Showing 101 - 120 results of 243 for search '"copyright"', query time: 0.05s Refine Results
  1. 101

    Deal Me In / by Thomason, Cynthia

    Published 2008
    View in OPAC
    Book
  2. 102

    Privacy-preserving digital rights management scheme in cloud computing by Qin-long HUANG, Zhao-feng MA, Jing-yi FU, Yi-xian YANG, Xin-xin NIU

    Published 2014-02-01
    “…Compared with existing DRM schemes in cloud computing, the proposed scheme which not only protects the data security and user privacy, but also supports fine-grained access control, and supports online and super-distribution application modes, is more applicable in the copyright protection for cloud computing.…”
    Get full text
    Article
  3. 103

    Legal Protection For Book Piracy Traded Through Marketplaces In Indonesia by Annisa Dinda Amalia, Siti Malikhatun Badriyah

    Published 2024-11-01
    “…Introduction: According to Law Number 28 of 2014 concerning Copyright, an act is considered a Copyright violation if it violates the exclusive rights of the creator, which includes the right to publish or reproduce his work and the right to give permission or prohibit other people from doing so. create, reproduce or broadcast it without their consent. …”
    Get full text
    Article
  4. 104

    Regulation of Intellectual Property Rights (IPR) in Artworks by Robots and Algorithms by Febrina Raevita, Nur Lailatuka Syafa’atul Uzma, Muhammad Alfarizy

    Published 2024-10-01
    “…In situations of commercial use, legal and ethical problems arise when digital works are created without the permission of the original copyright owner. The aim of this research is to determine the identification of copyright owners in the context of works of art created by robots and algorithms, as well as explain the protection of moral and commercial rights for creators of works of art that involve the use of robotic technology and algorithms. …”
    Get full text
    Article
  5. 105

    Civil ways to protect innovation in startups as in business projects by O.V. Belaya, Yu.A. Kitsay

    Published 2020-04-01
    “…., an action plan complying with a certain objective form, which relates to copyright objects, in the form of another work; as well as the innovation itself, which, depending on its essence, can be either embodied in the object of copyright and patent law or belongs to the objects of non-traditional protection (selection achievements, topologies, know-how). …”
    Get full text
    Article
  6. 106

    Perfectly blind image watermarking scheme with multi-purpose based on region segment for sub-block and self-embedding technology by Tian-yu YE

    Published 2013-03-01
    “…A perfectly blind image watermarking scheme with multi-purpose was proposed through region segment for sub-block and self-embedding technology, which could achieve copyright identification and content authentication only with the help of an attacked image. …”
    Get full text
    Article
  7. 107

    Far From the Madding Crowd /

    Published 2002
    View in OPAC
    Video
  8. 108

    Traditional guidance mechanism based deep robust watermarking by Xuejing GUO, Yixiang FANG, Yi ZHAO, Tianzhu ZHANG, Wenchao ZENG, Junxiang WANG

    Published 2023-04-01
    “…With the development of network and multimedia technology, multimedia data has gradually become a key source of information for people, making digital media the primary battlefield for copyright protection and anti-counterfeit traceability.Digital watermarking techniques have been widely studied and recognized as important tools for copyright protection.However, the robustness of conventional digital watermarking methods is limited as sensitive digital media can easily be affected by noise and external interference during transmission.Then the existing powerful digital watermarking technology’s comprehensive resistance to all forms of attacks must be enhanced.Moreover, the conventional robust digital watermarking algorithm’s generalizability across a variety of image types is limited due to its embedding method.Deep learning has been widely used in the development of robust digital watermarking systems due to its self-learning abilities.However, current initialization techniques based on deep neural networks rely on random parameters and features, resulting in low-quality model generation, lengthy training times, and potential convergence issues.To address these challenges, a deep robust digital watermarking algorithm based on a traditional bootstrapping mechanism was proposed.It combined the benefits of both traditional digital watermarking techniques and deep neural networks, taking into account their learning abilities and robust characteristics.The algorithm used the classic robust digital watermarking algorithm to make watermarked photos, and the constructed feature guaranteed the resilience of traditional watermarked images.The final dense image was produced by fusing the conventionally watermarked image with the deep network using the U-Net structure.The testing results demonstrate that the technique can increase the stego image’s resistance to various attacks and provide superior visual quality compared to the conventional algorithm.…”
    Get full text
    Article
  9. 109

    ARTISTIC CREATIONS. ORIGINALITY, INSPIRATION, IMITATION AND ARTIFICIAL INTELLIGENCE by Carmen-Oana MIHĂILĂ

    Published 2023-06-01
    “…But can artistic works, created with AI, benefit from copyright protection? Can they be considered related rights? …”
    Get full text
    Article
  10. 110

    Dual medical image watermarking using SRU-enhanced network and EICC chaotic map by Fei Yan, Zeqian Wang, Kaoru Hirota

