Techniques and Applications of Digital Watermarking and Content Protection Wolthusen Wolthusen-FM May 30, 2003 9:54

Total Page:16

File Type:pdf, Size:1020Kb

Techniques and Applications of Digital Watermarking and Content Protection Wolthusen Wolthusen-FM May 30, 2003 9:54 Wolthusen Wolthusen-FM May 30, 2003 9:54 Techniques and Applications of Digital Watermarking and Content Protection Wolthusen Wolthusen-FM May 30, 2003 9:54 For quite a long time, computer security was a rather narrow field of study that was populated mainly by theoretical computer scientists, electrical engineers, and applied mathematicians. With the proliferation of open systems in general, and of the Internet and the World Wide Web (WWW) in particular, this situation has changed fundamentally. Today, computer and network practitioners are equally interested in computer security, since they require technologies and solutions that can be used to secure applications related to electronic commerce. Against this background, the field of computer security has become very broad and includes many topics of interest. The aim of this series is to publish state-of-the-art, high standard technical books on topics related to computer security. Further information about the series can be found on the WWW at the following URL: http://www.esecurity.ch/serieseditor.html Also, if you’d like to contribute to the series by writing a book about a topic related to computer security, feel free to contact either the Com- missioning Editor or the Series Editor at Artech House. For a listing of recent titles in the Artech House Computer Security Series, turn to the back of this book. Wolthusen Wolthusen-FM May 30, 2003 9:54 Techniques and Applications of Digital Watermarking and Content Protection Michael Arnold Martin Schmucker Stephen D. Wolthusen Artech House Boston • London www.artechhouse.com Wolthusen Wolthusen-FM May 30, 2003 9:54 Library of Congress Cataloging-in-Publication Data Arnold, Michael (Michael Konrad), 1964– Techniques and applications of digital watermarking and content protection / Michael Arnold, Martin Schmucker, Stephen D. Wolthusen. p. cm.—(Artech House computer security series) Includes bibliographical references and index. ISBN 1-58053-111-3 (alk. paper) 1. Computer security. 2. Digital watermarking. 3. Data protection. I. Schmucker, Martin. II. Wolthusen, Stephen D. III. Title. QA76.9.A25A76 2003 005.8—dc21 2003049577 British Library Cataloguing in Publication Data Arnold, Michael Techniques and applications of digital watermarking and content protection.— (Artech House computer security series) 1. Digital watermarking I. Title II. Schmucker, Martin III. Wolthusen, Stephen D. 005.8 ISBN 1-58053-111-3 Cover design by Yekaterina Ratner c 2003 ARTECH HOUSE, INC. 685 Canton Street Norwood, MA 02062 All rights reserved. Printed and bound in the United States of America. No part of this book may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without permission in writing from the publisher. All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. Artech House cannot attest to the accuracy of this information. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark. International Standard Book Number: 1-58053-111-3 Library of Congress Catalog Card Number: 2003049577 10987654321 Wolthusen Wolthusen-FM May 30, 2003 9:54 To our parents Wolthusen Wolthusen-FM May 30, 2003 9:54 Wolthusen Wolthusen-FM May 30, 2003 9:54 Contents Preface....................................................xiii Acknowledgments .........................................xv 1 Introduction .................................................1 1.1 The origins of copyright protection 3 1.2 The protection of intellectual property through technical means 5 1.3 Integrity and authenticity 11 References 12 2 Digital watermarking ......................................15 2.1 Rationale 15 2.2 Digital watermarking and cryptography 16 2.2.1 Steganography 16 2.2.2 Digital watermarking 19 2.3 First generation approaches 19 2.3.1 Basic principles of watermarking 20 2.3.2 Terminology 21 2.3.3 First methods 23 2.4 Beyond the first generation 32 References 35 3 Applications of digital watermarking ......................39 3.1 Usage-specific requirements 39 3.2 Copyright protection 40 3.2.1 Misappropriation by other content providers 41 3.2.2 Illicit use by end users 44 vii Wolthusen Wolthusen-FM May 30, 2003 9:54 viii Contents 3.3 Annotation watermarking 46 3.4 Fingerprinting 48 3.5 Automatic playlist generation for rights verification 49 3.6 Multimedia authentication 50 3.7 Watermarking for copy protection 51 References 53 4 Digital watermarking for still images ......................55 4.1 Classification and application requirements 55 4.2 Photographic and photorealistic images 56 4.2.1 Traditional watermarking methods 56 4.2.2 Watermarking methods dealing with geometric distortions 63 4.2.3 Content-based watermarking methods 65 4.3 Binary and halftoned images 67 4.4 Summary 69 References 69 5 Digital watermarking for audio data .......................75 5.1 Requirements and design 