نتایج جستجو برای: copy protection
تعداد نتایج: 227907 فیلتر نتایج به سال:
Intellectual property protection of multimedia content is essential to the successful deployment of Internet content delivery platforms. There are two general approaches to multimedia copy protection: copy prevention and copy detection. Past experience shows that only copy detection based on mark embedding techniques looks promising. Multimedia fingerprinting means embedding a different buyer-i...
Copy detection has very important application in both intellectual property protection and information retrieval. Currently, copy detection concentrates on document copy detection mainly. In early days, document copy detection concentrated on program plagiarism detection mainly and now the most studies are on text copy detection. In this paper, a comprehensive survey on natural language text co...
Protecting software and data becomes more and more important, especially, when sensitive or expensive software is executed on remote hosts. This protection includes copy protection, prevention of disassembling, prevention of altering the program flow and protection of processed data. For personal computers protection is more focused on copy protection. However, providing extended security to pr...
This application-oriented paper discusses the use of electronic watermarks (also called embedded signaling) for copy control. Playback Control and Copy-Once are described. The 'ticket concept' is presented to provide these functionalities. Although the ticket shows similarities with a digital signature, there are essential differences. For instance, the ticket allows typical modifications of th...
Unclonable encryption, introduced by Broadbent and Lord (TQC’20), is an encryption scheme with the following attractive feature: given a ciphertext, adversary cannot create two ciphertexts both of which decrypt to same message as original ciphertext.We revisit this notion show following: 1. Reusability: The constructions proposed have disadvantage that they either guarantee one-time security (t...
Over the past ten years the analysis of mitochondrial DNA (mtDNA) has become widespread when dealing with very low quantities of and/or highly degraded DNA. The advantages of mtDNA for this type of analysis have been well documented including its high copy number, which improves the chance of retrieving DNA, and its highly polymorphic, and therefore informative nature. In addition to forensic s...
BIG media data is a new research area, and has been attracting a lot of research interests in both industry and academia. This editorial, as the third part of this special issue, introduces two papers on video copy detection data and personalized travel sequence recommendation from social media. The first paper is “Partial Copy Detection in Videos: A Benchmark and An Evaluation of Popular Metho...
MOTIVATION Array comparative genomic hybridization (CGH) allows detection and mapping of copy number of DNA segments. A challenge is to make inferences about the copy number structure of the genome. Several statistical methods have been proposed to determine genomic segments with different copy number levels. However, to date, no comprehensive comparison of various characteristics of these meth...
In today's time because of less-cost and more-resolution digital cameras, there is ample amount of digital images across globe. Digital images have a crucial presence in specific domains like in insurance process, forensic lab work, monitoring systems, services of intelligence, medical imaging and journalism. The most needed requirement is the images we see should be authentic. With the availab...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید