In November 2020,the third amendment of the Copyright Law of the People’s Republic of China was completed and officially implemented in June 2021,which is undoubtedly of great significance to Chinese citizens with a ...In November 2020,the third amendment of the Copyright Law of the People’s Republic of China was completed and officially implemented in June 2021,which is undoubtedly of great significance to Chinese citizens with a growing awareness of copyright.This has also triggered our thinking about the impact of Copyright Law on digital copyright.Through the analysis of the cases after the amendment of the Copyright Law,we find that to a certain extent,the Copyright Law has played a great role in the protection of digital copyright,but it is still unable to achieve comprehensive protection,and there are still some imperfections.From this point of view,the simple legal protection of digital copyright cannot be taken into account.It still needs to be combined with technical protection means,cooperate with social conditions,and work together to create a harmonious and healthy online publishing environment and promote the protection of digital copyright.展开更多
Image processing networks have gained great success in many fields,and thus the issue of copyright protection for image processing networks hasbecome a focus of attention. Model watermarking techniques are widely used...Image processing networks have gained great success in many fields,and thus the issue of copyright protection for image processing networks hasbecome a focus of attention. Model watermarking techniques are widely usedin model copyright protection, but there are two challenges: (1) designinguniversal trigger sample watermarking for different network models is stilla challenge;(2) existing methods of copyright protection based on trigger swatermarking are difficult to resist forgery attacks. In this work, we propose adual model watermarking framework for copyright protection in image processingnetworks. The trigger sample watermark is embedded in the trainingprocess of the model, which can effectively verify the model copyright. And wedesign a common method for generating trigger sample watermarks based ongenerative adversarial networks, adaptively generating trigger sample watermarksaccording to different models. The spatial watermark is embedded intothe model output. When an attacker steals model copyright using a forgedtrigger sample watermark, which can be correctly extracted to distinguishbetween the piratical and the protected model. The experiments show that theproposed framework has good performance in different image segmentationnetworks of UNET, UNET++, and FCN (fully convolutional network), andeffectively resists forgery attacks.展开更多
Audio copyright is a crucial issue in the music industry,as it protects the rights and interests of creators and distributors.This paper studies the current situation of digital music copyright certification and propo...Audio copyright is a crucial issue in the music industry,as it protects the rights and interests of creators and distributors.This paper studies the current situation of digital music copyright certification and proposes a music copyright certification framework based on“blockchain+edge computing mode,”abbreviated as MBE,by integrating edge computing into the Hyperledger Fabric system.MBE framework compresses and splits the audio into small chunks,performs Fast Fourier Transform(FFT)to extract the peak points of each frequency and combines them to obtain unique audio fingerprint information.After being confirmed by various nodes on the Fabric alliance chain,audio fingerprint information and copyright owner information are recorded on the chain and broadcast to all participants.Blockchain technology’s characteristics of being tamper-proof and traceable not only reform the trust mechanism of copyright protection but also endow edge computing with the ability to resist tampering and single-point attack,greatly enhancing the robustness of the music copyright certification system.Meanwhile,edge computing mode improves Fabric blockchain’s processing speed and transaction throughput.Experimental results show that MBE’s performance is better than traditional systems regarding efficiency,storage demand and security.Compared to the traditional Fabric system without edge computing mode,MBE exhibits a 53%higher deposition efficiency and a 48%lower storage space requirement.展开更多
Based on a study of copyright agencies in Beijing area, this paper reviews the historical development of the work of copyright agencies and their agents. It analyzes their business related problems that these copyrigh...Based on a study of copyright agencies in Beijing area, this paper reviews the historical development of the work of copyright agencies and their agents. It analyzes their business related problems that these copyright agencies and agents are facing today. This paper also proposes a few remedial measures that may usher this copyright industry into a more sustainable development and also with a more promising outlook.展开更多
A novel copyright protection scheme for digital content is presented, which is a private watermarking scheme based on the watermark embedding in the DCT domain and watermark extraction Using independent component anal...A novel copyright protection scheme for digital content is presented, which is a private watermarking scheme based on the watermark embedding in the DCT domain and watermark extraction Using independent component analysis (ICA). The system includes the key for watermark extraction and the host image. The algorithm splits the original image into blocks and classifies these blocks based on visual masking, that is, noise visibility function (NVF). Watermark components with different strength are inserted into chosen direct current components of DCT coefficients according to the classifier. The watermark extraction is based on the characteristic of the statistic independence of the host image, watermark and key. Principle component analysis (PCA) whitening process and FastICA techniques are introduced to ensure a blind watermark extraction without requiring the original image. Experirnental results show the proposed technique is robust under attacks such as image filtering and adding noise, cropping and resizing. In addition, the proposed private watermarking system can be improved to the application of the DTV content protection system.展开更多
