Academic literature on the topic 'RIGHTFUL OWNERSHIP'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'RIGHTFUL OWNERSHIP.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "RIGHTFUL OWNERSHIP"
Chang, Chin-Chen, and Pei-Yu Lin. "Adaptive watermark mechanism for rightful ownership protection." Journal of Systems and Software 81, no. 7 (July 2008): 1118–29. http://dx.doi.org/10.1016/j.jss.2007.07.036.
Full textRuizhen Liu and Tieniu Tan. "An SVD-based watermarking scheme for protecting rightful ownership." IEEE Transactions on Multimedia 4, no. 1 (March 2002): 121–28. http://dx.doi.org/10.1109/6046.985560.
Full textAl-Nu’aimi, Abdallah Al-Tahan. "Using Watermarking Techniques to prove Rightful Ownership of Web Images." International Journal of Information Technology and Web Engineering 6, no. 2 (April 2011): 29–39. http://dx.doi.org/10.4018/jitwe.2011040103.
Full textRAWAT, SANJAY, and BALASUBRAMANIAN RAMAN. "A CHAOS-BASED ROBUST WATERMARKING ALGORITHM FOR RIGHTFUL OWNERSHIP PROTECTION." International Journal of Image and Graphics 11, no. 04 (October 2011): 471–93. http://dx.doi.org/10.1142/s0219467811004263.
Full textMohammad, Ahmad A., Ali Alhaj, and Sameer Shaltaf. "An improved SVD-based watermarking scheme for protecting rightful ownership." Signal Processing 88, no. 9 (September 2008): 2158–80. http://dx.doi.org/10.1016/j.sigpro.2008.02.015.
Full textArneson, Richard J. "SELF-OWNERSHIP AND WORLD OWNERSHIP: AGAINST LEFT-LIBERTARIANISM." Social Philosophy and Policy 27, no. 1 (January 2010): 168–94. http://dx.doi.org/10.1017/s0265052509990070.
Full textCohen, G. A. "Self-Ownership, World Ownership, and Equality: Part II." Social Philosophy and Policy 3, no. 2 (1986): 77–96. http://dx.doi.org/10.1017/s0265052500000315.
Full textXiao-Ping Zhang and Kan Li. "Comments on "An SVD-based watermarking scheme for protecting rightful Ownership"." IEEE Transactions on Multimedia 7, no. 3 (June 2005): 593–94. http://dx.doi.org/10.1109/tmm.2005.843357.
Full textRykaczewski, R. "Comments on “An SVD-Based Watermarking Scheme for Protecting Rightful Ownership”." IEEE Transactions on Multimedia 9, no. 2 (February 2007): 421–23. http://dx.doi.org/10.1109/tmm.2006.886297.
Full textLin, Phen-Lan. "Digital watermarking models for resolving rightful ownership and authenticating legitimate customer." Journal of Systems and Software 55, no. 3 (January 2001): 261–71. http://dx.doi.org/10.1016/s0164-1212(00)00075-3.
Full textDissertations / Theses on the topic "RIGHTFUL OWNERSHIP"
Ghaderpanah, Mohammadreza. "Spectral schemes for rightful ownership protection." Thesis, 2008. http://spectrum.library.concordia.ca/976020/1/MR42530.pdf.
Full textChung, Chi-Yien, and 鍾季穎. "Some Protocols for Passing Secure Messages in Networks and Protecting Rightful Ownership." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/47280415083500704038.
Full text國立中正大學
資訊工程研究所
90
In these recent years, Internet has played an important role in our daily life. We can do lots of activities, which are done with great efforts before, easily at home. However, there are a lot of security and privacy issues arise while enjoying the convenience that Internet has brought us. General speaking, the services provided by Internet should have four basic security requests. They are confidentiality, authentication, integrity, and non-repudiation. As a result, we propose some protocols, which make the processes of communication can go on smoothly and safely. First of all, we suggest an efficient and secure method, which aims at the session keys generation used in the communications, to ensure that the whole process can‘t be altered by malicious eavesdroppers. Besides, traditional secure communication protocols focus on confidentiality of the contents. Nevertheless, an eavesdropper can detect that who the receiver is, and make her/him an attack target. As a result, except for the protocol needed in the process of session key generation, we also propose a scheme which can hide the identity of the receiver. Our protocol can be applied to both uni-cast and multicast. Those protocols mentioned above are suitable for the application in electronic voting. As for electronic voting, the most important thing is anonymity. At the same time of achieving anonymity, the situation of voting more than once should be concerned. In this thesis, we propose an effective electronic voting scheme, which makes the voting can be done on Internet securely. How to protect the intellectual property has become an important topic, when large amounts of data and digitalized image transmitted in Internet nowadays. It is a major issue to guarantee both the rights of buyer and seller. When disputes occur, how to solve them smoothly is significant. Therefore, we propose a scheme, which is about protecting rightful ownership. Once the buyer distributes unauthorized copies, the seller can detect whom this image is originated. Besides, we can stop the Man-in-the-Middle attack effectively, which can ensure the rights of the buyer.
