Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Talal G. Shamoon is active.

Publication


Featured researches published by Talal G. Shamoon.


international symposium on information theory | 1998

Resistance of digital watermarks to collusive attacks

Joe Kilian; Frank Thomson Leighton; Lesley R. Matheson; Talal G. Shamoon; Robert Endre Tarjan; F. Zane

In digital watermarking (also called digital fingerprinting), extra information is embedded imperceptibly into digital content (such as an audio track, a still image, or a movie). This extra information can be read by authorized parties, and other users attempting to remove the watermark cannot do so without destroying the value of the content by making perceptible changes to the content. This provides a disincentive to copying by allowing copies to be traced to their original owner. Unlike cryptography, digital watermarking provides protection to content that is in the clear. It is not easy to design watermarks that are hard to erase, especially if an attacker has access to several differently marked copies of the same base content. Cox et al. (see IEEE Trans. on Image Processing, vol.6, no.12, p.1673-87, 1997) have proposed the use of additive normally distributed values as watermarks, and have sketched an argument showing that, in a certain theoretical model, such watermarks are resistant to collusive attacks. Here, we fill in the mathematical justification for this claim.


financial cryptography | 1998

Robustness and Security of Digital Watermarks

Lesley R. Matheson; Stephen G. Mitchell; Talal G. Shamoon; Robert Endre Tarjan; Francis Zane

Digital watermarking is a nascent but promising technology that offers protection of unencrypted digital content. This paper is a brief technical survey of the multimedia watermarking landscape. The three main technical challenges faced by watermarking algorithms are fidelity, robustness and security. Current watermarking methods offer possibly acceptable fidelity and robustness against certain types of processing, such as data compression and noise addition, but are not sufficiently robust against geometric transforms such as scaling and cropping of images. Theoretical approaches have been developed that could lead to secure watermarking methods, but substantial gaps remain between theory and practice.


ieee international electric vehicle conference | 2012

The car as an Internet-enabled device, or how to make trusted networked cars

Gary F. Ellison; Jack Lacy; David P. Maher; Yutaka Nagao; Anahita D. Poonegar; Talal G. Shamoon

This paper presents an overall approach to creating security and trust architecture for networked automotive vehicles and outlines basic principles for mitigating certain risks facing this new paradigm.


hawaii international conference on system sciences | 1998

Culturally-induced information impactedness: a prescription for failure in software ventures

Lesley R. Matheson; Talal G. Shamoon; Robert Endre Tarjan

The impact of effective information flow in software ventures is analyzed through a recent case in which a hot, lucrative technology was lost on its way to the marketplace. The failure occurred despite the fact that the venture had many components crucial to success, including a proprietary intellectual property position, enormous market demand, a well-qualified, committed team and sufficient funding. One reason for this failure is the lack of information flows among several parties critical to the success of the venture. This case suggests that in software markets which operate at breakneck pace and have short development cycles, effective information flow is a first order priority. These blockages in information flows can stem from the nature of the cultures that are created to produce software ideas, especially proprietary technologies. The case also suggests that information can become impacted by the clash between US software market characteristics and Japanese business culture. Fortunately, there are inexpensive solutions that can substantially improve the return on investment, especially foreign investment, in new software technologies.


Archive | 2007

Methods and apparatus for persistent control and protection of content

Talal G. Shamoon; Ralph D. Hill; Chris D. Radcliffe; John P. Hwa; W. Olin Sibert; David M. Van Wie


Archive | 1999

Methods and apparatus for continuous control and protection of media content

Talal G. Shamoon; Ralph D. Hill; Chris D. Radcliffe; John P. Hwa


Archive | 2007

Systems and methods for retrofitting electronic appliances to accept different content formats

Talal G. Shamoon


Archive | 2012

Systems and methods for protecting and governing genomic and other information

W. Knox Carey; David P. Maher; Michael Manente; Jarl Nilsson; Talal G. Shamoon


Audio Engineering Society Conference: 17th International Conference: High-Quality Audio Coding | 1999

MPEG-4 intellectual property management & protection (IPMP) overview & applications

Jack Lacy; Niels Rump; Talal G. Shamoon; Panos Kudumakis


Archive | 1999

Streaming media player with continuous control and protection of media content

Ralph D. Hill; John P. Hwa; Chris D. Radcliffe; Talal G. Shamoon

Collaboration


Dive into the Talal G. Shamoon's collaboration.

Top Co-Authors

Avatar

Chris D. Radcliffe

Intertrust Technologies Corporation

View shared research outputs
Top Co-Authors

Avatar

John P. Hwa

Intertrust Technologies Corporation

View shared research outputs
Top Co-Authors

Avatar

Ralph D. Hill

Intertrust Technologies Corporation

View shared research outputs
Top Co-Authors

Avatar

David P. Maher

Intertrust Technologies Corporation

View shared research outputs
Top Co-Authors

Avatar

Lesley R. Matheson

Intertrust Technologies Corporation

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jack Lacy

Intertrust Technologies Corporation

View shared research outputs
Top Co-Authors

Avatar

Jarl Nilsson

Intertrust Technologies Corporation

View shared research outputs
Top Co-Authors

Avatar

Michael Manente

Intertrust Technologies Corporation

View shared research outputs
Top Co-Authors

Avatar

W. Knox Carey

Intertrust Technologies Corporation

View shared research outputs
Researchain Logo
Decentralizing Knowledge