期刊文献+
共找到46篇文章
< 1 2 3 >
每页显示 20 50 100
Research on IPFS Image Copyright Protection Method Based on Blockchain
1
作者 Xin Cong Lanjin Feng Lingling Zi 《Computers, Materials & Continua》 SCIE EI 2024年第10期663-684,共22页
In the digital information age,distributed file storage technologies like the InterPlanetary File System(IPFS)have gained considerable traction as a means of storing and disseminating media content.Despite the advanta... In the digital information age,distributed file storage technologies like the InterPlanetary File System(IPFS)have gained considerable traction as a means of storing and disseminating media content.Despite the advantages of decentralized storage,the proliferation of decentralized technologies has highlighted the need to address the issue of file ownership.The aim of this paper is to address the critical issues of source verification and digital copyright protection for IPFS image files.To this end,an innovative approach is proposed that integrates blockchain,digital signature,and blind watermarking.Blockchain technology functions as a decentralized and tamper-resistant ledger,recording and verifying the source information of files,thereby establishing credible evidence of file origin.A digital signature serves to authenticate the identity and integrity of the individual responsible for uploading the file,ensuring data security.Furthermore,blind watermarking is employed to embed invisible information within images,thereby safeguarding digital copyrights and enabling file traceability.To further optimize the efficiency of file retrieval within IPFS,a dual-layer Distributed Hash Table(DHT)indexing structure is proposed.This structure divides file index information into a global index layer and a local index layer,significantly reducing retrieval time and network overhead.The feasibility of the proposed approach is demonstrated through practical examples,providing an effective solution to the copyright protection issues associated with IPFS image files. 展开更多
关键词 Blockchain copyright protection IPFS distributed hash table digital sig
下载PDF
NEW APPROACH TO COPYRIGHT PROTECTION OF IMAGE AGAINST GEOMETRICAL ATTACKS
2
作者 郝红杰 吴一全 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2007年第4期335-342,共8页
To protect the copyright of the image as well as the image quality, a kind of image zero-watermark method based on the Krawtchouk moment invariants and timestamp is proposed. A method is used to protect the image, in ... To protect the copyright of the image as well as the image quality, a kind of image zero-watermark method based on the Krawtchouk moment invariants and timestamp is proposed. A method is used to protect the image, in which features are drawn out from the image as the watermarking. The main steps of the method are presented. Firstly, some low-order moment invariants of the image are extracted. Secondly, the moment invariants and the key are registered to a fair third party to gain the timestamp. Finally, the timestamp can be used to prove who the real owner is. The processing method is simple, only with a few low-order moment invariants to be computed. Experimental results are obtained and compared with those of the method based on geometric moment invariants. Results show that the scheme can well withstand such geometrical attacks as rotating, scaling, cropping, combined attack, translating, removing lines, filtering, and JPEG lossy compression. 展开更多
关键词 image copyright protection digital watermarking geometrical attack Krawtchouk moment invariant
下载PDF
Novel copyright protection scheme for digital content 被引量:3
3
作者 Fan Kefeng Wang Meihua +1 位作者 Mo Wei Zhao Xinhua 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第2期423-429,共7页
A novel copyright protection scheme for digital content is presented, which is a private watermarking scheme based on the watermark embedding in the DCT domain and watermark extraction Using independent component anal... A novel copyright protection scheme for digital content is presented, which is a private watermarking scheme based on the watermark embedding in the DCT domain and watermark extraction Using independent component analysis (ICA). The system includes the key for watermark extraction and the host image. The algorithm splits the original image into blocks and classifies these blocks based on visual masking, that is, noise visibility function (NVF). Watermark components with different strength are inserted into chosen direct current components of DCT coefficients according to the classifier. The watermark extraction is based on the characteristic of the statistic independence of the host image, watermark and key. Principle component analysis (PCA) whitening process and FastICA techniques are introduced to ensure a blind watermark extraction without requiring the original image. Experirnental results show the proposed technique is robust under attacks such as image filtering and adding noise, cropping and resizing. In addition, the proposed private watermarking system can be improved to the application of the DTV content protection system. 展开更多
关键词 digital content copyright protection digital watermarking noise visibility function independent component analysis.
