The necessity and the feasibility of introducing attribute weight into digital fingerprinting system are given. The weighted algorithm for fingerprinting relational databases of traitor tracing is proposed. Higher wei...The necessity and the feasibility of introducing attribute weight into digital fingerprinting system are given. The weighted algorithm for fingerprinting relational databases of traitor tracing is proposed. Higher weights are assigned to more significant attributes, so important attributes are more frequently fingerprinted than other ones. Finally, the robustness of the proposed algorithm, such as performance against collusion attacks, is analyzed. Experimental results prove the superiority of the algorithm.展开更多
To protect the copyright of the image as well as the image quality, a kind of image zero-watermark method based on the Krawtchouk moment invariants and timestamp is proposed. A method is used to protect the image, in ...To protect the copyright of the image as well as the image quality, a kind of image zero-watermark method based on the Krawtchouk moment invariants and timestamp is proposed. A method is used to protect the image, in which features are drawn out from the image as the watermarking. The main steps of the method are presented. Firstly, some low-order moment invariants of the image are extracted. Secondly, the moment invariants and the key are registered to a fair third party to gain the timestamp. Finally, the timestamp can be used to prove who the real owner is. The processing method is simple, only with a few low-order moment invariants to be computed. Experimental results are obtained and compared with those of the method based on geometric moment invariants. Results show that the scheme can well withstand such geometrical attacks as rotating, scaling, cropping, combined attack, translating, removing lines, filtering, and JPEG lossy compression.展开更多
A digital watermark is an invisible mark embedded in a digital image that may be used for a number of different purposes including copyright protection. Due to the urgent need for protecting the copyright of digital p...A digital watermark is an invisible mark embedded in a digital image that may be used for a number of different purposes including copyright protection. Due to the urgent need for protecting the copyright of digital products in digital library, digital watermarking has been proposed as a solution to this problem. This letter describes potential situations that nonlinear theory can be used to enhance robustness and security of the watermark in digital library. Some nonlinear watermark techniques have been enumerated. Experimental results show that the proposed scheme is superior to the general watermark scheme both in security and robustness in digital library.展开更多
Ammonium oxalate treatment, previously extensively studied on limestone in the laboratory, was applied to powdering historical stonework (limestone) situated on the shoreline in the Mediterranean Island of Malta. Th...Ammonium oxalate treatment, previously extensively studied on limestone in the laboratory, was applied to powdering historical stonework (limestone) situated on the shoreline in the Mediterranean Island of Malta. This paper presents the results obtained from onsite testing that aimed at evaluating the treatment in terms of its aesthetic performance, the depth of treatment, the mechanical properties of the consolidated stone and the influence on water transport. To this end, the testing program included colorimetry, DRMS (drilling resistance measurement system) and water absorption through the contact sponge method. This study is Part One of the final phase of a wider research program which included two previous phases progressing from treating this same very porous stone type in a laboratory-based controlled environment to uncontrolled site conditions, seeking to quantify this treatment's effectiveness in the field. Results showed that onsite consolidation was achieved and that although some changes in colour and water absorption were brought about by the treatment, these were within acceptable tolerance limits. Besides carrying out these treatments and evaluations directly on the coast, this study anticipates further studies which will look at rural and urban sites where the types and concentrations of salts are expected to be different.展开更多
Two fast and robust digital watermarking schemes for compressed music format and MIDI format are put forward, which are suitable for on-line distribution through the Internet. For compressed music, the watermark is em...Two fast and robust digital watermarking schemes for compressed music format and MIDI format are put forward, which are suitable for on-line distribution through the Internet. For compressed music, the watermark is embedded in partially uncompressed domain and the embedding scheme is closely related to music content. For MIDI, the watermark is embedded in virtual notes that are generated and randomly hide among the MIDI notes. This paper also presents a method for controlling usage and protecting against copying of digital music contents and their associated players. The digital music contents and their players installed in one computer cannot be used if they are copied to another computer. Even in the same computer, the duplicated digital music contents are not usable. The usage associated to the music content will restrict the running time and times. Also the music can be played and it will be automatically updated after each playing. The digital music cannot be accessible if its permitted usage expires.展开更多
This study used remote sensing and GIS to analyze the landscape pattern changes in the Yancheng Nature Reserve from 1983 to 2018,established an evaluation index system based on the regional natural-socio-economic comp...This study used remote sensing and GIS to analyze the landscape pattern changes in the Yancheng Nature Reserve from 1983 to 2018,established an evaluation index system based on the regional natural-socio-economic complex ecosystem security pattern,and then analyzed the spatial characteristics of ecological security changes and discusses reasons for these changes.The results show that the landscape pattern changed dramatically from natural landscape to a mixture of natural landscape and artificial landscape from 1983 to 2018 due to the intensification of human activities.At present,the ecological security status of the protected areas is not optimistic.From the perspective of the survival status of red-crowned cranes,the protected areas are suitable.However,due to the increase of human activities and policy adjustments,the habitat of red-crowned cranes is fragmented.The red-crowned crane currently gathers in localized areas such as the core area and the buffer zone.We should pay more attention to management,policy development and the environmental awareness of local residents.At the same time,it is necessary to reduce the intensity of human activities within the reserve.展开更多
This paper presents a block-based secure and robust watermarking technique for color images based on multi-resolution decomposition and de-correlation.The principal objective of the presented scheme is to simultaneous...This paper presents a block-based secure and robust watermarking technique for color images based on multi-resolution decomposition and de-correlation.The principal objective of the presented scheme is to simultaneously meet all the four requirements(robustness,security,imperceptibility,and capacity)of a good watermarking scheme.The contribution of this study is to basically achieve the four contradictory requirements that a good watermarking scheme must meet.To do so,different approaches are combined in a way that the four requirements are achieved.For instance,to obtain imperceptibility,the three color channels(red,green,and blue)are de-correlated using principal component analysis,and the first principal component(de-correlated red channel)is chosen for watermark embedding.Afterwards,to achieve robustness,the de-correlated channel is decomposed using a discrete wavelet transform(DWT),and the approximate band(the other three bands are kept intact to preserve the edge information)is further decomposed into distinct blocks.The random blocks are chosen based on a random generated key.The random selected blocks are further broken down into singular values and vectors.Based on the mutual dependency on singular values and vectors’matrices,the values are modified depending on the watermarking bits,and their locations are saved and used as another key,required when the watermark is to be extracted.Consequently,two-level authentication levels ensure the security,and using both singular values and vectors increases the capacity of the presented scheme.Moreover,the involvement of both left and right singular vectors along with singular values in the watermarking embedding process strengthens the robustness of the proposed scheme.Finally,to compare the presented scheme with the state-of-the-art schemes in terms of imperceptibility(peak signal-to-noise ratio and structural similarity index),security(with numerous fake keys),robustness(normalized correlation and bit error rate),and capacity,the Gonzalez and Kodak datasets are used.The comparison shows significant improvement of the proposed scheme over existing schemes.展开更多
文摘The necessity and the feasibility of introducing attribute weight into digital fingerprinting system are given. The weighted algorithm for fingerprinting relational databases of traitor tracing is proposed. Higher weights are assigned to more significant attributes, so important attributes are more frequently fingerprinted than other ones. Finally, the robustness of the proposed algorithm, such as performance against collusion attacks, is analyzed. Experimental results prove the superiority of the algorithm.
文摘To protect the copyright of the image as well as the image quality, a kind of image zero-watermark method based on the Krawtchouk moment invariants and timestamp is proposed. A method is used to protect the image, in which features are drawn out from the image as the watermarking. The main steps of the method are presented. Firstly, some low-order moment invariants of the image are extracted. Secondly, the moment invariants and the key are registered to a fair third party to gain the timestamp. Finally, the timestamp can be used to prove who the real owner is. The processing method is simple, only with a few low-order moment invariants to be computed. Experimental results are obtained and compared with those of the method based on geometric moment invariants. Results show that the scheme can well withstand such geometrical attacks as rotating, scaling, cropping, combined attack, translating, removing lines, filtering, and JPEG lossy compression.
基金Supported in part by the National Natural Science Foundation of China (No.60072044).
文摘A digital watermark is an invisible mark embedded in a digital image that may be used for a number of different purposes including copyright protection. Due to the urgent need for protecting the copyright of digital products in digital library, digital watermarking has been proposed as a solution to this problem. This letter describes potential situations that nonlinear theory can be used to enhance robustness and security of the watermark in digital library. Some nonlinear watermark techniques have been enumerated. Experimental results show that the proposed scheme is superior to the general watermark scheme both in security and robustness in digital library.
文摘Ammonium oxalate treatment, previously extensively studied on limestone in the laboratory, was applied to powdering historical stonework (limestone) situated on the shoreline in the Mediterranean Island of Malta. This paper presents the results obtained from onsite testing that aimed at evaluating the treatment in terms of its aesthetic performance, the depth of treatment, the mechanical properties of the consolidated stone and the influence on water transport. To this end, the testing program included colorimetry, DRMS (drilling resistance measurement system) and water absorption through the contact sponge method. This study is Part One of the final phase of a wider research program which included two previous phases progressing from treating this same very porous stone type in a laboratory-based controlled environment to uncontrolled site conditions, seeking to quantify this treatment's effectiveness in the field. Results showed that onsite consolidation was achieved and that although some changes in colour and water absorption were brought about by the treatment, these were within acceptable tolerance limits. Besides carrying out these treatments and evaluations directly on the coast, this study anticipates further studies which will look at rural and urban sites where the types and concentrations of salts are expected to be different.
文摘Two fast and robust digital watermarking schemes for compressed music format and MIDI format are put forward, which are suitable for on-line distribution through the Internet. For compressed music, the watermark is embedded in partially uncompressed domain and the embedding scheme is closely related to music content. For MIDI, the watermark is embedded in virtual notes that are generated and randomly hide among the MIDI notes. This paper also presents a method for controlling usage and protecting against copying of digital music contents and their associated players. The digital music contents and their players installed in one computer cannot be used if they are copied to another computer. Even in the same computer, the duplicated digital music contents are not usable. The usage associated to the music content will restrict the running time and times. Also the music can be played and it will be automatically updated after each playing. The digital music cannot be accessible if its permitted usage expires.
基金The Fund for Building World-class Universities(disciplines)of Renmin University of China(2019)
文摘This study used remote sensing and GIS to analyze the landscape pattern changes in the Yancheng Nature Reserve from 1983 to 2018,established an evaluation index system based on the regional natural-socio-economic complex ecosystem security pattern,and then analyzed the spatial characteristics of ecological security changes and discusses reasons for these changes.The results show that the landscape pattern changed dramatically from natural landscape to a mixture of natural landscape and artificial landscape from 1983 to 2018 due to the intensification of human activities.At present,the ecological security status of the protected areas is not optimistic.From the perspective of the survival status of red-crowned cranes,the protected areas are suitable.However,due to the increase of human activities and policy adjustments,the habitat of red-crowned cranes is fragmented.The red-crowned crane currently gathers in localized areas such as the core area and the buffer zone.We should pay more attention to management,policy development and the environmental awareness of local residents.At the same time,it is necessary to reduce the intensity of human activities within the reserve.
文摘This paper presents a block-based secure and robust watermarking technique for color images based on multi-resolution decomposition and de-correlation.The principal objective of the presented scheme is to simultaneously meet all the four requirements(robustness,security,imperceptibility,and capacity)of a good watermarking scheme.The contribution of this study is to basically achieve the four contradictory requirements that a good watermarking scheme must meet.To do so,different approaches are combined in a way that the four requirements are achieved.For instance,to obtain imperceptibility,the three color channels(red,green,and blue)are de-correlated using principal component analysis,and the first principal component(de-correlated red channel)is chosen for watermark embedding.Afterwards,to achieve robustness,the de-correlated channel is decomposed using a discrete wavelet transform(DWT),and the approximate band(the other three bands are kept intact to preserve the edge information)is further decomposed into distinct blocks.The random blocks are chosen based on a random generated key.The random selected blocks are further broken down into singular values and vectors.Based on the mutual dependency on singular values and vectors’matrices,the values are modified depending on the watermarking bits,and their locations are saved and used as another key,required when the watermark is to be extracted.Consequently,two-level authentication levels ensure the security,and using both singular values and vectors increases the capacity of the presented scheme.Moreover,the involvement of both left and right singular vectors along with singular values in the watermarking embedding process strengthens the robustness of the proposed scheme.Finally,to compare the presented scheme with the state-of-the-art schemes in terms of imperceptibility(peak signal-to-noise ratio and structural similarity index),security(with numerous fake keys),robustness(normalized correlation and bit error rate),and capacity,the Gonzalez and Kodak datasets are used.The comparison shows significant improvement of the proposed scheme over existing schemes.