75 5.1.1 Removal manipulations and attacks 76 5.1.2 Misalignment manipulations and attacks 76 5.2 Psychoacoustic facts and models 77 5.2.1 Critical bands 78 5.2.2 Masking effects 79 5.2.3 Psychoacoustic model MPEG 1 layers I and II 81 5.3 Perceptual audio watermarking 88 5.3.1 Spectral weighting 89 5.4 Algorithms 90 5.4.1 LSB coding 91 5.4.2 Embedding watermarks into the phase 91 5.4.3 Echo hiding 96 5.4.4 Watermarking of compressed audio data 99 5.4.5 Spread-spectrum audio watermarking 102 Wolthusen Wolthusen-FM May 30, 2003 9:54 Contents ix 5.4.6 Audio watermarking via the patchwork technique 106 5.4.7 Mechanisms against desynchronization manipulations 107 References 111 6 Digital watermarking for other media ....................115 6.1 Digital watermarking for video data 115 6.1.1 Application requirements 115 6.1.2 Algorithms 117 6.2 Digital watermarking for three-dimensional data 121 6.2.1 Application requirements 121 6.2.2 Data representation 122 6.2.3 Operations and attacks 124 6.2.4 Algorithms 125 6.2.5 Quality 135 6.3 Digital watermarking for two-dimensional geometry data 136 6.4 Digital watermarking for formatted text 136 6.4.1 Application requirements 137 6.4.2 Algorithms 137 6.5 Music scores 138 6.5.1 Application requirements 138 6.5.2 Algorithms 139 References 140 7 Attacks and benchmarks of digital watermarking systems ...................................147 7.1 Threats and risk analysis 148 7.2 Attacks 149 7.2.1 Classification of attacks 149 7.2.2 Removal attacks and manipulations 151 7.2.3 Desynchronization attacks 159 7.2.4 Embedding attacks 164 7.2.5 Detection attacks 168 7.3 Quality evaluation of watermarked objects 168 7.3.1 Psychophysical methods 169 Wolthusen Wolthusen-FM May 30, 2003 9:54 x Contents 7.3.2 Audio data 172 7.3.3 Image data 176 7.3.4 Video data 177 7.4 Benchmarking 178 7.4.1 Concepts 180 7.4.2 Automatic evaluation of watermarking algorithms 181 References 187 8 Other content protection mechanisms....................193 8.1 Copy and usage protection schemes 193 8.2 Analog media protection 197 8.2.1 Fingerprinting 200 8.3 Off-line digital content protection 201 8.3.1 Cryptographic mechanisms 204 References 208 9 Integrated content protection solutions ..................211 9.1 Digital rights management 211 9.1.1 The Digital Transmission Content Protection Specification 216 9.1.2 The Trusted Computing Platform Alliance System architecture 218 9.1.3 The CIPRESS system 221 9.1.4 Pragmatic aspects of digital rights management 225 9.2 Tamper protection 228 9.2.1 Techniques for software tamper protection 228 9.2.2 Techniques for hardware tamper protection 230 References 237 10 Conclusion ...............................................245 10.1 Digital rights management systems 245 10.1.1 Privacy, competition, and freedom of speech 246 10.1.2 DRM in commercial environments 248 10.2 Digital watermarking 250 Wolthusen Wolthusen-FM May 30, 2003 9:54 Contents xi 10.3 Outlook 251 References 252 Glossary .................................................255 List of acronyms ..........................................257 About the authors ........................................263 Index.....................................................265 Wolthusen Wolthusen-FM May 30, 2003 9:54 Wolthusen Wolthusen-FM May 30, 2003 9:54 Preface ew research subjects in computer science are as inextricably linked with F problems from other disciplines, ranging from economic theory to intel- lectual property law and even politics, as the study of protection mechanisms for intellectual property. The present book therefore not only introduces a number of techniques for such mechanisms (primarily focused on digital watermarking but also including other mechanisms). Rather, it strives to place these techniques into a context provided by application scenarios and their requirements, as well as the legal and—to a modest extent—ethical contexts all such research and development must be conducted in. Given this premise, particular attention is paid to clearly showing the limits of the currently known techniques and algorithms within the particular context of intellectual property protection. The book itself is structured in such a way that it can be read both in sequence and in a topical fashion. Chapter 1 discusses the legal background and historical origins of intellectual property and forms the basis for the remainder of the book, which consists of two logical segments. The first and larger segment is dedicated to digital watermarking. Here, Chapter 2 provides an introduction to general concepts while Chapter 3 describes application scenarios for digital watermarking. Following this general introduction, three separate chapters introduce media-specific techniques: Chapter 4 for still images, Chapter 5 for audio data, and finally Chapter 6 for several other media types, including video and formatted text, but with an emphasis on three-dimensional data sets. Based on this exposition, Chapter 7 concludes the discussion of digital wa- termarking with a detailed analysis of attack mechanisms and benchmarking approaches.
Recommended publications
  • Digital Watermarking: an Introduction
    Digital Watermarking: An Introduction Edward J. Delp Purdue University School of Electrical and Computer Engineering Purdue Multimedia Testbed Video and Image Processing Laboratory (VIPER) West Lafayette, Indiana email: [email protected] http://www.ece.purdue.edu/~ace EPICS Spring 2003 Slide 1 Outline • Provide an introduction to watermarking and data hiding and overview its use • Describe how security techniques may/will impact multimedia systems EPICS Spring 2003 Slide 2 Multimedia Security • “Everything” is digital these days - a copy of a digital media element is identical to the original • How can an owner protect their content? • Are images still “fossilized light”? • What does all of this mean in terms of law? • Does any security system really work or does it just make us feel good! EPICS Spring 2003 Slide 3 What Do We Want From a Security System? Playback Control • Access Control Record Control • Copy Control Þ Generation Control • Auditing (fingerprinting) – Who did what and when? EPICS Spring 2003 Slide 4 What Do Users Want? • Time-shifting • Space-shifting • Single copy (back ups?) EPICS Spring 2003 Slide 5 Digital Communication System EPICS Spring 2003 Slide 6 Typical Cryptography System: Trusted Users Source Insecure Channel User Attacker Is this a pirate device? EPICS Spring 2003 Slide 7 Cryptography System: User Not Trusted Source Insecure Channel User Authentication EPICS Spring 2003 Slide 8 Media Elements • Audio • Video • Documents (including HTML documents) • Images • Graphics • Graphic or Scene Models • Programs (executable
    [Show full text]
  • Open Source Projects As Incubators of Innovation
    RESEARCH CONTRIBUTIONS TO ORGANIZATIONAL SOCIOLOGY AND INNOVATION STUDIES / STUTTGARTER BEITRÄGE ZUR ORGANISATIONS- UND INNOVATIONSSOZIOLOGIE SOI Discussion Paper 2017-03 Open Source Projects as Incubators of Innovation From Niche Phenomenon to Integral Part of the Software Industry Jan-Felix Schrape Institute for Social Sciences Organizational Sociology and Innovation Studies Jan-Felix Schrape Open Source Projects as Incubators of Innovation. From Niche Phenomenon to Integral Part of the Software Industry. SOI Discussion Paper 2017-03 University of Stuttgart Institute for Social Sciences Department of Organizational Sociology and Innovation Studies Seidenstr. 36 D-70174 Stuttgart Editor Prof. Dr. Ulrich Dolata Tel.: +49 711 / 685-81001 [email protected] Managing Editor Dr. Jan-Felix Schrape Tel.: +49 711 / 685-81004 [email protected] Research Contributions to Organizational Sociology and Innovation Studies Discussion Paper 2017-03 (May 2017) ISSN 2191-4990 © 2017 by the author(s) Jan-Felix Schrape is senior researcher at the Department of Organizational Sociology and Innovation Studies, University of Stuttgart (Germany). [email protected] Additional downloads from the Department of Organizational Sociology and Innovation Studies at the Institute for Social Sciences (University of Stuttgart) are filed under: http://www.uni-stuttgart.de/soz/oi/publikationen/ Abstract Over the last 20 years, open source development has become an integral part of the software industry and a key component of the innovation strategies of all major IT providers. Against this backdrop, this paper seeks to develop a systematic overview of open source communities and their socio-economic contexts. I begin with a recon- struction of the genesis of open source software projects and their changing relation- ships to established IT companies.
