نتایج جستجو برای: copy protection

تعداد نتایج: 227907  

2000
Maurice Maes Ton Kalker Jean-Paul Linnartz Joop Talstra Geert Depovere Jaap Haitsma

One of the most quoted applications for digital watermarking is in the context of copy-protection of digital (multi-)media. In its most basic form a watermark is used as a single bit that indicates whether or not content is copyrighted. By the nature of a watermark, this copy-protection bit is (theoretically) strongly tied to the content: it can only be removed when the content suffers serious ...

Journal: :International Journal of Computer Science & Engineering Survey 2012

1998

O ne of the most quoted applications for digital watermarking is in the context of copy-protection of digital (multi-)media. In its most basic form a watermark is used as a single bit that indicates whether or not content is copyrighted. By the nature of a watermark, this copy-protection bit is (theoretically) strongly tied to the content: it can only be removed when the content suffers serious...

2005
Petar Djekic Claudia Löbbecke

Software piracy has recently gained enormous attention, not only in the context of P2P-networks. As one countermeasure against software piracy, publishers have been implementing Digital Rights Management systems such as technical copy protection measures into their software products. This paper examines the impact of different technical copy protection measures and Internet services usage on so...

2014
JOSEPH PREVITE MICHELLE PREVITE MARY VANDERSCHOOT

In this paper, we describe a copy-and-paste method for constructing a class of infinite self-similar trees. A copy-paste tree is constructed by repeatedly attaching copies of a finite tree (called a generator) to certain designated attachment vertices. We show that each generator has an associated nonnegative matrix which can be used to determine a formula for the growth function of the copy-pa...

2010
Seung-Jin Ryu Min-Jeong Lee Heung-Kyu Lee

As forgeries have become popular, the importance of forgery detection is much increased. Copy-move forgery, one of the most commonly used methods, copies a part of the image and pastes it into another part of the the image. In this paper, we propose a detection method of copy-move forgery that localizes duplicated regions using Zernike moments. Since the magnitude of Zernike moments is algebrai...

2009
LIN WAN YI XIAO QUAN CHEN MINGHUA DENG MINPING QIAN

Affymetrix SNP arrays are widely used for both genome-wide association and copy number variation (CNV) studies, both of which depend on accurate copy number estimation. However, depending on the method used to copy number estimation, distortions from the actual copy numbers can occur. Therefore, we demonstrate here several effects that can bias accurate copy number estimation, and we describe h...

2015
Eva D'hondt Xavier Tannier Aurélie Névéol

The use of Electronic Health Records (EHRs) is becoming more prevalent in healthcare institutions world-wide. These digital records contain a wealth of information on patients’ health in the form of Natural Language text. The electronic format of the clinical notes has evident advantages in terms of storage and shareability, but also makes it easy to duplicate information from one document to a...

2003
Ralph L. Andersen

The current radiation protection framework provides an adequate basis for protecting workers, the public and the environment. Nevertheless, international and national radiation protection organizations are presently engaged in updating, clarifying and enhancing radiation protection principles –and rightly so, given our culture of pursuing excellence in radiation safety through a process of cont...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید