Academic literature on the topic 'RIGHTFUL OWNERSHIP'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'RIGHTFUL OWNERSHIP.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "RIGHTFUL OWNERSHIP"

1

Chang, Chin-Chen, and Pei-Yu Lin. "Adaptive watermark mechanism for rightful ownership protection." Journal of Systems and Software 81, no. 7 (July 2008): 1118–29. http://dx.doi.org/10.1016/j.jss.2007.07.036.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ruizhen Liu and Tieniu Tan. "An SVD-based watermarking scheme for protecting rightful ownership." IEEE Transactions on Multimedia 4, no. 1 (March 2002): 121–28. http://dx.doi.org/10.1109/6046.985560.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Al-Nu’aimi, Abdallah Al-Tahan. "Using Watermarking Techniques to prove Rightful Ownership of Web Images." International Journal of Information Technology and Web Engineering 6, no. 2 (April 2011): 29–39. http://dx.doi.org/10.4018/jitwe.2011040103.

Full text
Abstract:
This article introduces intelligent watermarking scheme to protect Web images from attackers who try to counterfeit the copyright to damage the rightful ownership. Using secret signs and logos that are embedded within the digital images, the technique can investigate technically the ownership claim. Also, the nature of each individual image is taken into consideration which gives more reliable results. The colour channel used was chosen depending on the value of its standard deviation to compromise between robustness and invisibility of the watermarks. Several types of test images, logos, attacks and evaluation metrics were used to examine the performance of the techniques used. Subjective and objective tests were used to check visually and mathematically the solidity and weakness of the used scheme.
APA, Harvard, Vancouver, ISO, and other styles
4

RAWAT, SANJAY, and BALASUBRAMANIAN RAMAN. "A CHAOS-BASED ROBUST WATERMARKING ALGORITHM FOR RIGHTFUL OWNERSHIP PROTECTION." International Journal of Image and Graphics 11, no. 04 (October 2011): 471–93. http://dx.doi.org/10.1142/s0219467811004263.

Full text
Abstract:
Traditional singular value decomposition (SVD)-based watermarking schemes, already exist for watermark embedding on the image as a whole. In this paper, a chaos-based hybrid watermarking scheme that combines the Fourier transform and the SVD is proposed. Instead of modifying the original cover image to embed the watermark, a reference image is formed in the proposed scheme to embed the watermark. The watermark is embedded by modifying the singular values of the reference image. The watermark extraction process is semi-blind, i.e. it does not require the original image. Chaotic map is used to shuffle the pixel positions of the image, which can be used as a secret key to improve the security of the algorithm. The security of the scheme is further strengthened by applying Zig-Zag scan on the watermark before embedding. A series of experiments is conducted to prove the fidelity and robustness property of the proposed scheme. Experimental results show that our scheme is strong enough to resist common image-processing attacks, geometric distortions, and some composite attacks. The results also show that our scheme outperforms related works in most cases.
APA, Harvard, Vancouver, ISO, and other styles
5

Mohammad, Ahmad A., Ali Alhaj, and Sameer Shaltaf. "An improved SVD-based watermarking scheme for protecting rightful ownership." Signal Processing 88, no. 9 (September 2008): 2158–80. http://dx.doi.org/10.1016/j.sigpro.2008.02.015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Arneson, Richard J. "SELF-OWNERSHIP AND WORLD OWNERSHIP: AGAINST LEFT-LIBERTARIANISM." Social Philosophy and Policy 27, no. 1 (January 2010): 168–94. http://dx.doi.org/10.1017/s0265052509990070.