    Published 2024-12-01
    “…In this study, a dual watermarking scheme based on SRU-ConvNeXt V2 (SCNeXt) model and exponential iterative-cubic-cosine (EICC) chaotic map is proposed for medical image integrity verification, tamper localization, and copyright protection. A logo image for integrity verification is embedded into the region of interest within the medical image, and a text image containing copyright information is combined with the feature vectors extracted by SCNeXt for generating zero-watermark information. …”
    Get full text
    Article
  11. 111

    Tinjauan Hukum Tentang Penjualan Aplikasi Berbayar Dengan Cara Pinjam Akun Pribadi (Apple Id) by ika ramadhani

    Published 2018-12-01
    “…The legal impact of the sales of paid apps by lending personal account constitutes branch of a contract which can be asked for liability based on Article 32 Law No 11 of 2008 concerning Information Electronic Transactions, Law No 28 of 2014 corcerning Copyright. And Terms and Condition provided by Apple Inc.   …”
    Get full text
    Article
  12. 112

    From Parody to Rewriting: Margaret Mitchell’s GoneWith the Wind (1936) vs Alice Randall’s The Wind Done Gone (2001) by Isabelle Roblin

    Published 2004-10-01
    “…When after many difficulties, Alice Randall published The Wind Done Gone, the question of the very nature of the novel came to the foreground, from a constitutional as well as a literary standpoint: was it a parodic re-writing of Margaret Mitchell’s Gone With the Wind, and as such protected by the First Amendment; or was it just a “steal” of famous characters and situations, and as such submitted to the strict laws of copyright? The analysis of the various literary devices used by the author will show the subversive nature of the hypertext, which goes beyond simple parody.…”
    Get full text
    Article
  13. 113
  14. 114

    AI Composers and Cyborg Performers: More-than-human Creativity in Music by Trump Sebastian

    Published 2022-12-01
    “…The paper addresses ethical concerns about AI's role in music, including authorship and copyright, advocating for a reevaluation of musicological frameworks to accommodate the evolving collaborative landscape of human and machine creativity.…”
    Get full text
    Article
  15. 115

    THEORETICAL MULTIPLE ANALYSIS OF EXTREMAL RESULTS PHENOMENOLOGY LIES by A. Tarasov

    Published 2018-06-01
    “…This article discusses the results of theoretical and empirical research of the phenomena of false information using copyright questionnaire FPL. An attempt was made to theoretical analysis of multiple extremal results phenomenology lies. …”
    Get full text
    Article
  16. 116

    Forms of labour in information systems by Julian Warner

    Published 2002-01-01
    “…Information retrieval systems and the departure from the labour theory of copyright are considered in relation to the forms of labour distinguished. …”
    Get full text
    Article
  17. 117

    Multipurpose zero watermarking algorithm for medical image based on SVD and SAE by Jieli SUN, Yanxia ZHAO, Zenghui ZHOU, Sheng XING

    Published 2017-11-01
    “…A multipurpose zero watermarking algorithm was proposed according to the copyright protection and tamper location of medical image.The two information matrices were executed the XOR operation with the original robust watermarking image and the original semi-fragile watermarking image separately to generate zero robust watermarking image and zero semi-fragile watermarking image.The experimental results show that effects of extracted zero watermarking image are terrific,and the algorithm can resist the common attacks,particularly its resistance is effect ive for strong attacks.…”
    Get full text
    Article
  18. 118

    Research on color QR code watermarking technology based on chaos theory by Xi YIN, Weiqing HUANG

    Published 2018-07-01
    “…In order to carry on copyright protection and security verification of color QR code,the digital image chaos encryption technology and digital watermarking technology were respectively researched.Firstly,an improved image chaos encryption algorithm was proposed as a preprocessing step of digital watermarking algorithm.Then a color QR code digital watermarking algorithm was designed based on discrete wavelet transform and matrix singular value decomposition.Finally,the feasibility of the algorithm was verified by experiments.The results show that the proposed method has good resistance to JPEG compression,noise attack and cropping attack.…”
    Get full text
    Article
  19. 119

    “Dame tu fuerza, Pegaso”: cultura televisiva, música africana, copia e intertextualidad en el género de la champeta criolla by Andrés Gualdrón Ramírez

    Published 2024-12-01
    “…This article considers these intertextual exercises and their significance within the historical and economic dynamics of the genre, their relationship to some wide-ranging black music practices, and their tensions with the control of mimesis imposed globally by copyright law. Finally, some conclusions are proposed on the cultural and creative role played by contraventions of these norms in contexts of economic informality.…”
    Get full text
    Article
  20. 120

    Capital symbolique, consécration et marché des retraductions de littérature française en langue hongroise entre 2000 et 2020 by Adrienn Gulyás

    Published 2024-10-01
    “…The results show that retranslations constitute 1.26% of the French corpus, i.e. 31 records out of 2452, with a very clear preference for retranslations of narrative works, mostly novels, that are no longer protected by copyright. Although they represent a highly limited and fragmented market, Hungarian retranslations of French literature increase the publishers’ and translators’ symbolic capital and have been on the rise since 2010.…”
    Get full text
    Article