In this paper,we propose a novel wavelet-domain digital image watermarking scheme on copyright protection based on network manufacture environment.It codes the watermarking with error correcting coding and encrypts th...In this paper,we propose a novel wavelet-domain digital image watermarking scheme on copyright protection based on network manufacture environment.It codes the watermarking with error correcting coding and encrypts the watermarking with chaotic encryption.It embeds the watermarking into the coefficients which have large absolute values in the middle-frequency parts got by Discrete Wavelet Transform (DWT) repeatedly.The extraction doesn’t need the original image.Experiment results show that the proposed scheme is easy to implement,and has good robustness to some attacks,such as JPEG compression,average filtering,median filtering,wiener filtering,pepper (?) salt noise,especially to cropping and scaling.In order to solve the prob- lem of the copyright protection of the network manufacture production,the problems of digital image production such as tamper preventing and watermarking attacks preventing and so on are discussed.It solves the problems of manufacture information such as secure exchange and transmissions and production copyright protection and so on.展开更多
A method for creating digital image copyright protection is proposed in this paper. The proposed method in this paper is based on visual cryptography defined by Noor and Shamir. The proposed method is working on selec...A method for creating digital image copyright protection is proposed in this paper. The proposed method in this paper is based on visual cryptography defined by Noor and Shamir. The proposed method is working on selection of random pixels from the original digital image instead of specific selection of pixels. The new method proposed does not require that the watermark pattern to be embedded in to the original digital image. Instead of that, verification information is generated which will be used to verify the ownership of the image. This leaves the marked image equal to the original image. The method is based on the relationship between randomly selected pixels and their 8-neighbors’ pixels. This relationship keeps the marked image coherent against diverse attacks even if the most significant bits of randomly selected pixels have been changed by attacker as we will see later in this paper. Experimental results show the proposed method can recover the watermark pattern from the marked image even if major changes are made to the original digital image.展开更多
At present, in mobile business, the secure environment in the terminal of users has not been embedded, many cryptology-based methods can not be directly used to protect the copyright of digital media. Under this situa...At present, in mobile business, the secure environment in the terminal of users has not been embedded, many cryptology-based methods can not be directly used to protect the copyright of digital media. Under this situation, a transparent system based on watermark for digital right management and digital copyright protection is proposed in this paper. The transparent system is called WDRM (watermark-based digital rights management) and transparent to users. Its core is WDRM Agent. In this paper, system inner model and procession are designed in detail at first, including the registration, the downloading, the super distribution, and the cooperation. Because the watermark embedding and the extraction algorithms are the kernel in this architecture, we also discuss how to choose and design the algorithms. Then we establish a package for all algorithms in WDRM Agent.展开更多
In order to effectively solve the problem of copyright protection of materials genome engineering data,this paper proposes a method for copyright protection of materials genome engineering data based on zero-watermark...In order to effectively solve the problem of copyright protection of materials genome engineering data,this paper proposes a method for copyright protection of materials genome engineering data based on zero-watermarking technology.First,the important attribute values are selected from the materials genome engineering database;then,use the method of remainder to group the selected attribute values and extract eigenvalues;then,the eigenvalues sequence is obtained by the majority election method;finally,XOR the sequence with the actual copyright information to obtain the watermarking information and store it in the third-party authentication center.When a copyright dispute requires copyright authentication for the database to be detected.First,the zero-watermarking construction algorithm is used to obtain an eigenvalues sequence;then,this sequence is XORed with the watermarking information stored in the third-party authentication center to obtain copyright information to-be-detected.Finally,the ownership is determined by calculating the similarity between copyright information to-be-detected and copyright information that has practical significance.The experimental result shows that the zero-watermarking method proposed in this paper can effectively resist various common attacks,and can well achieve the copyright protection of material genome engineering database.展开更多
Fair use doctrine is easily controversial and difficult to judge,and owning to the coming of the new age,fair use doctrine becomes more troublesome.This paper will hold the balance between the right of reproduction of...Fair use doctrine is easily controversial and difficult to judge,and owning to the coming of the new age,fair use doctrine becomes more troublesome.This paper will hold the balance between the right of reproduction of library and the publisher interests by approaching a case under these four elements:the requirement for the Purpose and character of the use;The nature of the copyrighted work;The amount and substantiality of the works used in relation to the copyrighted work as a whole;The effect of the use upon the potential market for and value of the copyrighted work.展开更多
Submission of a manuscript implies:that the work described has not been published before(except in the form of an abstract or as part of a published lecture,review,or thesis);that it is not under consideration for pub...Submission of a manuscript implies:that the work described has not been published before(except in the form of an abstract or as part of a published lecture,review,or thesis);that it is not under consideration for publication elsewhere;that its publication has been approved by all co-authors,if any,as well as-tacitly or explicitly-by the responsible authorities at the institution where the work was展开更多
Submission of a manuscript implies:that the work described has not been published before(except in the form of an abstract or as part of a published lecture,review,or thesis);that it is not under consideration for pub...Submission of a manuscript implies:that the work described has not been published before(except in the form of an abstract or as part of a published lecture,review,or thesis);that it is not under consideration for publication elsewhere;that its publication has been approved by all co-authors,if any,as well as--tacitly or explicitly--by the responsible authorities at the institution where the work was carried out.The author warrants that his/her contribution is展开更多
Submission of a manuscript implies:that the work described has not been published before(except in the form of an abstract or as part of a published lecture,review,or thesis);that it is not under consideration for pub...Submission of a manuscript implies:that the work described has not been published before(except in the form of an abstract or as part of a published lecture,review,or thesis);that it is not under consideration for publication elsewhere;that its publication has been approved by all co-authors,if any,as well as--tacitly or explicitly--by the responsible authorities at the institution where the work was carried out.The author warrants that his/her contribution is展开更多
In this paper, we propose a semi-fragile wattr-marking technology forcopyright protection and image authentication We transform the image into wavelet domain and groupthe four adjacent wavelet coefficients Utilizing t...In this paper, we propose a semi-fragile wattr-marking technology forcopyright protection and image authentication We transform the image into wavelet domain and groupthe four adjacent wavelet coefficients Utilizing the characteristics of the humanvisual system, weembed a digital signal into the average of the four adjacent wavelet coefficients since the mean hasbetter stability than single wavelet coefficient. This method neednt original image when extractsthe watermark. Experimental results show the effectiveness of this method which is robust to commonimage process and fragile to malicious attack.展开更多
For the purpose of deterring unauthorized duplication and distribution of multimedia contents in e-commerce, some Buyer-seller watermarking protocols which combine of traditional watermarking and fingerprinting techni...For the purpose of deterring unauthorized duplication and distribution of multimedia contents in e-commerce, some Buyer-seller watermarking protocols which combine of traditional watermarking and fingerprinting techniques have been proposed, However, previous protocols have potential risk from trust third party (TTP) because all entities (including multi-buyers and multi-sellers) mentioned in protocol construct a star tupology like connection, in which the watermark certification authority (WCA) serves as the central point in the interaction and therefore its availability probably turns out to be the vital bottleneck of reliability and efficiency to the whole system. Secondly, WCA holds entire information about watermark used hy Buyers so that an innocent Buyer can he found as guilty if WCA collude with the Seller. In this paper, we propose a watermarking protocol to address the problems using cryptographic technologies in phase of watermark generation. The resuh is a TTP-independent and collusion-secure buyer-seller watermarking protocol.展开更多
Copyright Information For.Authors As soon as an article is accepted for publication,authors will be requested to assign copyright of the article(or to grant exclusive publication and dissemination rights)to the publis...Copyright Information For.Authors As soon as an article is accepted for publication,authors will be requested to assign copyright of the article(or to grant exclusive publication and dissemination rights)to the publisher.This w ill ensure the widest possible protection and dissemination of information under copyright laws.展开更多
