Consideration on combinatorial optimization of illegal copy countermeasures (Japanese)

In: Transactions of the Information Processing Society of Japan   ;  43 ,  8  ;  2435-2446  ;  2002
  • ISSN:
  • Article (Journal)  /  Print

How to get this document?

The progress of the Internet leads to the increase of distribution of digital contents, for example, music, still picture and motion picture in networks. This trend also leads to the increase of illegal copying without permission of a person who has the copyright. Although, this situation requires the countermeasures to protect illegal copying, it is impossible to find one perfect countermeasure. To obtain the optimal combination of these countermeasures, we propose the method based on the combinatorial optimization technique and fault tree analysis. By applying this method to some cases, we show the actual optimal combinations in each case.

Table of contents – Volume 43, Issue 8

Show all volumes and issues

The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.

2372
Digital security token and its derivatives
Matsuura, K. | 2002
2394
Biometric personal authentication using DNA data
Itakura, Y. / Nagashima, T. / Tsujii, S. | 2002
2435
Consideration on combinatorial optimization of illegal copy countermeasures
Sasaki, R. / Yoshiura, H. / Itoh, S. | 2002
2467
Virus extermination method using vaccine with chase ability
Nakaya, N. / Koui, Y. / Suzuki, M. | 2002
2529
Maintaining image quality in motion picture watermarking based on motion detection
Echizen, I. / Yoshiura, H. / Taguchi, J. / Nakano, K. / Sasaki, R. | 2002
2542
Implementation and evaluation of remote patrol system for Web server
Takemori, K. / Tanaka, T. / Nakao, K. / Ohigashi, T. / Miyake, T. / Shiraishi, Y. / Morii, M. | 2002
2552
Secure Tele-operation Protocol for the firewall in the control system
Kato, H. / Tamano, M. / Furuya, M. / Miyao, T. | 2002
2562
A privacy-enhanced SSL access control with authorization certificates
Umesawa, K. / Saito, T. / Okuno, H.G. | 2002
2610
Implementation and evaluation of certificate management mechanism for HTTPS
Wakayama, K. / Takasu, T. / Murase, S. / Suzuki, S. / Iwata, A. | 2002
2674
Object-oriented framework development method based on a three-view model
Hayase, T. / Matsumoto, K. | 2002
2687
Numerical simulation of dialysate flow in a hollow-fiber dialyzer
Osuga, T. / Ikehira, H. / Obata, T. / Homma, K. / Yamane, S. / Naito, H. | 2002
2697
A QoS-control method on video distribution by means of RTP
Shimotsuma, Y. / Fukuda, K. / Okumura, S. / Takatori, N. / Ohno, T. / Mizuno, T. | 2002
2728
A synthesis of structural adaptive learning algorithm in neural network based on the theory of evolution
Oeda, S. / Ichimura, T. / Terauchi, M. / Takahama, T. / Isomichi, Y. | 2002
2764
A study of learning support system for integrative study
Obayashi, F. / Yamamoto, A. / Ito, K. / Shimoda, H. / Yoshikawa, H. | 2002
2774
Representation of volumetric data with immersive image and haptics
Hashimoto, W. / Iwata, H. | 2002
2821
"e-office", a communication support system for distributed workers using media space
Sakakibara, K. / Kato, M. / Tadokoro, Y. / Miyasaki, T. | 2002