An approach to restrict viewing of media
Nowadays, the issue of copyright infringement of media contents becomes more vital since the media content is published on the internet for easy access to users.Due to that, the authors’ work affect adversely if their work can be copied or downloaded, modified or shared illegally by unauthorized use...
Saved in:
Main Authors: | , |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2015
|
Subjects: | |
Online Access: | http://repo.uum.edu.my/15565/1/PID220.pdf http://repo.uum.edu.my/15565/ http://www.icoci.cms.net.my/proceedings/2015/TOC.html |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Utara Malaysia |
Language: | English |
id |
my.uum.repo.15565 |
---|---|
record_format |
eprints |
spelling |
my.uum.repo.155652016-04-12T02:18:11Z http://repo.uum.edu.my/15565/ An approach to restrict viewing of media Abd Aziz, Norazah Mohamad Yusof, Raja Mohamad Fairuz QA75 Electronic computers. Computer science TK Electrical engineering. Electronics Nuclear engineering Nowadays, the issue of copyright infringement of media contents becomes more vital since the media content is published on the internet for easy access to users.Due to that, the authors’ work affect adversely if their work can be copied or downloaded, modified or shared illegally by unauthorized users.In this paper, we proposed a method to restrict the viewing of images to control the media content accessibility.The method is using basic encryption scheme in order to prevent copyright violations, means, user who does not have specific player and/or with correct password can still view the grey-scale part of the media work in order to accomplish the marketing purposes.The encryption scheme integrates with certain properties such frequency and/or date time which will be used as a salt parameter for Password Based Key Derivation Function 2 (PBKDF2). The method also uses Color Lookup Table (CLUT) as an input to encrypt color table which the decryption process relies on the properties and the correct password. 2015-08-11 Conference or Workshop Item PeerReviewed application/pdf en http://repo.uum.edu.my/15565/1/PID220.pdf Abd Aziz, Norazah and Mohamad Yusof, Raja Mohamad Fairuz (2015) An approach to restrict viewing of media. In: 5th International Conference on Computing and Informatics (ICOCI) 2015, 11-13 August 2015, Istanbul, Turkey. http://www.icoci.cms.net.my/proceedings/2015/TOC.html |
institution |
Universiti Utara Malaysia |
building |
UUM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Utara Malaysia |
content_source |
UUM Institutionali Repository |
url_provider |
http://repo.uum.edu.my/ |
language |
English |
topic |
QA75 Electronic computers. Computer science TK Electrical engineering. Electronics Nuclear engineering |
spellingShingle |
QA75 Electronic computers. Computer science TK Electrical engineering. Electronics Nuclear engineering Abd Aziz, Norazah Mohamad Yusof, Raja Mohamad Fairuz An approach to restrict viewing of media |
description |
Nowadays, the issue of copyright infringement of media contents becomes more vital since the media content is published on the internet for easy access to users.Due to that, the authors’ work affect adversely if their work can be copied or downloaded, modified or shared illegally by unauthorized users.In this paper, we proposed a method to restrict the viewing of images to control the media content accessibility.The method is using basic encryption scheme in order to prevent copyright violations, means, user who does not have specific player and/or with correct password can still view the grey-scale part of the media work in order to accomplish the marketing
purposes.The encryption scheme integrates with certain properties such frequency and/or date time which will be used as a salt parameter for
Password Based Key Derivation Function 2 (PBKDF2). The method also uses Color Lookup Table (CLUT) as an input to encrypt color table which the decryption process relies on the properties and the correct password. |
format |
Conference or Workshop Item |
author |
Abd Aziz, Norazah Mohamad Yusof, Raja Mohamad Fairuz |
author_facet |
Abd Aziz, Norazah Mohamad Yusof, Raja Mohamad Fairuz |
author_sort |
Abd Aziz, Norazah |
title |
An approach to restrict viewing of media |
title_short |
An approach to restrict viewing of media |
title_full |
An approach to restrict viewing of media |
title_fullStr |
An approach to restrict viewing of media |
title_full_unstemmed |
An approach to restrict viewing of media |
title_sort |
approach to restrict viewing of media |
publishDate |
2015 |
url |
http://repo.uum.edu.my/15565/1/PID220.pdf http://repo.uum.edu.my/15565/ http://www.icoci.cms.net.my/proceedings/2015/TOC.html |
_version_ |
1644281749824339968 |