Submission of a manuscript implies: that the work described has not been published before (except in the form of an abstracl or as part of a published lecture, review, or thesis); that it is not under consideration...Submission of a manuscript implies: that the work described has not been published before (except in the form of an abstracl or as part of a published lecture, review, or thesis); that it is not under consideration for publication elsewhere; that its publication has been approved by all co-authors, if any, as well astacitly or explicitly-by the responsible authorities at the institution where the work was carried out. The author warrants that his/her contribution is original and that he/she has full power to make this grant. The author signs for and accepts responsibility for releasing this material on behalf of any and all co-authors. Transfer of copyright to Wuhan University Journals Press and Springer becomes effective if and when the article is accepted for publication. After submission of the Copyright Transfer Statement signed by the corresponding author, changes of au- thorship or in the order of the authors listed will not be accepted by Wuhan University Journals Press and Springer. The copy- right covers the exclusive right (for U.S. government employees: to the extent transferable) to reproduce and distribute the article, including reprints, translations, photographic reproductions, microform, electronic form (offline, online) or other reproductions of similar nature.展开更多
文摘In November 2020,the third amendment of the Copyright Law of the People’s Republic of China was completed and officially implemented in June 2021,which is undoubtedly of great significance to Chinese citizens with a growing awareness of copyright.This has also triggered our thinking about the impact of Copyright Law on digital copyright.Through the analysis of the cases after the amendment of the Copyright Law,we find that to a certain extent,the Copyright Law has played a great role in the protection of digital copyright,but it is still unable to achieve comprehensive protection,and there are still some imperfections.From this point of view,the simple legal protection of digital copyright cannot be taken into account.It still needs to be combined with technical protection means,cooperate with social conditions,and work together to create a harmonious and healthy online publishing environment and promote the protection of digital copyright.
基金supported by the National Natural Science Foundation of China under grants U1836208,by the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD)fundby the Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CICAEET)fund,China.
文摘Image processing networks have gained great success in many fields,and thus the issue of copyright protection for image processing networks hasbecome a focus of attention. Model watermarking techniques are widely usedin model copyright protection, but there are two challenges: (1) designinguniversal trigger sample watermarking for different network models is stilla challenge;(2) existing methods of copyright protection based on trigger swatermarking are difficult to resist forgery attacks. In this work, we propose adual model watermarking framework for copyright protection in image processingnetworks. The trigger sample watermark is embedded in the trainingprocess of the model, which can effectively verify the model copyright. And wedesign a common method for generating trigger sample watermarks based ongenerative adversarial networks, adaptively generating trigger sample watermarksaccording to different models. The spatial watermark is embedded intothe model output. When an attacker steals model copyright using a forgedtrigger sample watermark, which can be correctly extracted to distinguishbetween the piratical and the protected model. The experiments show that theproposed framework has good performance in different image segmentationnetworks of UNET, UNET++, and FCN (fully convolutional network), andeffectively resists forgery attacks.
基金supported by Jiangxi Provincial Natural Science Foundation under Grant Nos.20224BAB212015,20224ACB202007Jiangxi Province Science and Technology Project (03 Special 5G Project)under Grant No.20224ABC03A13+1 种基金the Foundation of Jiangxi Educational Committee underGrant No.GJJ210338the National Natural Science Foundation of China (NSFC),under Grant No.61962026.
文摘Audio copyright is a crucial issue in the music industry,as it protects the rights and interests of creators and distributors.This paper studies the current situation of digital music copyright certification and proposes a music copyright certification framework based on“blockchain+edge computing mode,”abbreviated as MBE,by integrating edge computing into the Hyperledger Fabric system.MBE framework compresses and splits the audio into small chunks,performs Fast Fourier Transform(FFT)to extract the peak points of each frequency and combines them to obtain unique audio fingerprint information.After being confirmed by various nodes on the Fabric alliance chain,audio fingerprint information and copyright owner information are recorded on the chain and broadcast to all participants.Blockchain technology’s characteristics of being tamper-proof and traceable not only reform the trust mechanism of copyright protection but also endow edge computing with the ability to resist tampering and single-point attack,greatly enhancing the robustness of the music copyright certification system.Meanwhile,edge computing mode improves Fabric blockchain’s processing speed and transaction throughput.Experimental results show that MBE’s performance is better than traditional systems regarding efficiency,storage demand and security.Compared to the traditional Fabric system without edge computing mode,MBE exhibits a 53%higher deposition efficiency and a 48%lower storage space requirement.
基金supported by Beijing Planning Office of Philosophy and Social Sciences(Grant No.06BaJG106)
文摘Based on a study of copyright agencies in Beijing area, this paper reviews the historical development of the work of copyright agencies and their agents. It analyzes their business related problems that these copyright agencies and agents are facing today. This paper also proposes a few remedial measures that may usher this copyright industry into a more sustainable development and also with a more promising outlook.
