Gotowa bibliografia na temat „RIGHTFUL OWNERSHIP”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „RIGHTFUL OWNERSHIP”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "RIGHTFUL OWNERSHIP"
Chang, Chin-Chen, i Pei-Yu Lin. "Adaptive watermark mechanism for rightful ownership protection". Journal of Systems and Software 81, nr 7 (lipiec 2008): 1118–29. http://dx.doi.org/10.1016/j.jss.2007.07.036.
Pełny tekst źródłaRuizhen Liu i Tieniu Tan. "An SVD-based watermarking scheme for protecting rightful ownership". IEEE Transactions on Multimedia 4, nr 1 (marzec 2002): 121–28. http://dx.doi.org/10.1109/6046.985560.
Pełny tekst źródłaAl-Nu’aimi, Abdallah Al-Tahan. "Using Watermarking Techniques to prove Rightful Ownership of Web Images". International Journal of Information Technology and Web Engineering 6, nr 2 (kwiecień 2011): 29–39. http://dx.doi.org/10.4018/jitwe.2011040103.
Pełny tekst źródłaRAWAT, SANJAY, i BALASUBRAMANIAN RAMAN. "A CHAOS-BASED ROBUST WATERMARKING ALGORITHM FOR RIGHTFUL OWNERSHIP PROTECTION". International Journal of Image and Graphics 11, nr 04 (październik 2011): 471–93. http://dx.doi.org/10.1142/s0219467811004263.
Pełny tekst źródłaMohammad, Ahmad A., Ali Alhaj i Sameer Shaltaf. "An improved SVD-based watermarking scheme for protecting rightful ownership". Signal Processing 88, nr 9 (wrzesień 2008): 2158–80. http://dx.doi.org/10.1016/j.sigpro.2008.02.015.
Pełny tekst źródłaArneson, Richard J. "SELF-OWNERSHIP AND WORLD OWNERSHIP: AGAINST LEFT-LIBERTARIANISM". Social Philosophy and Policy 27, nr 1 (styczeń 2010): 168–94. http://dx.doi.org/10.1017/s0265052509990070.
Pełny tekst źródłaCohen, G. A. "Self-Ownership, World Ownership, and Equality: Part II". Social Philosophy and Policy 3, nr 2 (1986): 77–96. http://dx.doi.org/10.1017/s0265052500000315.
Pełny tekst źródłaXiao-Ping Zhang i Kan Li. "Comments on "An SVD-based watermarking scheme for protecting rightful Ownership"". IEEE Transactions on Multimedia 7, nr 3 (czerwiec 2005): 593–94. http://dx.doi.org/10.1109/tmm.2005.843357.
Pełny tekst źródłaRykaczewski, R. "Comments on “An SVD-Based Watermarking Scheme for Protecting Rightful Ownership”". IEEE Transactions on Multimedia 9, nr 2 (luty 2007): 421–23. http://dx.doi.org/10.1109/tmm.2006.886297.
Pełny tekst źródłaLin, Phen-Lan. "Digital watermarking models for resolving rightful ownership and authenticating legitimate customer". Journal of Systems and Software 55, nr 3 (styczeń 2001): 261–71. http://dx.doi.org/10.1016/s0164-1212(00)00075-3.
Pełny tekst źródłaRozprawy doktorskie na temat "RIGHTFUL OWNERSHIP"
Ghaderpanah, Mohammadreza. "Spectral schemes for rightful ownership protection". Thesis, 2008. http://spectrum.library.concordia.ca/976020/1/MR42530.pdf.
Pełny tekst źródłaChung, Chi-Yien, i 鍾季穎. "Some Protocols for Passing Secure Messages in Networks and Protecting Rightful Ownership". Thesis, 2002. http://ndltd.ncl.edu.tw/handle/47280415083500704038.
