital era." "This encompassing guide to defending digital copyright includes detailed discussions on network-based key systems, compression-based tagging, and tamper-resistant tagging. Discussions also address key-based systems that lock up information until the right key is entered, embedding information in the images, music, or text." "The techniques discussed focus on tagging documents with messages that indicate the rightful owner of the document and the copyright holder. These tags can be inserted in text files, images, or sound files." "The book also explores key-based systems for keeping data secure until someone purchases it. These keys can be distributed by phone, stores, or the Internet."--Jacket. 000021997 650_0 $$aCopyright infringement. 000021997 650_0 $$aCopyright and electronic data processing. 000021997 650_0 $$aCopyright. 000021997 650_0 $$aPatents. 000021997 650_4 $$aSUBLIMINAL SIGNATURES 000021997 650_4 $$aCOPYRIGHT : BERNE CONVENTION, PROTECTED PERSONS AND OBJECTS : PROTECTED WORKS : COMPUTER WORKS 000021997 650_4 $$aDIGITAL COPYRIGHT PROTECTION 000021997 650_4 $$aCOPYRIGHT SOFTWARE 000021997 650_4 $$aCRYPTOGRAPHY 000021997 650_4 $$aCOMPRESSION OF DATA 000021997 903__ $$v1 000021997 942__ $$cMON 000021997 952__ $$w2006-11-03$$p1998-0294$$r45.28$$u34134$$bMAIN$$10$$kN 631 WAY.D$$v1998-03-13$$zTagged$$71 000021997 980__ $$aBIB 000021997 999__ $$c23786$$d23786