• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 8
  • 6
  • 6
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 24
  • 24
  • 8
  • 8
  • 7
  • 6
  • 6
  • 6
  • 5
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Digital watermarking algorithms robust against loss of synchronization

Delannay, Damien 02 April 2004 (has links)
A digital watermark is a message robustly hidden within another digitized signal such as an image, a piece of music, a video, etc. . The principal applications of this technology are copyright protection and document fingerprinting. The robustness of watermarking algorithms against common geometrical deformations has drawn the attention of many researchers in the last ten years. Such distortions can result from usual processing of the media and/or malicious manipulations. As an example, a major concern for digital cinema industry is the illicit copy of movies with video cameras taking place in movie theaters. In this scenario, severe geometric distortions can jeopardize the retrieval of the watermark message from the illicit copies. The limitations and weaknesses of the previously proposed solutions to fight these distortions are presented. We developed a generalized construction method for periodic pseudo-random patterns. Based on these patterns, we designed a spread spectrum watermarking scheme with enhanced security properties. We investigated the detection probability and the interaction between exhaustive search and informed coding strategies. Finally, a scheme for the detection of a periodic structure and for the inversion of affine distortions was presented. We showed that the choice of the periodic repetition size involves a trade-off between robustness and secrecy. Thereafter, we studied the security flaw caused by the lack of secrecy in pilot-registration approaches. We proposed an innovative hiding scheme to remedy this issue. Our solution involves the extraction of robust local references from the content of the cover signal. Using this content normalized interpretation, we showed how one can design robust secret binary mask and modulate pilot signals in watermarking schemes. The efficiency of the approach is demonstrated on pilots derived from periodic structures. We also addressed the assessment of the degradation introduced by a geometrical distortion. We assume that a global rigid transform does not impair the perceptual value of an image and we propose a new criterion based on a local analysis of the geometrical deformations.
2

Autorskoprávní ochrana počítačových programů / Copyright protection of software

Kozelka, Ondřej January 2015 (has links)
Copyright protection of computer programs This thesis deals with copyright protection of specific works of authorship - computer programs. The thesis deals with the definition of works of authorship and the conditions in which the computer program is a work of authorship, at least as a legal fiction. For the term computer program, the thesis is trying to find a suitable definition that is sufficiently general, but also accurately captures it's notion. Various known forms of expression of the computer program (source code, machine code, but also a code in an intermediate language) are described and the thesis explains, why it is appropriate to protect the computer program in any form. The thesis clarifies, why the term "software" and the term "computer program" are not identical and arbitrarily exchanging them can cause problems. Furthermore, the thesis deals with the author of the computer program and co-authorship. The next part deals with the rights of the author of the work. The exclusive rights of the author (the moral rights of the author and copyright) are discussed. The thesis describes the rights of exploitation of a computer programs, with a focus on differences againts other works of authorship. One of the rights of the author is also the right to provide an authorization to exercise the right to...
3

Srovnání autorskoprávní ochrany autorů a výkonných umělců / A comparison of copyright protection of authors and performing artists

Martinka, Marek January 2010 (has links)
A comparison of copyright protection of authors and performing artists The aim of this thesis is to compare the legal regulation of the authors' rights in their works and the performing artists' rights in their performances as it arises from the Czech Copyright Act. I have chosen this topic because it requires profound study of the Copyright Act, good understanding of most of its provisions and their analysis. In my opinion, this kind of research could be very useful in my upcoming profession. Besides it seems to be quiet an actual theme, as for example the term of protection of these rights is largely discussed of late. The structure of this paper is following. The first three chapters are introducing the main characteristics of the authors' and performing artists' rights, their development and the main sources. Other chapters are dealing with the comparison of the protection itself. I examine the aspects I consider to be crucial. It is the subject of the rights, the object, moral and economic rights, the criterions of the protection, the contractual and non-contractual obligations and the term of protection. Two final chapters are focused on the collective management and the infringement of copyright. It can be concluded that the protection of the performing artists' rights is a bit weaker. It is...
4

Autorskoprávní ochrana v hudebním průmyslu / Copyright protection in music industry

