Literatura académica sobre el tema "RIGHTFUL OWNERSHIP"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "RIGHTFUL OWNERSHIP".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "RIGHTFUL OWNERSHIP"
Chang, Chin-Chen y Pei-Yu Lin. "Adaptive watermark mechanism for rightful ownership protection". Journal of Systems and Software 81, n.º 7 (julio de 2008): 1118–29. http://dx.doi.org/10.1016/j.jss.2007.07.036.
Texto completoRuizhen Liu y Tieniu Tan. "An SVD-based watermarking scheme for protecting rightful ownership". IEEE Transactions on Multimedia 4, n.º 1 (marzo de 2002): 121–28. http://dx.doi.org/10.1109/6046.985560.
Texto completoAl-Nu’aimi, Abdallah Al-Tahan. "Using Watermarking Techniques to prove Rightful Ownership of Web Images". International Journal of Information Technology and Web Engineering 6, n.º 2 (abril de 2011): 29–39. http://dx.doi.org/10.4018/jitwe.2011040103.
Texto completoRAWAT, SANJAY y BALASUBRAMANIAN RAMAN. "A CHAOS-BASED ROBUST WATERMARKING ALGORITHM FOR RIGHTFUL OWNERSHIP PROTECTION". International Journal of Image and Graphics 11, n.º 04 (octubre de 2011): 471–93. http://dx.doi.org/10.1142/s0219467811004263.
Texto completoMohammad, Ahmad A., Ali Alhaj y Sameer Shaltaf. "An improved SVD-based watermarking scheme for protecting rightful ownership". Signal Processing 88, n.º 9 (septiembre de 2008): 2158–80. http://dx.doi.org/10.1016/j.sigpro.2008.02.015.
Texto completoArneson, Richard J. "SELF-OWNERSHIP AND WORLD OWNERSHIP: AGAINST LEFT-LIBERTARIANISM". Social Philosophy and Policy 27, n.º 1 (enero de 2010): 168–94. http://dx.doi.org/10.1017/s0265052509990070.
Texto completoCohen, G. A. "Self-Ownership, World Ownership, and Equality: Part II". Social Philosophy and Policy 3, n.º 2 (1986): 77–96. http://dx.doi.org/10.1017/s0265052500000315.
Texto completoXiao-Ping Zhang y Kan Li. "Comments on "An SVD-based watermarking scheme for protecting rightful Ownership"". IEEE Transactions on Multimedia 7, n.º 3 (junio de 2005): 593–94. http://dx.doi.org/10.1109/tmm.2005.843357.
Texto completoRykaczewski, R. "Comments on “An SVD-Based Watermarking Scheme for Protecting Rightful Ownership”". IEEE Transactions on Multimedia 9, n.º 2 (febrero de 2007): 421–23. http://dx.doi.org/10.1109/tmm.2006.886297.
Texto completoLin, Phen-Lan. "Digital watermarking models for resolving rightful ownership and authenticating legitimate customer". Journal of Systems and Software 55, n.º 3 (enero de 2001): 261–71. http://dx.doi.org/10.1016/s0164-1212(00)00075-3.
Texto completoTesis sobre el tema "RIGHTFUL OWNERSHIP"
Ghaderpanah, Mohammadreza. "Spectral schemes for rightful ownership protection". Thesis, 2008. http://spectrum.library.concordia.ca/976020/1/MR42530.pdf.
Texto completoChung, Chi-Yien y 鍾季穎. "Some Protocols for Passing Secure Messages in Networks and Protecting Rightful Ownership". Thesis, 2002. http://ndltd.ncl.edu.tw/handle/47280415083500704038.
