期刊文献+
共找到383篇文章
< 1 2 20 >
每页显示 20 50 100
Research on IPFS Image Copyright Protection Method Based on Blockchain
1
作者 Xin Cong Lanjin Feng Lingling Zi 《Computers, Materials & Continua》 SCIE EI 2024年第10期663-684,共22页
In the digital information age,distributed file storage technologies like the InterPlanetary File System(IPFS)have gained considerable traction as a means of storing and disseminating media content.Despite the advanta... In the digital information age,distributed file storage technologies like the InterPlanetary File System(IPFS)have gained considerable traction as a means of storing and disseminating media content.Despite the advantages of decentralized storage,the proliferation of decentralized technologies has highlighted the need to address the issue of file ownership.The aim of this paper is to address the critical issues of source verification and digital copyright protection for IPFS image files.To this end,an innovative approach is proposed that integrates blockchain,digital signature,and blind watermarking.Blockchain technology functions as a decentralized and tamper-resistant ledger,recording and verifying the source information of files,thereby establishing credible evidence of file origin.A digital signature serves to authenticate the identity and integrity of the individual responsible for uploading the file,ensuring data security.Furthermore,blind watermarking is employed to embed invisible information within images,thereby safeguarding digital copyrights and enabling file traceability.To further optimize the efficiency of file retrieval within IPFS,a dual-layer Distributed Hash Table(DHT)indexing structure is proposed.This structure divides file index information into a global index layer and a local index layer,significantly reducing retrieval time and network overhead.The feasibility of the proposed approach is demonstrated through practical examples,providing an effective solution to the copyright protection issues associated with IPFS image files. 展开更多
关键词 Blockchain copyright protection IPFS distributed hash table digital sig
下载PDF
An Investigation into the Issues Concerning the Copyright of Content Generated by Text-to-Video AI
2
作者 Zhou Chunguang Yi Jia 《Contemporary Social Sciences》 2024年第5期95-117,共23页
Text-to-video artificial intelligence(AI)is a new product that has arisen from the continuous development of digital technology over recent years.The emergence of various text-to-video AI models,including Sora,is driv... Text-to-video artificial intelligence(AI)is a new product that has arisen from the continuous development of digital technology over recent years.The emergence of various text-to-video AI models,including Sora,is driving the proliferation of content generated through concrete imagery.However,the content generated by text-to-video AI raises significant issues such as unclear work identification,ambiguous copyright ownership,and widespread copyright infringement.These issues can hinder the development of text-to-video AI in the creative fields and impede the prosperity of China’s social and cultural arts.Therefore,this paper proposes three recommendations within a legal framework:(a)categorizing the content generated by text-to-video AI as audiovisual works;(b)clarifying the copyright ownership model for text-to-video AI works;(c)reasonably delineating the responsibilities of the parties who are involved in the text-to-video AI works.The aim is to mitigate the copyright risks associated with content generated by text-to-video AI and to promote the healthy development of text-to-video AI in the creative fields. 展开更多
关键词 text-to-video AI work identification copyright ownership copyright infringement
下载PDF
Overview of the Impact of the Introduction of the Copyright Act 2020 on Digital Publishing
3
作者 MA Jingyun 《Cultural and Religious Studies》 2024年第1期64-69,共6页
