期刊文献+

数字水印在网络出版和交易中应用分析

Research on the Application of Watermark Technology in Net Publication and Business
下载PDF
导出
摘要 采用数字水印技术应用到网络出版和交易中,既能发挥网络出版和发行的优势,又能形成自己的版权保护体系。首先,提出采用水印技术的网络出版和交易解决方案。然后分别通过文本作品和图形作品进行检测分析,完成对数字作品的跟踪识别和版权保护。这也是数字水印技术在网络安全领域应用的最新尝试。 This paper is about the application of watermark technology in net publication and business, And it not only develops advantages of net publication, but also forms its copyright protection system. Firstly, we put forward the project of net publication and business adopting watermark technology. Then after detection and analysis to texts and images, completed the copyright protection and tracing in transmitting to digital works, which is a new taste of digital watermark' s application in the security of net publication.
作者 李维仙
机构地区 廊坊师范学院
出处 《廊坊师范学院学报(自然科学版)》 2009年第1期33-35,共3页 Journal of Langfang Normal University(Natural Science Edition)
基金 河北省科技支撑计划项目:数字水印模型化攻击分析测试系统研究(072135216)
关键词 数字作品 网络出版 数字水印 版权保护 digital working net pubhcation digital watermarking copyright protection
  • 相关文献

参考文献3

二级参考文献16

  • 1盛骤 谢式千.概率论与数理统计[M].北京:高等教育出版社,1989.189-194.
  • 2[1]I.J. Cox, J. Killian, F. T. Leighton, T. Shamoon, Secure spread spectrum watermarking for multimedia, IEEE Trans. on Image Processing, 1997, IP-6(12), 1673-1687.
  • 3[2]N. Memon, P. W. Wong, Protecting digital media content, Communications of the ACM, 1998, 41(7), 35-43.
  • 4[3]S. Crave, B. L. Yeo, M. Yeung, Technical trials and legal tribulations, Conmmnieations of theACM, 1998, 41(7), 45-54.
  • 5[4]G.C. Langelaar, R. L. Lagendijk, J. Biemond, Renoving spatial spread spectrum watermarks bynon-linear filtering, EUSIPCO'98, 1998, 2281-2284.
  • 6[5]I.J. Cox, J. M. G. Linnartz, Some general methods for tampering with waternarks, IEEE J. onSelected Areas in Communications, 1998, SAC-16(4), 587 593.
  • 7[6]http://wwvw.cl.cam.ac.uk/users/fapp2/.
  • 8[7]S. Craver, N. Memon, B. L. Yeo, M. Yeung, Can invisible watermarks resolve rightful ownerships? Proceedings of IS&T/SPIE Electronic Imaging-Storage and Retrieval of Image and VideoDatabases, San Jose. S, CA: SPIE, Feb. 13-14, 1997, 310-321.
  • 9[8]S. Craver, N. Memon, B. L. Yeo, M. Yeung, On the invertibility of invisible watermarking techniques, Proceedings of the IEEE International Conf. on Image Processing, Santa Barbata, CA,IEEE Press, 1997, 540-543.
  • 10[9]S. Craver, N. Memon, B. L. Yeo, M. Yeung, Resolving rightful ownerships with invisible wa-termarking techniques: limitations, attacks, and implications, IEEE J. on Selected Areas inComnunications, 1998, SAC-16(4), 573-586.

共引文献39

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部