    [Show full text]
  • Final Exam Review History of Science 150
    Final Exam Review History of Science 150 1. Format of the Exam 90 minutes, on canvas 12:25pm December 18. You are welcome to bring notes to the exam, so you could start by filling out this sheet with notes from lectures and the readings! Like the mid-term, the final exam will have two kinds of questions. 1) Multiple choice questions examining your knowledge of key concepts, terms, historical developments, and contexts 2) Short answer questions in which ask you to draw on things you’ve learned in the course (from lecture, readings, videos) to craft a short argument in a brief essay expressing your informed issue on a historical question 2. Sample Questions Multiple Choice: Mina Rees was involved in (and wrote about) which of the following computing projects? A) Silicon Valley start-ups in the dot-com period B) Charles Babbage’s Difference Engine C) Works Projects Administration Tables Project D) Federal funding for computing research after WWII Short Answer: (Your answers should be between 100-200 words, and keep to specifics (events, machines, developments, people) that demonstrate your knowledge of materials covered from the course) A) What are two historical factors important to the development of Silicon Valley’s technology industry after World War II? B) In what ways did the field of programming change (in terms of its status and workers) between World War II and the late 1960s? 3. Topics to Review: Below, is a list of ideas to review for the final exam, which covers material through the entire course. You should review in particular, lecture notes, O’Mara’s The Code and other course readings provided on Canvas.
    [Show full text]
  • FOSS Philosophy 6 the FOSS Development Method 7
    1 Published by the United Nations Development Programme’s Asia-Pacific Development Information Programme (UNDP-APDIP) Kuala Lumpur, Malaysia www.apdip.net Email: [email protected] © UNDP-APDIP 2004 The material in this book may be reproduced, republished and incorporated into further works provided acknowledgement is given to UNDP-APDIP. For full details on the license governing this publication, please see the relevant Annex. ISBN: 983-3094-00-7 Design, layout and cover illustrations by: Rezonanze www.rezonanze.com PREFACE 6 INTRODUCTION 6 What is Free/Open Source Software? 6 The FOSS philosophy 6 The FOSS development method 7 What is the history of FOSS? 8 A Brief History of Free/Open Source Software Movement 8 WHY FOSS? 10 Is FOSS free? 10 How large are the savings from FOSS? 10 Direct Cost Savings - An Example 11 What are the benefits of using FOSS? 12 Security 13 Reliability/Stability 14 Open standards and vendor independence 14 Reduced reliance on imports 15 Developing local software capacity 15 Piracy, IPR, and the WTO 16 Localization 16 What are the shortcomings of FOSS? 17 Lack of business applications 17 Interoperability with proprietary systems 17 Documentation and “polish” 18 FOSS SUCCESS STORIES 19 What are governments doing with FOSS? 19 Europe 19 Americas 20 Brazil 21 Asia Pacific 22 Other Regions 24 What are some successful FOSS projects? 25 BIND (DNS Server) 25 Apache (Web Server) 25 Sendmail (Email Server) 25 OpenSSH (Secure Network Administration Tool) 26 Open Office (Office Productivity Suite) 26 LINUX 27 What is Linux?
    [Show full text]
  • Intellectual Property
    Intellectual Property Adam Goode Computer Ethics December 6, 2000 Contents 1 Introduction 1 2 Traditional Ideas About Property 1 3 Ideas as Property 2 4 Traditional Property Notions Applied To Intellectual Items 3 5 Software Should Be Free 5 6 Conclusion 5 1 Introduction Intellectual property is a controversial topic. The term itself is often ill-defined and confusing. According to one definition, intellectual property is “The own- ership of ideas and control over the tangible or virtual representation of those ideas (Howe, 2000).” But can ideas really have owners and control? Some (no- tably those like Richard Stallman) would advocate “no.” And of course, most software business leaders would give a powerful “yes.” The author of this paper is under the persuasion that intellectual property does not make sense (at least in software) and that control over one’s ideas is something that one gives up the moment he releases them to the world. This notion will be examined, as well as the notions of traditional property, ideas as property, where intellectual property seems to fit in with software, and why it really cannot. 2 Traditional Ideas About Property The word “property” brings out certain specific mental images. Ideas that spring to mind with the mention of property include things like “house” (dwelling as 1 property), “car” (machine as property), “yard” (land as property), or even “pet” (animal as property). Not many people initially think of “idea” or “notion” as a thing which might have property. Property has generally been restricted to things in the physical realm. Cer- tainly a person’s house or car can be considered property.
