期刊文献+
共找到384篇文章
< 1 2 20 >
每页显示 20 50 100
An Investigation into the Issues Concerning the Copyright of Content Generated by Text-to-Video AI
1
作者 Zhou Chunguang Yi Jia 《Contemporary Social Sciences》 2024年第5期95-117,共23页
Text-to-video artificial intelligence(AI)is a new product that has arisen from the continuous development of digital technology over recent years.The emergence of various text-to-video AI models,including Sora,is driv... Text-to-video artificial intelligence(AI)is a new product that has arisen from the continuous development of digital technology over recent years.The emergence of various text-to-video AI models,including Sora,is driving the proliferation of content generated through concrete imagery.However,the content generated by text-to-video AI raises significant issues such as unclear work identification,ambiguous copyright ownership,and widespread copyright infringement.These issues can hinder the development of text-to-video AI in the creative fields and impede the prosperity of China’s social and cultural arts.Therefore,this paper proposes three recommendations within a legal framework:(a)categorizing the content generated by text-to-video AI as audiovisual works;(b)clarifying the copyright ownership model for text-to-video AI works;(c)reasonably delineating the responsibilities of the parties who are involved in the text-to-video AI works.The aim is to mitigate the copyright risks associated with content generated by text-to-video AI and to promote the healthy development of text-to-video AI in the creative fields. 展开更多
关键词 text-to-video AI work identification copyright ownership copyright infringement
下载PDF
Overview of the Impact of the Introduction of the Copyright Act 2020 on Digital Publishing
2
作者 MA Jingyun 《Cultural and Religious Studies》 2024年第1期64-69,共6页
In November 2020,the third amendment of the Copyright Law of the People’s Republic of China was completed and officially implemented in June 2021,which is undoubtedly of great significance to Chinese citizens with a ... In November 2020,the third amendment of the Copyright Law of the People’s Republic of China was completed and officially implemented in June 2021,which is undoubtedly of great significance to Chinese citizens with a growing awareness of copyright.This has also triggered our thinking about the impact of Copyright Law on digital copyright.Through the analysis of the cases after the amendment of the Copyright Law,we find that to a certain extent,the Copyright Law has played a great role in the protection of digital copyright,but it is still unable to achieve comprehensive protection,and there are still some imperfections.From this point of view,the simple legal protection of digital copyright cannot be taken into account.It still needs to be combined with technical protection means,cooperate with social conditions,and work together to create a harmonious and healthy online publishing environment and promote the protection of digital copyright. 展开更多
关键词 digital copyright Copyright Law infringement phenomenon
下载PDF
Cyberattack Ramifications, The Hidden Cost of a Security Breach
3
作者 Meysam Tahmasebi 《Journal of Information Security》 2024年第2期87-105,共19页
In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term ... In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term consequences that businesses encounter. This study integrates findings from various research, including quantitative reports, drawing upon real-world incidents faced by both small and large enterprises. This investigation emphasizes the profound intangible costs, such as trade name devaluation and potential damage to brand reputation, which can persist long after the breach. By collating insights from industry experts and a myriad of research, the study provides a comprehensive perspective on the profound, multi-dimensional impacts of cybersecurity incidents. The overarching aim is to underscore the often-underestimated scope and depth of these breaches, emphasizing the entire timeline post-incident and the urgent need for fortified preventative and reactive measures in the digital domain. 展开更多
