Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








35,016 Hits in 3.7 sec

Toward Safe and Secure Electronic Documents of E-Governments: Generating Authentic Documents using Image Processing Techniques

Abdullah AL-Shraideh, Sulieman Bani-Ahmad, Audeh Bani-Ahmad
2013 International Journal of Computer Applications  
E-governmental applications have to find a solution for efficient and effective mechanism for authenticating and signing official documents.  ...  The watermark is augmented into the governmental document that is available in the form of image.  ...  Watermarking for Copyright Protection Copyright protection is the most common known application for watermarking.  ... 
doi:10.5120/10485-5235 fatcat:ritaoaubonhl5fimngst7c5w2m

A blind image copyright protection scheme for e-government

Shi-Jinn Horng, Didi Rosiyadi, Tianrui Li, Terano Takao, Minyi Guo, Muhammad Khurram Khan
2013 Journal of Visual Communication and Image Representation  
Pick signal to noise ratio Minimum square error a b s t r a c t An efficient blind copyright protection for e-government document images is proposed through a combination of the discrete cosine transform  ...  The host image is not needed in the watermark extraction and it is more useful than nonblind one in real-world applications.  ...  Acknowledgments This paper was developed on the PhD research in National Taiwan University of Science and Technology, and the basis of LI-PI's competitive research entitled e-government Development  ... 
doi:10.1016/j.jvcir.2013.07.008 fatcat:njxcgqerjbeuljm3t25bxd7vk4

Review Of Plagiarism Detection And Control & Copyrights In India

Prof. S.S.Karadage, Prof. Mahesh S. Jadhav
2015 Zenodo  
text documents have taken.  ...  The second half of the paper is fully dedicated to copyrights in India. https://www.ijiert.org/paper-details?paper_id=140037  ...  A musical work need not be written down to enjoy copyright protection.  ... 
doi:10.5281/zenodo.1472084 fatcat:ww4imstatff3jipkix77nqpttq

Safeguarding the Digital Contents: Digital Watermarking
English

M. Natarajan, Gayas Makhdumi
2009 DESIDOC Journal of Library & Information Technology  
It discusses tool and techniques for images, text, and other applications of DWM. The possible attacks on DWM and the organisations involved in developing standards for it are described.  ...  It has been concluded that the protection of individual rights is a must, and deeper understanding of the DWM will lead to the design of more reliable systems for safe-guarding digital contents.  ...  SureSign provides protection for many organisations who market high value visual content via e-commerce solutions.  ... 
doi:10.14429/djlit.29.249 fatcat:wo24xv5t4rczdcbiphwgiqtvfy

Intellectual property and the licensing of Canadian government geospatial data: an examination of GeoConnections' recommendations for best practices and template licences

ELIZABETH F. JUDGE, TERESA SCASSA
2010 The Canadian Geographer / Le Géographe canadien  
If the satellite images are analogized to output from a computer, the images would be protected if there is original expression in the software code (Gervais and Judge 2005, 36, 28-30) .  ...  If the satellite imagery is analogized to pictures from a camera, the resulting images would be protected if there was a human operator of that equipment (which could of course be remote) and the image  ...  Query Q1 Author: Please provide the city of location publisher for Reference ONSRUD (1998).  ... 
doi:10.1111/j.1541-0064.2010.00308.x fatcat:coukymclnjhhzmrrxbinqh47pq

Monoecism Algorithm in the Application of E-Commerce Information Security

Qingjie Zhang, Jianming Zhu, Xiaoxu Wang, Yapan Li
2014 2014 International Conference on Management of e-Commerce and e-Government  
Selecting ROI for Secure Communication Protection: The core of secure communication is hiding secret information without trace in the carrier image.  ...  Protection: In order to ensure the digital works presented in the form of original, the most colorful or the most iconic place of work can be chosen for ROI, while the watermark image should be embedded  ...  Using monoecism watermark method to protect copyright has fairly strong invisibility. Monoecism watermark algorithm meets all the conditions required for copyright protection.  ... 
doi:10.1109/icmecg.2014.25 fatcat:zivfh5fo7zexzcmysiid7vf54u

On the importance of intellectual property rights for e-science and the integrated health record

Giuseppina D'Agostino, Chris Hinds, Marina Jirotka, Charles Meyer, Tina Piper, Mustafizur Rahman, David Vaver
2008 Health Informatics Journal  
This raises challenges for technologists, clinical practice, and for the governance of these data.  ...  Based on an understanding of current practices, this article presents recommendations for the governance of IP in an integrated health record.  ...  Good governance of SUS will be critical for future e-health systems.  ... 
doi:10.1177/1081180x08089318 pmid:18477597 fatcat:g55w4vspwbf23gkljzmfpief4u

Legal and Regulatory Update: The legal issues relating to the Copyright Directive and the practical implications for marketers

Mark Sherrington
2004 Interactive Marketing  
This paper discusses the changes that the Copyright Directive will make to the existing law of copyright following the publication of implementing regulations on 31 October 2003, and how these changes  ...  , music or images.  ...  Remedies are also Measures for protecting copyright made available against anyone distributing copyrighted works knowing that the RMI has been removed.  ... 
doi:10.1057/palgrave.im.4340245 fatcat:eiwrdhpo6vfadf4cevwlutesyq