基金This project was supported by the Digital TV Special Foundation of National Development and Reform Commission ofChina (040313) Home Coming Scholars Science Activity Foundation of Ministry of Personnel (20041231) the Graduate In-novation Foundation of Xidian University (innovaion 0509)
文摘A novel copyright protection scheme for digital content is presented, which is a private watermarking scheme based on the watermark embedding in the DCT domain and watermark extraction Using independent component analysis (ICA). The system includes the key for watermark extraction and the host image. The algorithm splits the original image into blocks and classifies these blocks based on visual masking, that is, noise visibility function (NVF). Watermark components with different strength are inserted into chosen direct current components of DCT coefficients according to the classifier. The watermark extraction is based on the characteristic of the statistic independence of the host image, watermark and key. Principle component analysis (PCA) whitening process and FastICA techniques are introduced to ensure a blind watermark extraction without requiring the original image. Experirnental results show the proposed technique is robust under attacks such as image filtering and adding noise, cropping and resizing. In addition, the proposed private watermarking system can be improved to the application of the DTV content protection system.
基金Funded by the National Natural Science Foundation of China(No.50335020)the International Cooperation Project(No.2003CA007)
文摘In this paper,we propose a novel wavelet-domain digital image watermarking scheme on copyright protection based on network manufacture environment.It codes the watermarking with error correcting coding and encrypts the watermarking with chaotic encryption.It embeds the watermarking into the coefficients which have large absolute values in the middle-frequency parts got by Discrete Wavelet Transform (DWT) repeatedly.The extraction doesn’t need the original image.Experiment results show that the proposed scheme is easy to implement,and has good robustness to some attacks,such as JPEG compression,average filtering,median filtering,wiener filtering,pepper (?) salt noise,especially to cropping and scaling.In order to solve the prob- lem of the copyright protection of the network manufacture production,the problems of digital image production such as tamper preventing and watermarking attacks preventing and so on are discussed.It solves the problems of manufacture information such as secure exchange and transmissions and production copyright protection and so on.
文摘A method for creating digital image copyright protection is proposed in this paper. The proposed method in this paper is based on visual cryptography defined by Noor and Shamir. The proposed method is working on selection of random pixels from the original digital image instead of specific selection of pixels. The new method proposed does not require that the watermark pattern to be embedded in to the original digital image. Instead of that, verification information is generated which will be used to verify the ownership of the image. This leaves the marked image equal to the original image. The method is based on the relationship between randomly selected pixels and their 8-neighbors’ pixels. This relationship keeps the marked image coherent against diverse attacks even if the most significant bits of randomly selected pixels have been changed by attacker as we will see later in this paper. Experimental results show the proposed method can recover the watermark pattern from the marked image even if major changes are made to the original digital image.
基金Supported by the China Next Generation Internet (CNGI)2004 of National Development and Reform Commission (CNGI-04-12-2A) the State Administration of Radio Fil mand Television (2005-02-2)
文摘At present, in mobile business, the secure environment in the terminal of users has not been embedded, many cryptology-based methods can not be directly used to protect the copyright of digital media. Under this situation, a transparent system based on watermark for digital right management and digital copyright protection is proposed in this paper. The transparent system is called WDRM (watermark-based digital rights management) and transparent to users. Its core is WDRM Agent. In this paper, system inner model and procession are designed in detail at first, including the registration, the downloading, the super distribution, and the cooperation. Because the watermark embedding and the extraction algorithms are the kernel in this architecture, we also discuss how to choose and design the algorithms. Then we establish a package for all algorithms in WDRM Agent.
基金This work is supported by Foundation of Beijing Key Laboratory of Internet Culture and Digital Dissemination Research No.ICDDXN004Foundation of Beijing Advanced Innovation Center for Materials Genome Engineering.
文摘In order to effectively solve the problem of copyright protection of materials genome engineering data,this paper proposes a method for copyright protection of materials genome engineering data based on zero-watermarking technology.First,the important attribute values are selected from the materials genome engineering database;then,use the method of remainder to group the selected attribute values and extract eigenvalues;then,the eigenvalues sequence is obtained by the majority election method;finally,XOR the sequence with the actual copyright information to obtain the watermarking information and store it in the third-party authentication center.When a copyright dispute requires copyright authentication for the database to be detected.First,the zero-watermarking construction algorithm is used to obtain an eigenvalues sequence;then,this sequence is XORed with the watermarking information stored in the third-party authentication center to obtain copyright information to-be-detected.Finally,the ownership is determined by calculating the similarity between copyright information to-be-detected and copyright information that has practical significance.The experimental result shows that the zero-watermarking method proposed in this paper can effectively resist various common attacks,and can well achieve the copyright protection of material genome engineering database.