关键词 Artificial Intelligence (AI) Business Continuity Case Studies Copyright Cost-Benefit Analysis Credit Rating Cyberwarfare Cybersecurity Breaches Data Breaches Denial Of Service (DOS) Devaluation Of Trade Name Disaster Recovery Distributed Denial of Service (DDOS) Identity Theft Increased Cost to Raise Debt Insurance Premium Intellectual Property Operational Disruption Patent Post-Breach Customer Protection Recovery Point Objective (RPO) Recovery Time Objective (RTO) Regulatory Compliance Risk Assessment Service Level Agreement Stuxnet Trade Secret
下载PDF
WEIGHTED ALGORITHM FOR FINGERPRINTING RELATIONAL DATABASES 被引量:1
4
作者 崔新春 秦小麟 +1 位作者 管致锦 束瑜 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2008年第2期148-154,共7页
The necessity and the feasibility of introducing attribute weight into digital fingerprinting system are given. The weighted algorithm for fingerprinting relational databases of traitor tracing is proposed. Higher wei... The necessity and the feasibility of introducing attribute weight into digital fingerprinting system are given. The weighted algorithm for fingerprinting relational databases of traitor tracing is proposed. Higher weights are assigned to more significant attributes, so important attributes are more frequently fingerprinted than other ones. Finally, the robustness of the proposed algorithm, such as performance against collusion attacks, is analyzed. Experimental results prove the superiority of the algorithm. 展开更多
关键词 digital fingerprinting relational database systems copyright protection attribute weight traitor tracing
下载PDF
国内外知识产权管理软件研发现状分析 被引量:2
5
作者 马海群 孙扬民 《现代图书情报技术》 CSSCI 北大核心 2004年第2期56-59,共4页
在简述知识产权管理软件研发背景及其社会价值的基础上,重点分析了国内外现有知识产权管理软件的开发状况,并举例介绍了几个国外应用比较广泛的知识产权管理软件,同时还对知识产权管理软件今后的发展方向进行一定程度的描述与预测。
关键词 知识产权管理 计算机软件 软件开发 Patentpro OFFICIAL COPYRIGHT SOFTWARE
下载PDF
数字版权保护中DCI编码方案及数字证书研究 被引量:4
6
作者 杨树林 孙丽 胡洁萍 《北京印刷学院学报》 2012年第6期38-41,共4页
数字版权标志符为数字内容在互联网上提供唯一的版权身份标志,为确保在网络环境中能够精准定位和检索数字作品、确认版权主体提供了技术基础。建立数字版权标志符体系是我国数字版权管理发展的迫切要求。通过研究DCI(数字版权标志符)的... 数字版权标志符为数字内容在互联网上提供唯一的版权身份标志,为确保在网络环境中能够精准定位和检索数字作品、确认版权主体提供了技术基础。建立数字版权标志符体系是我国数字版权管理发展的迫切要求。通过研究DCI(数字版权标志符)的概念、设计原则,分析了国外相关研究的现状,提出了适合我国版权保护的DCI编码方案,并给出了应用于移动互联网的加密机制、数字证书及DCI嵌入方案。研究结果表明,采用上述方法,兼容性好,易于与国际上的DOI(digital object identifier)接轨,加密机制及数字证书的设计适合在移动互联网上应用。 展开更多
关键词 数字版权保护 DCI(digital COPYRIGHT identifier) 椭圆曲线密码 数字证书
下载PDF
Copyleft思潮:对网络著作权扩张的反思 被引量:4
7
作者 温晓红 《现代传播(中国传媒大学学报)》 CSSCI 北大核心 2009年第2期112-115,共4页
随着网络技术的发展,Copyleft应运而生。作为一种新的著作权理念,它力促自由软件的产生与传播,对传统的著作权制度体系(Copyright)构成了挑战。但是,Copyleft并不企图全面否定Copyright,而是以承认Copyright作为存在的前提条件。本文从C... 随着网络技术的发展,Copyleft应运而生。作为一种新的著作权理念,它力促自由软件的产生与传播,对传统的著作权制度体系(Copyright)构成了挑战。但是,Copyleft并不企图全面否定Copyright,而是以承认Copyright作为存在的前提条件。本文从Copyleft思潮的兴起和发展,探讨Copy-left思潮的实质和影响。 展开更多
关键词 COPYRIGHT COPYLEFT 自由软件 著作权
下载PDF
Copyright与Copyleft的经济学分析 被引量:2
8
作者 聂盛 《科技与经济》 CSSCI 2009年第2期63-65,共3页
Copyleft是一种全新的知识产权理念,它将知识产品的权利对外开放,对传统的版权(Copyright)制度提出了挑战,引起人们的广泛关注。通过从经济学角度对Copyright及Copyleft制度进行了比较分析,认为Copyleft满足了网络社会知识集体生产的需... Copyleft是一种全新的知识产权理念,它将知识产品的权利对外开放,对传统的版权(Copyright)制度提出了挑战,引起人们的广泛关注。通过从经济学角度对Copyright及Copyleft制度进行了比较分析,认为Copyleft满足了网络社会知识集体生产的需求,是对Copyright的超越与补充;两者都是人们在利益最大化原则下对知识产品产权形式的理性选择,并将长期共存。 展开更多
关键词 COPYRIGHT COPYLEFT 知识产权
下载PDF
Copyleft:在版权保护下的信息共享规则 被引量:3
9
作者 王闻贤 《黑龙江省政法管理干部学院学报》 2003年第2期14-17,共4页
知识产权代替整个知识保护已经不符合世界的潮流。有专家建议知识产权保护制度的基点应是以符合社会发展的现实要求为前提 ,在权利人利益和社会公众利益之间维持恰如其分的平衡。于是COPYLEFT应运这样的需要而生 ,它并不否定COPYRIGHT ... 知识产权代替整个知识保护已经不符合世界的潮流。有专家建议知识产权保护制度的基点应是以符合社会发展的现实要求为前提 ,在权利人利益和社会公众利益之间维持恰如其分的平衡。于是COPYLEFT应运这样的需要而生 ,它并不否定COPYRIGHT ,是版权保护的延伸 ,核心思想是“信息共享 ,源代码共享”。 展开更多
关键词 COPYLEFT 自由软件 COPYRIGHT 自由
下载PDF
Copyleft:在版权保护下的信息共享规则 被引量:3
10
作者 王闻贤 《上海高校图书情报工作研究》 2003年第1期18-22,共5页
知识产权代替整个知识保护已经不符合世界潮流。有专家建议知识产权保护制度的基点应是以符合社会发展的现实要求为前提,在权利人利益和社会公众利益之间维持恰如其分的平衡。于是COPYLEFT应运而生,它并不否定COPYRIGHT,而是版权保护的... 知识产权代替整个知识保护已经不符合世界潮流。有专家建议知识产权保护制度的基点应是以符合社会发展的现实要求为前提,在权利人利益和社会公众利益之间维持恰如其分的平衡。于是COPYLEFT应运而生,它并不否定COPYRIGHT,而是版权保护的延伸,核心思想是"信息共享,源代码共享"。 展开更多
