期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
自然灾害下的适足饮水权保护——以2010年西南旱灾为例 被引量:1
1
作者 武艳艳 《求实》 CSSCI 北大核心 2012年第A01期115-117,共3页
引言2010年春季,我国大部分地区受到旱灾的侵扰,尤以西南地区旱情严重,根据国家防总办公室统计数据显示“截至2010年4月8日,全国耕地受旱面积1.21亿亩(多年同期均值1.04亿亩),其中作物受旱9780万亩(重旱2862万亩、干枯1671万... 引言2010年春季,我国大部分地区受到旱灾的侵扰,尤以西南地区旱情严重,根据国家防总办公室统计数据显示“截至2010年4月8日,全国耕地受旱面积1.21亿亩(多年同期均值1.04亿亩),其中作物受旱9780万亩(重旱2862万亩、干枯1671万亩),待播耕地缺水缺墒2280万亩;有2595万人、1844万头大牲畜因旱饮水困难(多年同期均值1144万人、893万头)。其中,云南、贵州、广西、重庆、四川5省(区、市)耕地受旱面积1.01亿亩、占全国的84%,作物受旱7907万亩(重旱2554万亩、干枯1643万亩),待播耕地缺水缺墒2197万亩;有2088万人、1368万头大牲畜因旱饮水困难,分别占全国的80%和74%”。 展开更多
关键词 2010年 西南地区 水权保护 自然灾害 旱灾 数据显示 耕地 办公室
下载PDF
国际河流的水权及其有效利用和保护研究 被引量:18
2
作者 冯彦 何大明 《水科学进展》 EI CAS CSCD 北大核心 2003年第1期124-128,共5页
国际河流水资源由于其自然跨越一个或多个国家而成为流域内各国共享的自然资源,这意味着国际河流水资源的所有权也将为多国共同享有,即多国共同享有河流水资源的所有权(简称"水权")。通过对国际河流水权特点的分析,为实现水... 国际河流水资源由于其自然跨越一个或多个国家而成为流域内各国共享的自然资源,这意味着国际河流水资源的所有权也将为多国共同享有,即多国共同享有河流水资源的所有权(简称"水权")。通过对国际河流水权特点的分析,为实现水资源的有效利用,对国际河流水权市场化和水权保护进行了初步探讨,认识到各国的国际河流水权具有:有限的水资源利用权,水资源的保护义务,在一定条件下进行水权交易的权利,提出:各国的国际河流水权应保持相对的稳定,流域国间应建立一定的水权协议和水权有效利用的监督机制等。 展开更多
关键词 国际河流 水权 市场化 水权保护 水资源
下载PDF
关于《水法》修订目标和方向的几点思考
3
作者 洪国增 曹东平 武慧明 《江苏水利》 2002年第1期16-17,共2页
现行 < 水法 > 受当时认识的局限和立法条件的限制 , 部分法律条款已经不适应新形势的需要以及水资源可持续利用和建立社会主义市场经济体制的要求 . 主要表现在 : ( 1) 长期以来 , 在水资源开发利用的指导思想中 , 存在着重开源... 现行 < 水法 > 受当时认识的局限和立法条件的限制 , 部分法律条款已经不适应新形势的需要以及水资源可持续利用和建立社会主义市场经济体制的要求 . 主要表现在 : ( 1) 长期以来 , 在水资源开发利用的指导思想中 , 存在着重开源、轻节流与保护 , 重经济效益、轻生态与环境保护的问题 , 致使许多地方水源枯竭 , 污染严重 , 生态环境破坏 . ( 2) < 水法 > 规定水资源实行统一管理与分级、分部门管理相结合的管理体制 , 且对流域管理没有规定 , 致使在许多地方 , 特别是一些城市 , 水资源城乡间、地区间分割管理 , 影响了水资源的合理配置和综合效益的发挥 , 难以有效解决普遍存在的缺水和水污染等问题 . ( 3) 水资源管理制度不完善 , 特别是在节约用水、计划用水和水资源保护方面缺乏相应的法律制度 , 致使滥用、浪费、破坏水资源现象普遍 , 水资源利用效率极低 . ( 4) 水权、水资源有偿使用的规定不全面 , 不利于有效保护各方的权益和利用市场机制优化水资源配置 . ( 5) 处罚力度不大 , 操作性不够强等 . 展开更多
关键词 水资源保护 水务一体化管理 节约用水 水权保护 《水法》
下载PDF
An Audio Zero-Watermark Scheme Based on Energy Comparing 被引量:7
4
作者 YANG Yu LEI Min +3 位作者 CHENG Mingzhi LIU Bohuai LIN Guoyuan XIAO Da 《China Communications》 SCIE CSCD 2014年第7期110-116,共7页
Zero-watermark technique,embedding watermark without modifying carriers,has been broadly applied for copyright protection of images.However,there is little research on audio zerowatermark.This paper proposes an audio ... Zero-watermark technique,embedding watermark without modifying carriers,has been broadly applied for copyright protection of images.However,there is little research on audio zerowatermark.This paper proposes an audio zero-watermark scheme based on energy relationship between adjacent audio sections.Taking use of discrete wavelet transformation(DWT),it gets power approximations,or energies,of audio segments.Then,it extracts the audio profile,i.e.the zero-watermark,according to the relative size of energies of consecutive fragments.The experimental results demonstrate that the proposed scheme is robust against general malicious attacks including noise addition,resampling,low-pass filtering,etc.,and this approach effectively solves the contradiction between inaudibility and robustness. 展开更多
关键词 zero-watermark audio water-marking scheme energy comparing
下载PDF
Adaptive audio watermarking based on SNR in localized regions 被引量:1
5
作者 吴国民 庄越挺 +1 位作者 吴飞 潘云鹤 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第B08期53-57,共5页
In this paper, a novel localized audio watermarking scheme based on signal to noise ratio (SNR) to determine a scaling parameter a is proposed. The basic idea is to embed watermark in selected high inflexion regions... In this paper, a novel localized audio watermarking scheme based on signal to noise ratio (SNR) to determine a scaling parameter a is proposed. The basic idea is to embed watermark in selected high inflexion regions, and the intensity of embedded watermarks are modified by adaptively adjusting a. As these high inflexion local regions usually correspond to music edges like sound of percussion instruments, explosion or transition of mixed music, which represent the music rhythm or tempo and are very important to human auditory perception, the embedded watermark is especially expected to escape the distortions caused by time domain synchronization attacks. Taking advantage of localization and SNR, the method shows strong robustness against common problems in audio signal processing, random cropping, time scale modification, etc. 展开更多
关键词 Copyright protection Audio watermarking Time scale modification MDCT
下载PDF
NEW APPROACH TO COPYRIGHT PROTECTION OF IMAGE AGAINST GEOMETRICAL ATTACKS
6
作者 郝红杰 吴一全 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2007年第4期335-342,共8页
To protect the copyright of the image as well as the image quality, a kind of image zero-watermark method based on the Krawtchouk moment invariants and timestamp is proposed. A method is used to protect the image, in ... To protect the copyright of the image as well as the image quality, a kind of image zero-watermark method based on the Krawtchouk moment invariants and timestamp is proposed. A method is used to protect the image, in which features are drawn out from the image as the watermarking. The main steps of the method are presented. Firstly, some low-order moment invariants of the image are extracted. Secondly, the moment invariants and the key are registered to a fair third party to gain the timestamp. Finally, the timestamp can be used to prove who the real owner is. The processing method is simple, only with a few low-order moment invariants to be computed. Experimental results are obtained and compared with those of the method based on geometric moment invariants. Results show that the scheme can well withstand such geometrical attacks as rotating, scaling, cropping, combined attack, translating, removing lines, filtering, and JPEG lossy compression. 展开更多
关键词 image copyright protection digital watermarking geometrical attack Krawtchouk moment invariant
下载PDF
Novel Blind Robust Watermarking Based on Chaotic Mixing 被引量:1
7
作者 王东建 蒋铃鸽 +1 位作者 何晨 冯国瑞 《Journal of Shanghai Jiaotong university(Science)》 EI 2004年第2期10-15,共6页
This paper proposed a novel blind robust watermarking scheme. Multi-bits watermark is embedded in the chaotic mixed image blocks. Energy of the watermark is spread to all region of the blocks instead of some individua... This paper proposed a novel blind robust watermarking scheme. Multi-bits watermark is embedded in the chaotic mixed image blocks. Energy of the watermark is spread to all region of the blocks instead of some individual pixels, which entitles the watermark with imperceptibility and high robustness. A class of 1-D Markov chaotic maps is employed to perform image block mixing and watermark encryption ensures security of the system. To prove the validity of this proposed scheme, some objective comparisons with the popular spread spectrum scheme were also presented. The simulation results show that this scheme can survive processing such as high-ratio JPEG compression, Gaussian noise pollution and histogram equalization. 展开更多
关键词 robust watermark chaotic mixing copyright protection
下载PDF
APPLICATION OF NONLINEAR WATERMARK TECHNIQUES IN DIGITAL LIBRARIES 被引量:1
8
作者 Zhao Jian Zhou Mingquan 《Journal of Electronics(China)》 2005年第5期524-527,共4页
A digital watermark is an invisible mark embedded in a digital image that may be used for a number of different purposes including copyright protection. Due to the urgent need for protecting the copyright of digital p... A digital watermark is an invisible mark embedded in a digital image that may be used for a number of different purposes including copyright protection. Due to the urgent need for protecting the copyright of digital products in digital library, digital watermarking has been proposed as a solution to this problem. This letter describes potential situations that nonlinear theory can be used to enhance robustness and security of the watermark in digital library. Some nonlinear watermark techniques have been enumerated. Experimental results show that the proposed scheme is superior to the general watermark scheme both in security and robustness in digital library. 展开更多
关键词 Digital library Digital watermarking NONLINEAR Copyright protection
下载PDF
Using the Wavelet as the Private Key for Encrypting the Watermark
9
作者 何小帆 《Journal of Chongqing University》 CAS 2002年第1期16-20,共5页
Watermarking is an effective approach to the copyright protection of digital media such as audio, image, and video. By inspiration from cryptography and considering the immensity of the set of all possible wavelets, i... Watermarking is an effective approach to the copyright protection of digital media such as audio, image, and video. By inspiration from cryptography and considering the immensity of the set of all possible wavelets, it is presented that in wavelet domain watermarking, the associated wavelet can be considered as the private key for encrypting the watermark so as to enhance the security of the embedded mark. This idea is partly supported by the fact that from computational complexity viewpoint, it is very time-consuming to search over the immense set of all candidate wavelets for the right one if no a priori knowledge is known about it. To verify our proposal, the standard image 'Lena' is first watermarked in a specific wavelet domain, the watermark recovery experiments are then conducted in the wavelet domain for a set of wavelets with the one used for mark embedded in it,separately. It follows from the experimental results that the mark can be recovered only in the right wavelet domain, which justifies the suggestion. 展开更多
关键词 Digital watermark WATERMARKING CRYPTOGRAPHY Private key cryptographic system WAVELET Daubechies wavelet
下载PDF
DCT based multipurpose watermarking technique for image copyright notification and protection 被引量:2
10
作者 姜守达 陆哲明 吴昊天 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2004年第3期237-239,共3页
A multipurpose image watermarking technique based on DCT is proposed to notify and protect the copyright of digital products. In order to achieve this objective, the DCT coefficients of each image block are divided in... A multipurpose image watermarking technique based on DCT is proposed to notify and protect the copyright of digital products. In order to achieve this objective, the DCT coefficients of each image block are divided into two parts for embedding the visible and invisible watermarks. The visible watermark is embedded in each DC DCT coefficient and most of the AC DCT coefficients of every block, and the invisible watermark in the rest. Based on the characteristics of Human Visual System (HVS), the embedding strength of the visible watermark is varied in accordance with the underlying content of the host image. The invisible watermark is embedded in a quaternity of midrange frequencies. Experimental results show that the visible watermark is hard to remove and the invisible watermark is robust to common digital signal processing operations. 展开更多
关键词 copyright notification visible watermark HVS quantization index modulation
下载PDF
Music Protection Based on Digital Watermarking and Encryption
11
作者 徐常凯 王耀才 《Journal of China University of Mining and Technology》 2003年第1期60-65,共6页
Two fast and robust digital watermarking schemes for compressed music format and MIDI format are put forward, which are suitable for on-line distribution through the Internet. For compressed music, the watermark is em... Two fast and robust digital watermarking schemes for compressed music format and MIDI format are put forward, which are suitable for on-line distribution through the Internet. For compressed music, the watermark is embedded in partially uncompressed domain and the embedding scheme is closely related to music content. For MIDI, the watermark is embedded in virtual notes that are generated and randomly hide among the MIDI notes. This paper also presents a method for controlling usage and protecting against copying of digital music contents and their associated players. The digital music contents and their players installed in one computer cannot be used if they are copied to another computer. Even in the same computer, the duplicated digital music contents are not usable. The usage associated to the music content will restrict the running time and times. Also the music can be played and it will be automatically updated after each playing. The digital music cannot be accessible if its permitted usage expires. 展开更多
关键词 digital watermarking ENCRYPTION copy protection usage control security key digital music
下载PDF
A robust intelligent audio watermarking scheme using support vector machine
12
作者 Mohammad MOSLEH Hadi LATIFPOUR +2 位作者 Mohammad KHEYRANDISH Mahdi MOSLEH Najmeh HOSSEINPOUR 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2016年第12期1320-1330,共11页
Rapid growth in information technology and computer networks has resulted in the universal use of data transmission in the digital domain. However, the major challenge faced by digital data owners is protection of dat... Rapid growth in information technology and computer networks has resulted in the universal use of data transmission in the digital domain. However, the major challenge faced by digital data owners is protection of data against unauthorized copying and distribution. Digital watermark technology is starting to be considered a credible protection method to mitigate the potential challenges that undermine the efficiency of the system. Digital audio watermarking should retain the quality of the host signal in a way that remains inaudible to the human hearing system. It should be sufficiently robust to be resistant against potential attacks, One of the major deficiencies of conventional audio watermarking techniques is the use of non-intelligent decoders in which some sets of specific rules are used for watermark extraction. This paper presents a new robust intelligent audio water- marking scheme using a synergistic combination of singular value decomposition (SVD) and support vector machine (SVM). The methodology involves embedding a watermark data by modulating the singular values in the SVD transform domain. In the extraction process, an intelligent detector using SVM is suggested for extracting the watermark data. By learning the destructive effects of noise, the detector in question can effectively retrieve the watermark. Diverse experiments under various conditions have been carried out to verify the performance of the proposed scheme. Experimental results showed better imperceptibility, higher robustness, lower payload, and higher operational efficiency, for the proposed method than for conventional techniques. 展开更多
关键词 Audio watermarking Copyright protection Singular value decomposition (SVD) Machine learning Support vector machine (SVM)
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部