Pełny tekst źródła國立中正大學
資訊工程研究所
90
In these recent years, Internet has played an important role in our daily life. We can do lots of activities, which are done with great efforts before, easily at home. However, there are a lot of security and privacy issues arise while enjoying the convenience that Internet has brought us. General speaking, the services provided by Internet should have four basic security requests. They are confidentiality, authentication, integrity, and non-repudiation. As a result, we propose some protocols, which make the processes of communication can go on smoothly and safely. First of all, we suggest an efficient and secure method, which aims at the session keys generation used in the communications, to ensure that the whole process can‘t be altered by malicious eavesdroppers. Besides, traditional secure communication protocols focus on confidentiality of the contents. Nevertheless, an eavesdropper can detect that who the receiver is, and make her/him an attack target. As a result, except for the protocol needed in the process of session key generation, we also propose a scheme which can hide the identity of the receiver. Our protocol can be applied to both uni-cast and multicast. Those protocols mentioned above are suitable for the application in electronic voting. As for electronic voting, the most important thing is anonymity. At the same time of achieving anonymity, the situation of voting more than once should be concerned. In this thesis, we propose an effective electronic voting scheme, which makes the voting can be done on Internet securely. How to protect the intellectual property has become an important topic, when large amounts of data and digitalized image transmitted in Internet nowadays. It is a major issue to guarantee both the rights of buyer and seller. When disputes occur, how to solve them smoothly is significant. Therefore, we propose a scheme, which is about protecting rightful ownership. Once the buyer distributes unauthorized copies, the seller can detect whom this image is originated. Besides, we can stop the Man-in-the-Middle attack effectively, which can ensure the rights of the buyer.
MONIKA. "DWT BASED DUAL WATERMARKING SCHEME FOR RIGHTFUL OWNERSHIP AND SECURE IMAGE AUTHENTICATION". Thesis, 2013. http://dspace.dtu.ac.in:8080/jspui/handle/repository/16128.
Pełny tekst źródłaGu, Yong-Guang, i 古永光. "A Subsampling Image SVD-based Semi-fragile Watermarking Technique for Rightful Ownership Protection". Thesis, 2008. http://ndltd.ncl.edu.tw/handle/00221458782479901742.
Pełny tekst źródła國立成功大學
電腦與通信工程研究所
96
The original images are usually handled by general image manipulations or loss compression for some kinds of situations such as the Internet, surveillance system and medicine. Semi-fragile digital watermarking techniques allow content-preserving manipulations while are sensitive to malicious tamper. These techniques modify the singular values through the singular value decomposition (SVD) in recent years. It is a research because the watermarked image quality may be decreased by modifying the singular values. In this paper, we utilize the high similar property of each subimage through subsampling and propose a subsampling image SVD-based semi-fragile watermarking technique with use of the high similar property of each subimage through subsampling. First, four subimages are obtained by subsampling. We use two of subimages to generate a block correlation with the correlation factor (CF) for adjusting between the fragility and robustness of the embedded watermark. Then, The watermark are embedded into two SVD coefficients of the other subimages. The proposed technique can detect the modified regions with block unit because we employ the block correlation of all subimage. Experiment results show that the precision of this technique not only overcomes several attacks such as the gaussian noise attack and sharpening attack, but also detects the tampered regions.
Min-Yang, Huang, i 黃民仰. "A robust image watermarking system to resolve rightful ownerships". Thesis, 2001. http://ndltd.ncl.edu.tw/handle/60559565073653272804.
Pełny tekst źródła國立臺灣科技大學
電機工程系
89
In this thesis, a robust watermarking scheme and solutions to resolve rightful ownerships are both presented. For the robust watermarking scheme, we propose a method to embed bipolar data into digital images. Two watermarks are cast into different levels and coefficients of wavelet transform to resist various image attacks. Moreover, a repeated embedding manner is performed to increase the robustness. We apply the JND paradigm and texture masking to guarantee the embedded watermark is transparent. Besides, the watermark detection is based on the estimation of the probability of false positives. The malice attacks on watermarking algorithms themselves are also taken into consideration. The experimental results show our watermarks in various types of images suffering different types of attacks are robust enough. For resolving multiple claims of ownerships, some proposed solutions to prevent the image from counterfeiting are discussed. We propose some methods to strengthen these solutions. Furthermore, we develop a watermarking system based on the time stamp encryption from a third party. On the issues of robustness and ownerships, not only the means but also the aims of watermarks are emphasized.
Książki na temat "RIGHTFUL OWNERSHIP"
Vallentyne, Peter. Neurointerventions, Self-Ownership, and Enforcement Rights. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198758617.003.0007.
Pełny tekst źródłaCzęści książek na temat "RIGHTFUL OWNERSHIP"
Kumar, Naveen, i Vijay Kumar Sharma. "Quantum Hilbert Image Scrambling and SVD-Based Watermarking Scheme for Rightful Ownership". W Algorithms for Intelligent Systems, 361–70. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5077-5_33.
Pełny tekst źródłaFukui, Hideo. "Real Estate and the Legal System of Japan". W New Frontiers in Regional Science: Asian Perspectives, 3–7. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-8848-8_1.