Texto completo國立中正大學
資訊工程研究所
90
In these recent years, Internet has played an important role in our daily life. We can do lots of activities, which are done with great efforts before, easily at home. However, there are a lot of security and privacy issues arise while enjoying the convenience that Internet has brought us. General speaking, the services provided by Internet should have four basic security requests. They are confidentiality, authentication, integrity, and non-repudiation. As a result, we propose some protocols, which make the processes of communication can go on smoothly and safely. First of all, we suggest an efficient and secure method, which aims at the session keys generation used in the communications, to ensure that the whole process can‘t be altered by malicious eavesdroppers. Besides, traditional secure communication protocols focus on confidentiality of the contents. Nevertheless, an eavesdropper can detect that who the receiver is, and make her/him an attack target. As a result, except for the protocol needed in the process of session key generation, we also propose a scheme which can hide the identity of the receiver. Our protocol can be applied to both uni-cast and multicast. Those protocols mentioned above are suitable for the application in electronic voting. As for electronic voting, the most important thing is anonymity. At the same time of achieving anonymity, the situation of voting more than once should be concerned. In this thesis, we propose an effective electronic voting scheme, which makes the voting can be done on Internet securely. How to protect the intellectual property has become an important topic, when large amounts of data and digitalized image transmitted in Internet nowadays. It is a major issue to guarantee both the rights of buyer and seller. When disputes occur, how to solve them smoothly is significant. Therefore, we propose a scheme, which is about protecting rightful ownership. Once the buyer distributes unauthorized copies, the seller can detect whom this image is originated. Besides, we can stop the Man-in-the-Middle attack effectively, which can ensure the rights of the buyer.
MONIKA. "DWT BASED DUAL WATERMARKING SCHEME FOR RIGHTFUL OWNERSHIP AND SECURE IMAGE AUTHENTICATION". Thesis, 2013. http://dspace.dtu.ac.in:8080/jspui/handle/repository/16128.
Texto completoGu, Yong-Guang y 古永光. "A Subsampling Image SVD-based Semi-fragile Watermarking Technique for Rightful Ownership Protection". Thesis, 2008. http://ndltd.ncl.edu.tw/handle/00221458782479901742.
Texto completo國立成功大學
電腦與通信工程研究所
96
The original images are usually handled by general image manipulations or loss compression for some kinds of situations such as the Internet, surveillance system and medicine. Semi-fragile digital watermarking techniques allow content-preserving manipulations while are sensitive to malicious tamper. These techniques modify the singular values through the singular value decomposition (SVD) in recent years. It is a research because the watermarked image quality may be decreased by modifying the singular values. In this paper, we utilize the high similar property of each subimage through subsampling and propose a subsampling image SVD-based semi-fragile watermarking technique with use of the high similar property of each subimage through subsampling. First, four subimages are obtained by subsampling. We use two of subimages to generate a block correlation with the correlation factor (CF) for adjusting between the fragility and robustness of the embedded watermark. Then, The watermark are embedded into two SVD coefficients of the other subimages. The proposed technique can detect the modified regions with block unit because we employ the block correlation of all subimage. Experiment results show that the precision of this technique not only overcomes several attacks such as the gaussian noise attack and sharpening attack, but also detects the tampered regions.
Min-Yang, Huang y 黃民仰. "A robust image watermarking system to resolve rightful ownerships". Thesis, 2001. http://ndltd.ncl.edu.tw/handle/60559565073653272804.
Texto completo國立臺灣科技大學
電機工程系
89
In this thesis, a robust watermarking scheme and solutions to resolve rightful ownerships are both presented. For the robust watermarking scheme, we propose a method to embed bipolar data into digital images. Two watermarks are cast into different levels and coefficients of wavelet transform to resist various image attacks. Moreover, a repeated embedding manner is performed to increase the robustness. We apply the JND paradigm and texture masking to guarantee the embedded watermark is transparent. Besides, the watermark detection is based on the estimation of the probability of false positives. The malice attacks on watermarking algorithms themselves are also taken into consideration. The experimental results show our watermarks in various types of images suffering different types of attacks are robust enough. For resolving multiple claims of ownerships, some proposed solutions to prevent the image from counterfeiting are discussed. We propose some methods to strengthen these solutions. Furthermore, we develop a watermarking system based on the time stamp encryption from a third party. On the issues of robustness and ownerships, not only the means but also the aims of watermarks are emphasized.
Libros sobre el tema "RIGHTFUL OWNERSHIP"
Vallentyne, Peter. Neurointerventions, Self-Ownership, and Enforcement Rights. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198758617.003.0007.
Texto completoCapítulos de libros sobre el tema "RIGHTFUL OWNERSHIP"
Kumar, Naveen y Vijay Kumar Sharma. "Quantum Hilbert Image Scrambling and SVD-Based Watermarking Scheme for Rightful Ownership". En Algorithms for Intelligent Systems, 361–70. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5077-5_33.
Texto completoFukui, Hideo. "Real Estate and the Legal System of Japan". En New Frontiers in Regional Science: Asian Perspectives, 3–7. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-8848-8_1.