In November 2020,the third amendment of the Copyright Law of the People’s Republic of China was completed and officially implemented in June 2021,which is undoubtedly of great significance to Chinese citizens with a ... In November 2020,the third amendment of the Copyright Law of the People’s Republic of China was completed and officially implemented in June 2021,which is undoubtedly of great significance to Chinese citizens with a growing awareness of copyright.This has also triggered our thinking about the impact of Copyright Law on digital copyright.Through the analysis of the cases after the amendment of the Copyright Law,we find that to a certain extent,the Copyright Law has played a great role in the protection of digital copyright,but it is still unable to achieve comprehensive protection,and there are still some imperfections.From this point of view,the simple legal protection of digital copyright cannot be taken into account.It still needs to be combined with technical protection means,cooperate with social conditions,and work together to create a harmonious and healthy online publishing environment and promote the protection of digital copyright. 展开更多
关键词 digital copyright Copyright Law infringement phenomenon
下载PDF
Cyberattack Ramifications, The Hidden Cost of a Security Breach
4
作者 Meysam Tahmasebi 《Journal of Information Security》 2024年第2期87-105,共19页
In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term ... In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term consequences that businesses encounter. This study integrates findings from various research, including quantitative reports, drawing upon real-world incidents faced by both small and large enterprises. This investigation emphasizes the profound intangible costs, such as trade name devaluation and potential damage to brand reputation, which can persist long after the breach. By collating insights from industry experts and a myriad of research, the study provides a comprehensive perspective on the profound, multi-dimensional impacts of cybersecurity incidents. The overarching aim is to underscore the often-underestimated scope and depth of these breaches, emphasizing the entire timeline post-incident and the urgent need for fortified preventative and reactive measures in the digital domain. 展开更多
关键词 Artificial Intelligence (AI) Business Continuity Case Studies Copyright Cost-Benefit Analysis Credit Rating Cyberwarfare Cybersecurity Breaches Data Breaches Denial Of Service (DOS) Devaluation Of Trade Name Disaster Recovery Distributed Denial of Service (DDOS) Identity Theft Increased Cost to Raise Debt Insurance Premium Intellectual Property Operational Disruption Patent Post-Breach Customer Protection Recovery Point Objective (RPO) Recovery Time Objective (RTO) Regulatory Compliance Risk Assessment Service Level Agreement Stuxnet Trade Secret
下载PDF
A Dual Model Watermarking Framework for Copyright Protection in Image Processing Networks 被引量:1
5
作者 Yuhang Meng Xianyi Chen +2 位作者 Xingming Sun Yu Liu Guo Wei 《Computers, Materials & Continua》 SCIE EI 2023年第4期831-844,共14页
Image processing networks have gained great success in many fields,and thus the issue of copyright protection for image processing networks hasbecome a focus of attention. Model watermarking techniques are widely used... Image processing networks have gained great success in many fields,and thus the issue of copyright protection for image processing networks hasbecome a focus of attention. Model watermarking techniques are widely usedin model copyright protection, but there are two challenges: (1) designinguniversal trigger sample watermarking for different network models is stilla challenge;(2) existing methods of copyright protection based on trigger swatermarking are difficult to resist forgery attacks. In this work, we propose adual model watermarking framework for copyright protection in image processingnetworks. The trigger sample watermark is embedded in the trainingprocess of the model, which can effectively verify the model copyright. And wedesign a common method for generating trigger sample watermarks based ongenerative adversarial networks, adaptively generating trigger sample watermarksaccording to different models. The spatial watermark is embedded intothe model output. When an attacker steals model copyright using a forgedtrigger sample watermark, which can be correctly extracted to distinguishbetween the piratical and the protected model. The experiments show that theproposed framework has good performance in different image segmentationnetworks of UNET, UNET++, and FCN (fully convolutional network), andeffectively resists forgery attacks. 展开更多