An Existential Review on Text Watermarking Techniques

Manmeet Kaur, Kamna Mahajan
2015 International Journal of Computer Applications  
We also highlight the security issues like copyright protection, tamper detection and data hiding which need to be focussed for ensuring text security.  ...  The protection of these online documents is the need of the hour and need to be dealt with urgently.  ...  [5] , that combined the best of both image based text watermarking techniques and language based watermarking techniques for an efficient copyright protection mechanism.  ... 
doi:10.5120/21330-4300 fatcat:tsg3suxqz5hu7b3plzyrtb2bbi

IT ASPECTS OF MUSEUM OPERATIONS

Rafał Golat
2020 Muzealnictwo  
The legal status of these assets is specified in the provisions of the Act on Copyright and Related Rights (see its Arts. 3 and 7) as well as of the Act on Database Protection.  ...  Apart from the Act on Museums, particularly its Art. 25a, it is the Act on Copyright and Related Rights as well as the Civil Code that through the general provisions on the protection of personal rights  ...  deal with personal rights for which provisions of the Act on Copyright are respectively applicable (see Art. 83 of the Act) One of those rights is image (Art. 81of the Act on Copyright) which is also  ... 
doi:10.5604/01.3001.0013.9717 doaj:53ae8f5c53e244c298b4438d4b635190 fatcat:rcnnsb6ovrbhnfqs2l5ozzbulu

A Study of Data Security on E-Governance using Steganographic Optimization Algorithms

Sk Anamul Hoda, Dr. Abhoy Chand Mondal
2022 International Journal on Recent and Innovation Trends in Computing and Communication  
A new perspective on using this technique to protect the information for e-governance is also presented.  ...  Various optimization techniques like particle swarm optimization and genetic algorithms with cryptography can be used to protect information for e-governance services.  ...  Sunil Karforma the department of computer science, The University of Burdwan for his guide.  ... 
doi:10.17762/ijritcc.v10i5.5548 fatcat:vxojh7t5tnao7dhkntchh3uuja

The Australia and New Zealand Cardio‐Oncology Registry (ACOR): evaluation of chemotherapy‐related cardiotoxicity in a national cohort of paediatric cancer patients

Daniel Lapirow, Andre La Gerche, Claudia Toro, Emma Masango, Ben Costello, Enzo Porello, Louise Ludlow, Glenn Marshall, Toby Trahair, Marion Mateos, Jeremy Lewin, Jennifer Byrne (+22 others)
2019 Internal medicine journal (Print)  
This article is protected by copyright. All rights reserved.  ...  Finally, an imaging arm will establish if exercise magnetic resonance imaging (CMR) and VO2 max testing is a more sensitive predictor of cardiac reserve in paediatric and AYA oncology patients exposed  ...  Professor Melissa Little the Theme Director of Cell Biology and the Cardiac Regeneration laboratory at the Murdoch Children's This article is protected by copyright. All rights reserved.  ... 
doi:10.1111/imj.14719 pmid:31841257 fatcat:oogtx4leo5fh3avncdzfoadi5u

Implementation of a Novel Watermarking Technique for Devanagari Text

Nitin Patil
2015 International Journal of Information and Electronics Engineering  
The proposed extraction algorithm also supports the defined security checks to preserve the authentication and copyrights of the genuine author of the Devanagari text document.  ...  Till now considerable attempts are made for developing watermarking techniques for numerous natural languages.  ...  Zunera JaliI et al. proposed a structural approach for copyright protection of plain text document for English language.  ... 
doi:10.7763/ijiee.2015.v5.557 fatcat:dvjqzveptraztgian45rlb2c3i

Watermarking for Images using Alphanumeric Technique

2020 International journal of recent technology and engineering  
This paper explains the concepts of IPR and proposed alphanumeric watermarking technique for authentication of images and its protection from the fraud or misuse.  ...  This paper gives the methodology of embedding and extraction techniques for images to prove the authentication of images when required its demand.  ...  Copyright: The copyright means protecting the rights of creative people like authors, artists etc. for their literary and artistic works.  ... 
doi:10.35940/ijrte.f7154.038620 fatcat:ql2irzkirvaqnnasp5wuhjjepu

Digital Age 2.0 and its challenges on media ethics

Juhi P. Pathak
2016 IOSR Journal of Humanities and Social Science  
broad and includes a wide host of technology like the wireless and mobile med ia, satellite radio, d igital television, d igital music players, dig ital cameras and other new or emerging technologies for  ...  problems which are mainly related to issues of media laws; such as the right of access to information, the right of privacy which is threatened by the emphasis on the free flow of information, and the protection  ...  The development of the Internet industries has brought opportunities fo r the copyright industry as well as new challenges for the judicial protection for copyright.  ... 
doi:10.9790/0837-21111824 fatcat:yyfhsai6wrbuvapqmbbshtc6xe
« Previous Showing results 1 — 15 out of 35,016 results