Car Rental System

Read Complete Research Material

CAR RENTAL SYSTEM

Car Rental System

Name of the Writer

Name of the Institution

Car Rental System

introduction

Digital watermarking remains a largely untested field and only very few large industrial consortiums have published requirements against which algorithms should be tested , . For instance the International Federation for the Phonographic Industry led one of the first large scale comparative testing of car rental system algorithm for audio. In general, a number of broad claims have been made about the 'robustness' of various digital car rental system or fingerprinting methods but very few researchers or companies have published extensive tests on their systems.

The growing number of attacks against car rental system systems has shown that far more research is required to improve the quality of existing car rental system methods so that, for instance, the coming JPEG 2000 (and new multimedia standards) can be more widely used within electronic commerce applications.

scope of the evaluation

Car rental system algorithms are often used in larger system designed to achieve certain goals (e.g., prevention of illegal copying). For instance Herrigel et al. presented a system for trading images; this system uses car rental system technologies but relies heavily on cryptographic protocols. Such systems may be flawed for other reasons than car rental system itself; for instance the protocol, which uses the watermark, may be wrong or the random number generator used by the watermark embedder may not be good. In this paper we are only concerned with the evaluation of car rental system (so the signal processing aspects) within the larger system not the effectiveness of the full system to achieve its goals.

target of evaluation

The first step in the evaluation process is to clearly identify the target of evaluation, that is the car rental system scheme (set of algorithms required for embedding and extraction) subject to evaluation and its purpose. The purpose of a scheme is defined by one or more objectives and an operational environment. For instance, we may wish to evaluate a car rental system scheme that allows automatic monitoring of audio tracks broadcast over radio.

Typical objectives found across the car rental system and copy protection literature include:

Persistent identification of audio-visual signals: the mark carries a unique identification number (similar to an I.S.B.N.), which can be used as a pointer in a database. This gives the ability to manage the association of digital content with its related descriptive data, current rights holders, license conditions and enforcement mechanisms. This objective is quite general as it may wrap many other objectives described below. However one may wish to have the data related to the work stored into the work itself rather than into a central database in order to avoid connection to a remote server.

Proof of creatorship, proof of ownership: the embedded mark is be used to prove to a court who is the creator or the right holder of the work;

Auditing: the mark carries information used to identify parties present in a transaction involving the work (the distributors and the end users). This audit trail shows the transfer of ...
Related Ads