文摘Fair use doctrine is easily controversial and difficult to judge,and owning to the coming of the new age,fair use doctrine becomes more troublesome.This paper will hold the balance between the right of reproduction of library and the publisher interests by approaching a case under these four elements:the requirement for the Purpose and character of the use;The nature of the copyrighted work;The amount and substantiality of the works used in relation to the copyrighted work as a whole;The effect of the use upon the potential market for and value of the copyrighted work.
文摘Submission of a manuscript implies:that the work described has not been published before(except in the form of an abstract or as part of a published lecture,review,or thesis);that it is not under consideration for publication elsewhere;that its publication has been approved by all co-authors,if any,as well as-tacitly or explicitly-by the responsible authorities at the institution where the work was
文摘Submission of a manuscript implies:that the work described has not been published before(except in the form of an abstract or as part of a published lecture,review,or thesis);that it is not under consideration for publication elsewhere;that its publication has been approved by all co-authors,if any,as well as--tacitly or explicitly--by the responsible authorities at the institution where the work was carried out.The author warrants that his/her contribution is
文摘Submission of a manuscript implies:that the work described has not been published before(except in the form of an abstract or as part of a published lecture,review,or thesis);that it is not under consideration for publication elsewhere;that its publication has been approved by all co-authors,if any,as well as--tacitly or explicitly--by the responsible authorities at the institution where the work was carried out.The author warrants that his/her contribution is
文摘In this paper, we propose a semi-fragile wattr-marking technology forcopyright protection and image authentication We transform the image into wavelet domain and groupthe four adjacent wavelet coefficients Utilizing the characteristics of the humanvisual system, weembed a digital signal into the average of the four adjacent wavelet coefficients since the mean hasbetter stability than single wavelet coefficient. This method neednt original image when extractsthe watermark. Experimental results show the effectiveness of this method which is robust to commonimage process and fragile to malicious attack.
基金Supported by the National Natural Science Foun-dation of China (60403027)
文摘For the purpose of deterring unauthorized duplication and distribution of multimedia contents in e-commerce, some Buyer-seller watermarking protocols which combine of traditional watermarking and fingerprinting techniques have been proposed, However, previous protocols have potential risk from trust third party (TTP) because all entities (including multi-buyers and multi-sellers) mentioned in protocol construct a star tupology like connection, in which the watermark certification authority (WCA) serves as the central point in the interaction and therefore its availability probably turns out to be the vital bottleneck of reliability and efficiency to the whole system. Secondly, WCA holds entire information about watermark used hy Buyers so that an innocent Buyer can he found as guilty if WCA collude with the Seller. In this paper, we propose a watermarking protocol to address the problems using cryptographic technologies in phase of watermark generation. The resuh is a TTP-independent and collusion-secure buyer-seller watermarking protocol.
文摘Copyright Information For.Authors As soon as an article is accepted for publication,authors will be requested to assign copyright of the article(or to grant exclusive publication and dissemination rights)to the publisher.This w ill ensure the widest possible protection and dissemination of information under copyright laws.
文摘Submission of a manuscript implies: that the work described has not been published before (except in the form of an abstracl or as part of a published lecture, review, or thesis); that it is not under consideration for publication elsewhere; that its publication has been approved by all co-authors, if any, as well astacitly or explicitly-by the responsible authorities at the institution where the work was carried out. The author warrants that his/her contribution is original and that he/she has full power to make this grant. The author signs for and accepts responsibility for releasing this material on behalf of any and all co-authors. Transfer of copyright to Wuhan University Journals Press and Springer becomes effective if and when the article is accepted for publication. After submission of the Copyright Transfer Statement signed by the corresponding author, changes of au- thorship or in the order of the authors listed will not be accepted by Wuhan University Journals Press and Springer. The copy- right covers the exclusive right (for U.S. government employees: to the extent transferable) to reproduce and distribute the article, including reprints, translations, photographic reproductions, microform, electronic form (offline, online) or other reproductions of similar nature.