E-Learning Certificate Using Digital Watermarking Technology
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 4
Abstract
Abstract: There has been an increasing demand for e-learning technologies and especially for digital watermarking. Using the digital watermarking technology in e-learning is increasingly becoming an important part of the strategy for trusting on-line materials and activities, especially the on-line certificate both easy and cheaply in flexible e-learning way. This paper sets out to develop and create a novel approach to digital watermarking for e-learning certificate that can increase the trustworthiness of e-learning systems in institutions all over the world. This approach will enable these institutions to create an on-line certificate and to add a watermark that can be trusted by other institutions. The most important driving force is concern over protecting copyright, such as for video, audio and other works now available in digital form; it might be that the ease with which perfect copies can be made will lead to large-scale illegal copying, which will in turn undermine the creation of new books, films, pictures etc. the main aims of this paper is to introduce high-quality protected on-line certificates using two kinds of digital watermarking (visible digital watermarking and invisible digital watermarking) in e-learning systems. In addition, this study aims to enable institutions to offer e-learning certificate and to embed digital watermarking systematically
Authors and Affiliations
Ajlan S. Al-Ajlan
Three-Pass Protocol Implementation in Caesar Cipher Classic Cryptography
Abstract: This study combines classic and modern cryptographic algorithms so that the data security of information more awake authenticity. Caesar cipher is the oldest classical cryptography which uses a symmetric key me...
An efficient process mining model for Petri Nets in process discovery
Abstract: Process mining is a process management system used to analyze business processes based on event logs. The knowledge is extracted from event logs by using knowledge retrieval techniques. The process mining...
Frequent Pattern Mining with Serialization and De-Serialization
Abstract : Competent frequent pattern mining techniques be critical for finding relationship rules. Here, examination of subject of finding association rules for objects into an enormous DB of customer purchaseentries i...
Energy using optimization in wireless sensor networks using the hybrid algorithm
Abstract: Energy limitation is one the most important issues in wireless sensor networks design. Data integration and their multi-step and hierarchical transition is an effective method for reducing energy consumption a...
Security Issues and Privacy in Cloud Computing
Abstract: Recent advances have given rise to the popularity and success of cloud computing. However, when outsourcing the data and business application to a third party causes the security and privacy issues to become a...