    [Show full text]
  • Incorporating the Commons: a Political Economic Analysis
    INCORPORATING THE COMMONS: A POLITICAL ECONOMIC ANALYSIS OF CORPORATE INVOLVEMENT IN FREE AND OPEN SOURCE SOFTWARE by BENJAMIN J. BIRKINBINE A DISSERTATION Presented to the School of Journalism and Communication and the Graduate School of the University of Oregon in partial fulfillment of the requirements for the degree of Doctor of Philosophy September 2014 DISSERTATION APPROVAL PAGE Student: Benjamin J. Birkinbine Title: Incorporating the Commons: A Political Economic Analysis of Corporate Involvement in Free and Open Source Software This dissertation has been accepted and approved in partial fulfillment of the requirements for the Doctor of Philosophy degree in the School of Journalism and Communication by: Dr. Janet Wasko Chairperson Dr. Biswarup Sen Core Member Dr. Gabriela Martinez Core Member Eric Priest, J.D. Institutional Representative and J. Andrew Berglund Dean of the Graduate School Original approval signatures are on file with the University of Oregon Graduate School. Degree awarded September 2014 ii DISSERTATION ABSTRACT Benjamin J. Birkinbine Doctor of Philosophy School of Journalism and Communication September 2014 Title: Incorporating the Commons: A Political Economic Analysis of Corporate Involvement in Free and Open Source Software Free (libre) and open source software (FLOSS) emerged in the 1980s as a radical alternative to proprietary software. Fighting back against what FLOSS enthusiasts viewed as overly restrictive intellectual property protections placed on proprietary software, FLOSS was designed with the intent of granting users the right to study, modify, adapt, or otherwise tinker with the source code of software. As such, FLOSS users were able to collaborate in producing software that could be distributed freely and widely to others, who could, in turn, make changes to the software.
    [Show full text]
  • Digital Watermarking and Steganography the Morgan Kaufmann Series in Multimedia Information and Systems Series Editor, Edward A
    Digital Watermarking and Steganography The Morgan Kaufmann Series in Multimedia Information and Systems Series Editor, Edward A. Fox, Virginia Poytechnic University Digital Watermarking and Steganography, Second Edition Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom, Jessica Fridrich, and Ton Kalker Keeping Found Things Found: The Study and Practice of Personal Information Management William P. Jones Web Dragons: Inside the Myths of Search Engine Technology Ian H. Witten, Marco Gori, and Teresa Numerico Introduction to Data Compression, Third Edition Khalid Sayood Understanding Digital Libraries, Second Edition Michael Lesk Bioinformatics: Managing Scientific Data Zoe´ Lacroix and Terence Critchlow How to Build a Digital Library Ian H. Witten and David Bainbridge Readings in Multimedia Computing and Networking Kevin Jeffay and Hong Jiang Zhang Multimedia Servers: Applications, Environments, and Design Dinkar Sitaram and Asit Dan Visual Information Retrieval Alberto del Bimbo Managing Gigabytes: Compressing and Indexing Documents and Images, Second Edition Ian H. Witten, Alistair Moffat, and Timothy C. Bell Digital Compression for Multimedia: Principles & Standards Jerry D. Gibson, Toby Berger, Tom Lookabaugh, Rich Baker, and David Lindbergh Readings in Information Retrieval Karen Sparck Jones, and Peter Willett For further information on these books and for a list of forthcoming titles, please visit our web site at http://www.mkp.com. The Morgan Kaufmann Series in Computer Security Digital Watermarking and Steganography, Second Edition Ingemar J. Cox, Matthew L. Miller, Jeffrey A. Bloom, Jessica Fridrich, and Ton Kalker Information Assurance: Dependability and Security in Networked Systems Yi Qian, David Tipper, Prashant Krishnamurthy, and James Joshi Network Recovery: Protection and Restoration of Optical, SONET-SDH, IP, and MPLS Jean-Philippe Vasseur, Mario Pickavet, and Piet Demeester For further information on these books and for a list of forthcoming titles, please visit our Web site at http://www.mkp.com.