下载PDF
Transparent System for Digital Media Copyright Protection in Mobile Business 被引量:1
4
作者 YANG Cheng ZHANG Lihe +1 位作者 WANG Yongbin LIU Jianbo 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1923-1926,共4页
At present, in mobile business, the secure environment in the terminal of users has not been embedded, many cryptology-based methods can not be directly used to protect the copyright of digital media. Under this situa... At present, in mobile business, the secure environment in the terminal of users has not been embedded, many cryptology-based methods can not be directly used to protect the copyright of digital media. Under this situation, a transparent system based on watermark for digital right management and digital copyright protection is proposed in this paper. The transparent system is called WDRM (watermark-based digital rights management) and transparent to users. Its core is WDRM Agent. In this paper, system inner model and procession are designed in detail at first, including the registration, the downloading, the super distribution, and the cooperation. Because the watermark embedding and the extraction algorithms are the kernel in this architecture, we also discuss how to choose and design the algorithms. Then we establish a package for all algorithms in WDRM Agent. 展开更多
关键词 mobile business information security digital copyright protection digital watermark
下载PDF
A Dual Model Watermarking Framework for Copyright Protection in Image Processing Networks 被引量:1
5
作者 Yuhang Meng Xianyi Chen +2 位作者 Xingming Sun Yu Liu Guo Wei 《Computers, Materials & Continua》 SCIE EI 2023年第4期831-844,共14页
Image processing networks have gained great success in many fields,and thus the issue of copyright protection for image processing networks hasbecome a focus of attention. Model watermarking techniques are widely used... Image processing networks have gained great success in many fields,and thus the issue of copyright protection for image processing networks hasbecome a focus of attention. Model watermarking techniques are widely usedin model copyright protection, but there are two challenges: (1) designinguniversal trigger sample watermarking for different network models is stilla challenge;(2) existing methods of copyright protection based on trigger swatermarking are difficult to resist forgery attacks. In this work, we propose adual model watermarking framework for copyright protection in image processingnetworks. The trigger sample watermark is embedded in the trainingprocess of the model, which can effectively verify the model copyright. And wedesign a common method for generating trigger sample watermarks based ongenerative adversarial networks, adaptively generating trigger sample watermarksaccording to different models. The spatial watermark is embedded intothe model output. When an attacker steals model copyright using a forgedtrigger sample watermark, which can be correctly extracted to distinguishbetween the piratical and the protected model. The experiments show that theproposed framework has good performance in different image segmentationnetworks of UNET, UNET++, and FCN (fully convolutional network), andeffectively resists forgery attacks. 展开更多
关键词 Image processing networks copyright protection model watermark
下载PDF
Research on Copyright Protection Method of Material Genome Engineering Data Based on Zero-Watermarking 被引量:2
6
作者 Lulu Cui Yabin Xu 《Journal on Big Data》 2020年第2期53-62,共10页
In order to effectively solve the problem of copyright protection of materials genome engineering data,this paper proposes a method for copyright protection of materials genome engineering data based on zero-watermark... In order to effectively solve the problem of copyright protection of materials genome engineering data,this paper proposes a method for copyright protection of materials genome engineering data based on zero-watermarking technology.First,the important attribute values are selected from the materials genome engineering database;then,use the method of remainder to group the selected attribute values and extract eigenvalues;then,the eigenvalues sequence is obtained by the majority election method;finally,XOR the sequence with the actual copyright information to obtain the watermarking information and store it in the third-party authentication center.When a copyright dispute requires copyright authentication for the database to be detected.First,the zero-watermarking construction algorithm is used to obtain an eigenvalues sequence;then,this sequence is XORed with the watermarking information stored in the third-party authentication center to obtain copyright information to-be-detected.Finally,the ownership is determined by calculating the similarity between copyright information to-be-detected and copyright information that has practical significance.The experimental result shows that the zero-watermarking method proposed in this paper can effectively resist various common attacks,and can well achieve the copyright protection of material genome engineering database. 展开更多
