Special

Introducing the “Welcome to Xojo” Bundle!

New to Xojo and looking for guidance? We've put together a terrific bundle to welcome you! Xojo Bundle

This bundle includes six back issues of the magazine -- all of year 14 in printed book and digital formats -- plus a one-year subscription so you'll be learning all about Xojo for the next year. It's the perfect way to get started programming with Xojo. And you save as much as $35 over the non-bundle price!

This offer is only available for a limited time as supplies are limited, so hurry today and order this special bundle before the offer goes away!

Article Preview


Buy Now

PDF:

Feature

REALSecure

Leave Your Mark

Issue: 6.6 (September/October 2008)
Author: JC Cruz
Article Description: No description available.
Article Length (in bytes): 23,600
Starting Page Number: 27
RBD Number: 6612
Resource File(s):

Download Icon 6612.zip Updated: Monday, September 1, 2008 at 2:43 PM

Related Web Link(s):

http://en.wikipedia.org/wiki/Digital_watermarks
http://en.wikipedia.org/wiki/Eurion
http://w2.eff.org/Privacy/printers/docucolor/

Known Limitations: None

Excerpt of article text...

In today's REALSecure article, we will study the concept of digital watermarks. First, we will learn how a watermark protects an image from unfair use. Then, we will look at three forms of watermark algorithms. Next, we will implement these algorithms into a finite-state machine or FSM. We will then use this FSM to mark a basic test image.

The Problem Of Ownership

One of the challenges faced by today's digital artists is to protect their images against unfair use. When they share their image files with other people, using either physical media or the Net, they expose those files to potential abuse. For instance, an unscrupulous user may add a copy of the image, unmodified and without permission, into their image files (plagiarism). Another may try to pass the image file as their own (theft). Others may even create and sell copies of the image without compensation to the original artist.

There are several ways a digital artist can protect their work. One simple way is to "sign" their work using their name or website's URL. But in order to avoid marring the image, they have to place the signature near the image's corner or side. A casual thief can then use basic image software, like Gimp or Picasa, to remove that signature by cropping. Also, a text signature is easy to forge or replace, making it harder for the artist to prove his ownership.

...End of Excerpt. Please purchase the magazine to read the full article.

Article copyrighted by REALbasic Developer magazine. All rights reserved.


 


|

 


Weblog Commenting and Trackback by HaloScan.com