期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
基于可信身份认证的数权保护技术方案研究与实现 被引量:2
1
作者 王杰勋 马圣东 《网络空间安全》 2019年第7期62-67,共6页
在互联网时代,数据拥有价值,个人信息也是一种财产权益。频繁发生的数据泄漏事故,除了造成巨大的财产损失外,也带来了巨大的安全隐患。文章分析了互联网环境下个人信息数据安全的问题及现状,并提出了基于可信身份认证的数权保护技术方案... 在互联网时代,数据拥有价值,个人信息也是一种财产权益。频繁发生的数据泄漏事故,除了造成巨大的财产损失外,也带来了巨大的安全隐患。文章分析了互联网环境下个人信息数据安全的问题及现状,并提出了基于可信身份认证的数权保护技术方案,重点介绍了方案的主要流程以及技术原理。 展开更多
关键词 数据安全 可信身份认证 数权保护
下载PDF
WEIGHTED ALGORITHM FOR FINGERPRINTING RELATIONAL DATABASES 被引量:1
2
作者 崔新春 秦小麟 +1 位作者 管致锦 束瑜 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2008年第2期148-154,共7页
The necessity and the feasibility of introducing attribute weight into digital fingerprinting system are given. The weighted algorithm for fingerprinting relational databases of traitor tracing is proposed. Higher wei... The necessity and the feasibility of introducing attribute weight into digital fingerprinting system are given. The weighted algorithm for fingerprinting relational databases of traitor tracing is proposed. Higher weights are assigned to more significant attributes, so important attributes are more frequently fingerprinted than other ones. Finally, the robustness of the proposed algorithm, such as performance against collusion attacks, is analyzed. Experimental results prove the superiority of the algorithm. 展开更多
关键词 digital fingerprinting relational database systems copyright protection attribute weight traitor tracing
下载PDF
NEW APPROACH TO COPYRIGHT PROTECTION OF IMAGE AGAINST GEOMETRICAL ATTACKS
3
作者 郝红杰 吴一全 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2007年第4期335-342,共8页
To protect the copyright of the image as well as the image quality, a kind of image zero-watermark method based on the Krawtchouk moment invariants and timestamp is proposed. A method is used to protect the image, in ... To protect the copyright of the image as well as the image quality, a kind of image zero-watermark method based on the Krawtchouk moment invariants and timestamp is proposed. A method is used to protect the image, in which features are drawn out from the image as the watermarking. The main steps of the method are presented. Firstly, some low-order moment invariants of the image are extracted. Secondly, the moment invariants and the key are registered to a fair third party to gain the timestamp. Finally, the timestamp can be used to prove who the real owner is. The processing method is simple, only with a few low-order moment invariants to be computed. Experimental results are obtained and compared with those of the method based on geometric moment invariants. Results show that the scheme can well withstand such geometrical attacks as rotating, scaling, cropping, combined attack, translating, removing lines, filtering, and JPEG lossy compression. 展开更多
关键词 image copyright protection digital watermarking geometrical attack Krawtchouk moment invariant
下载PDF
APPLICATION OF NONLINEAR WATERMARK TECHNIQUES IN DIGITAL LIBRARIES 被引量:1
4
作者 Zhao Jian Zhou Mingquan 《Journal of Electronics(China)》 2005年第5期524-527,共4页
A digital watermark is an invisible mark embedded in a digital image that may be used for a number of different purposes including copyright protection. Due to the urgent need for protecting the copyright of digital p... A digital watermark is an invisible mark embedded in a digital image that may be used for a number of different purposes including copyright protection. Due to the urgent need for protecting the copyright of digital products in digital library, digital watermarking has been proposed as a solution to this problem. This letter describes potential situations that nonlinear theory can be used to enhance robustness and security of the watermark in digital library. Some nonlinear watermark techniques have been enumerated. Experimental results show that the proposed scheme is superior to the general watermark scheme both in security and robustness in digital library. 展开更多
关键词 Digital library Digital watermarking NONLINEAR Copyright protection
下载PDF
Onsite Testing of Ammonium Oxalate Treatment Applied to Historical Salt-Infested Limestone
5
作者 Tabitha Dreyfuss JoAnn Cassar 《Journal of Civil Engineering and Architecture》 2017年第2期175-183,共9页
Ammonium oxalate treatment, previously extensively studied on limestone in the laboratory, was applied to powdering historical stonework (limestone) situated on the shoreline in the Mediterranean Island of Malta. Th... Ammonium oxalate treatment, previously extensively studied on limestone in the laboratory, was applied to powdering historical stonework (limestone) situated on the shoreline in the Mediterranean Island of Malta. This paper presents the results obtained from onsite testing that aimed at evaluating the treatment in terms of its aesthetic performance, the depth of treatment, the mechanical properties of the consolidated stone and the influence on water transport. To this end, the testing program included colorimetry, DRMS (drilling resistance measurement system) and water absorption through the contact sponge method. This study is Part One of the final phase of a wider research program which included two previous phases progressing from treating this same very porous stone type in a laboratory-based controlled environment to uncontrolled site conditions, seeking to quantify this treatment's effectiveness in the field. Results showed that onsite consolidation was achieved and that although some changes in colour and water absorption were brought about by the treatment, these were within acceptable tolerance limits. Besides carrying out these treatments and evaluations directly on the coast, this study anticipates further studies which will look at rural and urban sites where the types and concentrations of salts are expected to be different. 展开更多
关键词 Historical stonework limestone consolidation ammonium oxalate treatment onsite treatment onsite testing.