    [Show full text]
  • Survey on Decentralized Fingerprinting Solutions: Copyright Protection Through Piracy Tracing
    computers Review Survey on Decentralized Fingerprinting Solutions: Copyright Protection through Piracy Tracing David Megías 1,* , Minoru Kuribayashi 2 and Amna Qureshi 1 1 Internet Interdisciplinary Institute (IN3), Universitat Oberta de Catalunya (UOC), CYBERCAT-Center for Cybersecurity Research of Catalonia, Castelldefels (Barcelona), 08860 Catalonia, Spain; [email protected] 2 Graduate School of Natural Science and Technology, Okayama University, Okayama 700-8530, Japan; [email protected] * Correspondence: [email protected] Received: 13 March 2020; Accepted: 30 March 2020; Published: 3 April 2020 Abstract: Copyright protection is one of the most relevant challenges in the network society. This paper focuses on digital fingerprinting, a technology that facilitates the tracing of the source of an illegal redistribution, making it possible for the copyright holder to take legal action in case of copyright violation. The paper reviews recent digital fingerprinting solutions that are available for two particularly relevant scenarios: peer-to-peer distribution networks and broadcasting. After analyzing those solutions, a discussion is carried out to highlight the properties and the limitations of those techniques. Finally, some directions for further research on this topic are suggested. Keywords: copyright infringement; piracy tracing; fingerprinting; peer-to-peer distribution; broadcasting 1. Introduction Nowadays, digital technologies allow users to generate near-perfect quality identical copies of the content at low costs. Therefore, the amount of the digital data that is illegally redistributed is growing, making businesses lose income. Content creators and multimedia producers are concerned about the consequences of illegal copying and redistribution on a massive scale. Consequently, the need for a protection system that can provide copyright protection by prosecuting unauthorized copying has arisen in recent years.
    [Show full text]
  • Incorporating the Digital Commons:Corporate Involvement in Free and Open Source Software
    INCORPORATING THE DIGITAL COMMONS DIGITAL THE INCORPORATING INCORPORATING THE CDSMS DIGITAL COMMONS he concept of ‘the commons’ has been used as a framework to understand resources shared by a community rather than a private BENJAMIN J. BIRKINBINE T entity, and it has also inspired social movements working against the enclosure of public goods and resources. One such resource is free (libre) and open source software (FLOSS). FLOSS emerged as an alternative to proprietary software in the 1980s. However, both the products and production processes of FLOSS have become incorporated into capitalist INCORPORATING THE production. For example, Red Hat, Inc. is a large publicly traded company whose business model relies entirely on free software, and IBM, Intel, Cisco, Samsung, Google are some of the largest contributors to Linux, the DIGITAL COMMONS open-source operating system. This book explores the ways in which FLOSS has been incorporated into digital capitalism. Just as the commons have been used as a motivational frame for radical social movements, it has also Corporate Involvement in Free served the interests of free-marketeers, corporate libertarians, and states to expand their reach by dragging the shared resources of social life onto and Open Source Software digital platforms so they can be integrated into the global capitalist system. The book concludes by asserting the need for a critical political economic understanding of the commons that foregrounds (digital) labour, class struggle, and uneven power distribution within the digital commons as well as between FLOSS communities and their corporate sponsors. BENJAMIN J. BIRKINBINE J. BENJAMIN COMMUNICATION STUDIES | POLITICAL ECONOMY | MEDIA INDUSTRIES CDSMS CRITICAL DIGITAL AND SOCIAL MEDIA STUDIES THE AUTHOR Benjamin J.
    [Show full text]
  • Advanced BASIC VCFE9.Pdf
    Advanced BASIC Vintage Computer Festival 9.1 Bill Degnan Course Outline • BASIC Overview • Matricies • BASIC Timing Comparisons 1977 • Micro-Soft vs. Tiny BASIC • Micro-Soft BASIC Breakdown using PEEK BASIC Overview • BASIC has three classes of capabilities: commands, statements, and functions. • Commands “part of the operating system or environment” and manipulate global items, such as programs • Statements are made up of keywords, variables, constants, operators, and functions • Functions - A user-defined and library functions. BASIC Overview • Constants. BASIC programs are made up of statements that contain keywords, variables, operators, and constants • Numeric constants (Floating point and Integer) - Each BASIC version handles numeric constants differently. • Character String constants - signaled by a quote (") • Variables - "names" that may take on different values during a problem. - vintage versions of BASIC required variables to start with a letter. Matricies (1966 Dartmouth BASIC) • A matrix is simply a rectangular array of numbers • An array is a set of numbers arranged in rows and columns • A matrix may also consist of a single row or a single column, also called “row vectors” (lists) and “column vectors”. 10 REM MATRICIES USING DARTMOUTH BASIC 20 DIM S(2,2) 30 MAT READ S ... 240 DATA 30, 50 245 DATA 40, 25 250 FOR K=1 TO 2 260 PRINT S(K,1) 270 NEXT K RUN [What would be the output??] Matricies (Digital PDP 11 BASIC) 10 DIM A(2,3) 20 FOR I=0 TO 2 30 FOR J=0 TO 3: LET A(I,J) = 0 40 NEXT J 50 NEXT I 60 FOR I = 0 TO 2: LET A(I,0) = I 70 FOR J = 0 TO 3: LET A(0,J) = J 80 PRINT A(I,J); 90 NEXT J 100 PRINT 110 NEXT I 120 END RUN 0 1 2 3 1 0 0 0 2 0 0 0 STOP AT LINE 120 READY What’s different? The Knight’s Tour • Chess is played on a square board having 64 smaller squares, eight on a side.
