A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Toward Safe and Secure Electronic Documents of E-Governments: Generating Authentic Documents using Image Processing Techniques
2013
International Journal of Computer Applications
E-governmental applications have to find a solution for efficient and effective mechanism for authenticating and signing official documents. ...
The watermark is augmented into the governmental document that is available in the form of image. ...
Watermarking for Copyright Protection Copyright protection is the most common known application for watermarking. ...
doi:10.5120/10485-5235
fatcat:ritaoaubonhl5fimngst7c5w2m
A blind image copyright protection scheme for e-government
2013
Journal of Visual Communication and Image Representation
Pick signal to noise ratio Minimum square error a b s t r a c t An efficient blind copyright protection for e-government document images is proposed through a combination of the discrete cosine transform ...
The host image is not needed in the watermark extraction and it is more useful than nonblind one in real-world applications. ...
Acknowledgments This paper was developed on the PhD research in National Taiwan University of Science and Technology, and the basis of LI-PI's competitive research entitled e-government Development ...
doi:10.1016/j.jvcir.2013.07.008
fatcat:njxcgqerjbeuljm3t25bxd7vk4
Review Of Plagiarism Detection And Control & Copyrights In India
2015
Zenodo
text documents have taken. ...
The second half of the paper is fully dedicated to copyrights in India. https://www.ijiert.org/paper-details?paper_id=140037 ...
A musical work need not be written down to enjoy copyright protection. ...
doi:10.5281/zenodo.1472084
fatcat:ww4imstatff3jipkix77nqpttq
Safeguarding the Digital Contents: Digital Watermarking
English
2009
DESIDOC Journal of Library & Information Technology
English
It discusses tool and techniques for images, text, and other applications of DWM. The possible attacks on DWM and the organisations involved in developing standards for it are described. ...
It has been concluded that the protection of individual rights is a must, and deeper understanding of the DWM will lead to the design of more reliable systems for safe-guarding digital contents. ...
SureSign provides protection for many organisations who market high value visual content via e-commerce solutions. ...
doi:10.14429/djlit.29.249
fatcat:wo24xv5t4rczdcbiphwgiqtvfy
Intellectual property and the licensing of Canadian government geospatial data: an examination of GeoConnections' recommendations for best practices and template licences
2010
The Canadian Geographer / Le Géographe canadien
If the satellite images are analogized to output from a computer, the images would be protected if there is original expression in the software code (Gervais and Judge 2005, 36, 28-30) . ...
If the satellite imagery is analogized to pictures from a camera, the resulting images would be protected if there was a human operator of that equipment (which could of course be remote) and the image ...
Query Q1 Author: Please provide the city of location publisher for Reference ONSRUD (1998). ...
doi:10.1111/j.1541-0064.2010.00308.x
fatcat:coukymclnjhhzmrrxbinqh47pq
Monoecism Algorithm in the Application of E-Commerce Information Security
2014
2014 International Conference on Management of e-Commerce and e-Government
Selecting ROI for Secure Communication Protection: The core of secure communication is hiding secret information without trace in the carrier image. ...
Protection: In order to ensure the digital works presented in the form of original, the most colorful or the most iconic place of work can be chosen for ROI, while the watermark image should be embedded ...
Using monoecism watermark method to protect copyright has fairly strong invisibility. Monoecism watermark algorithm meets all the conditions required for copyright protection. ...
doi:10.1109/icmecg.2014.25
fatcat:zivfh5fo7zexzcmysiid7vf54u
On the importance of intellectual property rights for e-science and the integrated health record
2008
Health Informatics Journal
This raises challenges for technologists, clinical practice, and for the governance of these data. ...
Based on an understanding of current practices, this article presents recommendations for the governance of IP in an integrated health record. ...
Good governance of SUS will be critical for future e-health systems. ...
doi:10.1177/1081180x08089318
pmid:18477597
fatcat:g55w4vspwbf23gkljzmfpief4u
Legal and Regulatory Update: The legal issues relating to the Copyright Directive and the practical implications for marketers
2004
Interactive Marketing
This paper discusses the changes that the Copyright Directive will make to the existing law of copyright following the publication of implementing regulations on 31 October 2003, and how these changes ...
, music or images. ...
