Search Results

1 - 7 of 7 items :

  • "Copyright protection" x
Clear All
Comparison of Video Steganography Methods for Watermark Embedding

Abstract

The paper focuses on the comparison of video steganography methods for the purpose of digital watermarking in the context of copyright protection. Four embedding methods that use Discrete Cosine and Discrete Wavelet Transforms have been researched and compared based on their embedding efficiency and fidelity. A video steganography program has been developed in the Java programming language with all of the researched methods implemented for experiments. The experiments used 3 video containers with different amounts of movement. The impact of the movement has been addressed in the paper as well as the ways of potential improvement of embedding efficiency using adaptive embedding based on the movement amount. Results of the research have been verified using a survey with 17 participants.

Open access
Development of Requirements Specification for Steganographic Systems

Abstract

The paper focuses on development of requirements specification for steganographic systems. The main concepts and fields of use of steganography are briefly explained. Criteria that can be used for various non-functional requirements are grouped and their possible metrics are given with examples and sample requirements. The authors provide an original systematic approach to develop requirements for steganographic systems based on the field of use and the importance of each criterion in the selected field. The approach also allows for automated selection of steganographic algorithms based on the requirements and is related to the concept of the Universal Stegoconstructor, which guarantees that clients receive the required steganographic system from the developers.

Open access
A New Zero-Watermarking Algorithm Resisting Attacks Based on Differences Hashing

References 1. Giakoumaki, A., S. Pavlopoulo s, D. Koutsouris. Multiple Image Watermarking Applied to Health Information Management. - Information Technology in Biomedicine, IEEE Transactions on, Vol. 10, 2006, No 4, pp. 722-732. 2. Preda, R. O., D. N. Vizireanu. A Robust Digital Watermarking Scheme for Video Copyright Protection in the Wavelet Domain. - Measurement, Vol. 43, 2010, No 10, pp. 1720-1726. 3. Panduranga, H. T., S. K. Naveen Kumar, Kiran. Image Encryption Based on Permutation-Substitution Using

Open access
Improved Reference Image Encryption Methods Based on 2 K Correction in the Integer Wavelet Domain

. (2017). An algorithm for encryption of secret images into meaningful images, Optics and Lasers in Engineering 90 : 196–208. Lee, S.-H. (2014). DWT based coding DNA watermarking for DNA copyright protection, Information Sciences 273 : 263–286. Liu, F. and Wu, C. (2011). Robust visual cryptography-based watermarking scheme for multiple cover images and multiple owners, IET Information Security 5 (2): 121–128. Peng, F., Li, X. and Yang, B. (2012). Adaptive reversible data hiding scheme based on integer transform, Signal Processing 92 (1): 54

Open access
Technology Transfer in the EU: Exporting Strategically Important ICT Solutions to Other EU Member States

] Kalvet, T.; Tiits, M. & Hinsberg, H. (2013), E-teenuste kasutamise tulemuslikkus ja mõju [Efficiency and effect of e-service usage], Tallinn: Balti Uuringute Instituut ja Poliitikauuringute Keskus Praxis. Karjala, D. S. (1998), ‘Copyright protection of computer program structure,’ Brooklyn Law Review, vol. 64, no. 2, pp. 519-543. Lakson, P. (2015), ‘Taavi Rõivas Helsingis: Soome on Eesti olulisim partner’ [Taavi Rõivas in Helsinki: Finland is Estonia’s main partner], Postimees, 14 April 2015. Levine, H. (1986

Open access
Free Trade Agreements With The United States: 8 Lessons For Prospective Parties From Australia’s Experience

Australia’s copyright regime-but we have strengthened protection in certain circumstances-providing a platform for Australia to attract and incubate greater creativity and innovation. Hon. Mark Vaile, Minister for Trade, Reading Speech introducing the U.S. Free Trade Agreement Implementation Bill 2004, House of Representatives Hansard (Jun. 23, 2004), 31218. The principal political opposition party supported the legislation but identified several problems arising from enhanced copyright protection. Colette Ormonde, Copyright Overboard? The Debate After the Australia

Open access
The Trans-Pacific Partnership

24, art. 18.83. Such periods are commonly included in intellectual property agreements for the benefit of developing nations, but the TPP also provides grace periods for some of its developed country parties. For instance, New Zealand has eight years to increase its term of copyright protection. Id . art. 18.83.4(d). B Access to Medicines and Protection for Biologics As noted above, the United States’ negotiating objectives for the TPP included ensuring both strong protection for intellectual property (including for new and emerging technologies) Bipartisan

Open access