By Topic

IEEE Signal Processing Magazine

Issue 2 • Mar 2004

Filter Results

Displaying Results 1 - 25 of 26
  • xCP: peer-to-peer content protection

    Publication Year: 2004, Page(s):71 - 81
    Cited by:  Papers (9)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (592 KB) | HTML iconHTML

    In this article, we present a new protocol for implementing an authorized domain, a collection of devices that are equally authorized to play content. This is a new direction for content protection schemes that represents a careful balance between the needs and wants of consumers and content owners. Our protocol is a novel application of cryptographic technique known as broadcast encryption in a c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Can digital rights management be standardized?

    Publication Year: 2004, Page(s):63 - 70
    Cited by:  Papers (8)  |  Patents (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (540 KB) | HTML iconHTML

    With increasing use of the Internet as a content-distribution platform, mere interoperability of the codec is no longer sufficient if content owners are not prepared to distribute their content online for fear of piracy. Therefore, one also needs interoperability in the area of managing and protecting related intellectual property rights. To provide interoperability of digital rights management (D... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Authentication gets personal with biometrics

    Publication Year: 2004, Page(s):50 - 62
    Cited by:  Papers (53)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (761 KB) | HTML iconHTML

    Securing the exchange of intellectual property and providing protection to multimedia contents in distribution systems have enabled the advent of digital rights management (DRM) systems. User authentication, a key component of any DRM system, ensures that only those with specific rights are able to access the digital information. It is here that biometrics play an essential role. It reinforces sec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The joys of leading an academic department

    Publication Year: 2004, Page(s):8 - 122
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (277 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • When seeing isn't believing [multimedia authentication technologies]

    Publication Year: 2004, Page(s):40 - 49
    Cited by:  Papers (96)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (738 KB) | HTML iconHTML

    Digital multimedia is ubiquitous today. Multimedia is easily reproduced and modified without any trace of manipulations. In most cases, a human will not be able to judge whether a multimedia signal is authentic by perceptual inspection. In this article we provide a compact yet fairly comprehensive introduction of multimedia authentication (MA) to the general signal processing audience. The article... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Society news

    Publication Year: 2004, Page(s): 6
    Request permission for commercial reuse | PDF file iconPDF (239 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advertisers index

    Publication Year: 2004, Page(s): 128
    Request permission for commercial reuse | PDF file iconPDF (192 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Copy protection system for digital home networks

    Publication Year: 2004, Page(s):100 - 108
    Cited by:  Papers (12)  |  Patents (24)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (632 KB) | HTML iconHTML

    This article describes the rationale supporting and design of a copy protection system called SmartRight. While carefully presenting our motivations, some light is shed on the very peculiar problems raised by the enforcement of copy protection. Hence, this article also explores less technical but highly important issues such as the legal and commercial aspects. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Gift of Giving: A Call to Contributors and Volunteers - From the editor

    Publication Year: 2004, Page(s): 2
    Request permission for commercial reuse | PDF file iconPDF (196 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New products

    Publication Year: 2004, Page(s): 124
    Request permission for commercial reuse | PDF file iconPDF (227 KB) | HTML iconHTML
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital rights management in consumer electronics products

    Publication Year: 2004, Page(s):82 - 91
    Cited by:  Papers (23)  |  Patents (30)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (735 KB) | HTML iconHTML

    In the current consumer electronics (CE) environment, we see many activities in content protection and digital rights management (DRM) which could lead to a situation with many standards and unnecessary limitations on the flow of content over various devices. As a result, the main challenge in the CE environment is to develop DRM solutions that allow interacceptable exchange of content that is acq... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Technological protection measures in the courts

    Publication Year: 2004, Page(s):109 - 117
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (540 KB) | HTML iconHTML

    This article is about the similarities and differences that exist between law and engineering. It is about the nature and value of interdisciplinary research and the importance this approach will have in dealing with the problems associated with media piracy and unauthorized use of digital information. The aim of this article is to explore legal reasoning as it applies to the technological protect... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic identification of sound recordings

    Publication Year: 2004, Page(s):92 - 99
    Cited by:  Papers (20)  |  Patents (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (621 KB) | HTML iconHTML

    We have designed an automatic song identification component of a digital rights management (DRM) system for music, called MusicDNA. The details of MusicDNA are presented and the process by which we arrived at the final system configuration is outlined. This paper documents our experiences so that it can serve as a reference to those seeking to build a complete DRM system for music. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data hiding for fighting piracy

    Publication Year: 2004, Page(s):28 - 39
    Cited by:  Papers (43)  |  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (714 KB) | HTML iconHTML

    The problem of digital content piracy is becoming more and more critical, and major content producers are risking seeing their business being drastically reduced because of the ease by which digital contents can be copied and distributed. This is the reason why digital rights management (DRM) is currently garnering much attention from industry and research. Among the various technologies that can ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The chirp z-transform algorithm-a lesson in serendipity

    Publication Year: 2004, Page(s):118 - 119
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (265 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ICASSP 2004 in Montreal

    Publication Year: 2004, Page(s):120 - 122
    Request permission for commercial reuse | PDF file iconPDF (512 KB)
    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IEEE Signal Processing Magazine

    Publication Year: 2004, Page(s): 0_1
    Request permission for commercial reuse | PDF file iconPDF (1227 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2004, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (190 KB)
    Freely Available from IEEE
  • Publications - President's message

    Publication Year: 2004, Page(s):4 - 5
    Request permission for commercial reuse | PDF file iconPDF (254 KB) | HTML iconHTML
    Freely Available from IEEE
  • Call for Papers - Announcement

    Publication Year: 2004, Page(s): 7
    Request permission for commercial reuse | PDF file iconPDF (186 KB)
    Freely Available from IEEE
  • Digital Rights Management - from the guest editors

    Publication Year: 2004, Page(s):11 - 14
    Cited by:  Papers (8)
    Request permission for commercial reuse | PDF file iconPDF (326 KB) | HTML iconHTML
    Freely Available from IEEE
  • Collusion-resistant fingerprinting for multimedia

    Publication Year: 2004, Page(s):15 - 27
    Cited by:  Papers (86)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (840 KB) | HTML iconHTML

    Digital fingerprinting is a technology for enforcing digital rights policies whereby unique labels, known as digital fingerprints, are inserted into content prior to distribution. For multimedia content, fingerprints can be embedded using conventional watermarking techniques that are typically concerned with robustness against a variety of attacks mounted by an individual. These attacks, known as ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Announcement

    Publication Year: 2004, Page(s): 123
    Request permission for commercial reuse | PDF file iconPDF (123 KB)
    Freely Available from IEEE
  • Call for Participation

    Publication Year: 2004, Page(s): 126
    Request permission for commercial reuse | PDF file iconPDF (91 KB)
    Freely Available from IEEE
  • Call for Papers

    Publication Year: 2004, Page(s): 127
    Request permission for commercial reuse | PDF file iconPDF (298 KB)
    Freely Available from IEEE

Aims & Scope

IEEE Signal Processing Magazine publishes tutorial-style articles on signal processing research and applications, as well as columns and forums on issues of interest. Its coverage ranges from fundamental principles to practical implementation, reflecting the multidimensional facets of interests and concerns of the community. Its mission is to bring up-to-date, emerging and active technical developments, issues, and events to the research, educational, and professional communities. It is also the main Society communication platform addressing important issues concerning all members.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Min Wu
University of Maryland, College Park
United States
http://www.ece.umd.edu/~minwu/