Overview of Ethical Issues in Digital Watermarking
Journal Title: The International Journal of Technological Exploration and Learning - Year 2014, Vol 3, Issue 6
Abstract
Ethics has to do with moral principles that control or influence a person’s behavior. Research ethics has taken a prime position in the process of research. Digital watermarking as a technology that embeds information, in machine-readable form, within the content of a digital media file could raise privacy issues if deployed in ways that fail to take privacy into account. Digital watermarking can be applied to different applications including digital signatures, fingerprinting, broadcast and publication monitoring, authentication, copy control, and secret communication. This paper brings to view various ethical concerns of digital watermarking such as privacy, piracy, deception and anonymity.
Authors and Affiliations
Agbaje, M.O,| Department of Computer Sc.Babcock University, Nigeria, Omotosho O. J,| Department of Computer Sc.Babcock University, Nigeria, Adebayo, A.O,| Department of Computer Sc.Babcock University, Nigeria
Ship Detection with Wireless Sensor Network
The main aim of this work is an Intrusion detection on the sea which is a critical surveillance problem for harbor protection, border security, and also the protection of business facilities, such as oil platforms and...
IT Recovery for Business to Take Off
Enterprise information technology is changed rapidly and it has also become the integral part and become a strategic asset to business. New technology coming today and adoption of it are helping IT applications to run...
Spiritual and Moral Principles for Promoting Gender Sensitivity and Equality
The necessity of spiritual and moral principles for promoting gender sensitivity and equality is assumed reality despite the lack of empirical information that directly compares women and men. Gender sensitivity is th...
Imperceptible Data Transmission
Steganographic is a art or method or technique of sending hidden data or secret messages over a public channel so that a third party cannot detect the presence of secret message. There are numerous proposed protocols...
Enhanced Bit Compressed Authentication Approach to Prevent False Data Injection Attacks and Energy Wastage in Route Nodes Over Wireless Sensor Network
Sensor Nodes Offer a powerful Combination of Distributed Sensing, Computation and Communication. A sensor network is a static ad hoc network consisting of hundreds of sensor nodes deployed over an area to perform loca...