关键词 Image processing networks copyright protection model watermark
下载PDF
New Fragile Watermarking Technique to Identify Inserted Video Objects Using H.264 and Color Features
6
作者 Raheem Ogla Eman Shakar Mahmood +1 位作者 Rasha I.Ahmed Abdul Monem S.Rahma 《Computers, Materials & Continua》 SCIE EI 2023年第9期3075-3096,共22页
The transmission of video content over a network raises various issues relating to copyright authenticity,ethics,legality,and privacy.The protection of copyrighted video content is a significant issue in the video ind... The transmission of video content over a network raises various issues relating to copyright authenticity,ethics,legality,and privacy.The protection of copyrighted video content is a significant issue in the video industry,and it is essential to find effective solutions to prevent tampering and modification of digital video content during its transmission through digital media.However,there are stillmany unresolved challenges.This paper aims to address those challenges by proposing a new technique for detectingmoving objects in digital videos,which can help prove the credibility of video content by detecting any fake objects inserted by hackers.The proposed technique involves using two methods,the H.264 and the extraction color features methods,to embed and extract watermarks in video frames.The study tested the performance of the system against various attacks and found it to be robust.The evaluation was done using different metrics such as Peak-Signal-to-Noise Ratio(PSNR),Mean Squared Error(MSE),Structural Similarity Index Measure(SSIM),Bit Correction Ratio(BCR),and Normalized Correlation.The accuracy of identifying moving objects was high,ranging from 96.3%to 98.7%.The system was also able to embed a fragile watermark with a success rate of over 93.65%and had an average capacity of hiding of 78.67.The reconstructed video frames had high quality with a PSNR of at least 65.45 dB and SSIMof over 0.97,making them imperceptible to the human eye.The system also had an acceptable average time difference(T=1.227/s)compared with other state-of-the-art methods. 展开更多
关键词 Video watermarking fragile digital watermark copyright protection moving objects color image features H.264
下载PDF
MBE:A Music Copyright Depository Framework Incorporating Blockchain and Edge Computing
7
作者 Jianmao Xiao Ridong Huang +4 位作者 Jiangyu Wang Zhean Zhong Chenyu Liu Yuanlong Cao Chuying Ouyang 《Computer Systems Science & Engineering》 SCIE EI 2023年第12期2815-2834,共20页
Audio copyright is a crucial issue in the music industry,as it protects the rights and interests of creators and distributors.This paper studies the current situation of digital music copyright certification and propo... Audio copyright is a crucial issue in the music industry,as it protects the rights and interests of creators and distributors.This paper studies the current situation of digital music copyright certification and proposes a music copyright certification framework based on“blockchain+edge computing mode,”abbreviated as MBE,by integrating edge computing into the Hyperledger Fabric system.MBE framework compresses and splits the audio into small chunks,performs Fast Fourier Transform(FFT)to extract the peak points of each frequency and combines them to obtain unique audio fingerprint information.After being confirmed by various nodes on the Fabric alliance chain,audio fingerprint information and copyright owner information are recorded on the chain and broadcast to all participants.Blockchain technology’s characteristics of being tamper-proof and traceable not only reform the trust mechanism of copyright protection but also endow edge computing with the ability to resist tampering and single-point attack,greatly enhancing the robustness of the music copyright certification system.Meanwhile,edge computing mode improves Fabric blockchain’s processing speed and transaction throughput.Experimental results show that MBE’s performance is better than traditional systems regarding efficiency,storage demand and security.Compared to the traditional Fabric system without edge computing mode,MBE exhibits a 53%higher deposition efficiency and a 48%lower storage space requirement. 展开更多
关键词 Blockchain copyright protection audio fingerprinting smart contracts
下载PDF
WEIGHTED ALGORITHM FOR FINGERPRINTING RELATIONAL DATABASES 被引量:1
8
作者 崔新春 秦小麟 +1 位作者 管致锦 束瑜 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2008年第2期148-154,共7页
The necessity and the feasibility of introducing attribute weight into digital fingerprinting system are given. The weighted algorithm for fingerprinting relational databases of traitor tracing is proposed. Higher wei... The necessity and the feasibility of introducing attribute weight into digital fingerprinting system are given. The weighted algorithm for fingerprinting relational databases of traitor tracing is proposed. Higher weights are assigned to more significant attributes, so important attributes are more frequently fingerprinted than other ones. Finally, the robustness of the proposed algorithm, such as performance against collusion attacks, is analyzed. Experimental results prove the superiority of the algorithm. 展开更多
关键词 digital fingerprinting relational database systems copyright protection attribute weight traitor tracing
下载PDF
国内外知识产权管理软件研发现状分析 被引量:2
9
作者 马海群 孙扬民 《现代图书情报技术》 CSSCI 北大核心 2004年第2期56-59,共4页
在简述知识产权管理软件研发背景及其社会价值的基础上,重点分析了国内外现有知识产权管理软件的开发状况,并举例介绍了几个国外应用比较广泛的知识产权管理软件,同时还对知识产权管理软件今后的发展方向进行一定程度的描述与预测。
关键词 知识产权管理 计算机软件 软件开发 Patentpro OFFICIAL COPYRIGHT SOFTWARE
下载PDF
数字版权保护中DCI编码方案及数字证书研究 被引量:4
10
作者 杨树林 孙丽 胡洁萍 《北京印刷学院学报》 2012年第6期38-41,共4页
数字版权标志符为数字内容在互联网上提供唯一的版权身份标志,为确保在网络环境中能够精准定位和检索数字作品、确认版权主体提供了技术基础。建立数字版权标志符体系是我国数字版权管理发展的迫切要求。通过研究DCI(数字版权标志符)的... 数字版权标志符为数字内容在互联网上提供唯一的版权身份标志,为确保在网络环境中能够精准定位和检索数字作品、确认版权主体提供了技术基础。建立数字版权标志符体系是我国数字版权管理发展的迫切要求。通过研究DCI(数字版权标志符)的概念、设计原则,分析了国外相关研究的现状,提出了适合我国版权保护的DCI编码方案,并给出了应用于移动互联网的加密机制、数字证书及DCI嵌入方案。研究结果表明,采用上述方法,兼容性好,易于与国际上的DOI(digital object identifier)接轨,加密机制及数字证书的设计适合在移动互联网上应用。 展开更多
关键词 数字版权保护 DCI(digital COPYRIGHT identifier) 椭圆曲线密码 数字证书
下载PDF
Copyleft思潮:对网络著作权扩张的反思 被引量:4
11
作者 温晓红 《现代传播(中国传媒大学学报)》 CSSCI 北大核心 2009年第2期112-115,共4页
随着网络技术的发展,Copyleft应运而生。作为一种新的著作权理念,它力促自由软件的产生与传播,对传统的著作权制度体系(Copyright)构成了挑战。但是,Copyleft并不企图全面否定Copyright,而是以承认Copyright作为存在的前提条件。本文从C... 随着网络技术的发展,Copyleft应运而生。作为一种新的著作权理念,它力促自由软件的产生与传播,对传统的著作权制度体系(Copyright)构成了挑战。但是,Copyleft并不企图全面否定Copyright,而是以承认Copyright作为存在的前提条件。本文从Copyleft思潮的兴起和发展,探讨Copy-left思潮的实质和影响。 展开更多
关键词 COPYRIGHT COPYLEFT 自由软件 著作权
下载PDF
Copyright与Copyleft的经济学分析 被引量:2
12
作者 聂盛 《科技与经济》 CSSCI 2009年第2期63-65,共3页
Copyleft是一种全新的知识产权理念,它将知识产品的权利对外开放,对传统的版权(Copyright)制度提出了挑战,引起人们的广泛关注。通过从经济学角度对Copyright及Copyleft制度进行了比较分析,认为Copyleft满足了网络社会知识集体生产的需... Copyleft是一种全新的知识产权理念,它将知识产品的权利对外开放,对传统的版权(Copyright)制度提出了挑战,引起人们的广泛关注。通过从经济学角度对Copyright及Copyleft制度进行了比较分析,认为Copyleft满足了网络社会知识集体生产的需求,是对Copyright的超越与补充;两者都是人们在利益最大化原则下对知识产品产权形式的理性选择,并将长期共存。 展开更多
关键词 COPYRIGHT COPYLEFT 知识产权
下载PDF
Copyleft:在版权保护下的信息共享规则 被引量:3
13
作者 王闻贤 《黑龙江省政法管理干部学院学报》 2003年第2期14-17,共4页
知识产权代替整个知识保护已经不符合世界的潮流。有专家建议知识产权保护制度的基点应是以符合社会发展的现实要求为前提 ,在权利人利益和社会公众利益之间维持恰如其分的平衡。于是COPYLEFT应运这样的需要而生 ,它并不否定COPYRIGHT ... 知识产权代替整个知识保护已经不符合世界的潮流。有专家建议知识产权保护制度的基点应是以符合社会发展的现实要求为前提 ,在权利人利益和社会公众利益之间维持恰如其分的平衡。于是COPYLEFT应运这样的需要而生 ,它并不否定COPYRIGHT ,是版权保护的延伸 ,核心思想是“信息共享 ,源代码共享”。 展开更多
关键词 COPYLEFT 自由软件 COPYRIGHT 自由
下载PDF
Copyleft:在版权保护下的信息共享规则 被引量:3
14
作者 王闻贤 《上海高校图书情报工作研究》 2003年第1期18-22,共5页
知识产权代替整个知识保护已经不符合世界潮流。有专家建议知识产权保护制度的基点应是以符合社会发展的现实要求为前提,在权利人利益和社会公众利益之间维持恰如其分的平衡。于是COPYLEFT应运而生,它并不否定COPYRIGHT,而是版权保护的... 知识产权代替整个知识保护已经不符合世界潮流。有专家建议知识产权保护制度的基点应是以符合社会发展的现实要求为前提,在权利人利益和社会公众利益之间维持恰如其分的平衡。于是COPYLEFT应运而生,它并不否定COPYRIGHT,而是版权保护的延伸,核心思想是"信息共享,源代码共享"。 展开更多
关键词 自由软件 COPYLEFT COPYRIGHT 信息共享 源代码共享 版权保护
下载PDF
文化经济学为什么对著作权置之不理? 被引量:2
15
作者 Ruth Towse 郑小倩 《文化艺术研究》 2010年第1期243-252,共10页
本文主张应该将著作权政策视作文化政策不可或缺的一部分;文化经济学家对补贴在文化政策中的意义给予了很多的关注和讨论,但是对于著作权问题却很少提及。尽管如此,由于在文化政策以及艺术工作者的劳动力市场方面具有独到的阐释力,文化... 本文主张应该将著作权政策视作文化政策不可或缺的一部分;文化经济学家对补贴在文化政策中的意义给予了很多的关注和讨论,但是对于著作权问题却很少提及。尽管如此,由于在文化政策以及艺术工作者的劳动力市场方面具有独到的阐释力,文化经济学可以被用于分析著作权问题并证明著作权是创意产业中激发创造力的一个有效因素。本文将文化补贴和著作权均视为政策工具,将两者进行对比并初步探讨了当前的文化政策中与著作权密切相关的两个问题,即著作权中介协会的规范管理以及目前流行的"版权补偿金"之说,认为这类问题是文化经济学者有能力也有义务解决的问题。 展开更多
关键词 文化经济学 著作权问题 COPYRIGHT 文化政策 艺术工作者 劳动力市场 激发创造力 版权补偿金 政策工具 有效因素 意义给予 经济学家 规范管理 创意产业 补贴 阐释力 中介 证明 义务 学者
下载PDF
GEOMETRICALLY INVARIANT WATERMARKING BASED ON RADON TRANSFORMATION 被引量:19
16
作者 CaiLian DuSidan GaoDuntang 《Journal of Electronics(China)》 2005年第3期301-306,共6页
The weakness of classical watermarking methods is the vulnerability to geometrical distortions that widely occur during normal use of the media. In this letter, a new image- watermarking method is presented to resist ... The weakness of classical watermarking methods is the vulnerability to geometrical distortions that widely occur during normal use of the media. In this letter, a new image- watermarking method is presented to resist Rotation, Scale and Translation (RST) attacks. The watermark is embedded into a domain obtained by taking Radon transform of a circular area selected from the original image, and then extracting Two-Dimensional (2-D) Fourier magnitude of the Radon transformed image. Furthermore, to prevent the watermarked image from degrading due to inverse Radon transform, watermark signal is inversely Radon transformed individually. Experimental results demonstrate that the proposed scheme is able to withstand a variety of attacks including common geometric attacks. 展开更多
关键词 Copyright protection AUTHENTICATION Radon transformation Geometrical at- tacks Invariant centroid
下载PDF
A New Mechanism Based on Similar Clouds Watermark for Database’s Information Security 被引量:4
17
作者 HUANGMin CAOJia-heng +1 位作者 PENGZhi-yong ZENGCheng 《Wuhan University Journal of Natural Sciences》 CAS 2004年第4期415-419,共5页
This paper studies the digit watermark technology of numeric attributes in relational database for database's information security. It proposes a new mechanism based on similar clouds watermark and gives the conce... This paper studies the digit watermark technology of numeric attributes in relational database for database's information security. It proposes a new mechanism based on similar clouds watermark and gives the concept of similar clouds. The algorithm SCWA that can insert the meaning watermark and detect it from the watermarked data is described. The mechanism can effectively and broadly scatter the watermark in the database; therefore the watermark is very robust. Key words copyright protection - digit watermark - similar clouds - clouds model CLC number TP 311. 52 Foundation item: Supported by the National Natural Science Foundation of China (60273072) and 863 Hi-technique Research (2002AA4Z3450)Biography: HUANG Min(1979-), female, Ph. D candidate, research direction: database's information security 展开更多
关键词 copyright protection digit watermark similar clouds clouds model
下载PDF
NEW APPROACH TO COPYRIGHT PROTECTION OF IMAGE AGAINST GEOMETRICAL ATTACKS
18
作者 郝红杰 吴一全 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2007年第4期335-342,共8页
To protect the copyright of the image as well as the image quality, a kind of image zero-watermark method based on the Krawtchouk moment invariants and timestamp is proposed. A method is used to protect the image, in ... To protect the copyright of the image as well as the image quality, a kind of image zero-watermark method based on the Krawtchouk moment invariants and timestamp is proposed. A method is used to protect the image, in which features are drawn out from the image as the watermarking. The main steps of the method are presented. Firstly, some low-order moment invariants of the image are extracted. Secondly, the moment invariants and the key are registered to a fair third party to gain the timestamp. Finally, the timestamp can be used to prove who the real owner is. The processing method is simple, only with a few low-order moment invariants to be computed. Experimental results are obtained and compared with those of the method based on geometric moment invariants. Results show that the scheme can well withstand such geometrical attacks as rotating, scaling, cropping, combined attack, translating, removing lines, filtering, and JPEG lossy compression. 展开更多
关键词 image copyright protection digital watermarking geometrical attack Krawtchouk moment invariant
下载PDF
Multipurpose audio watermarking algorithm 被引量:3
19
作者 Ning CHEN Jie ZHU 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第4期517-523,共7页
To make audio watermarking accomplish both copyright protection and content authentication with localization, a novel multipurpose audio watermarking scheme is proposed in this paper. The zero-watermarking idea is int... To make audio watermarking accomplish both copyright protection and content authentication with localization, a novel multipurpose audio watermarking scheme is proposed in this paper. The zero-watermarking idea is introduced into the design of robust watermarking algorithm to ensure the transparency and to avoid the interference between the robust watermark and the semi-fragile watermark. The property of natural audio that the VQ indices of DWT-DCT coefficients among neighboring frames tend to be very similar is utilized to extract essential feature from the host audio, which is then used for watermark ex-traction. And, the chaotic mapping based semi-fragile watermark is embedded in the detail wavelet coefficients based on the instantaneous mixing model of the independent component analysis (ICA) system. Both the robust and semi-fragile watermarks can be extracted blindly and the semi-fragile watermarking algorithm can localize the tampering accurately. Simulation results demonstrate the effectiveness of our algorithm in terms of transparency, security, robustness and tampering localization ability. 展开更多
关键词 Multipurpose audio watermarking Copyright protection Content authentication
下载PDF
Novel copyright protection scheme for digital content 被引量:3
20
作者 Fan Kefeng Wang Meihua +1 位作者 Mo Wei Zhao Xinhua 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第2期423-429,共7页
A novel copyright protection scheme for digital content is presented, which is a private watermarking scheme based on the watermark embedding in the DCT domain and watermark extraction Using independent component anal... A novel copyright protection scheme for digital content is presented, which is a private watermarking scheme based on the watermark embedding in the DCT domain and watermark extraction Using independent component analysis (ICA). The system includes the key for watermark extraction and the host image. The algorithm splits the original image into blocks and classifies these blocks based on visual masking, that is, noise visibility function (NVF). Watermark components with different strength are inserted into chosen direct current components of DCT coefficients according to the classifier. The watermark extraction is based on the characteristic of the statistic independence of the host image, watermark and key. Principle component analysis (PCA) whitening process and FastICA techniques are introduced to ensure a blind watermark extraction without requiring the original image. Experirnental results show the proposed technique is robust under attacks such as image filtering and adding noise, cropping and resizing. In addition, the proposed private watermarking system can be improved to the application of the DTV content protection system. 展开更多
关键词 digital content copyright protection digital watermarking noise visibility function independent component analysis.
下载PDF
上一页 1 2 20 下一页 到第
使用帮助 返回顶部