E-Learning Certificate Using Digital Watermarking Technology
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 4
Abstract
Abstract: There has been an increasing demand for e-learning technologies and especially for digital watermarking. Using the digital watermarking technology in e-learning is increasingly becoming an important part of the strategy for trusting on-line materials and activities, especially the on-line certificate both easy and cheaply in flexible e-learning way. This paper sets out to develop and create a novel approach to digital watermarking for e-learning certificate that can increase the trustworthiness of e-learning systems in institutions all over the world. This approach will enable these institutions to create an on-line certificate and to add a watermark that can be trusted by other institutions. The most important driving force is concern over protecting copyright, such as for video, audio and other works now available in digital form; it might be that the ease with which perfect copies can be made will lead to large-scale illegal copying, which will in turn undermine the creation of new books, films, pictures etc. the main aims of this paper is to introduce high-quality protected on-line certificates using two kinds of digital watermarking (visible digital watermarking and invisible digital watermarking) in e-learning systems. In addition, this study aims to enable institutions to offer e-learning certificate and to embed digital watermarking systematically
Authors and Affiliations
Ajlan S. Al-Ajlan
A Comprehensive lossless modified compression in medical application on DICOM CT images
In current days, Digital Imaging and Communication in Medicine (DICOM) is widely used for viewing medical images from different modalities, distribution and storage. Image processing can be processed by pho...
Energy Consumption Algorithms on Green Computing Technology
Green computing is the eco-friendly technology for the environmentally responsible of computers and their resources usage. Green computing is also defined as the way that reduces their environmental impact on study of de...
Storage Data Security of Data in Cloud Computing
Abstract: Cloud Computing refers to the many different types of services and applications being delivered in the internet cloud, and the fact that, in many cases, the devices used to access these services and appli...
Detection of Replica Nodes in Wireless Sensor Network: A Survey
Abstract: Network security has become a challenging area, historically only tackled by well qualified andfamiliar experts. Although more pupils are becoming wired, an increasing number of pupils need to understandb...
Authentication of grayscale document images using shamir secret sharing scheme.
Abstract: This paper proposed a new blind authentication method based on the secret sharing technique with a data repair capability for grayscale document images .Shamir proposed threshold secret sharing scheme in...