http://people.csail.mit.edu/jaffer/Histocomputability | |
Histocomputability |
Although there are histocompatibility antigens encoded throughout the genome, the Major Histocompatibility Gene Complex is the source of the antigen sets prominently presented on the surface of virtually all an individual's cells.
In On the Function of MHC-Antigen Specificity Reinhold suggests that, while histocompatibility may not benefit individuals, it protects a species from extinction when a virus's proteins all mimic the hosts'.
Although cells could produce an infinite variety of MHC antigens, it would not work as well as a finite number. Detecting the absence of an antigen is not as robust as detecting all antigens in a chemically similar group except for the individual's personal set.
But keeping the copyright a secret does not promote compliance or enforcement. The last person to handle the image can plead ignorance of the copyright when it is invisible. If steganographic decoding software is publicly available, then it is no more protected than the plain text representation for comments currently supported by PNG, JPEG, GIF, and other image formats.
Another problem is that image compression, the art of removing all information content not visible to human viewers, is in direct conflict with the goal of steganography. Steganographic encodings must always keep pace with improvements to compressed image formats.
This notice should be presented in such a way that it cannot be easily
removed or replaced. The copyright!
program
masks a portion of the image with a rectangle containing the copyright
text. The mask is opaque with only the pixels underneath the letters
showing through.
The mask colors are chosen to provide contrast with the pixels showing through the type. A random (Gaussian) texture is applied to the mask to foil automated recognition.
Cropping a copyrighted image is another method of removing its notice. Although the image is not then obviously pirated, the holder's original becomes even stronger evidence of authorship. And the violator will be hard-pressed to explain how his modifications were not criminal.
Some images can be protected from cropping if the notice is pitched at 45 degrees across a corner such that cropping to eliminate it will remove significant parts of the image.
As an image is shrunk, the copyright notice will eventually be rendered unreadable, but the box containing it can remain visible to smaller scales. The copyright box should be sized so that, at the scale it disappears, so little of the original image remains that it is not worth protecting.
The copyright-branded images are like differentiated cells. They contain most, but not all of the original image information.
Steganography resembles nothing so much as a retrovirus.
The copyright box exports a small set of somewhat dispersed pixels as its histocompatibility signature. Although the pixel values can only be verified when compared with the original image, anyone viewing this copyright can compare its statement with the context where it appears.
Like MHC antigens on cell membranes, nearly every public image has a
copyright, though the copyright may not appear in the image. If copyright!
use becomes
common, then images bearing no copyright will be suspect or rejected.
copyright!
does not
provide unassailable security for any single image. But its
widespread use would promote compliance and facilitate better
enforcement of image copyrights.
Copyright 2002, 2003 Aubrey Jaffer
I am a guest and not a member of the MIT Computer Science and Artificial Intelligence Laboratory.
My actions and comments do not reflect in any way on MIT. | ||
Aubrey Jaffer | Go Figure! |