illegal copying
Recently Published Documents


TOTAL DOCUMENTS

37
(FIVE YEARS 2)

H-INDEX

3
(FIVE YEARS 0)

2021 ◽  
Vol 2 (2) ◽  
pp. 320-325
Author(s):  
Ni Luh Dwi Ega Mileniawati ◽  
Nella Hasibuan OLeary ◽  
Desak Gde Dwi Arini

The essence of national development is the development of the whole human being and the development of the entire Indonesian society based on Pancasila and the 1945 Constitution of the Republic of Indonesia. Development is not only pursuing physical or mental progress, but also pursuing harmony, harmony and balance. The purpose of this study is to determine the implementation of Law Number 28 of 2014 concerning Copyright related to illegal copying of books in the Cahya Printing Bali photocopy business and to find out legal protection for book creators related to illegal book duplication in the Cahya Printing Bali photocopy business. The research method used is to use the empirical legal research method, which is to study the legal provisions that apply or what happen in reality in society. The results of the study show that the implementation of Law Number 28 of 2014 concerning copyright related to illegal book duplication in the Cahya Printing Bali photocopy business has not been carried out due to lack of support from related parties, namely still weak policing and lack of socialization. Legal protection for book creators related to the copying of illegal books in the copy business of Cahya Printing Bali in protecting creators' rights, the government does not provide direct legal protection.


2021 ◽  
Vol 1 (1) ◽  
pp. 115-124
Author(s):  
E. I. Trofimova

De-centralized storage and the closely-coupled related constancy of loaded data, immunity against hacker attacks, transaction history recording and complete transparency make the blockchain technology attractive not only for developing cryptocurrencies and economic transactions. The author reviews the world experience in applying the technology to various activities of social memory institutions and, in particular, individual programs based on the blockchain. The technology enables to provide control and insurance for pieces of art, to ensure copyright, to prevent illegal copying, to store digital copies and ori- ginal works created in the digital environment, to integrate resources using the key functionality of distributed databases. The possibilities and prospects for Russia are evaluated; the need for regulative foundation to define core functionality and legal liability of blockchain processes is emphasized. The possibility for using the technology for building the single knowledge space as the integrative model of digital museum, archival and library resources is analyzed.


Author(s):  
Tribhuwan Kumar Tewari

Background & Objective: Revolution in digital multimedia is a boon to music industries, music creators for decades as digital music can be created, stored replicated and transferred easily and efficiently. But digitalization of multimedia becomes a curse when the multimedia content is illegally and freely distributed, shared across the network online or offline. Countering the illegal copying and distribution of digital media is the driving force behind the evolution of copyright protection and digital watermarking techniques. Methods: This paper presents the problem of piracy and the overview of the evolution of different digital audio watermarking techniques in time, transformed and compression domains to counter the problem of music piracy. The limitations of the audio watermarking techniques and the future scope for improvement are also presented. Results & Conclusion: This paper summarizes the evolution of audio watermarking techniques and reviews the existing watermarking techniques applied on audios. The limitations of the audio watermarking techniques and the future scope for improvement are also proposed. Additionally, the preliminaries for audio and brief of the properties which are exploited for watermarking of audio are presented.


Author(s):  
Fahad Layth Malallah ◽  
Awatif Ali Jafaar ◽  
Nidaa Hasan Abbas ◽  
Mustafa Ghanem Saeed

<p>Unauthorized redistribution and illegal copying of digital contents are serious issues which have affected numerous types of digital contents such as digital video. One of the methods, which have been suggested to support copyright protection, is to hide digital watermark within the digital video. This paper introduces a new video watermarking system which based on a combination of Arnold transform and integer wavelet transforms (IWT). IWT is employed to decompose the cover video frames whereby Arnold transform is used to scramble the watermark which is a grey scale image. Scrambling the watermark before the concealment makes the transmission more secure by disordering the information. The system performance was benchmarked against related video watermarking schemes, in which the evaluation processes consist of testing against several video operations and attacks. Consequently, the scheme has been demonstrated to be perfectly robust.</p>


Author(s):  
I. Bordakova

The main stages of formation of own name, style, image of the manufacturer of own products were analyzed in this article. One of the main criteria of a product and the most important source of information about products (goods) at the market is presence of marking (brand name, sign, image, style, etc.). Presence of label elements makes up individualization of goods and services. The term ‘trademark’ refers to a trade-mark or its juridically protected part that gives a shop assistant the exclusive right to use a brand name or a brand mark. There is no doubt that the use of a trademark is a kind of link between manufacturers and consumers, an effective method for attracting customers attention to the product allowing consumers to choose appropriate products of a particular manufacturer. It should be noted that one of the means of identifying a product is marking. Marking is considered to be an integral part of goods. It provides consumers with relevant information on a corresponding product, container and packaging. It also reflects quality and safety of products. Significance of trademarks-brands is increasing considerably in conditions of market-oriented economy for distinguishing the same goods produced by different manufacturers. Since goods introduced to consumer market by different manufacturers always differ by characteristics, features, qualities, etc. A trademark (brand) is a sign that helps to distinguish a product of one manufacturer from the same product of another. The growing role of brands and trademarks is stressed in today international market. Thus, a manufacturer is in front of the choice of registration of trademarks which in turn become objects of intellectual property. However, creating an exclusive international scale brand is only possible for large commodity producers who are able to produce quality goods delivered to different markets and invest enormously into their promotion. Accordingly, trademark holders aim to protect their products from counterfeiting, individualize them and promote at the consumer market in a civilized way. But there are many people who want to make money using a name of a famous brand, therefore, counterfeiting that spoils reputation of a brand manufacturer appears. This problem is connected with a large number of counterfeiting illegally imported into the territory of Ukraine without commodity accompanying documents, and then sold in stores and markets. Thus, known trademarks are required to be registered in accordance with the current legislation in order to avoid cases of illegal copying. To conclude, registration of a trademark is a preventive and protective measure aimed at preventing violations of the rights of an owner. The modern regulatory framework regulating protection of trademarks as objects of intellectual property in Ukraine, in general, complies with international standards, but needs to be further improved taking into consideration counterfeiting at the market.


Extensive use of the Internet coupled with tremendous growth in database applications have created a huge demand for database security. The concepts of e-governance, e-commerce, e-business, e-learning, and digital libraries are already in place and evolving across poles. This raises various concomitant threats such as illegal copying, illegal redistribution, tampering, forgery and authentication of copyrighted digital assets. Digital Watermarking is an effective technique which can be introduced for solving the above mentioned threats. Based on the detection of the Watermark, the ownership and the integrity of the data can be asserted. Database Watermarking techniques are generally classified into two: i.e., Robust or Fragile. Robust watermarking techniques are designed for copyright protection and fragile watermarking techniques are for authentication or integrity checking of data. Watermarking schemes for relational databases authentication are almost fragile in nature. These algorithms do not allow any legitimate modification of the data. In most of the cases, innocent distortions such as tuple and/or attribute sorting may be considered as tampering. In this paper, the research work proposes a novel semi-fragile watermarking technique for tamper detection of relational databases. The new semi-fragile scheme can detect and localize malicious modifications, while allowing authorized updates. Theoretical analysis and experimental results demonstrate that common database attacks can be detected with high rate of success.


2019 ◽  
Vol 9 (22) ◽  
pp. 4889 ◽  
Author(s):  
Pham ◽  
Ngo ◽  
Bui ◽  
Tran ◽  
Lee ◽  
...  

In recent years, GIS (Geographical Information System) vector maps are widely used in everyday life, science, and the military. However, the production process of vector maps is expensive, and a large volume of vector map data is easily stolen and illegally distributed. Therefore, original providers desire an encryption solution to encrypt GIS vector map data before being stored and transmitted in order to prevent pirate attacks and to ensure secure transmission. In this paper, we propose an encryption algorithm for GIS vector map data for preventing illegal copying, and ensuring secured storage and transmission. Polyline/polygon data of GIS vector maps are extracted to compute a backbone object. The backbone object is then selectively simplified by the multi-scale simplification algorithm in order to determine the feature vertices of the backbone object. The feature vertices of the backbone object are encrypted by the advanced encryption standard and the secret key. Finally, all vertices of the backbone object are randomized by the random Gaussian distribution algorithm to obtain the encrypted GIS vector map. Experimental results show that the entire map is altered completely after the encryption process. The proposed method is responsive to the various GIS vector map data formats, and also provides better security than previous methods. The computation time of the proposed method is also significantly shorter than that of previous methods.


2019 ◽  
Vol 8 (3) ◽  
pp. 4040-4046

Internet based digitization has been of rapid increase in the usage of database applications at an enormous rate in recent times. It is very difficult to secure the ownership of digital assets because all the data on the internet are available everywhere almost free of cost and anybody can access such data and claim their ownership. In current digital scenario not only images, videos, and audio are in digital form. Databases are also digitized in different models and used as a service in database applications, including areas such as finance, multimedia, personnel, etc. A huge amount of confidential and sensitive data which are available publically facing a variety of threats like illegal copying, illegal redistribution, tampering, forgery and authentication. Authenticity, integrity, confidentiality and copyright protection are most important security issues to be addressed with most importance. Copyright management is a serious issue in database applications because it is much easier for others to download and manipulate copyrighted databases from the Internet and later re-use without any control. In this paper we proposed a robust watermarking scheme for copyright protection for relational databases, which protects the copy right information of the database even if the attacker tampers the data by changing the attribute values or reordering the tuples of the database. The proposed watermarking technique is robust since the watermark will not be lost even though the attacker tampers the data. The experiments show that the new method is efficient as well as effective for maintaining copy right information there by ensuring right protection to relational databases


Author(s):  
Hadj Ahmed Bouarara ◽  
Reda Mohamed Hamou

In the last decade with the new technology, it is important to allow users to access information freely, while at the same time, restrict them from illegal copying and distribution of information. In the age of information technologies plagiarism has become a topical subject in the digital world and turned into a serious problem. The author's work deals with the development of a new system for combating this phenomenon using a new insect behaviour algorithm called Groping cockroaches classifier GCC. Each suspicious text (cockroach) will be classified (hidden) in a class (shelter) that can be plagiarism or no-plagiarism, using a security function that is based on the attractiveness of each class (calculated using the aggregation operators (shelter darkness, congeners attraction and security quality)) and the displacement probability (calculated using the naive Bayes algorithm). The experimental results performed on the Pan 09 dataset and using the validation measures (recall, precision, f-measure, and entropy), have demonstrated that GCC has clear advantages over others plagiarism detection techniques existed in literature. Finally, a set of service was added in order to detect the different cases of plagiarism such as plagiarism with translation, plagiarism of idea, plagiarism with synonymy, and plagiarism paraphrase.


2019 ◽  
Vol 6 (2) ◽  
pp. 159-168
Author(s):  
Angelika Pechyonkina ◽  
Igor Karmanov

At the moment, due to the development of global networks, protection of intellectual property from illegal copying is of great importance. A lot of research is devoted to use of steganography for copyright protection. Steganographic methods not only secretly transmit information, but also solve problems of authentication noise immunity, protecting data from unauthorized copying, tracking information movement in a network and for searching it in multimedia databases. Most areas of applied mathematics are used as a tool for steganography, and the term «stego» has long been used by Internet users as an important component of modern information security technologies.


Sign in / Sign up

Export Citation Format

Share Document