Full text
Abstract:
AbstractLeft-libertarianism is a version of Lockean libertarianism that combines the idea that each person is the full rightful owner of herself and the idea that each person should have the right to own a roughly equal amount of the world's resources. This essay argues against left-libertarianism. The specific target is an interesting form of left-libertarianism proposed by Michael Otsuka that is especially stringent in its equal world ownership claim. One criticism advanced is that there is more tension than Otsuka acknowledges between private ownership of self and equal ownership of the world. This emerges once one notices that self-ownership should not be conceived merely in a thin, formal way but also as a thicker substantive insistence on wide individual freedom. A second criticism is that in other respects the formal idea of self-ownership that Otsuka and other left-libertarians embrace is an extreme doctrine that merits rejection.
APA, Harvard, Vancouver, ISO, and other styles
7

Cohen, G. A. "Self-Ownership, World Ownership, and Equality: Part II." Social Philosophy and Policy 3, no. 2 (1986): 77–96. http://dx.doi.org/10.1017/s0265052500000315.

Full text
Abstract:
1. The present paper is a continuation of my “Self-Ownership, World Ownership, and Equality,” which began with a description of the political philosophy of Robert Nozick. I contended in that essay that the foundational claim of Nozick's philosophy is the thesis of self-ownership, which says that each person is the morally rightful owner of his own person and powers, and, consequently, that each is free (morally speaking) to use those powers as he wishes, provided that he does not deploy them aggressively against others. To be sure, he may not harm others, and he may, if necessary, be forced not to harm them, but he should never be forced to help them, as people are in fact forced to help others, according to Nozick, by redistributive taxation. (Nozick recognizes that an unhelping person may qualify as unpleasant or even, under certain conditions, as immoral. The self-ownership thesis says that people should be free to live their lives as they choose, but it does not say that how they choose to live them is beyond criticism.)
APA, Harvard, Vancouver, ISO, and other styles
8

Xiao-Ping Zhang and Kan Li. "Comments on "An SVD-based watermarking scheme for protecting rightful Ownership"." IEEE Transactions on Multimedia 7, no. 3 (June 2005): 593–94. http://dx.doi.org/10.1109/tmm.2005.843357.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Rykaczewski, R. "Comments on “An SVD-Based Watermarking Scheme for Protecting Rightful Ownership”." IEEE Transactions on Multimedia 9, no. 2 (February 2007): 421–23. http://dx.doi.org/10.1109/tmm.2006.886297.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lin, Phen-Lan. "Digital watermarking models for resolving rightful ownership and authenticating legitimate customer." Journal of Systems and Software 55, no. 3 (January 2001): 261–71. http://dx.doi.org/10.1016/s0164-1212(00)00075-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "RIGHTFUL OWNERSHIP"

1

Ghaderpanah, Mohammadreza. "Spectral schemes for rightful ownership protection." Thesis, 2008. http://spectrum.library.concordia.ca/976020/1/MR42530.pdf.

Full text
Abstract:
Since their introduction, photo sharing and social network websites such as Flickr, RockYou, MySpace, PhotoShelter, and FaceBook have attracted millions of users, many of whom are using these sites to share digital photos, but there is an increasing concern about controlling copyrighted content. Using digital image watermarking technology, online photo-sharing users will not only be able to monetize nonlinear distribution of copyrighted content, but also apply rules to how the content can be used and shared in order to avoid having the digital photos corraled and reused. This thesis introduces a robust invisible image watermarking mechanism using nonnegative matrix factorization and singular value decomposition approaches. The proposed watermarking scheme improves the performance of the data embedding system effectively, and provides resistance to a wide range of attacks. Illustrating experimental results show the much improved performance of the proposed watermarking approach in comparison with existing techniques, and also demonstrate its robustness against a variety of intentional attacks and normal visual processes. Inspired by the successful application of graph theory in 2D image watermarking, and looking to address its limitations in often difficult 3D model identification and authentication, we also present in this thesis a 3D mesh fingerprinting technique using spectral graph theory. The main idea is to partition a 3D model into sub-meshes, then apply eigen-decomposition to the Laplace-Beltrami matrix of each sub-mesh, followed by hashing each transformed sub-mesh. The experimental results using a benchmark of 3D models demonstrate the effectiveness of the proposed fingerprinting technique
APA, Harvard, Vancouver, ISO, and other styles
2

Chung, Chi-Yien, and 鍾季穎. "Some Protocols for Passing Secure Messages in Networks and Protecting Rightful Ownership." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/47280415083500704038.