Cittová, Gabriela January 2012 (has links)
In this work, the copyright protection in the music industry is discussed. I am focusing in particular on the description of copyright, rights related to copyright, collective management and protection of these rights. In the beginning, I mention the national, international and European sources of copyright and I am explaining the concepts of copyright, copyright work (including musical and processed work of art), and authoring. Furthermore, I explore the copyright law in terms of its origin, content and restrictions. Copyright is based on the quasidual concept, which simply means that we distinguish the moral rights from the property rights. In this work, I explain the content of all of these individual rights. I also address the licensing contract, by which the author authorizes another person to administer the rights to use his piece. I am focusing on cases of the so-called non-contractual use of production, which means that the user may use the work without the consent of the author and free of charge. Furthermore, I define the idea and the content of performer's rights to his artistic output, the manufacturer of the sound and image recording rights to his sound recordings and radio and television broadcaster's rights to his broadcast. At the end of this work, I am focusing on the activities of...
5

Proteção dos direitos autorais de imagem estática utilizando criptografia visual e marca d\'água / Still image copyright protection using visual cryptography and watermark

Feijó, Eduardo Almeida 18 May 2016 (has links)
A tecnologia atual não oferece prevenção contra cópia, adulteração ou plágio de uma imagem estática em meio digital sem autorização do verdadeiro autor. Dado que tais mal feitos não podem ser evitados, resta ao criador da obra original lutar a posteriori por seus direitos nos fóruns adequados (no tribunal, por exemplo). Na época da fotografia analógica com filme, o negativo poderia ser utilizado como prova. Hoje este recurso raramente está disponível e se faz necessária uma solução alternativa. A técnica de Marca d´Água é uma das possibilidades criptográficas existentes para apoiar o autor em sua defesa. O principio da Marca d´Água é o encapsulamento de informações relevantes, preferencialmente de forma imperceptível, na imagem a ser protegida. Tais informações, quando extraídas da imagem marcada, devem revelar o verdadeiro autor num processo de disputa. Soluções de Marca d´Água combinada com Criptografia Visual são encontradas na literatura. A principal vantagem deste caminho é a propriedade Imperceptível por segurança perfeita que a Marca d´Água assume quando tratada por Criptografia Visual. O segredo (neste caso, a Marca d´Água) é segmentado via Criptografia Visual em 2 transparências: uma delas é encapsulada na imagem a ser protegida e a outra é mantida pelo verdadeiro autor. Basta a sobreposição de tais transparências para que a Marca d´Água seja revelada. Nesta pesquisa propomos um novo método, denominado MACV, que combina Marca d´Água, Criptografia Visual e um algoritmo de hashing. O MACV apresenta, entre outras, as seguintes propriedades desejáveis de Marca d´Água: imperceptível por segurança perfeita, alta entropia, armazenamento na própria imagem e sem ambiguidade. Veremos em nossa pesquisa bibliográfica que há uma lacuna de soluções que apresentem, simultaneamente, todas estas propriedades. Esta lacuna torna o MACV único em sua categoria. / Current technology does not prevent copy, tamper or plagiarism of a still image in digital media without authorization of the true author. Since such misdeeds can not be avoided, the creator of the original work has to defend his rights a posteriori in the appropriate forum (in court, for example). A negative could be used as evidence in the era of analog photography. Currently this feature is rarely available and an alternative solution is needed. Watermark is one of the existing cryptographic possibilities to support the author in his defense. A Watermark is embedded into the image to be protected, preferably imperceptibly. Such information when extracted from the watermarked image should reveal the true author in a dispute process. Solutions using Watermark with Visual Cryptography are found in the literature. The main advantage of this way is the property Imperceptible by perfect secrecy that the Water- mark assumes when treated by Visual Cryptography. The key (in this case, the Watermark) is partitioned by Visual Cryptography in 2 transparencies: one is embedded in the image to be protected and the other is kept by the true author. The Watermark is revealed by overlapping such transparencies. In this research we propose a new method, called MACV, combining Watermark, Vi- sual Cryptography and a hashing algorithm. The MACV has, among others, the following desirable properties of Watermark: invisible by perfect secrecy, high entropy, stored into the image itself and unambiguously. We will see in our research that there is no solution that presents, simultaneously, all these properties. This fact makes the MACV the first one to show all these properties
6