Pełny tekst źródłaCHANG, CHING-YUN, i IUON-CHANG LIN. "ASSURING RIGHTFUL OWNERSHIP FOR DIGITAL IMAGES USING INVISIBLE WATERMARKS". W Wavelet Analysis and Active Media Technology, 533–50. World Scientific Publishing Company, 2005. http://dx.doi.org/10.1142/9789812701695_0083.
Pełny tekst źródłaMkrttchian, Vardan, Dmitry Davydov i Viacheslav Voronin. "The Perspectives of Supply Chain Management Using Natural Knowledge From 3D Blockchain Technologies and Avatar-Based and Geographic Information Systems (GIS)". W Digitalization of Decentralized Supply Chains During Global Crises, 174–92. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-6874-3.ch008.
Pełny tekst źródłaAgbesi, Samuel, i Fati Tahiru. "Application of Blockchain Technology in Land Administration in Ghana". W Advances in Data Mining and Database Management, 103–16. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-3632-2.ch006.
Pełny tekst źródłaChristopher J, Borgen. "Part II Predominant Security Challenges and International Law, International Security, Ch.15 Contested Territory". W The Oxford Handbook of the International Law of Global Security. Oxford University Press, 2021. http://dx.doi.org/10.1093/law/9780198827276.003.0016.
Pełny tekst źródłaVinitha, K., P. Thirumoorthy i S. Hemalatha. "Data Storage, Data Forwarding, Data Retrieval With Big Data Deepfakes in Secure Cloud Storage". W Advances in Multimedia and Interactive Technologies, 106–19. IGI Global, 2023. http://dx.doi.org/10.4018/978-1-6684-6060-3.ch009.
Pełny tekst źródłaMurray, Andrew. "14. Branding, trademarks, and domain names". W Information Technology Law, 359–89. Oxford University Press, 2019. http://dx.doi.org/10.1093/he/9780198804727.003.0014.
Pełny tekst źródłaMurray, Andrew. "14. Branding, trade marks, and domain names". W Information Technology Law, 372–400. Oxford University Press, 2023. http://dx.doi.org/10.1093/he/9780192893529.003.0014.
Pełny tekst źródłaRiccardo, Pavoni. "Part III General International Law, Ch.24 Cultural Heritage and State Immunity". W The Oxford Handbook of International Cultural Heritage Law. Oxford University Press, 2020. http://dx.doi.org/10.1093/law/9780198859871.003.0024.
Pełny tekst źródłaStreszczenia konferencji na temat "RIGHTFUL OWNERSHIP"
Zeng, Wenjun, Bede Liu i Shawmin Lei. "Extraction of multiresolution watermark images for resolving rightful ownership". W Electronic Imaging '99, redaktorzy Ping W. Wong i Edward J. Delp III. SPIE, 1999. http://dx.doi.org/10.1117/12.344691.
Pełny tekst źródłaSchlauweg, Mathias, Dima Pröfrock, Benedikt Zeibich i Erika Müller. "Dual watermarking for protection of rightful ownership and secure image authentication". W the 4th ACM international workshop. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1178766.1178781.
Pełny tekst źródłaAl-Nu'aimi, Abdallah Al-Tahan. "Gray watermarks to prove the rightful ownership for digital coloured images". W the 1st International Conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1874590.1874617.
Pełny tekst źródłaDorairangaswamy, M. A., i B. Padhmavathi. "An effective blind watermarking scheme for protecting rightful ownership of digital images". W TENCON 2009 - 2009 IEEE Region 10 Conference. IEEE, 2009. http://dx.doi.org/10.1109/tencon.2009.5395812.
Pełny tekst źródłaSingh, Priyanka, Shivendra Shivani i Suneeta Agarwal. "A chaotic map based DCT-SVD watermarking scheme for rightful ownership verification". W 2014 Students Conference on Engineering and Systems (SCES). IEEE, 2014. http://dx.doi.org/10.1109/sces.2014.6880048.
Pełny tekst źródłaPandey, Aishwary K., Priyanka Singh, Nishant Agarwal i Balasubramanian Raman. "SecMed: A Secure Approach for Proving Rightful Ownership of Medical Images in Encrypted Domain over Cloud". W 2018 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR). IEEE, 2018. http://dx.doi.org/10.1109/mipr.2018.00085.
Pełny tekst źródłaCraver, Scott A., Nasir D. Memon, Boon-Lock Yeo i Minerva M. Yeung. "Can invisible watermarks resolve rightful ownerships?" W Electronic Imaging '97, redaktorzy Ishwar K. Sethi i Ramesh C. Jain. SPIE, 1997. http://dx.doi.org/10.1117/12.263419.
Pełny tekst źródła