Full text
Abstract:
碩士
國立中正大學
資訊工程研究所
90
In these recent years, Internet has played an important role in our daily life. We can do lots of activities, which are done with great efforts before, easily at home. However, there are a lot of security and privacy issues arise while enjoying the convenience that Internet has brought us. General speaking, the services provided by Internet should have four basic security requests. They are confidentiality, authentication, integrity, and non-repudiation. As a result, we propose some protocols, which make the processes of communication can go on smoothly and safely. First of all, we suggest an efficient and secure method, which aims at the session keys generation used in the communications, to ensure that the whole process can‘t be altered by malicious eavesdroppers. Besides, traditional secure communication protocols focus on confidentiality of the contents. Nevertheless, an eavesdropper can detect that who the receiver is, and make her/him an attack target. As a result, except for the protocol needed in the process of session key generation, we also propose a scheme which can hide the identity of the receiver. Our protocol can be applied to both uni-cast and multicast. Those protocols mentioned above are suitable for the application in electronic voting. As for electronic voting, the most important thing is anonymity. At the same time of achieving anonymity, the situation of voting more than once should be concerned. In this thesis, we propose an effective electronic voting scheme, which makes the voting can be done on Internet securely. How to protect the intellectual property has become an important topic, when large amounts of data and digitalized image transmitted in Internet nowadays. It is a major issue to guarantee both the rights of buyer and seller. When disputes occur, how to solve them smoothly is significant. Therefore, we propose a scheme, which is about protecting rightful ownership. Once the buyer distributes unauthorized copies, the seller can detect whom this image is originated. Besides, we can stop the Man-in-the-Middle attack effectively, which can ensure the rights of the buyer.
APA, Harvard, Vancouver, ISO, and other styles
3

MONIKA. "DWT BASED DUAL WATERMARKING SCHEME FOR RIGHTFUL OWNERSHIP AND SECURE IMAGE AUTHENTICATION." Thesis, 2013. http://dspace.dtu.ac.in:8080/jspui/handle/repository/16128.

Full text
Abstract:
The availability of versatile multimedia processing software and the far-reaching coverage of the interconnected networks have facilitated flawless copying, manipulations and distribution of the digital multimedia (digital video, audio, text, and images). The ever advancing storage and retrieval technologies have also smoothed the way for large-scale multimedia database applications. However, abuses of these facilities and technologies pose pressing threats to multimedia security management in general, and multimedia copyright protection and content integrity verification in particular. Although cryptography has a long history of application to information and multimedia security, the undesirable characteristic of providing no protection to the media once decrypted has limited the feasibility of its widespread use. For example, an adversary can obtain the decryption key by purchasing a legal copy of the media but then redistribute the decrypted copies of the original .In response to these challenges; digital watermarking techniques have been proposed in the last decade. Digital watermarking is the procedure whereby secret information (the watermark) is embedded into the host multimedia content, such that it is: (1) hidden, i.e., not perceptually visible; and (2) recoverable, even after the content is degraded by different attacks such JPEG compression, noise, horizontal and vertical flips etc. The two basic requirements for an effective watermarking scheme, imperceptibility and robustness, conflict with each other. The main focus of this thesis is to provide good tradeoff between perceptual quality of the watermarked image and its robustness against different attacks. For this purpose, we have discussed a robust digital watermarking technique in discrete wavelet (DWT) domain. This scheme employs a contrast sensitivity based human visual system (HVS) model. The iv HVS models give us a direct way to determine the maximum strength of watermark signal that each portion of an image can tolerate without affecting the visual quality of the image. The proposed work develops a novel approach of embedding both visible and invisible watermarks into cover image. Visible watermark is used only to distract the hacker /unauthorized user as actual watermark is inserted invisibly. This increases the security two fold as visible watermark act as copyright logo and invisible serves the purpose of authentication. This is carried out by embedding primary watermark visibly using alpha blending and the DWT coefficients of the host image have been modified for embedding invisible secondary watermark. The proposed approach incorporates both blind and non blind methods into one watermarking scheme and work well on grayscale as well as color images. Performed objective and subjective analysis proves the efficiency of proposed approach.
APA, Harvard, Vancouver, ISO, and other styles
4

Gu, Yong-Guang, and 古永光. "A Subsampling Image SVD-based Semi-fragile Watermarking Technique for Rightful Ownership Protection." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/00221458782479901742.