A proteção dos direitos autorais a partir da realidade Internet : a perspectiva brasileira /

Sola, José Eduardo Martins. January 2002 (has links)
Orientador: José Augusto Chaves Guimarães / Banca: Plácida Leopoldina Costa Santos / Banca: José Fernando Modesto da Silva / Resumo: A Internet vem modificando substancialmente os hábitos de pesquisa do ser humano, por um lado permitindo-lhe maior agilidade e eficiência na obtenção de informações, mas, por outro, multiplicando problemas de direito autoral nas obras por ela veiculadas. Desse modo, torna-se necessário analisar, no âmbito doutrinário, legislativo e jurisprudencial brasileiro, os direitos autorais (intelectuais e materiais) e sua aplicabilidade às criações dispostas na rede, ao que se aliam questões como a de controle das cópias de tais publicações e a de meios para evitar falsificações, adulterações e uso indevido das mesmas. Valendo-se de pesquisa documental em fontes do direito e em informações da própria rede, parte-se da abordagem da Internet em seu conceito, características e tipos de documentos, analisam-se os direitos autorais em termos teóricos (conceito e modalidades) e aplicados (controle e proteção no Direito Brasileiro) e discute-se a utilização de alguns elementos para a proteção dos direitos autorais na Internet: Criptografia, Assinatura Digital, Certificação Digital e Marca d'Água Digital, concluindo-se pela natureza eminentemente diplomática dos mesmos. Verifica-se que a Criptografia, enquanto código, é a linguagem por meio da qual se apresenta o documento, podendo ser caracterizada, dentro dos elementos que compõem a estrutura documental, como um elemento externo, sob a ótica diplomática. Já a Assinatura Digital caracteriza uma subscrição, ou seja, a assinatura do autor nos documentos digitais, sendo dessa forma caracterizada como um elemento de estrutura interna do documento. A Certificação Digital representa uma espécie de precação, pois é por seu intermédio que se tem a certeza da legalidade do documento. Essa ferramenta é comparada a um sinal de validação ou uma assinatura testemunhal, ficando, assim... (Resumo completo, clicar acesso eletrônico abaixo) / Abstract: The Internet has been substantially changing the research habits of human beings, on one hand providing them more agility and efficiency for obtaining information, but on the other hand it increases problems related to copyright in works that the net can spread. Consequently, it is necessary to analyse, in Brazilian doctrinal, legislative and jurisprudencial scopes the copyright (intellectual and material) and its apply to the creations on the net, to which are related questions such as the control of publications copies and the means to avoid falsifications, adulterations and inappropriate use of them. Based on documentary research, on law and also on information from the net, starting from the Internet approach in its concept, characteristics and types of documents, it is analysed the copyright in theoretical (concept and kinds) and applied (control and protection in Brazilian law) terms and it is discussed the use of some elements to protect copyright on the Internet: Cryptography, Digital Subscription, Digital Certification and Digital Watermark, and it is concluded with the diplomatic nature of the same. It is verified that the Cryptography, as a code, is the language through which the document is presented, and it can be characterized, among the elements that form the documentation structure, as an outer element, under the diplomatic view. The Digital Signature characterizes a subscription, that is, the author's signature on digital documents, it is therefore, featured as an element of the document inner structure. The Digital Certification represents a kind of precation because it proves the legality of the document. This tool is compared to a validating sign or to a testifying signature, being featured by diplomatic as an inner element of the documentation structure. Finally, it is verified that the Digital Watermark is compared to a special... (Complete abstract, click electronic address below) / Mestre
7

Copyright in Social Media : A Preparatory Study in Access to Protected YouTube Clips

Vintersvärd, Anna January 2011 (has links)
Social media, such as YouTube, contain different types of information provided by the users. Because of the popularity and ability to reach out to others, coprorations might want to use this information in its advertising. However, some of the information is copyright protected works. How can a coproration use the limitations in the copyright protection to its advantage? Even when it is allowed to use the work with regard to the limitations in the copyright protection, attention must be paid to personal information and marketing provisions. This bachelor's thesis disclosures the method by which a work or the information is legally eccessed for advertising purposes.
8

Fotografie jako autorské dílo a ochrana autorských práv fotografa / Photograph as the copyright and copyright protection of photographer

Pavelcová, Andrea January 2018 (has links)
The objective of the master's thesis called 'Photograph as the copyright and copyright protection of photographer' is to describe the basic foundations and characteristics of the current regulation of copyright work, specifically of photography. The Czech legal system do not contain a complex regulation of photography; therefore, the thesis deals with the individual aspects of copyright law related to the characterisation of photographs as a copyright work, the rights of photographers or their rights related to the protection of their copyright. The thesis is based primarily on copyright law commentaries, copyright regulation on the Czech, international and European level and on the decisions of both Czech and foreign courts due to rapid development of copyright law in the information society and the inflexibility of the current legislation. Due to the author's interest in photography, the thesis is enriched with personal observations from her own experience with photography. The thesis is divided into seven chapters. The first deals with the general description of copyright, its principles, basic concepts and the moment of copyright formation. Chapter two focuses on photography and discusses the subject of copyright protection. Chapter three deals with authorship of photography, defines under...
9

A proteção dos direitos autorais a partir da realidade Internet: a perspectiva brasileira

Sola, José Eduardo Martins [UNESP] 06 1900 (has links) (PDF)
Made available in DSpace on 2014-06-11T19:23:09Z (GMT). No. of bitstreams: 0 Previous issue date: 2002-06Bitstream added on 2014-06-13T19:49:58Z : No. of bitstreams: 1 sola_jem_me_mar.pdf: 951554 bytes, checksum: f760cf493cdc27e21faa47420f41e7d5 (MD5) / A Internet vem modificando substancialmente os hábitos de pesquisa do ser humano, por um lado permitindo-lhe maior agilidade e eficiência na obtenção de informações, mas, por outro, multiplicando problemas de direito autoral nas obras por ela veiculadas. Desse modo, torna-se necessário analisar, no âmbito doutrinário, legislativo e jurisprudencial brasileiro, os direitos autorais (intelectuais e materiais) e sua aplicabilidade às criações dispostas na rede, ao que se aliam questões como a de controle das cópias de tais publicações e a de meios para evitar falsificações, adulterações e uso indevido das mesmas. Valendo-se de pesquisa documental em fontes do direito e em informações da própria rede, parte-se da abordagem da Internet em seu conceito, características e tipos de documentos, analisam-se os direitos autorais em termos teóricos (conceito e modalidades) e aplicados (controle e proteção no Direito Brasileiro) e discute-se a utilização de alguns elementos para a proteção dos direitos autorais na Internet: Criptografia, Assinatura Digital, Certificação Digital e Marca d'Água Digital, concluindo-se pela natureza eminentemente diplomática dos mesmos. Verifica-se que a Criptografia, enquanto código, é a linguagem por meio da qual se apresenta o documento, podendo ser caracterizada, dentro dos elementos que compõem a estrutura documental, como um elemento externo, sob a ótica diplomática. Já a Assinatura Digital caracteriza uma subscrição, ou seja, a assinatura do autor nos documentos digitais, sendo dessa forma caracterizada como um elemento de estrutura interna do documento. A Certificação Digital representa uma espécie de precação, pois é por seu intermédio que se tem a certeza da legalidade do documento. Essa ferramenta é comparada a um sinal de validação ou uma assinatura testemunhal, ficando, assim... / The Internet has been substantially changing the research habits of human beings, on one hand providing them more agility and efficiency for obtaining information, but on the other hand it increases problems related to copyright in works that the net can spread. Consequently, it is necessary to analyse, in Brazilian doctrinal, legislative and jurisprudencial scopes the copyright (intellectual and material) and its apply to the creations on the net, to which are related questions such as the control of publications copies and the means to avoid falsifications, adulterations and inappropriate use of them. Based on documentary research, on law and also on information from the net, starting from the Internet approach in its concept, characteristics and types of documents, it is analysed the copyright in theoretical (concept and kinds) and applied (control and protection in Brazilian law) terms and it is discussed the use of some elements to protect copyright on the Internet: Cryptography, Digital Subscription, Digital Certification and Digital Watermark, and it is concluded with the diplomatic nature of the same. It is verified that the Cryptography, as a code, is the language through which the document is presented, and it can be characterized, among the elements that form the documentation structure, as an outer element, under the diplomatic view. The Digital Signature characterizes a subscription, that is, the author's signature on digital documents, it is therefore, featured as an element of the document inner structure. The Digital Certification represents a kind of precation because it proves the legality of the document. This tool is compared to a validating sign or to a testifying signature, being featured by diplomatic as an inner element of the documentation structure. Finally, it is verified that the Digital Watermark is compared to a special... (Complete abstract, click electronic address below)
10

