Copyright protection scheme based on visual Cryptography: AReview
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 3
Abstract
Abstract: Management of digital images via internet and e-business has witnessed tremendous growth in lastdecades, resulting in vulnerability to copyright infringement, Manipulation and attacks. This paper reviewssome of the current developments in the copyright protection techniques for digital images based on visualcryptography. The approaches reviewed in the paper are lined based on the false positive rate. This paperdiscusses the main approaches for copyright protection of digital images. This paper also discusses how thoseapproaches can achieve the required security standard. The methods are measured against relevantperformance metrics and set according to their respective environments and digital formats being used. Thuscontributing sufficient knowledge so as to develop more secure scheme.
Authors and Affiliations
Smriti sahu , Namita Tiwari
Wavelet Based Features for Defect Detection in Fabric using Genetic Algorithm
Abstract: In this paper a new scheme is proposed for Fabric defect detection in textile industry. For this purpose, wavelet transformer is used as feature extractor of coefficients of fabric. These coefficients c...
Agriculture Ontology for Sustainable Development in Nigeria
Nigeria, a country of more than 160 million people; also, the biggest oil exporter in Africa [1] Nigeria with her oil wealth, food security, and unemployment remains a serious problem. Shortage and increase in...
IPv6: Threats Posed By Multicast Packets, Extension Headers and Their Counter Measures
Security issues concerning the spreading Internet Protocol version 6 (IPv6) is one of the major issues in the world of networking today. Since it is not the default network protocol deployed nowadays (but s...
Detection of Sub-Lines of Various Orientations Using Back Propagation Networks
Various approaches can be taken to achieve vision for robot navigation using back-propagation artificial neural networks. An approach is presented in this paper which attempts to detect straight sub-lines from 8x8...
Detecting Vulnerable User in Twitter Using Tweet Description Logic Rule Generation
In today’s modern era, Social media have become a mandatory, exciting and mundane apparatus in our lives and diverse informal organizations have distinctive focused set of people. Among these networks, twitter standout i...