下载PDF
Music Protection Based on Digital Watermarking and Encryption
6
作者 徐常凯 王耀才 《Journal of China University of Mining and Technology》 2003年第1期60-65,共6页
Two fast and robust digital watermarking schemes for compressed music format and MIDI format are put forward, which are suitable for on-line distribution through the Internet. For compressed music, the watermark is em... Two fast and robust digital watermarking schemes for compressed music format and MIDI format are put forward, which are suitable for on-line distribution through the Internet. For compressed music, the watermark is embedded in partially uncompressed domain and the embedding scheme is closely related to music content. For MIDI, the watermark is embedded in virtual notes that are generated and randomly hide among the MIDI notes. This paper also presents a method for controlling usage and protecting against copying of digital music contents and their associated players. The digital music contents and their players installed in one computer cannot be used if they are copied to another computer. Even in the same computer, the duplicated digital music contents are not usable. The usage associated to the music content will restrict the running time and times. Also the music can be played and it will be automatically updated after each playing. The digital music cannot be accessible if its permitted usage expires. 展开更多
关键词 digital watermarking ENCRYPTION copy protection usage control security key digital music
下载PDF
Ecological Security Assessment of the Yancheng National Nature Reserve based on GIS 被引量:4
7
作者 LI Haiping GAO Ge LI Jing 《Journal of Resources and Ecology》 CSCD 2020年第1期38-49,共12页
This study used remote sensing and GIS to analyze the landscape pattern changes in the Yancheng Nature Reserve from 1983 to 2018,established an evaluation index system based on the regional natural-socio-economic comp... This study used remote sensing and GIS to analyze the landscape pattern changes in the Yancheng Nature Reserve from 1983 to 2018,established an evaluation index system based on the regional natural-socio-economic complex ecosystem security pattern,and then analyzed the spatial characteristics of ecological security changes and discusses reasons for these changes.The results show that the landscape pattern changed dramatically from natural landscape to a mixture of natural landscape and artificial landscape from 1983 to 2018 due to the intensification of human activities.At present,the ecological security status of the protected areas is not optimistic.From the perspective of the survival status of red-crowned cranes,the protected areas are suitable.However,due to the increase of human activities and policy adjustments,the habitat of red-crowned cranes is fragmented.The red-crowned crane currently gathers in localized areas such as the core area and the buffer zone.We should pay more attention to management,policy development and the environmental awareness of local residents.At the same time,it is necessary to reduce the intensity of human activities within the reserve. 展开更多
关键词 ecological security assessment pressure-state-response(P-S-R)model analytical hierarchy process(AHP) index weight Yancheng Nature Reserve
原文传递
A block-based secure and robust watermarking scheme for color images based on multi-resolution decomposition and de-correlation
8
作者 Muhammad IMRANz Bruce AHARVEY +1 位作者 Muhammad ATIF Adnan Ali MEMON 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2019年第7期946-964,共19页
This paper presents a block-based secure and robust watermarking technique for color images based on multi-resolution decomposition and de-correlation.The principal objective of the presented scheme is to simultaneous... This paper presents a block-based secure and robust watermarking technique for color images based on multi-resolution decomposition and de-correlation.The principal objective of the presented scheme is to simultaneously meet all the four requirements(robustness,security,imperceptibility,and capacity)of a good watermarking scheme.The contribution of this study is to basically achieve the four contradictory requirements that a good watermarking scheme must meet.To do so,different approaches are combined in a way that the four requirements are achieved.For instance,to obtain imperceptibility,the three color channels(red,green,and blue)are de-correlated using principal component analysis,and the first principal component(de-correlated red channel)is chosen for watermark embedding.Afterwards,to achieve robustness,the de-correlated channel is decomposed using a discrete wavelet transform(DWT),and the approximate band(the other three bands are kept intact to preserve the edge information)is further decomposed into distinct blocks.The random blocks are chosen based on a random generated key.The random selected blocks are further broken down into singular values and vectors.Based on the mutual dependency on singular values and vectors’matrices,the values are modified depending on the watermarking bits,and their locations are saved and used as another key,required when the watermark is to be extracted.Consequently,two-level authentication levels ensure the security,and using both singular values and vectors increases the capacity of the presented scheme.Moreover,the involvement of both left and right singular vectors along with singular values in the watermarking embedding process strengthens the robustness of the proposed scheme.Finally,to compare the presented scheme with the state-of-the-art schemes in terms of imperceptibility(peak signal-to-noise ratio and structural similarity index),security(with numerous fake keys),robustness(normalized correlation and bit error rate),and capacity,the Gonzalez and Kodak datasets are used.The comparison shows significant improvement of the proposed scheme over existing schemes. 展开更多
关键词 Copyright protection Data hiding Multi-resolution decomposition De-correlation SECURITY
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部