Remedies are also Measures for protecting copyright made available against anyone distributing copyrighted works knowing that the RMI has been removed. ...
doi:10.1057/palgrave.im.4340245
fatcat:eiwrdhpo6vfadf4cevwlutesyq
An Existential Review on Text Watermarking Techniques
2015
International Journal of Computer Applications
We also highlight the security issues like copyright protection, tamper detection and data hiding which need to be focussed for ensuring text security. ...
The protection of these online documents is the need of the hour and need to be dealt with urgently. ...
[5] , that combined the best of both image based text watermarking techniques and language based watermarking techniques for an efficient copyright protection mechanism. ...
doi:10.5120/21330-4300
fatcat:tsg3suxqz5hu7b3plzyrtb2bbi
IT ASPECTS OF MUSEUM OPERATIONS
2020
Muzealnictwo
The legal status of these assets is specified in the provisions of the Act on Copyright and Related Rights (see its Arts. 3 and 7) as well as of the Act on Database Protection. ...
Apart from the Act on Museums, particularly its Art. 25a, it is the Act on Copyright and Related Rights as well as the Civil Code that through the general provisions on the protection of personal rights ...
deal with personal rights for which provisions of the Act on Copyright are respectively applicable (see Art. 83 of the Act) One of those rights is image (Art. 81of the Act on Copyright) which is also ...
doi:10.5604/01.3001.0013.9717
doaj:53ae8f5c53e244c298b4438d4b635190
fatcat:rcnnsb6ovrbhnfqs2l5ozzbulu
A Study of Data Security on E-Governance using Steganographic Optimization Algorithms
2022
International Journal on Recent and Innovation Trends in Computing and Communication
A new perspective on using this technique to protect the information for e-governance is also presented. ...
Various optimization techniques like particle swarm optimization and genetic algorithms with cryptography can be used to protect information for e-governance services. ...
Sunil Karforma the department of computer science, The University of Burdwan for his guide. ...
doi:10.17762/ijritcc.v10i5.5548
fatcat:vxojh7t5tnao7dhkntchh3uuja
The Australia and New Zealand Cardio‐Oncology Registry (ACOR): evaluation of chemotherapy‐related cardiotoxicity in a national cohort of paediatric cancer patients
2019
Internal medicine journal (Print)
This article is protected by copyright. All rights reserved. ...
Finally, an imaging arm will establish if exercise magnetic resonance imaging (CMR) and VO2 max testing is a more sensitive predictor of cardiac reserve in paediatric and AYA oncology patients exposed ...
Professor Melissa Little the Theme Director of Cell Biology and the Cardiac Regeneration laboratory at the Murdoch Children's This article is protected by copyright. All rights reserved. ...
doi:10.1111/imj.14719
pmid:31841257
fatcat:oogtx4leo5fh3avncdzfoadi5u
Implementation of a Novel Watermarking Technique for Devanagari Text
2015
International Journal of Information and Electronics Engineering
The proposed extraction algorithm also supports the defined security checks to preserve the authentication and copyrights of the genuine author of the Devanagari text document. ...
Till now considerable attempts are made for developing watermarking techniques for numerous natural languages. ...
Zunera JaliI et al. proposed a structural approach for copyright protection of plain text document for English language. ...
doi:10.7763/ijiee.2015.v5.557
fatcat:dvjqzveptraztgian45rlb2c3i
Watermarking for Images using Alphanumeric Technique
2020
International journal of recent technology and engineering
This paper explains the concepts of IPR and proposed alphanumeric watermarking technique for authentication of images and its protection from the fraud or misuse. ...
This paper gives the methodology of embedding and extraction techniques for images to prove the authentication of images when required its demand. ...
Copyright: The copyright means protecting the rights of creative people like authors, artists etc. for their literary and artistic works. ...
doi:10.35940/ijrte.f7154.038620
fatcat:ql2irzkirvaqnnasp5wuhjjepu
Digital Age 2.0 and its challenges on media ethics
2016
IOSR Journal of Humanities and Social Science
broad and includes a wide host of technology like the wireless and mobile med ia, satellite radio, d igital television, d igital music players, dig ital cameras and other new or emerging technologies for ...
problems which are mainly related to issues of media laws; such as the right of access to information, the right of privacy which is threatened by the emphasis on the free flow of information, and the protection ...
The development of the Internet industries has brought opportunities fo r the copyright industry as well as new challenges for the judicial protection for copyright. ...
doi:10.9790/0837-21111824
fatcat:yyfhsai6wrbuvapqmbbshtc6xe
« Previous
Showing results 1 — 15 out of 35,016 results