16 resultados para copyright protection

em Deakin Research Online - Australia


Relevância:

100.00% 100.00%

Publicador:

Resumo:

This research presented improved watermarking methods for mono and stereo audio signals. To enhance the performance, novel methods are developed using echo hiding techniques and patchwork-based algorithms. The superior performances of the proposed methods are demonstrated by theoretical analysis and simulation examples, in comparison with the existing methods.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Changes to Australian copyright law introduced under the Australia–United States Free Trade Agreement will diminish the public domain, criminalise common copyright infringing practices and locally introduce significant portions of the controversial 1998 American Digital Millennium Copyright Act. This paper examines these imminent changes to Australian copyright law, with specific attention to the potential effects of the extended duration of copyright protection and the introduction of technological anti-circumvention measures. It argues that public domain-enhancing activities are crucial for sustaining cultural creativity and technological innovation, and discusses the potential role of the Creative Commons movement in establishing economically viable and legal alternatives to the current model of trade-oriented copyright reform.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Watermarking technique enables to hide an imperceptible watermark into a multimedia content for copyright protection. However, in most conventional watermarking schemes, the watermark is embedded solely by the seller, and both the seller and the buyer know the watermarked copy, which causes unsettled dispute at the phase of arbitration. To solve this problem, many watermarking protocols have been proposed using watermarking scheme in the encrypted domain. In this paper, we firstly discuss many security aspects in the encrypted domain, and then propose a new method of homomorphism conversion for probabilistic public key cryptosystem with homomorphic property. Based on our previous work, a new secure watermarking scheme for watermarking protocol is presented using a new embedding strategy in the encrypted domain. We employ an El Gamal variant cryptosystem with additive homomorphic property to reduce the computing overload of watermark embedding in the encrypted domain, and RA code to improve the robustness of the watermarked image against many moderate attacks after decryption. Security analysis and experiment demonstrate that the secure watermarking scheme is more suitable for implementing the existing watermarking protocols.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

A trusted third party introduced in watermarking protocols would decrease the security and affect the implementation of the protocols. In this paper, a new watermarking protocol with an un trusted third party (UTTP) was proposed. Based on the idea of all-o>nothing disclosure of secret (ANDOS), all of the buyer, the seller and the third party didn't know the exact watermark, which was embedded in a digital content for tracing piracy. The proposed protocol pro vided mechanisms to trace piracy and protect customer's right, fn addition, the problem that a seller colluded with UTTP to frame the buyer, namely, the conspiracy problem, could be avoided.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Reversible watermarking has merged over the past few years as a promising solution for copyright protection, especially for applications like remote sensing, medical imaging and military applications which require lossless recovery of the host media. In this paper, we aim to extend the additive interpolation error expansion technique in [16]. We will consider the human visual system (HVS) to improve the embedding rate while maintaining the image visual quality. To this end, the just noticeable difference (JND) is used to embed more watermark bits. The experimental results show that the proposed algorithm can improve the embedding rate while preserving the image visual quality. © 2014 IEEE.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This research presents a novel rank based image watermarking method and improved moment based and histogram based image watermarking methods. A high-frequency component modification step is also proposed to compensate the side effect of commonly used Gaussian pre-filtering. The proposed methods outperform the latest image watermarking methods.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Abstract— Audio watermarking is a promising technology for copyright protection of audio data. Built upon the concept of spread spectrum (SS), many SS-based audio watermarking method shave been developed, where a pseudonoise (PN) sequence is usually used to introduce security. A major drawback of the existing SS-based audio watermarking methods is their low embedding capacity. In this paper, we propose a new SS-based audio watermarking method which possesses much higher embedding capacity while ensuring satisfactory imperceptibility and robustness. The high embedding capacity is achieved through a set of mechanisms: embedding multiple watermark bits in one audio segment, reducing host signal interference on watermark extraction, and adaptively adjusting PN sequence amplitude in watermark embedding based on the property of audio segments. The effectiveness of the proposed audio watermarking method is demonstrated by simulation examples.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Against the background of the recent international trend of a greater reliance on deterrence measures in managing the flow of asylum seekers, this paper discusses the implementation of the temporary protection visa (TPV) in Australia. It focuses on the psychological impact of the TPV policy on individual asylum seekers and how this unlimited temporary status affects the overall process of settlement. This study is based on personal narratives constructed by individual asylum seekers during one-on-one interviews aimed at sketching the mental and psychological manifestations of stressful events in their lives as TPV holders. What is particularly revealing among many of these TPV holders is the fact that their pre-migration traumatic experiences are compounded by a post-migration condition of being in indefinite "temporary" protection. This is further exacerbated by a prevalence of racialized discourses and exclusionary policies advocated by the host government. Past trauma and persecution, combined with present family separation and social exclusion, and further compounded by uncertainty about the future, had resulted in almost chronic states of anxiety and depression among a significant number of TPV holders.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Influenza virus-specific CD8+ T cells generally recognize peptides derived from conserved, internal proteins that are not subject to antibody-mediated selection pressure. Prior exposure to any one influenza A virus (H1N1) can prime for a secondary CD8+ T cell response to a serologically different influenza A virus (H3N2). The protection afforded by this recall of established CD8+ T cell memory, although limited, is not negligible. Key characteristics of primary and secondary influenza-specific host responses are probed here with recombinant viruses expressing modified nucleoprotein (NP) and acid polymerase (PA) genes. Point mutations were introduced into the epitopes derived from the NP and PA such that they no longer bound the presenting H2Db MHC class I glycoprotein, and reassortant H1N1 and H3N2 viruses were made by reverse genetics. Conventional (C57BL/6J, H2b, and Ig+/+) and Ig-/- (muMT) mice were more susceptible to challenge with the single NP [HKx31 influenza A virus (HK)-NP] and PA (HK-PA) mutants, but unlike the Ig-/- mice, Ig+/+ mice were surprisingly resistant to the HK-NP/-PA double mutant. This virus was found to promote an enhanced IgG response resulting, perhaps, from the delayed elimination of antigen-presenting cells. Antigen persistence also could explain the increase in size of the minor KbPB1703 CD8+ T cell population in mice infected with the mutant viruses. The extent of such compensation was always partial, giving the impression that any virus-specific CD8+ T cell response operates within constrained limits. It seems that the relationship between protective humoral and cellular immunity is neither simple nor readily predicted.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

[The present comment considers an issue that has received little discussion in the common law world: namely whether fixation and authorship are parts of the same creative act in relation to literary, dramatic and musical works. The importance of the question is that, if authorship does not entail fixation, it should logically be possible for a person independent of the author to reduce the work to material form for copyright purposes. This would significantly expand the range of works protected by copyright and would extend protection to those works which have never been fixed by their authors. The focus of the comment is Australian law, but its discussion is comparative, with particular attention given to UK law.]

Relevância:

30.00% 30.00%

Publicador: