copyright violation
Recently Published Documents


TOTAL DOCUMENTS

39
(FIVE YEARS 13)

H-INDEX

2
(FIVE YEARS 1)

2021 ◽  
Author(s):  
Dhiran Kumar Mahto ◽  
Amit Singh

Abstract Colour images have been widely used in many aspects of life; however, copyright violation issues related to these images motivate research efforts. This paper aims to develop an enhanced watermarking algorithm for producing a watermarked image using hybrid optimisation with high imperceptibility and robustness. The algorithm is based on spatial and transform domains and begins by embedding multiple secret marks into cover media using an optimal scaling factor. The multi-type mark contributes an additional level of authenticity to the proposed algorithm. Furthermore, the marked image is encrypted using an improved encryption scheme, and the denoising convolutional neural network (DnCNN) is employed to enhance the robustness of the proposed algorithm. The results reveal that the proposed watermarking algorithm yields low computational overhead, excellent watermark capacity, imperceptibility, and robustness to common filtering attacks. Moreover, the comparison shows that the proposed algorithm outperforms other competing methods.


2020 ◽  
pp. 155545892096485
Author(s):  
Barbara Hickman

The use of social media may be contributing to violations of copyright law and can create legal challenges for school districts trying to balance ease of communication and First Amendment freedom of speech rights against compliance with federal regulations. In this case, a district is threatened with a lawsuit for copyright violation when one of the employees retweets a trademarked phrase. The case explores how school districts monitor copyright law, issues surrounding social media accounts for teachers and other employees such as coaches, the district’s liability for what is shared on those accounts, professional development, and possible board and district responses.


2020 ◽  
Vol 16 (2) ◽  
pp. 137-156
Author(s):  
Xenia Angelica Wijayanto ◽  
Lestari Nurhajati

According to We Are Social research in January 2018, Indonesia's population now is 265,4 million, while its social media active users reached 130 million. 43% of people are using Youtube as their primary social media. This situation shows us that Youtube is still the most used and liked social media channel, followed closely by Facebook and Whatsapp. The vlogger phenomenon is also getting stronger among Indonesian young people. The increasing number of Youtube content production ranged from artists, public figures, and ordinary people, also known as Youtuber. One of the famous Youtuber is Raditya Dika, whose subscriber reached more than 3.3 million, and estimated income per year around USD 46 thousand to USD 739 thousand. The problem that arises is about the copyright violation in background music used by Indonesian Youtuber. This research tries to dig further data about the youtube policy in protecting the copyright issue in that area. This research uses a discourse analysis method on 15 videos from the top 5 Youtuber in Indonesia as the unit of analysis. The result shows that some Youtuber still violate the copyright issue while using background music on their Youtube materials production.


Author(s):  
Jasmine Jolly ◽  
Mehbooba P Shareef

The growth of internet and its reachability to all sectors of people have never been greater. Internet has become the best marketplace, the best library and may be the best guide for everything. But this revolution comes with some bigger problems. One of the most challenging problems among them would be copyright protection of digital data being transferred over internet. Digital images, videos and audios undergo illegal re-production and re-distributions, tampering and other acts of copyright violation. This is proved to have leading the film and other prominent industries to loss of millions of dollars per year. Encrypting the data provides security to it. In this case only people who pay to buy the secret key that should be used for decryption can use the data. But the problem is that once decrypted, the data can be re-produced into any number of copies and can be re-distributed without any permission from the author. Watermarking is an intelligent solution for this problem where the presence of watermark can be checked to distinguish pirated copies from the actual ones. A lot of methods have been developed for image and video watermarking, but the research on audio watermarking started a little bit later. The reason might be the fact that audio watermarking is tedious compared to image and video as Human Auditory System (HAS) is more sensitive compared to Human Visionary System. So ensuring the imperceptibility of audio watermarks is a tougher task. In this thesis various audio watermarking schemes introduced so far in the literature and their merits and demerits are studied.


2020 ◽  
Vol 30 (2) ◽  
pp. 196-201
Author(s):  
Daria Pašalić ◽  
Vesna Šupak Smolčić

Biochemia Medica is an open access journal that does not charge manuscript processing or publishing. All editorial staff are continuously educated and directed to follow the highest ethical and scholarly publishing standards in all steps of the manuscript processing. They are all laboratory medicine professionals, who apart from their regular jobs, are in charge of different phases in Journal processing as volunteers. The publisher of the Journal is scientific and professional association of laboratory medicine professionals, Croatian Society of Medical Biochemistry and Laboratory medicine (CSMBLM). During November and December 2018, without knowledge of the editorial staff, unknown perpetrator(s) downloaded a respectable number of articles published in Biochemia Medica as PDF and launched an illegal web page under the same journal name with downloaded articles. Although this was a very harmful experience, we have learned a lot from it and we would like to share this with scientific journals’ community. Therefore, we would like to share this harmful experience, and to present a short workflow on how to manage situations like this if it will be necessary for any scientific journal in the future.


Author(s):  
Rakan Saadallah Rashid ◽  
Jafar Ramadhan Mohammed

<span>Digital watermarking is the process of embedding particular information into other signal data in such a way that the quality of the original data is maintained and secured. Watermarking can be performed on images, videos, texts, or audio to protect them from copyright violation. Among all of these types of watermarking, audio watermarking techniques are gaining more interest and becoming more challenging because the quality of such signals is highly affected by the watermarked code. This paper introduces some efficient approaches that have capability to maintain the signals’ quality and preserves the important features of the audio signals. Moreover, the proposed digital audio watermarking approaches are performed in the transform domain. These approaches are gaining more attention due to their robustness or resistance to the attackers. These transform domains include discrete cosine transform (DCT), short-term Fourier transform (STFT), and digital wavelet transform (DWT). Furthermore, the most digital wavelet transforms were found to be applicable for speech watermarking are the Haar and the Daubechies-4. </span>


Acta Comitas ◽  
2020 ◽  
Vol 5 (1) ◽  
pp. 161
Author(s):  
I Made Dwi Dimas Mahendrayana

A copyright violation occurs when someone makes an announcement or reproduction of a work without permission from the creator or copyright holder. If this happens, the creator or copyright holder can bring his dispute to be resolved through alternative dispute resolution or arbitration. However, the Law No. 28 of 2014 concerning Copyright does not regulate the mechanism for resolving copyright disputes through arbitration. The purpose of this study is to determine the mechanism for resolving disputes over copyright infringement through arbitration and the mechanism for canceling decisions on resolving disputes over copyright infringement through arbitration. This research uses normative legal research. From the results of the study, the initial stage of the mechanism of resolving disputes over copyright infringement through arbitration begins with the submission of the request for arbitration. Furthermore, the applicant makes a claim letter and proceed with the selection and appointment of the arbitrator. Then the arbitration examination. The final stage of the trial in arbitration is the submission of the award to the parties, and continued with the implementation of the arbitration award. An arbitration award can be requested to be canceled. The mechanism for cancellation of a national arbitration award begins by registering an arbitration award for cancellation at the Registrar's Office of the District Court. Then the court will examine the facts about whether or not the reasons stated by the applicant to cancel the arbitration award. If no, the application is rejected, but if the facts are found, the court is only authorized to cancel part of the arbitration award.


Computers ◽  
2020 ◽  
Vol 9 (2) ◽  
pp. 26 ◽  
Author(s):  
David Megías ◽  
Minoru Kuribayashi ◽  
Amna Qureshi

Copyright protection is one of the most relevant challenges in the network society. This paper focuses on digital fingerprinting, a technology that facilitates the tracing of the source of an illegal redistribution, making it possible for the copyright holder to take legal action in case of copyright violation. The paper reviews recent digital fingerprinting solutions that are available for two particularly relevant scenarios: peer-to-peer distribution networks and broadcasting. After analyzing those solutions, a discussion is carried out to highlight the properties and the limitations of those techniques. Finally, some directions for further research on this topic are suggested.


2020 ◽  
Vol 2020 ◽  
pp. 1-10
Author(s):  
JeongYeon Kim

With popularity of social network services, the security and privacy issues over shared contents receive many attentions. Besides, multimedia files have additional concerns of copyright violation or illegal usage to share over communication networks. For image file management, JPEG group develops new image file format to enhance security and privacy features. Adopting a box structure with different application markers, new standards for privacy and security provide a concept of replacement substituting a private part of the original image or metadata with an alternative public data. In this paper, we extend data protection features of new JPEG formats to remote access control as a metadata. By keeping location information of access control data as a metadata in image files, the image owner can allow or deny other’s data consumption regardless where the media file is. License issue also can be resolved by applying new access control schemes, and we present how new formats protect commercial image files against unauthorized accesses.


Sign in / Sign up

Export Citation Format

Share Document