Full text
Abstract:
碩士
國立成功大學
電腦與通信工程研究所
96
The original images are usually handled by general image manipulations or loss compression for some kinds of situations such as the Internet, surveillance system and medicine. Semi-fragile digital watermarking techniques allow content-preserving manipulations while are sensitive to malicious tamper. These techniques modify the singular values through the singular value decomposition (SVD) in recent years. It is a research because the watermarked image quality may be decreased by modifying the singular values. In this paper, we utilize the high similar property of each subimage through subsampling and propose a subsampling image SVD-based semi-fragile watermarking technique with use of the high similar property of each subimage through subsampling. First, four subimages are obtained by subsampling. We use two of subimages to generate a block correlation with the correlation factor (CF) for adjusting between the fragility and robustness of the embedded watermark. Then, The watermark are embedded into two SVD coefficients of the other subimages. The proposed technique can detect the modified regions with block unit because we employ the block correlation of all subimage. Experiment results show that the precision of this technique not only overcomes several attacks such as the gaussian noise attack and sharpening attack, but also detects the tampered regions.
APA, Harvard, Vancouver, ISO, and other styles
5

Min-Yang, Huang, and 黃民仰. "A robust image watermarking system to resolve rightful ownerships." Thesis, 2001. http://ndltd.ncl.edu.tw/handle/60559565073653272804.

Full text
Abstract:
碩士
國立臺灣科技大學
電機工程系
89
In this thesis, a robust watermarking scheme and solutions to resolve rightful ownerships are both presented. For the robust watermarking scheme, we propose a method to embed bipolar data into digital images. Two watermarks are cast into different levels and coefficients of wavelet transform to resist various image attacks. Moreover, a repeated embedding manner is performed to increase the robustness. We apply the JND paradigm and texture masking to guarantee the embedded watermark is transparent. Besides, the watermark detection is based on the estimation of the probability of false positives. The malice attacks on watermarking algorithms themselves are also taken into consideration. The experimental results show our watermarks in various types of images suffering different types of attacks are robust enough. For resolving multiple claims of ownerships, some proposed solutions to prevent the image from counterfeiting are discussed. We propose some methods to strengthen these solutions. Furthermore, we develop a watermarking system based on the time stamp encryption from a third party. On the issues of robustness and ownerships, not only the means but also the aims of watermarks are emphasized.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "RIGHTFUL OWNERSHIP"

1

Vallentyne, Peter. Neurointerventions, Self-Ownership, and Enforcement Rights. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198758617.003.0007.

Full text
Abstract:
Individuals who have not intruded, and who do not risk intruding, upon the rights of others, normally are wronged by harmful non-consensual neurointerventions. Nonetheless, this chapter argues that neurointerventions sometimes do not wrong the intervenee; namely, when (1) suitably valid consent has been given by the intervenee, or (2) the intervenee risks non-rightfully intruding upon the rights of others and the intervention is proportionate and necessary for suitably reducing the intrusion-harms she imposes, or (3) the intervenee is not psychologically autonomous and the intervention is in her interests. Moreover, in the second case, it wrongs an individual to impose harmful non-consensual alternatives to neurointerventions (such as incarceration) when they impose greater intrusion-harm on the individual and do not achieve a greater reduction in the relevant intrusion-harm she imposes.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "RIGHTFUL OWNERSHIP"

1

Kumar, Naveen, and Vijay Kumar Sharma. "Quantum Hilbert Image Scrambling and SVD-Based Watermarking Scheme for Rightful Ownership." In Algorithms for Intelligent Systems, 361–70. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5077-5_33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fukui, Hideo. "Real Estate and the Legal System of Japan." In New Frontiers in Regional Science: Asian Perspectives, 3–7. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-8848-8_1.

