期刊文献+

面向网络图片防盗保护的软件设计—基于理论研究与实验论证的结合

The Software Design for the Antitheft of Website Pictures* —Based on the Combination of Theoretical Study and Experimental Demonstration
下载PDF
导出
摘要 数字图像的安全问题是多媒体信息安全的重点,本文对网络图片的防盗保护问题进行研究,主要思路是防止用户直接轻松地通过截取屏幕来获得图片。为此,本文首先借助人眼的视觉暂留特性,提出类似动画合成帧的保护策略,使得每一帧总有部分像素被隐藏起来或被模糊处理。然后,从多个角度设计若干个数值实验并作对比分析。实验结果表明,本文提出的方案既不会对图片的实际浏览效果带来明显的影响,又能达到在任何时刻无法完整截取图片的目的。本文的研究成果能有效遏制网络图片的非法盗用和二次分发,维护原创者的合法权益。 The security problem of digital image is the key point of multimedia information security. This paper focuses its research on the security protection of network pictures, and the main idea is to prevent the network users through screen shot to get pictures easily and directly. Therefore, this paper firstly utilizes the persistence of vision characteristic of human eyes and proposes a protection strategy similar to animation frames, so that some pixels of each frame can be hidden or fuzzy processed. Secondly, this paper designs a number of numerical experiments from multiple angles and then conducts comparative analysis. The experimental results showed that the scheme we put forward would neither cause distinct influences when network users skimmed through the network pictures, nor could they get the pictures completely through screen shot at any time. The research results of this paper can prevent the illegal utilization of network pictures and the second distribution effectively, so as to preserve the legitimate rights of the original.
出处 《软件工程与应用》 2013年第4期75-80,共6页 Software Engineering and Applications
基金 2012年暨南大学国家级大学生创新创业训练计划项目“面向网络图片防盗保护的软件设计与开发(1210559135)”。
  • 相关文献

参考文献7

二级参考文献35

  • 1刘青,蒋训毅.电子商务中的广告法律问题及其对策研究[J].现代情报,2004,24(9):15-17. 被引量:2
  • 2谢东,张基温.基于数字水印技术的信息产品保护[J].情报杂志,2005,24(7):91-92. 被引量:6
  • 3北京启动版权登记平台数字作品首现版权保护伞[J].电信快报(网络与通信),2006(5):45-45. 被引量:1
  • 4郝振省,段桂鉴,辛广伟,魏玉山,童之磊,郝捷,阎芳.我国数字版权保护[J].出版发行研究,2007(1):18-20. 被引量:5
  • 5[1]TANAKA K,NAKAMURA Y,MATSUI K.Embedding secret information into a dithered multilevel image[A]. IEEE Military Communications Conference [C].1990.
  • 6[2]CRAVER S,MEMON N,BOON-LOCK YEO.Resolving rightful ownerships with invisible watermarking techniques[J].IEEE Journal on Selected Areas in Communications,1998,16(4):573-586.
  • 7[3]ZENG WJ,LIU BEDE.A statistical watermark detection techniques[J].IEEE Transactions on Image Processing,1999,8(11):1534-1548.
  • 8[4]PRATT WK.Digital Image Processing[M]. New York:Wiley-Interscience Publication,1978.
  • 9[5]COX IJ,KILIAN J,LEIGHTON FT,et al.Secure Spread Spectrum Watermarking for Multimedia[J].IEEE transactions on image processing,1997,6(12):1673-1686.
  • 10Cox i J, Kilian J, Leighto F T, et al. Secure spread spectrum watermarking for multimedia[ J ]. IEEE Trans. Image Processing, 1997, 6(12) :1673-1687.

共引文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部