Добірка наукової літератури з теми "RIGHTFUL OWNERSHIP"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "RIGHTFUL OWNERSHIP".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "RIGHTFUL OWNERSHIP"
Chang, Chin-Chen, and Pei-Yu Lin. "Adaptive watermark mechanism for rightful ownership protection." Journal of Systems and Software 81, no. 7 (July 2008): 1118–29. http://dx.doi.org/10.1016/j.jss.2007.07.036.
Повний текст джерелаRuizhen Liu and Tieniu Tan. "An SVD-based watermarking scheme for protecting rightful ownership." IEEE Transactions on Multimedia 4, no. 1 (March 2002): 121–28. http://dx.doi.org/10.1109/6046.985560.
Повний текст джерелаAl-Nu’aimi, Abdallah Al-Tahan. "Using Watermarking Techniques to prove Rightful Ownership of Web Images." International Journal of Information Technology and Web Engineering 6, no. 2 (April 2011): 29–39. http://dx.doi.org/10.4018/jitwe.2011040103.
Повний текст джерелаRAWAT, SANJAY, and BALASUBRAMANIAN RAMAN. "A CHAOS-BASED ROBUST WATERMARKING ALGORITHM FOR RIGHTFUL OWNERSHIP PROTECTION." International Journal of Image and Graphics 11, no. 04 (October 2011): 471–93. http://dx.doi.org/10.1142/s0219467811004263.
Повний текст джерелаMohammad, Ahmad A., Ali Alhaj, and Sameer Shaltaf. "An improved SVD-based watermarking scheme for protecting rightful ownership." Signal Processing 88, no. 9 (September 2008): 2158–80. http://dx.doi.org/10.1016/j.sigpro.2008.02.015.
Повний текст джерелаArneson, Richard J. "SELF-OWNERSHIP AND WORLD OWNERSHIP: AGAINST LEFT-LIBERTARIANISM." Social Philosophy and Policy 27, no. 1 (January 2010): 168–94. http://dx.doi.org/10.1017/s0265052509990070.
Повний текст джерелаCohen, G. A. "Self-Ownership, World Ownership, and Equality: Part II." Social Philosophy and Policy 3, no. 2 (1986): 77–96. http://dx.doi.org/10.1017/s0265052500000315.
Повний текст джерелаXiao-Ping Zhang and Kan Li. "Comments on "An SVD-based watermarking scheme for protecting rightful Ownership"." IEEE Transactions on Multimedia 7, no. 3 (June 2005): 593–94. http://dx.doi.org/10.1109/tmm.2005.843357.
Повний текст джерелаRykaczewski, R. "Comments on “An SVD-Based Watermarking Scheme for Protecting Rightful Ownership”." IEEE Transactions on Multimedia 9, no. 2 (February 2007): 421–23. http://dx.doi.org/10.1109/tmm.2006.886297.
Повний текст джерелаLin, Phen-Lan. "Digital watermarking models for resolving rightful ownership and authenticating legitimate customer." Journal of Systems and Software 55, no. 3 (January 2001): 261–71. http://dx.doi.org/10.1016/s0164-1212(00)00075-3.
Повний текст джерелаДисертації з теми "RIGHTFUL OWNERSHIP"
Ghaderpanah, Mohammadreza. "Spectral schemes for rightful ownership protection." Thesis, 2008. http://spectrum.library.concordia.ca/976020/1/MR42530.pdf.
Повний текст джерелаChung, Chi-Yien, and 鍾季穎. "Some Protocols for Passing Secure Messages in Networks and Protecting Rightful Ownership." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/47280415083500704038.
Повний текст джерела國立中正大學
資訊工程研究所
90
In these recent years, Internet has played an important role in our daily life. We can do lots of activities, which are done with great efforts before, easily at home. However, there are a lot of security and privacy issues arise while enjoying the convenience that Internet has brought us. General speaking, the services provided by Internet should have four basic security requests. They are confidentiality, authentication, integrity, and non-repudiation. As a result, we propose some protocols, which make the processes of communication can go on smoothly and safely. First of all, we suggest an efficient and secure method, which aims at the session keys generation used in the communications, to ensure that the whole process can‘t be altered by malicious eavesdroppers. Besides, traditional secure communication protocols focus on confidentiality of the contents. Nevertheless, an eavesdropper can detect that who the receiver is, and make her/him an attack target. As a result, except for the protocol needed in the process of session key generation, we also propose a scheme which can hide the identity of the receiver. Our protocol can be applied to both uni-cast and multicast. Those protocols mentioned above are suitable for the application in electronic voting. As for electronic voting, the most important thing is anonymity. At the same time of achieving anonymity, the situation of voting more than once should be concerned. In this thesis, we propose an effective electronic voting scheme, which makes the voting can be done on Internet securely. How to protect the intellectual property has become an important topic, when large amounts of data and digitalized image transmitted in Internet nowadays. It is a major issue to guarantee both the rights of buyer and seller. When disputes occur, how to solve them smoothly is significant. Therefore, we propose a scheme, which is about protecting rightful ownership. Once the buyer distributes unauthorized copies, the seller can detect whom this image is originated. Besides, we can stop the Man-in-the-Middle attack effectively, which can ensure the rights of the buyer.