Proteção dos direitos autorais de imagem estática utilizando criptografia visual e marca d\'água / Still image copyright protection using visual cryptography and watermark

Eduardo Almeida Feijó 18 May 2016 (has links)
A tecnologia atual não oferece prevenção contra cópia, adulteração ou plágio de uma imagem estática em meio digital sem autorização do verdadeiro autor. Dado que tais mal feitos não podem ser evitados, resta ao criador da obra original lutar a posteriori por seus direitos nos fóruns adequados (no tribunal, por exemplo). Na época da fotografia analógica com filme, o negativo poderia ser utilizado como prova. Hoje este recurso raramente está disponível e se faz necessária uma solução alternativa. A técnica de Marca d´Água é uma das possibilidades criptográficas existentes para apoiar o autor em sua defesa. O principio da Marca d´Água é o encapsulamento de informações relevantes, preferencialmente de forma imperceptível, na imagem a ser protegida. Tais informações, quando extraídas da imagem marcada, devem revelar o verdadeiro autor num processo de disputa. Soluções de Marca d´Água combinada com Criptografia Visual são encontradas na literatura. A principal vantagem deste caminho é a propriedade Imperceptível por segurança perfeita que a Marca d´Água assume quando tratada por Criptografia Visual. O segredo (neste caso, a Marca d´Água) é segmentado via Criptografia Visual em 2 transparências: uma delas é encapsulada na imagem a ser protegida e a outra é mantida pelo verdadeiro autor. Basta a sobreposição de tais transparências para que a Marca d´Água seja revelada. Nesta pesquisa propomos um novo método, denominado MACV, que combina Marca d´Água, Criptografia Visual e um algoritmo de hashing. O MACV apresenta, entre outras, as seguintes propriedades desejáveis de Marca d´Água: imperceptível por segurança perfeita, alta entropia, armazenamento na própria imagem e sem ambiguidade. Veremos em nossa pesquisa bibliográfica que há uma lacuna de soluções que apresentem, simultaneamente, todas estas propriedades. Esta lacuna torna o MACV único em sua categoria. / Current technology does not prevent copy, tamper or plagiarism of a still image in digital media without authorization of the true author. Since such misdeeds can not be avoided, the creator of the original work has to defend his rights a posteriori in the appropriate forum (in court, for example). A negative could be used as evidence in the era of analog photography. Currently this feature is rarely available and an alternative solution is needed. Watermark is one of the existing cryptographic possibilities to support the author in his defense. A Watermark is embedded into the image to be protected, preferably imperceptibly. Such information when extracted from the watermarked image should reveal the true author in a dispute process. Solutions using Watermark with Visual Cryptography are found in the literature. The main advantage of this way is the property Imperceptible by perfect secrecy that the Water- mark assumes when treated by Visual Cryptography. The key (in this case, the Watermark) is partitioned by Visual Cryptography in 2 transparencies: one is embedded in the image to be protected and the other is kept by the true author. The Watermark is revealed by overlapping such transparencies. In this research we propose a new method, called MACV, combining Watermark, Vi- sual Cryptography and a hashing algorithm. The MACV has, among others, the following desirable properties of Watermark: invisible by perfect secrecy, high entropy, stored into the image itself and unambiguously. We will see in our research that there is no solution that presents, simultaneously, all these properties. This fact makes the MACV the first one to show all these properties

Page generated in 0.1403 seconds