MONIKA. "DWT BASED DUAL WATERMARKING SCHEME FOR RIGHTFUL OWNERSHIP AND SECURE IMAGE AUTHENTICATION." Thesis, 2013. http://dspace.dtu.ac.in:8080/jspui/handle/repository/16128.
Full textGu, Yong-Guang, and 古永光. "A Subsampling Image SVD-based Semi-fragile Watermarking Technique for Rightful Ownership Protection." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/00221458782479901742.
Full text國立成功大學
電腦與通信工程研究所
96
The original images are usually handled by general image manipulations or loss compression for some kinds of situations such as the Internet, surveillance system and medicine. Semi-fragile digital watermarking techniques allow content-preserving manipulations while are sensitive to malicious tamper. These techniques modify the singular values through the singular value decomposition (SVD) in recent years. It is a research because the watermarked image quality may be decreased by modifying the singular values. In this paper, we utilize the high similar property of each subimage through subsampling and propose a subsampling image SVD-based semi-fragile watermarking technique with use of the high similar property of each subimage through subsampling. First, four subimages are obtained by subsampling. We use two of subimages to generate a block correlation with the correlation factor (CF) for adjusting between the fragility and robustness of the embedded watermark. Then, The watermark are embedded into two SVD coefficients of the other subimages. The proposed technique can detect the modified regions with block unit because we employ the block correlation of all subimage. Experiment results show that the precision of this technique not only overcomes several attacks such as the gaussian noise attack and sharpening attack, but also detects the tampered regions.
Min-Yang, Huang, and 黃民仰. "A robust image watermarking system to resolve rightful ownerships." Thesis, 2001. http://ndltd.ncl.edu.tw/handle/60559565073653272804.
Full text國立臺灣科技大學
電機工程系
89
In this thesis, a robust watermarking scheme and solutions to resolve rightful ownerships are both presented. For the robust watermarking scheme, we propose a method to embed bipolar data into digital images. Two watermarks are cast into different levels and coefficients of wavelet transform to resist various image attacks. Moreover, a repeated embedding manner is performed to increase the robustness. We apply the JND paradigm and texture masking to guarantee the embedded watermark is transparent. Besides, the watermark detection is based on the estimation of the probability of false positives. The malice attacks on watermarking algorithms themselves are also taken into consideration. The experimental results show our watermarks in various types of images suffering different types of attacks are robust enough. For resolving multiple claims of ownerships, some proposed solutions to prevent the image from counterfeiting are discussed. We propose some methods to strengthen these solutions. Furthermore, we develop a watermarking system based on the time stamp encryption from a third party. On the issues of robustness and ownerships, not only the means but also the aims of watermarks are emphasized.
Books on the topic "RIGHTFUL OWNERSHIP"
Vallentyne, Peter. Neurointerventions, Self-Ownership, and Enforcement Rights. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198758617.003.0007.
Full textBook chapters on the topic "RIGHTFUL OWNERSHIP"
Kumar, Naveen, and Vijay Kumar Sharma. "Quantum Hilbert Image Scrambling and SVD-Based Watermarking Scheme for Rightful Ownership." In Algorithms for Intelligent Systems, 361–70. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5077-5_33.
Full textFukui, Hideo. "Real Estate and the Legal System of Japan." In New Frontiers in Regional Science: Asian Perspectives, 3–7. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-8848-8_1.