关键词 自由软件 COPYLEFT COPYRIGHT 信息共享 源代码共享 版权保护
下载PDF
文化经济学为什么对著作权置之不理? 被引量:2
11
作者 Ruth Towse 郑小倩 《文化艺术研究》 2010年第1期243-252,共10页
本文主张应该将著作权政策视作文化政策不可或缺的一部分;文化经济学家对补贴在文化政策中的意义给予了很多的关注和讨论,但是对于著作权问题却很少提及。尽管如此,由于在文化政策以及艺术工作者的劳动力市场方面具有独到的阐释力,文化... 本文主张应该将著作权政策视作文化政策不可或缺的一部分;文化经济学家对补贴在文化政策中的意义给予了很多的关注和讨论,但是对于著作权问题却很少提及。尽管如此,由于在文化政策以及艺术工作者的劳动力市场方面具有独到的阐释力,文化经济学可以被用于分析著作权问题并证明著作权是创意产业中激发创造力的一个有效因素。本文将文化补贴和著作权均视为政策工具,将两者进行对比并初步探讨了当前的文化政策中与著作权密切相关的两个问题,即著作权中介协会的规范管理以及目前流行的"版权补偿金"之说,认为这类问题是文化经济学者有能力也有义务解决的问题。 展开更多
关键词 文化经济学 著作权问题 COPYRIGHT 文化政策 艺术工作者 劳动力市场 激发创造力 版权补偿金 政策工具 有效因素 意义给予 经济学家 规范管理 创意产业 补贴 阐释力 中介 证明 义务 学者
下载PDF
GEOMETRICALLY INVARIANT WATERMARKING BASED ON RADON TRANSFORMATION 被引量:19
12
作者 CaiLian DuSidan GaoDuntang 《Journal of Electronics(China)》 2005年第3期301-306,共6页
The weakness of classical watermarking methods is the vulnerability to geometrical distortions that widely occur during normal use of the media. In this letter, a new image- watermarking method is presented to resist ... The weakness of classical watermarking methods is the vulnerability to geometrical distortions that widely occur during normal use of the media. In this letter, a new image- watermarking method is presented to resist Rotation, Scale and Translation (RST) attacks. The watermark is embedded into a domain obtained by taking Radon transform of a circular area selected from the original image, and then extracting Two-Dimensional (2-D) Fourier magnitude of the Radon transformed image. Furthermore, to prevent the watermarked image from degrading due to inverse Radon transform, watermark signal is inversely Radon transformed individually. Experimental results demonstrate that the proposed scheme is able to withstand a variety of attacks including common geometric attacks. 展开更多
关键词 Copyright protection AUTHENTICATION Radon transformation Geometrical at- tacks Invariant centroid
下载PDF
A New Mechanism Based on Similar Clouds Watermark for Database’s Information Security 被引量:4
13
作者 HUANGMin CAOJia-heng +1 位作者 PENGZhi-yong ZENGCheng 《Wuhan University Journal of Natural Sciences》 CAS 2004年第4期415-419,共5页
This paper studies the digit watermark technology of numeric attributes in relational database for database's information security. It proposes a new mechanism based on similar clouds watermark and gives the conce... This paper studies the digit watermark technology of numeric attributes in relational database for database's information security. It proposes a new mechanism based on similar clouds watermark and gives the concept of similar clouds. The algorithm SCWA that can insert the meaning watermark and detect it from the watermarked data is described. The mechanism can effectively and broadly scatter the watermark in the database; therefore the watermark is very robust. Key words copyright protection - digit watermark - similar clouds - clouds model CLC number TP 311. 52 Foundation item: Supported by the National Natural Science Foundation of China (60273072) and 863 Hi-technique Research (2002AA4Z3450)Biography: HUANG Min(1979-), female, Ph. D candidate, research direction: database's information security 展开更多
关键词 copyright protection digit watermark similar clouds clouds model
下载PDF
NEW APPROACH TO COPYRIGHT PROTECTION OF IMAGE AGAINST GEOMETRICAL ATTACKS
14
作者 郝红杰 吴一全 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2007年第4期335-342,共8页