关键词 Material genome engineering copyright protection ZERO-WATERMARKING majority voting
下载PDF
A Image Copyright Protection Method Using Zero-Watermark by Blockchain and IPFS 被引量:1
7
作者 Tao Chen Zhao Qiu +5 位作者 Gengquan Xie Lin Yuan Shaohua Duan Hao Guo Dahao Fu Hancheng Huang 《Journal of Information Hiding and Privacy Protection》 2021年第3期131-142,共12页
Behind the popularity of multimedia technology,the dispute over image copyright is getting worse.In the digital watermark prevention technology for copyright infringement,watermark technology is considered to be an im... Behind the popularity of multimedia technology,the dispute over image copyright is getting worse.In the digital watermark prevention technology for copyright infringement,watermark technology is considered to be an important technology to overcome data protection problems and verify the relationship between data ownership.Among the many digital watermarking technologies,zero watermarking technology has been favored in recent years.However,the existing zero watermark technology in the implementation process often needs a trusted third party to store watermarks,which may make the data too central,data storage security is low and copyright registration costs are too high,which creates a rare problem.The decentivization and information cannot be tampered of blockchain technology’s nature find new methods for image copyright protection.This paper studies the role of zero watermark algorithm in the image copyright and its complete storage and certification scheme,proposes a zero watermark image protection framework based on blockchain,and builds a system according to the framework.Combined with blockchain and zero watermarking technology,the framework uses inter IPFS(Inter Planetary File System)to solve the problem of blockchain efficient storage and sharing of large files.In addition,the application of user copyright information,image image query and image trading in the system are realized based on smart contracts,which solves the problem of lack of trusted third parties.Experiments show that the scheme is feasible and robust to various attacks. 展开更多
关键词 Zero watermarking blockchain IPFS copyright protection
下载PDF
Semi-Fragile Watermarking for Copyright Protection and Image Authentication
8
作者 HUANGJi-feng 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期284-288,共5页
In this paper, we propose a semi-fragile wattr-marking technology forcopyright protection and image authentication We transform the image into wavelet domain and groupthe four adjacent wavelet coefficients Utilizing t... In this paper, we propose a semi-fragile wattr-marking technology forcopyright protection and image authentication We transform the image into wavelet domain and groupthe four adjacent wavelet coefficients Utilizing the characteristics of the humanvisual system, weembed a digital signal into the average of the four adjacent wavelet coefficients since the mean hasbetter stability than single wavelet coefficient. This method neednt original image when extractsthe watermark. Experimental results show the effectiveness of this method which is robust to commonimage process and fragile to malicious attack. 展开更多
关键词 semi-fiagile watermark image authentication copyright protection wavelettransform
下载PDF
A TTP-Independent Watermarking Protocol Based on Commutative Cryptosystem for Copyright Protection in E-Commerce
9
作者 LUO Ting YUAN Jun HONG Fan 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1636-1640,共5页
For the purpose of deterring unauthorized duplication and distribution of multimedia contents in e-commerce, some Buyer-seller watermarking protocols which combine of traditional watermarking and fingerprinting techni... For the purpose of deterring unauthorized duplication and distribution of multimedia contents in e-commerce, some Buyer-seller watermarking protocols which combine of traditional watermarking and fingerprinting techniques have been proposed, However, previous protocols have potential risk from trust third party (TTP) because all entities (including multi-buyers and multi-sellers) mentioned in protocol construct a star tupology like connection, in which the watermark certification authority (WCA) serves as the central point in the interaction and therefore its availability probably turns out to be the vital bottleneck of reliability and efficiency to the whole system. Secondly, WCA holds entire information about watermark used hy Buyers so that an innocent Buyer can he found as guilty if WCA collude with the Seller. In this paper, we propose a watermarking protocol to address the problems using cryptographic technologies in phase of watermark generation. The resuh is a TTP-independent and collusion-secure buyer-seller watermarking protocol. 展开更多
关键词 WATERMARKING copyright protection watermarking protocol commutative cryptosystem
下载PDF
MBE:A Music Copyright Depository Framework Incorporating Blockchain and Edge Computing
10
作者 Jianmao Xiao Ridong Huang +4 位作者 Jiangyu Wang Zhean Zhong Chenyu Liu Yuanlong Cao Chuying Ouyang 《Computer Systems Science & Engineering》 SCIE EI 2023年第12期2815-2834,共20页
Audio copyright is a crucial issue in the music industry,as it protects the rights and interests of creators and distributors.This paper studies the current situation of digital music copyright certification and propo... Audio copyright is a crucial issue in the music industry,as it protects the rights and interests of creators and distributors.This paper studies the current situation of digital music copyright certification and proposes a music copyright certification framework based on“blockchain+edge computing mode,”abbreviated as MBE,by integrating edge computing into the Hyperledger Fabric system.MBE framework compresses and splits the audio into small chunks,performs Fast Fourier Transform(FFT)to extract the peak points of each frequency and combines them to obtain unique audio fingerprint information.After being confirmed by various nodes on the Fabric alliance chain,audio fingerprint information and copyright owner information are recorded on the chain and broadcast to all participants.Blockchain technology’s characteristics of being tamper-proof and traceable not only reform the trust mechanism of copyright protection but also endow edge computing with the ability to resist tampering and single-point attack,greatly enhancing the robustness of the music copyright certification system.Meanwhile,edge computing mode improves Fabric blockchain’s processing speed and transaction throughput.Experimental results show that MBE’s performance is better than traditional systems regarding efficiency,storage demand and security.Compared to the traditional Fabric system without edge computing mode,MBE exhibits a 53%higher deposition efficiency and a 48%lower storage space requirement. 展开更多
关键词 Blockchain copyright protection audio fingerprinting smart contracts
下载PDF
Research on Software Design of Image Copyright Protection in the Field of Education
11
作者 Yu Huang Zhengyue Han +2 位作者 Zhenjie Wu Hanyue Zhang Rong Wu 《International Journal of Communications, Network and System Sciences》 2022年第4期43-52,共10页
Nowadays, image copyright protection is one of the key points of information security in the field of education. Based on the transient property of human vision, the anti-theft and copyright protection strategies are ... Nowadays, image copyright protection is one of the key points of information security in the field of education. Based on the transient property of human vision, the anti-theft and copyright protection strategies are proposed based on the idea of animation synthesis. In this paper, experiments are designed and compared from multiple perspectives. The results show that the strategy based on animation synthesis can not only ensure the browsing effect of images, but also effectively achieve the purpose of preventing interception via screenshot and protecting the legitimate rights of the original images. 展开更多
关键词 copyright Protection Image Anti-Theft Screenshot Animation Synthesis
下载PDF
The National Standard Copyright Protection and Publication Expansion Workshop Held in Yichang, Hubei
12
《China Standardization》 2004年第6期15-15,共1页
关键词 HUBEI The National Standard copyright Protection and Publication Expansion Workshop Held in Yichang SAC work
下载PDF
WEIGHTED ALGORITHM FOR FINGERPRINTING RELATIONAL DATABASES 被引量:1
13
作者 崔新春 秦小麟 +1 位作者 管致锦 束瑜 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2008年第2期148-154,共7页
The necessity and the feasibility of introducing attribute weight into digital fingerprinting system are given. The weighted algorithm for fingerprinting relational databases of traitor tracing is proposed. Higher wei... The necessity and the feasibility of introducing attribute weight into digital fingerprinting system are given. The weighted algorithm for fingerprinting relational databases of traitor tracing is proposed. Higher weights are assigned to more significant attributes, so important attributes are more frequently fingerprinted than other ones. Finally, the robustness of the proposed algorithm, such as performance against collusion attacks, is analyzed. Experimental results prove the superiority of the algorithm. 展开更多
