scispace - formally typeset
Search or ask a question

Showing papers by "Cormac Herley published in 2000"


Patent
25 May 2000
TL;DR: A barcode system for generating and decoding a barcode with visual significance is described in this article. But it does not address the problem of recovering the message specified by the visually significant barcode.
Abstract: A barcode system for generating and decoding a barcode with visual significance. The barcode system of the present invention includes an encoding module for receiving a message and a logo and generating a visually significant barcode based on these inputs. A decoding module is also provided for receiving an acquired version of a visually significant barcode that may have been degraded in a typical document handling channel (e.g., through the printing, scanning, or copying process) and for recovering the message specified by the visually significant barcode.

63 citations


Patent
Cormac Herley1
04 May 2000
TL;DR: In this paper, a user is presented with a degraded version of a digital object, and the user can request portions of the degraded version to experience the requested portion before the user is allowed to experience it.
Abstract: Methods and systems of protecting digital objects are described. In one embodiment, a user is presented with a degraded version of a digital object. An exemplary degraded version might be a thumbnail version of a digital image. The user can then request portions of the degraded version of the object. Before a user is allowed to experience the requested portion, it is processed to perturb the portion in a manner that is generally imperceptible to the user. The user can request multiple portions and each portion is advantageously perturbed. In one embodiment, each of the multiple requested portions are perturbed differently so that if a user attempts to assemble the individual portions, they will not fit together. Each perturbation, however, when experienced individually by a user, is generally imperceptible to the user. Rule-based methods and systems for protecting digital objects by constraining a user's browsing behavior are also described.

4 citations


Proceedings ArticleDOI
Cormac Herley1
10 Sep 2000
TL;DR: A method of allowing a client to browse an image to examine it in detail, while making it difficult to steal, differs from invisible watermarking methods in that it attempts to prevent theft, rather than detect or verify theft after it has happened.
Abstract: The paper covers a method of allowing a client to browse an image to examine it in detail, while making it difficult to steal. It differs from invisible watermarking methods in that it attempts to prevent theft, rather than detect or verify theft after it has happened. The image is served to the client in parts. The parts are imperceptibly altered. No effort is made to protect individual parts; however, the alterations ensure that putting the parts together is extremely difficult without clearly visible distortion. Thus, the client can view any part of the image in detail, but is unable to obtain a usable copy of the whole.

2 citations