To protect the copyright of the image as well as the image quality, a kind of image zero-watermark method based on the Krawtchouk moment invariants and timestamp is proposed. A method is used to protect the image, in ... To protect the copyright of the image as well as the image quality, a kind of image zero-watermark method based on the Krawtchouk moment invariants and timestamp is proposed. A method is used to protect the image, in which features are drawn out from the image as the watermarking. The main steps of the method are presented. Firstly, some low-order moment invariants of the image are extracted. Secondly, the moment invariants and the key are registered to a fair third party to gain the timestamp. Finally, the timestamp can be used to prove who the real owner is. The processing method is simple, only with a few low-order moment invariants to be computed. Experimental results are obtained and compared with those of the method based on geometric moment invariants. Results show that the scheme can well withstand such geometrical attacks as rotating, scaling, cropping, combined attack, translating, removing lines, filtering, and JPEG lossy compression. 展开更多
关键词 image copyright protection digital watermarking geometrical attack Krawtchouk moment invariant
下载PDF
Multipurpose audio watermarking algorithm 被引量:3
15
作者 Ning CHEN Jie ZHU 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第4期517-523,共7页
To make audio watermarking accomplish both copyright protection and content authentication with localization, a novel multipurpose audio watermarking scheme is proposed in this paper. The zero-watermarking idea is int... To make audio watermarking accomplish both copyright protection and content authentication with localization, a novel multipurpose audio watermarking scheme is proposed in this paper. The zero-watermarking idea is introduced into the design of robust watermarking algorithm to ensure the transparency and to avoid the interference between the robust watermark and the semi-fragile watermark. The property of natural audio that the VQ indices of DWT-DCT coefficients among neighboring frames tend to be very similar is utilized to extract essential feature from the host audio, which is then used for watermark ex-traction. And, the chaotic mapping based semi-fragile watermark is embedded in the detail wavelet coefficients based on the instantaneous mixing model of the independent component analysis (ICA) system. Both the robust and semi-fragile watermarks can be extracted blindly and the semi-fragile watermarking algorithm can localize the tampering accurately. Simulation results demonstrate the effectiveness of our algorithm in terms of transparency, security, robustness and tampering localization ability. 展开更多
关键词 Multipurpose audio watermarking Copyright protection Content authentication
下载PDF
Novel copyright protection scheme for digital content 被引量:3
16
作者 Fan Kefeng Wang Meihua +1 位作者 Mo Wei Zhao Xinhua 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第2期423-429,共7页
A novel copyright protection scheme for digital content is presented, which is a private watermarking scheme based on the watermark embedding in the DCT domain and watermark extraction Using independent component anal... A novel copyright protection scheme for digital content is presented, which is a private watermarking scheme based on the watermark embedding in the DCT domain and watermark extraction Using independent component analysis (ICA). The system includes the key for watermark extraction and the host image. The algorithm splits the original image into blocks and classifies these blocks based on visual masking, that is, noise visibility function (NVF). Watermark components with different strength are inserted into chosen direct current components of DCT coefficients according to the classifier. The watermark extraction is based on the characteristic of the statistic independence of the host image, watermark and key. Principle component analysis (PCA) whitening process and FastICA techniques are introduced to ensure a blind watermark extraction without requiring the original image. Experirnental results show the proposed technique is robust under attacks such as image filtering and adding noise, cropping and resizing. In addition, the proposed private watermarking system can be improved to the application of the DTV content protection system. 展开更多
关键词 digital content copyright protection digital watermarking noise visibility function independent component analysis.