关键词 digital fingerprinting relational database systems copyright protection attribute weight traitor tracing
下载PDF
GEOMETRICALLY INVARIANT WATERMARKING BASED ON RADON TRANSFORMATION 被引量:19
14
作者 CaiLian DuSidan GaoDuntang 《Journal of Electronics(China)》 2005年第3期301-306,共6页
The weakness of classical watermarking methods is the vulnerability to geometrical distortions that widely occur during normal use of the media. In this letter, a new image- watermarking method is presented to resist ... The weakness of classical watermarking methods is the vulnerability to geometrical distortions that widely occur during normal use of the media. In this letter, a new image- watermarking method is presented to resist Rotation, Scale and Translation (RST) attacks. The watermark is embedded into a domain obtained by taking Radon transform of a circular area selected from the original image, and then extracting Two-Dimensional (2-D) Fourier magnitude of the Radon transformed image. Furthermore, to prevent the watermarked image from degrading due to inverse Radon transform, watermark signal is inversely Radon transformed individually. Experimental results demonstrate that the proposed scheme is able to withstand a variety of attacks including common geometric attacks. 展开更多
关键词 copyright protection AUTHENTICATION Radon transformation Geometrical at- tacks Invariant centroid
下载PDF
A New Mechanism Based on Similar Clouds Watermark for Database’s Information Security 被引量:4
15
作者 HUANGMin CAOJia-heng +1 位作者 PENGZhi-yong ZENGCheng 《Wuhan University Journal of Natural Sciences》 CAS 2004年第4期415-419,共5页
This paper studies the digit watermark technology of numeric attributes in relational database for database's information security. It proposes a new mechanism based on similar clouds watermark and gives the conce... This paper studies the digit watermark technology of numeric attributes in relational database for database's information security. It proposes a new mechanism based on similar clouds watermark and gives the concept of similar clouds. The algorithm SCWA that can insert the meaning watermark and detect it from the watermarked data is described. The mechanism can effectively and broadly scatter the watermark in the database; therefore the watermark is very robust. Key words copyright protection - digit watermark - similar clouds - clouds model CLC number TP 311. 52 Foundation item: Supported by the National Natural Science Foundation of China (60273072) and 863 Hi-technique Research (2002AA4Z3450)Biography: HUANG Min(1979-), female, Ph. D candidate, research direction: database's information security 展开更多
关键词 copyright protection digit watermark similar clouds clouds model
下载PDF
Multipurpose audio watermarking algorithm 被引量:3
16
作者 Ning CHEN Jie ZHU 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第4期517-523,共7页
To make audio watermarking accomplish both copyright protection and content authentication with localization, a novel multipurpose audio watermarking scheme is proposed in this paper. The zero-watermarking idea is int... To make audio watermarking accomplish both copyright protection and content authentication with localization, a novel multipurpose audio watermarking scheme is proposed in this paper. The zero-watermarking idea is introduced into the design of robust watermarking algorithm to ensure the transparency and to avoid the interference between the robust watermark and the semi-fragile watermark. The property of natural audio that the VQ indices of DWT-DCT coefficients among neighboring frames tend to be very similar is utilized to extract essential feature from the host audio, which is then used for watermark ex-traction. And, the chaotic mapping based semi-fragile watermark is embedded in the detail wavelet coefficients based on the instantaneous mixing model of the independent component analysis (ICA) system. Both the robust and semi-fragile watermarks can be extracted blindly and the semi-fragile watermarking algorithm can localize the tampering accurately. Simulation results demonstrate the effectiveness of our algorithm in terms of transparency, security, robustness and tampering localization ability. 展开更多
关键词 Multipurpose audio watermarking copyright protection Content authentication
下载PDF
Digital Watermark-based Security Technology for Geo-spatial Graphics Data 被引量:2
17
作者 JIA Peihong CHEN Yunzhen +1 位作者 MA Jinsong ZHU Dakui 《Chinese Geographical Science》 SCIE CSCD 2006年第3期276-281,共6页