Full text
Abstract:
AbstractIn Part I, entitled Real Estate and the Legal System, we analyze owner-unknown land issues, land acquisitions, and real estate auctions.The use and value of real estate such as land and buildings are significantly affected by public laws and regulations related to urban planning and construction, the environment, and taxation; for example, contract laws such as the Act on Land and Building Leases; private laws regulating torts, collateral enforcement, and so on; tax laws that regulate transfer taxes, ownership taxes, and transaction taxes; and regulations surrounding land use and urban infrastructure development. This paper discusses, therefore, the relationships between these laws and real estate, identifies problems in the laws associated with real estate in Japan, and proposes improvements.First, in recent years, owner-unknown land issues have become a serious concern in Japan. The Japanese registry does not always reflect the actual rightful owner, primarily because such registration is only a perfection requirement in civil law and registration involves a great deal of time and money. For example, because a large extent of land is registered to owners from nearly 100 years ago, it has changed hands many times through inheritance, which means that today, it is extremely difficult to determine the actual owner (inheritor) without spending a great deal of time and money. However, if the profits to be obtained from the land do not justify such expense, the land remains unused as “owner-unknown land.”Buying and selling land under Japanese civil law requires an agreement from all landowners including in the case of shared ownerships; therefore, even if the land has high returns, if it is “owner-unknown land,” it cannot be used effectively. With a focus on unknown-owner land, in this section, four writers provide multifaceted perspectives on the causes thereof, the defects in the current system, and the possible solutions.Eminent domain, the system which allows the acquisition of land against the land owner’s will for public projects, is widely institutionalized in many countries. It works to mitigate the owner-unknown land issues as far as lands are acquired by public projects.Further, real estate auctions are often held when liens are placed on land and/or residences for housing loan defaults. The Japanese civil auction system, which was institutionalized at the end of the nineteenth century, stipulates that a tenancy that is behind on a mortgage may resist a purchase unconditionally as long as the mortgage default period is within 3 years (short-term lease protection system/former Civil Code Article 395). This system was intended to avoid the unstable use of mortgaged properties and to promote the effective use of real estate; however, because the majority of users and the beneficiaries of this system were in fact anti-social groups, it was used to demand money unjustly from debtors and buyers, thus preventing the effective use of the mortgaged properties.When the protection of short-term leases was abolished in 2004, these types of interferences are said to have decreased drastically. However, successful bids for auctioned real estate properties continue to be lower than in general transactions. Therefore, here, we provide a quantitative analysis of these situations and propose further auction system improvements.Below, we introduce the outlines of each theory in Part I.
APA, Harvard, Vancouver, ISO, and other styles
3

CHANG, CHING-YUN, and IUON-CHANG LIN. "ASSURING RIGHTFUL OWNERSHIP FOR DIGITAL IMAGES USING INVISIBLE WATERMARKS." In Wavelet Analysis and Active Media Technology, 533–50. World Scientific Publishing Company, 2005. http://dx.doi.org/10.1142/9789812701695_0083.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mkrttchian, Vardan, Dmitry Davydov, and Viacheslav Voronin. "The Perspectives of Supply Chain Management Using Natural Knowledge From 3D Blockchain Technologies and Avatar-Based and Geographic Information Systems (GIS)." In Digitalization of Decentralized Supply Chains During Global Crises, 174–92. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-6874-3.ch008.

Full text
Abstract:
The blockchain restores control and ownership of information back to its rightful owner, thus eliminating dependencies on central authorities and third parties. These material chains are immensely complex; they can be subject to the laws and regulations of more than 200 countries and territories, and they are heavily influenced by many different factors ranging from freight consolidation to the timing of hundreds of concurrent shipments. This chapter is about algorithmic modeling of supply chain management using natural knowledge from a 3D-hybrid blockchain as a dragon chain.
APA, Harvard, Vancouver, ISO, and other styles
5

Agbesi, Samuel, and Fati Tahiru. "Application of Blockchain Technology in Land Administration in Ghana." In Advances in Data Mining and Database Management, 103–16. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-3632-2.ch006.