MONIKA. "DWT BASED DUAL WATERMARKING SCHEME FOR RIGHTFUL OWNERSHIP AND SECURE IMAGE AUTHENTICATION." Thesis, 2013. http://dspace.dtu.ac.in:8080/jspui/handle/repository/16128.
Повний текст джерелаGu, Yong-Guang, and 古永光. "A Subsampling Image SVD-based Semi-fragile Watermarking Technique for Rightful Ownership Protection." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/00221458782479901742.
Повний текст джерела國立成功大學
電腦與通信工程研究所
96
The original images are usually handled by general image manipulations or loss compression for some kinds of situations such as the Internet, surveillance system and medicine. Semi-fragile digital watermarking techniques allow content-preserving manipulations while are sensitive to malicious tamper. These techniques modify the singular values through the singular value decomposition (SVD) in recent years. It is a research because the watermarked image quality may be decreased by modifying the singular values. In this paper, we utilize the high similar property of each subimage through subsampling and propose a subsampling image SVD-based semi-fragile watermarking technique with use of the high similar property of each subimage through subsampling. First, four subimages are obtained by subsampling. We use two of subimages to generate a block correlation with the correlation factor (CF) for adjusting between the fragility and robustness of the embedded watermark. Then, The watermark are embedded into two SVD coefficients of the other subimages. The proposed technique can detect the modified regions with block unit because we employ the block correlation of all subimage. Experiment results show that the precision of this technique not only overcomes several attacks such as the gaussian noise attack and sharpening attack, but also detects the tampered regions.
Min-Yang, Huang, and 黃民仰. "A robust image watermarking system to resolve rightful ownerships." Thesis, 2001. http://ndltd.ncl.edu.tw/handle/60559565073653272804.
Повний текст джерела國立臺灣科技大學
電機工程系
89
In this thesis, a robust watermarking scheme and solutions to resolve rightful ownerships are both presented. For the robust watermarking scheme, we propose a method to embed bipolar data into digital images. Two watermarks are cast into different levels and coefficients of wavelet transform to resist various image attacks. Moreover, a repeated embedding manner is performed to increase the robustness. We apply the JND paradigm and texture masking to guarantee the embedded watermark is transparent. Besides, the watermark detection is based on the estimation of the probability of false positives. The malice attacks on watermarking algorithms themselves are also taken into consideration. The experimental results show our watermarks in various types of images suffering different types of attacks are robust enough. For resolving multiple claims of ownerships, some proposed solutions to prevent the image from counterfeiting are discussed. We propose some methods to strengthen these solutions. Furthermore, we develop a watermarking system based on the time stamp encryption from a third party. On the issues of robustness and ownerships, not only the means but also the aims of watermarks are emphasized.
Книги з теми "RIGHTFUL OWNERSHIP"
Vallentyne, Peter. Neurointerventions, Self-Ownership, and Enforcement Rights. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198758617.003.0007.
Повний текст джерелаЧастини книг з теми "RIGHTFUL OWNERSHIP"
Kumar, Naveen, and Vijay Kumar Sharma. "Quantum Hilbert Image Scrambling and SVD-Based Watermarking Scheme for Rightful Ownership." In Algorithms for Intelligent Systems, 361–70. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5077-5_33.
Повний текст джерелаFukui, Hideo. "Real Estate and the Legal System of Japan." In New Frontiers in Regional Science: Asian Perspectives, 3–7. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-8848-8_1.
Повний текст джерелаCHANG, CHING-YUN, and IUON-CHANG LIN. "ASSURING RIGHTFUL OWNERSHIP FOR DIGITAL IMAGES USING INVISIBLE WATERMARKS." In Wavelet Analysis and Active Media Technology, 533–50. World Scientific Publishing Company, 2005. http://dx.doi.org/10.1142/9789812701695_0083.