    [Show full text]
  • Personal Computing
    Personal Computing Thomas J. Bergin ©Computer History Museum American University Recap: Context • By 1977, there was a fairly robust but fragmented hobbyist-oriented microcomputer industry: – Micro Instrumentation Telemetry Systems (MITS) – Processor Technology – Cromemco – MicroStuf – Kentucky Fried Computers • Two things were needed for the personal computer revolution: 1) a way to store and retrieve data, and 2) a programming language in which to write applications. Homebrew Computer Club • March 5, 1975: the Amateur Computer Users Group (Lee Felsenstein, Bob Marsh, Steve Dompier, BobAlbrecht and 27 others) met in Gordon French’s garage, Menlo Park, CA • 3rd meeting drew several hundred people and was moved to the Coleman mansion • Stanford Linear Accelerator Center’s auditorium – Steve Wozniak shows off his single board computer – Steve Jobs attends meetings Homebrew-ed • 21 companies formed: – Apcose Apple – Cromemco Morrow – North Star Osborne • West Coast Computer Faire • Byte magazine, September 1975 • Byte Shop Both: images.google.com And then there was Traf-O-Data • October 28, 1955: William H. Gates III born – father: attorney mother: schoolteacher • Lakeside School: Lakeside Programming Group – Mothers Club: access to time-shared system at GE – Students hired by local firm to debug software – First computer program: Tic-Tac-Toe (age 13) – Traf-O-Data to sell traffic mgt. software (age 16) • 1973, Bill Gates enrolls at Harvard in pre-law. • Paul Allen is in his second year. January 1975, Popular Electronics: Altair • Allen shows
    [Show full text]
  • The Public Domain Enclosing the Commons of the Mind by James
    The Public Domain: Enclosing the Commons of the Mind Boyle, James Published: 2008 Categorie(s): Non-Fiction Source: http://yupnet.org/boyle/ 1 About Boyle: James Boyle is the William Neal Reynolds Professor of Law and co- founder of the Center for the Study of the Public Domain at Duke University School of Law in Durham, North Carolina. He was one of the founding board members of Creative Commons, and currently chairs the board. Boyle joined Duke University School of Law in July 2000. He has previously taught at the American University, Yale, Harvard, and the University of Pennsylvania Law School. He is the author of Shamans, Software and Spleens: Law and Construction of the Information Society as well as a novel published under a Creative Commons license, The Shakespeare Chronicles. In 2003, he won the World Technology Award for Law for his work on the intellectual ecology of the public domain, and on the "Second Enclosure Movement" that threatens it. Boyle also contributes a column to the Financial Times New Technology Policy For- um. Source: Wikipedia Copyright: Please read the legal notice included in this e-book and/or check the copyright status in your country. Note: This book is brought to you by Feedbooks http://www.feedbooks.com Strictly for personal use, do not use this file for commercial purposes. 2 Creative Commons License This work is licensed under a Creative Commons Attribution- Noncommercial-Share Alike 3.0 Unported License. 3 Preface Each person has a different breaking point. For one of my students it was United States Patent number 6,004,596 for a “Sealed Crustless Sand- wich.” In the curiously mangled form of English that patent law pro- duces, it was described this way: A sealed crustless sandwich for providing a convenient sandwich without an outer crust which can be stored for long periods of time without a central filling from leaking outwardly.
    [Show full text]