下载PDF
A Novel Digital Image Watermarking Scheme on Copyright Protection Based on Network Manufacture Environment 被引量:2
17
作者 LIU Quan WANG Jin (School of Information Engineering,Wuhan University of Technology,Wuhan 430070,China 《武汉理工大学学报》 CAS CSCD 北大核心 2006年第S2期552-556,共5页
In this paper,we propose a novel wavelet-domain digital image watermarking scheme on copyright protection based on network manufacture environment.It codes the watermarking with error correcting coding and encrypts th... In this paper,we propose a novel wavelet-domain digital image watermarking scheme on copyright protection based on network manufacture environment.It codes the watermarking with error correcting coding and encrypts the watermarking with chaotic encryption.It embeds the watermarking into the coefficients which have large absolute values in the middle-frequency parts got by Discrete Wavelet Transform (DWT) repeatedly.The extraction doesn’t need the original image.Experiment results show that the proposed scheme is easy to implement,and has good robustness to some attacks,such as JPEG compression,average filtering,median filtering,wiener filtering,pepper (?) salt noise,especially to cropping and scaling.In order to solve the prob- lem of the copyright protection of the network manufacture production,the problems of digital image production such as tamper preventing and watermarking attacks preventing and so on are discussed.It solves the problems of manufacture information such as secure exchange and transmissions and production copyright protection and so on. 展开更多
关键词 network manufacture COPYRIGHT protection digital WATERMARKING wavelet transform error CORRECTING coding chaotic ENCRYPTION
下载PDF
Digital Watermark-based Security Technology for Geo-spatial Graphics Data 被引量:2
18
作者 JIA Peihong CHEN Yunzhen +1 位作者 MA Jinsong ZHU Dakui 《Chinese Geographical Science》 SCIE CSCD 2006年第3期276-281,共6页
The paper presents a set of techniques of digital watermarking by which copyright and user rights messages are hidden into geo-spatial graphics data,as well as techniques of compressing and encrypting the watermarked ... The paper presents a set of techniques of digital watermarking by which copyright and user rights messages are hidden into geo-spatial graphics data,as well as techniques of compressing and encrypting the watermarked geo-spatial graphics data.The technology aims at tracing and resisting the illegal distribution and duplication of the geo-spatial graphics data product,so as to effectively protect the data producer's rights as well as to facilitate the secure sharing of geo-spatial graphics data.So far in the CIS field throughout the world,few researches have been made on digital watermarking.The research is a novel exploration both in the field of security management of geo-spatial graphics data and in the applications of digital watermarking technique.An application software employing the proposed technology has been developed.A number of experimental tests on the 1:500,000 digital bathymetric chart of the South China Sea and 1:10,000 digital topographic map of Jiangsu Province have been conducted to verify the feasibility of the proposed technology. 展开更多
关键词 geo-spatial graphics data copyright protection digital watermarking stego carrier data encrypting
下载PDF
Lossless Digital Watermarking Scheme for Image Maps 被引量:2
19
作者 SUN Jianguo ZHENG Chonghui GAO Di 《China Communications》 SCIE CSCD 2014年第8期125-130,共6页
A lossless digital watermarking scheme,which was zero- perturbation on the content and graphics for the digital image maps,is proposed.During the simulation,the scheme has been utilized to model the copyright protecti... A lossless digital watermarking scheme,which was zero- perturbation on the content and graphics for the digital image maps,is proposed.During the simulation,the scheme has been utilized to model the copyright protection program as a commerce application.Compared to the traditional digital watermarking schemes,our scheme operates in redundancy areas of maps and is scalable to topology changes.Experimental results show that,with respect to the geometric attacks and image transformed,the performance of our scheme is better than the classical algorithms based space or frequency domain with much lower complexity.. 展开更多
关键词 information hiding digitalwatermarking copyright protection digitalmaps
下载PDF
Research of Anti-Plagiarism Monitoring System Model 被引量:2
20
作者 SHEN Yang YUAN Zhongshang +1 位作者 LIU Lu DONG Hui 《Wuhan University Journal of Natural Sciences》 CAS 2007年第5期937-940,共4页
We proposed a flexible anti-plagiarism system model based on user-defined plagiarism standards. We also proposed PlagLazy and format-legacy phenomena that plagiarist will remain format-legacy such as soft-enter symbol... We proposed a flexible anti-plagiarism system model based on user-defined plagiarism standards. We also proposed PlagLazy and format-legacy phenomena that plagiarist will remain format-legacy such as soft-enter symbol in his DOC document after plagiarizing material from web and corresponding optimized algorithm which improves the speed of comparison. Our model is suitable for the anti-plagiarism and monitoring of large document collections, and it can also be used in digital library, E-learning and other fields. 展开更多
关键词 anti-plagiarism PLAGIARISM information fingerprints copyright protection format-legacy
下载PDF
上一页 1 2 20 下一页 到第
使用帮助 返回顶部