Повний текст джерелаMkrttchian, Vardan, Dmitry Davydov, and Viacheslav Voronin. "The Perspectives of Supply Chain Management Using Natural Knowledge From 3D Blockchain Technologies and Avatar-Based and Geographic Information Systems (GIS)." In Digitalization of Decentralized Supply Chains During Global Crises, 174–92. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-6874-3.ch008.
Повний текст джерелаAgbesi, Samuel, and Fati Tahiru. "Application of Blockchain Technology in Land Administration in Ghana." In Advances in Data Mining and Database Management, 103–16. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-3632-2.ch006.
Повний текст джерелаChristopher J, Borgen. "Part II Predominant Security Challenges and International Law, International Security, Ch.15 Contested Territory." In The Oxford Handbook of the International Law of Global Security. Oxford University Press, 2021. http://dx.doi.org/10.1093/law/9780198827276.003.0016.
Повний текст джерелаVinitha, K., P. Thirumoorthy, and S. Hemalatha. "Data Storage, Data Forwarding, Data Retrieval With Big Data Deepfakes in Secure Cloud Storage." In Advances in Multimedia and Interactive Technologies, 106–19. IGI Global, 2023. http://dx.doi.org/10.4018/978-1-6684-6060-3.ch009.
Повний текст джерелаMurray, Andrew. "14. Branding, trademarks, and domain names." In Information Technology Law, 359–89. Oxford University Press, 2019. http://dx.doi.org/10.1093/he/9780198804727.003.0014.
Повний текст джерелаMurray, Andrew. "14. Branding, trade marks, and domain names." In Information Technology Law, 372–400. Oxford University Press, 2023. http://dx.doi.org/10.1093/he/9780192893529.003.0014.
Повний текст джерелаRiccardo, Pavoni. "Part III General International Law, Ch.24 Cultural Heritage and State Immunity." In The Oxford Handbook of International Cultural Heritage Law. Oxford University Press, 2020. http://dx.doi.org/10.1093/law/9780198859871.003.0024.
Повний текст джерелаТези доповідей конференцій з теми "RIGHTFUL OWNERSHIP"
Zeng, Wenjun, Bede Liu, and Shawmin Lei. "Extraction of multiresolution watermark images for resolving rightful ownership." In Electronic Imaging '99, edited by Ping W. Wong and Edward J. Delp III. SPIE, 1999. http://dx.doi.org/10.1117/12.344691.
Повний текст джерелаSchlauweg, Mathias, Dima Pröfrock, Benedikt Zeibich, and Erika Müller. "Dual watermarking for protection of rightful ownership and secure image authentication." In the 4th ACM international workshop. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1178766.1178781.
Повний текст джерелаAl-Nu'aimi, Abdallah Al-Tahan. "Gray watermarks to prove the rightful ownership for digital coloured images." In the 1st International Conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1874590.1874617.
Повний текст джерелаDorairangaswamy, M. A., and B. Padhmavathi. "An effective blind watermarking scheme for protecting rightful ownership of digital images." In TENCON 2009 - 2009 IEEE Region 10 Conference. IEEE, 2009. http://dx.doi.org/10.1109/tencon.2009.5395812.
Повний текст джерелаSingh, Priyanka, Shivendra Shivani, and Suneeta Agarwal. "A chaotic map based DCT-SVD watermarking scheme for rightful ownership verification." In 2014 Students Conference on Engineering and Systems (SCES). IEEE, 2014. http://dx.doi.org/10.1109/sces.2014.6880048.
Повний текст джерелаPandey, Aishwary K., Priyanka Singh, Nishant Agarwal, and Balasubramanian Raman. "SecMed: A Secure Approach for Proving Rightful Ownership of Medical Images in Encrypted Domain over Cloud." In 2018 IEEE Conference on Multimedia Information Processing and Retrieval (MIPR). IEEE, 2018. http://dx.doi.org/10.1109/mipr.2018.00085.
Повний текст джерелаCraver, Scott A., Nasir D. Memon, Boon-Lock Yeo, and Minerva M. Yeung. "Can invisible watermarks resolve rightful ownerships?" In Electronic Imaging '97, edited by Ishwar K. Sethi and Ramesh C. Jain. SPIE, 1997. http://dx.doi.org/10.1117/12.263419.
Повний текст джерела