Texto completoCHANG, CHING-YUN y IUON-CHANG LIN. "ASSURING RIGHTFUL OWNERSHIP FOR DIGITAL IMAGES USING INVISIBLE WATERMARKS". En Wavelet Analysis and Active Media Technology, 533–50. World Scientific Publishing Company, 2005. http://dx.doi.org/10.1142/9789812701695_0083.
Texto completoMkrttchian, Vardan, Dmitry Davydov y Viacheslav Voronin. "The Perspectives of Supply Chain Management Using Natural Knowledge From 3D Blockchain Technologies and Avatar-Based and Geographic Information Systems (GIS)". En Digitalization of Decentralized Supply Chains During Global Crises, 174–92. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-6874-3.ch008.
Texto completoAgbesi, Samuel y Fati Tahiru. "Application of Blockchain Technology in Land Administration in Ghana". En Advances in Data Mining and Database Management, 103–16. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-3632-2.ch006.
Texto completoChristopher J, Borgen. "Part II Predominant Security Challenges and International Law, International Security, Ch.15 Contested Territory". En The Oxford Handbook of the International Law of Global Security. Oxford University Press, 2021. http://dx.doi.org/10.1093/law/9780198827276.003.0016.
Texto completoVinitha, K., P. Thirumoorthy y S. Hemalatha. "Data Storage, Data Forwarding, Data Retrieval With Big Data Deepfakes in Secure Cloud Storage". En Advances in Multimedia and Interactive Technologies, 106–19. IGI Global, 2023. http://dx.doi.org/10.4018/978-1-6684-6060-3.ch009.
Texto completoMurray, Andrew. "14. Branding, trademarks, and domain names". En Information Technology Law, 359–89. Oxford University Press, 2019. http://dx.doi.org/10.1093/he/9780198804727.003.0014.
Texto completoMurray, Andrew. "14. Branding, trade marks, and domain names". En Information Technology Law, 372–400. Oxford University Press, 2023. http://dx.doi.org/10.1093/he/9780192893529.003.0014.
Texto completoRiccardo, Pavoni. "Part III General International Law, Ch.24 Cultural Heritage and State Immunity". En The Oxford Handbook of International Cultural Heritage Law. Oxford University Press, 2020. http://dx.doi.org/10.1093/law/9780198859871.003.0024.
Texto completoActas de conferencias sobre el tema "RIGHTFUL OWNERSHIP"
Zeng, Wenjun, Bede Liu y Shawmin Lei. "Extraction of multiresolution watermark images for resolving rightful ownership". En Electronic Imaging '99, editado por Ping W. Wong y Edward J. Delp III. SPIE, 1999. http://dx.doi.org/10.1117/12.344691.
Texto completoSchlauweg, Mathias, Dima Pröfrock, Benedikt Zeibich y Erika Müller. "Dual watermarking for protection of rightful ownership and secure image authentication". En the 4th ACM international workshop. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1178766.1178781.
Texto completoAl-Nu'aimi, Abdallah Al-Tahan. "Gray watermarks to prove the rightful ownership for digital coloured images". En the 1st International Conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1874590.1874617.
Texto completoDorairangaswamy, M. A. y B. Padhmavathi. "An effective blind watermarking scheme for protecting rightful ownership of digital images". En TENCON 2009 - 2009 IEEE Region 10 Conference. IEEE, 2009. http://dx.doi.org/10.1109/tencon.2009.5395812.
Texto completoSingh, Priyanka, Shivendra Shivani y Suneeta Agarwal. "A chaotic map based DCT-SVD watermarking scheme for rightful ownership verification". En 2014 Students Conference on Engineering and Systems (SCES). IEEE, 2014. http://dx.doi.org/10.1109/sces.2014.6880048.
Texto completoPandey, Aishwary K., Priyanka Singh, Nishant Agarwal y Balasubramanian Raman. "SecMed: A Secure Approach for Proving Rightful Ownership of Medical Images in Encrypted Domain over Cloud". En 2018 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR). IEEE, 2018. http://dx.doi.org/10.1109/mipr.2018.00085.
Texto completoCraver, Scott A., Nasir D. Memon, Boon-Lock Yeo y Minerva M. Yeung. "Can invisible watermarks resolve rightful ownerships?" En Electronic Imaging '97, editado por Ishwar K. Sethi y Ramesh C. Jain. SPIE, 1997. http://dx.doi.org/10.1117/12.263419.
Texto completo