The paper presents a set of techniques of digital watermarking by which copyright and user rights messages are hidden into geo-spatial graphics data,as well as techniques of compressing and encrypting the watermarked ... The paper presents a set of techniques of digital watermarking by which copyright and user rights messages are hidden into geo-spatial graphics data,as well as techniques of compressing and encrypting the watermarked geo-spatial graphics data.The technology aims at tracing and resisting the illegal distribution and duplication of the geo-spatial graphics data product,so as to effectively protect the data producer's rights as well as to facilitate the secure sharing of geo-spatial graphics data.So far in the CIS field throughout the world,few researches have been made on digital watermarking.The research is a novel exploration both in the field of security management of geo-spatial graphics data and in the applications of digital watermarking technique.An application software employing the proposed technology has been developed.A number of experimental tests on the 1:500,000 digital bathymetric chart of the South China Sea and 1:10,000 digital topographic map of Jiangsu Province have been conducted to verify the feasibility of the proposed technology. 展开更多
关键词 geo-spatial graphics data copyright protection digital watermarking stego carrier data encrypting
下载PDF
Lossless Digital Watermarking Scheme for Image Maps 被引量:2
18
作者 SUN Jianguo ZHENG Chonghui GAO Di 《China Communications》 SCIE CSCD 2014年第8期125-130,共6页
A lossless digital watermarking scheme,which was zero- perturbation on the content and graphics for the digital image maps,is proposed.During the simulation,the scheme has been utilized to model the copyright protecti... A lossless digital watermarking scheme,which was zero- perturbation on the content and graphics for the digital image maps,is proposed.During the simulation,the scheme has been utilized to model the copyright protection program as a commerce application.Compared to the traditional digital watermarking schemes,our scheme operates in redundancy areas of maps and is scalable to topology changes.Experimental results show that,with respect to the geometric attacks and image transformed,the performance of our scheme is better than the classical algorithms based space or frequency domain with much lower complexity.. 展开更多
关键词 information hiding digitalwatermarking copyright protection digitalmaps
下载PDF
Research of Anti-Plagiarism Monitoring System Model 被引量:2
19
作者 SHEN Yang YUAN Zhongshang +1 位作者 LIU Lu DONG Hui 《Wuhan University Journal of Natural Sciences》 CAS 2007年第5期937-940,共4页
We proposed a flexible anti-plagiarism system model based on user-defined plagiarism standards. We also proposed PlagLazy and format-legacy phenomena that plagiarist will remain format-legacy such as soft-enter symbol... We proposed a flexible anti-plagiarism system model based on user-defined plagiarism standards. We also proposed PlagLazy and format-legacy phenomena that plagiarist will remain format-legacy such as soft-enter symbol in his DOC document after plagiarizing material from web and corresponding optimized algorithm which improves the speed of comparison. Our model is suitable for the anti-plagiarism and monitoring of large document collections, and it can also be used in digital library, E-learning and other fields. 展开更多
关键词 anti-plagiarism PLAGIARISM information fingerprints copyright protection format-legacy
下载PDF
Chaos-Based Multipurpose Image Watermarking Algorithm 被引量:2
20
作者 ZHU Congxu LIAO Xuefeng LI Zhihua 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1675-1678,共4页
To achieve the goal of image content authentication and copyright protection simultaneously, this paper presents a novel image dual watermarking method based on chaotic map. Firstly, the host image was split into many... To achieve the goal of image content authentication and copyright protection simultaneously, this paper presents a novel image dual watermarking method based on chaotic map. Firstly, the host image was split into many nonoverlapping small blocks, and the block-wise discrete cosine transform (DCT) is computed. Secondly, the robust watermarks, shuffled by the chaotic sequences, are embedded in the DC coefficients of blocks to achieve the goal of copyright protection. The semi-fragile watermarks, generated by chaotic map, are embedded in the AC coefficients of blocks to obtain the aim of image authentication. Both of them can be extracted without the original image. Simulation results demonstrate the effectiveness of our algorithm in terms of robustness and fragility. 展开更多
关键词 copyright protection image authentication multipurpose watermarking chaos theory
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部