Full text
Abstract:
The administration of lands in Ghana has been a major issue in the past years that has resulted in parties seeking arbitration to determine the rightful owners and others resulting in death because of the land-guard menace. The main issues in land administration in Ghana include modification and falsification of land records, difficulty in authenticating the ownership of land property, sales of land property to more than one customer, and lack of transparency in land transactions. This chapter examines the application of Blockchain in land administration in Ghana to solve the issues of unauthorized modification of land records, difficulties in proven ownership of land properties, and the lack of transparency in land transactions. The proposed solution is based on Ethereum Blockchain technology using a smart contract. The solution used a non-fungible token to represent land properties as a digital asset that can be traded on the proposed solution. The proposed solution provides integrity, immutability, provenance, and transparency in land administration.
APA, Harvard, Vancouver, ISO, and other styles
6

Christopher J, Borgen. "Part II Predominant Security Challenges and International Law, International Security, Ch.15 Contested Territory." In The Oxford Handbook of the International Law of Global Security. Oxford University Press, 2021. http://dx.doi.org/10.1093/law/9780198827276.003.0016.

Full text
Abstract:
This chapter describes the theory and practice of territorial contestation, past, present, and possibly future. It sketches the evolution of the so-called ‘modes of acquisition’ of territory and other concepts through different eras. Territorial disputes are perhaps the quintessential problem of public international law. In its transformation from the ancient world, through feudalism, and into the Westphalian system of States, territory has been repeatedly reconceptualized and reorganized from an era of frontiers to a modern world segmented by borders. This modern compartmentalization of territory emphasizes the concept of rightful ownership of title. The chapter then looks at the methods of resolving territorial disputes. It discusses political and military responses to territorial contests and judicial resolution. The chapter focuses on the particular role that recognition plays in resolving territorial disputes.
APA, Harvard, Vancouver, ISO, and other styles
7

Vinitha, K., P. Thirumoorthy, and S. Hemalatha. "Data Storage, Data Forwarding, Data Retrieval With Big Data Deepfakes in Secure Cloud Storage." In Advances in Multimedia and Interactive Technologies, 106–19. IGI Global, 2023. http://dx.doi.org/10.4018/978-1-6684-6060-3.ch009.

Full text
Abstract:
Deduplication technologies are extensively used in distributed storage management to lower the space and transfer rate needs of services by eliminating redundant information and storing only its single replica. Many clients redistributing comparable data to a shared repository is ideal for deduplication; however, this practise raises concerns about data ownership and confidentiality. Each data owner can confidently show a distributed storage server that they are the rightful owner of a piece of data via confirmation of holding plans. In contrast to state, many clients would encrypt data before re-appropriating it to distributed storage for added safety. Due to the unpredictable nature of encryption, this prevents data duplication. Some recent deduplication systems have been proposed to solve this issue by allowing multiple owners to share the same encryption key for identical data.
APA, Harvard, Vancouver, ISO, and other styles
8

Murray, Andrew. "14. Branding, trademarks, and domain names." In Information Technology Law, 359–89. Oxford University Press, 2019. http://dx.doi.org/10.1093/he/9780198804727.003.0014.

Full text
Abstract:
This chapter examines the role of trademarks in the creation of brand portfolios online, including internet addresses or domain names. It first provides an overview of branding and trademarks in the global business environment, trademark characteristics, and the distinction between registered and unregistered trademarks, and then looks at domain names as address tools and brand identifiers. The chapter also considers early disputes over rightful ownership of trademarks and domain names, examining the development of cybersquatting case law before the UK and US courts. It discusses the allocation of new generic top-level domains under the New gTLD procedure and examines the legal safeguards for trademark holders under the procedure. The primary focus of the chapter is the Internet Corporation for Assigned Names and Numbers (ICANN) Uniform Domain Name Dispute Resolution Policy and its domestic counterpart in the UK, the Nominet Dispute Resolution Service.
APA, Harvard, Vancouver, ISO, and other styles
9

Murray, Andrew. "14. Branding, trade marks, and domain names." In Information Technology Law, 372–400. Oxford University Press, 2023. http://dx.doi.org/10.1093/he/9780192893529.003.0014.