Full textCHANG, CHING-YUN, and IUON-CHANG LIN. "ASSURING RIGHTFUL OWNERSHIP FOR DIGITAL IMAGES USING INVISIBLE WATERMARKS." In Wavelet Analysis and Active Media Technology, 533–50. World Scientific Publishing Company, 2005. http://dx.doi.org/10.1142/9789812701695_0083.
Full textMkrttchian, Vardan, Dmitry Davydov, and Viacheslav Voronin. "The Perspectives of Supply Chain Management Using Natural Knowledge From 3D Blockchain Technologies and Avatar-Based and Geographic Information Systems (GIS)." In Digitalization of Decentralized Supply Chains During Global Crises, 174–92. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-6874-3.ch008.
Full textAgbesi, Samuel, and Fati Tahiru. "Application of Blockchain Technology in Land Administration in Ghana." In Advances in Data Mining and Database Management, 103–16. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-3632-2.ch006.
Full textChristopher J, Borgen. "Part II Predominant Security Challenges and International Law, International Security, Ch.15 Contested Territory." In The Oxford Handbook of the International Law of Global Security. Oxford University Press, 2021. http://dx.doi.org/10.1093/law/9780198827276.003.0016.
Full textVinitha, K., P. Thirumoorthy, and S. Hemalatha. "Data Storage, Data Forwarding, Data Retrieval With Big Data Deepfakes in Secure Cloud Storage." In Advances in Multimedia and Interactive Technologies, 106–19. IGI Global, 2023. http://dx.doi.org/10.4018/978-1-6684-6060-3.ch009.
Full textMurray, Andrew. "14. Branding, trademarks, and domain names." In Information Technology Law, 359–89. Oxford University Press, 2019. http://dx.doi.org/10.1093/he/9780198804727.003.0014.
Full textMurray, Andrew. "14. Branding, trade marks, and domain names." In Information Technology Law, 372–400. Oxford University Press, 2023. http://dx.doi.org/10.1093/he/9780192893529.003.0014.
Full textRiccardo, Pavoni. "Part III General International Law, Ch.24 Cultural Heritage and State Immunity." In The Oxford Handbook of International Cultural Heritage Law. Oxford University Press, 2020. http://dx.doi.org/10.1093/law/9780198859871.003.0024.
Full textConference papers on the topic "RIGHTFUL OWNERSHIP"
Zeng, Wenjun, Bede Liu, and Shawmin Lei. "Extraction of multiresolution watermark images for resolving rightful ownership." In Electronic Imaging '99, edited by Ping W. Wong and Edward J. Delp III. SPIE, 1999. http://dx.doi.org/10.1117/12.344691.
Full textSchlauweg, Mathias, Dima Pröfrock, Benedikt Zeibich, and Erika Müller. "Dual watermarking for protection of rightful ownership and secure image authentication." In the 4th ACM international workshop. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1178766.1178781.
Full textAl-Nu'aimi, Abdallah Al-Tahan. "Gray watermarks to prove the rightful ownership for digital coloured images." In the 1st International Conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1874590.1874617.
Full textDorairangaswamy, M. A., and B. Padhmavathi. "An effective blind watermarking scheme for protecting rightful ownership of digital images." In TENCON 2009 - 2009 IEEE Region 10 Conference. IEEE, 2009. http://dx.doi.org/10.1109/tencon.2009.5395812.
Full textSingh, Priyanka, Shivendra Shivani, and Suneeta Agarwal. "A chaotic map based DCT-SVD watermarking scheme for rightful ownership verification." In 2014 Students Conference on Engineering and Systems (SCES). IEEE, 2014. http://dx.doi.org/10.1109/sces.2014.6880048.
Full textPandey, Aishwary K., Priyanka Singh, Nishant Agarwal, and Balasubramanian Raman. "SecMed: A Secure Approach for Proving Rightful Ownership of Medical Images in Encrypted Domain over Cloud." In 2018 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR). IEEE, 2018. http://dx.doi.org/10.1109/mipr.2018.00085.
Full textCraver, Scott A., Nasir D. Memon, Boon-Lock Yeo, and Minerva M. Yeung. "Can invisible watermarks resolve rightful ownerships?" In Electronic Imaging '97, edited by Ishwar K. Sethi and Ramesh C. Jain. SPIE, 1997. http://dx.doi.org/10.1117/12.263419.
Full text