|
|
|
Mahbuba Begum, Sumaita Binte Shorif, Mohammad Shorif Uddin, Jannatul Ferdush, Tony Jan, Alistair Barros and Md Whaiduzzaman
Digital multimedia elements such as text, image, audio, and video can be easily manipulated because of the rapid rise of multimedia technology, making data protection a prime concern. Hence, copyright protection, content authentication, and integrity ver...
ver más
|
|
|
|
|
|
|
Xie He, Arash Habibi Lashkari, Nikhill Vombatkere and Dilli Prasad Sharma
Over the past few decades, researchers have put their effort and paid significant attention to the authorship attribution field, as it plays an important role in software forensics analysis, plagiarism detection, security attack detection, and protection...
ver más
|
|
|
|
|
|
|
Franco Frattolillo
Watermarking protocols, in conjunction with digital watermarking technologies, make it possible to trace back digital copyright infringers by identifying who has legitimately purchased digital content and then illegally shared it on the Internet. Althoug...
ver más
|
|
|
|
|
|
|
Yinguo Qiu, Jiuyun Sun and Jiaojue Zheng
The existing digital watermarking schemes for vector maps focus mainly on the process of watermark embedding, while few works have been conducted on the topic of the self-optimization of watermark data in the process of watermark detection. There is thus...
ver más
|
|
|
|
|
|
|
Qianwen Zhou, Changqing Zhu and Na Ren
With the increasing ease of building information modeling data usage, digital watermarking technology has become increasingly crucial for BIM data copyright protection. In response to the problem that existing robust watermarking methods mainly focus on ...
ver más
|
|
|
|
|
|
|
Sandra L. Gomez-Coronel, Ernesto Moya-Albor, Jorge Brieva and Andrés Romero-Arellano
Currently, algorithms to embed watermarks into digital images are increasing exponentially, for example in image copyright protection. However, when a watermarking algorithm is applied, the preservation of the image?s quality is of utmost importance, for...
ver más
|
|
|
|
|
|
|
Shams Mhmood Abd Ali, Mohd Najwadi Yusoff and Hasan Falah Hasan
The continuous advancements of blockchain applications impose constant improvements on their technical features. Particularly immutability, a highly secure blockchain attribute forbidding unauthorized or illicit data editing or deletion, which functions ...
ver más
|
|
|
|
|
|
|
Mingyang Zhang, Jian Dong, Na Ren and Shuitao Guo
With the increasing demand for high-precision and difficult-to-obtain geospatial point cloud data copyright protection in military, scientific research, and other fields, research on lossless watermarking is receiving more and more attention. However, mo...
ver más
|
|
|
|
|
|
|
Yajing Wang, Yaodong Yang, Shuaipeng Suo, Mingyuan Wang and Weifeng Rao
As three-dimensional (3D) printing technology is widely used, security issues have arisen, especially in the terminal parts of automobiles, aircraft, and 3D-printed military equipment. If the original design models or the STL (stereolithography) files ar...
ver más
|
|
|
|
|
|
|
Rafik Hamza and Hilmil Pradana
Big Data applications have the potential to transform any digital business platform by enabling the analysis of vast amounts of data. However, the biggest problem with Big Data is breaking down the intellectual property barriers to using that data, espec...
ver más
|
|
|
|