Full text
Abstract:
This chapter examines the role of trade marks in the creation of brand portfolios online, including internet addresses or domain names. It first provides an overview of branding and trade marks in the global business environment, trade mark characteristics, and the distinction between registered and unregistered trade marks, and then looks at domain names as address tools and brand identifiers. The chapter also considers early disputes over rightful ownership of trade marks and domain names, examining the development of cybersquatting case law before the UK and US courts. It discusses the allocation of new generic top-level domains under the New gTLD procedure and examines the legal safeguards for trade mark holders under the procedure. The primary focus of the chapter is the Internet Corporation for Assigned Names and Numbers (ICANN) Uniform Domain Name Dispute Resolution Policy and its domestic counterpart in the UK, the Nominet Dispute Resolution Service.
APA, Harvard, Vancouver, ISO, and other styles
10

Riccardo, Pavoni. "Part III General International Law, Ch.24 Cultural Heritage and State Immunity." In The Oxford Handbook of International Cultural Heritage Law. Oxford University Press, 2020. http://dx.doi.org/10.1093/law/9780198859871.003.0024.

Full text
Abstract:
The application of State immunity to cultural heritage property may yield contradictory outcomes. On the one hand, it may bar access to justice by rightful owners of cultural property. On the other, it may shield art objects from reparation claims by victims of state breaches of obligations which are unrelated to ownership issues. This chapter examines the law and practice concerning cultural heritage and state immunity. A variety of pertinent recent developments are reviewed, such as certain law-making activities by the Council of Europe, the International Law Association, and a number of States, as well as several high-profile judicial disputes challenging state immunity for cultural property, particularly in the context of the United States Nazi-looted art litigation. Against that backdrop, the chapter discusses the boundaries of customary law in this area, especially as regards the existence and scope of a customary rule of immunity from seizure for artworks on loan.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "RIGHTFUL OWNERSHIP"

1

Zeng, Wenjun, Bede Liu, and Shawmin Lei. "Extraction of multiresolution watermark images for resolving rightful ownership." In Electronic Imaging '99, edited by Ping W. Wong and Edward J. Delp III. SPIE, 1999. http://dx.doi.org/10.1117/12.344691.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Schlauweg, Mathias, Dima Pröfrock, Benedikt Zeibich, and Erika Müller. "Dual watermarking for protection of rightful ownership and secure image authentication." In the 4th ACM international workshop. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1178766.1178781.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Al-Nu'aimi, Abdallah Al-Tahan. "Gray watermarks to prove the rightful ownership for digital coloured images." In the 1st International Conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1874590.1874617.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dorairangaswamy, M. A., and B. Padhmavathi. "An effective blind watermarking scheme for protecting rightful ownership of digital images." In TENCON 2009 - 2009 IEEE Region 10 Conference. IEEE, 2009. http://dx.doi.org/10.1109/tencon.2009.5395812.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Singh, Priyanka, Shivendra Shivani, and Suneeta Agarwal. "A chaotic map based DCT-SVD watermarking scheme for rightful ownership verification." In 2014 Students Conference on Engineering and Systems (SCES). IEEE, 2014. http://dx.doi.org/10.1109/sces.2014.6880048.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pandey, Aishwary K., Priyanka Singh, Nishant Agarwal, and Balasubramanian Raman. "SecMed: A Secure Approach for Proving Rightful Ownership of Medical Images in Encrypted Domain over Cloud." In 2018 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR). IEEE, 2018. http://dx.doi.org/10.1109/mipr.2018.00085.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Craver, Scott A., Nasir D. Memon, Boon-Lock Yeo, and Minerva M. Yeung. "Can invisible watermarks resolve rightful ownerships?" In Electronic Imaging '97, edited by Ishwar K. Sethi and Ramesh C. Jain. SPIE, 1997. http://dx.doi.org/10.1117/12.263419.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography