期刊文献+
共找到18篇文章
< 1 >
每页显示 20 50 100
一种基于秘密分享的非对称数字指纹体制 被引量:3
1
作者 王彦 吕述望 刘振华 《中国科学技术大学学报》 CAS CSCD 北大核心 2003年第2期237-242,共6页
论文将秘密分享的思想用于非对称数字指纹的构造 ,提出了一种不使用安全多方计算协议的非对称数字指纹体制 .考虑到对用户合谋攻击的容忍性 ,结合一种随机指纹编码方法 ,将该体制改进成具有一定抗用户合谋攻击能力的非对称指纹体制 ,该... 论文将秘密分享的思想用于非对称数字指纹的构造 ,提出了一种不使用安全多方计算协议的非对称数字指纹体制 .考虑到对用户合谋攻击的容忍性 ,结合一种随机指纹编码方法 ,将该体制改进成具有一定抗用户合谋攻击能力的非对称指纹体制 ,该体制具有较好的实现效率 . 展开更多
关键词 非对称数字指纹体制 秘密分享 版权保 安全多方计算协议 随机指纹编码 抗攻击能力
下载PDF
WEIGHTED ALGORITHM FOR FINGERPRINTING RELATIONAL DATABASES 被引量:1
2
作者 崔新春 秦小麟 +1 位作者 管致锦 束瑜 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2008年第2期148-154,共7页
The necessity and the feasibility of introducing attribute weight into digital fingerprinting system are given. The weighted algorithm for fingerprinting relational databases of traitor tracing is proposed. Higher wei... The necessity and the feasibility of introducing attribute weight into digital fingerprinting system are given. The weighted algorithm for fingerprinting relational databases of traitor tracing is proposed. Higher weights are assigned to more significant attributes, so important attributes are more frequently fingerprinted than other ones. Finally, the robustness of the proposed algorithm, such as performance against collusion attacks, is analyzed. Experimental results prove the superiority of the algorithm. 展开更多
关键词 digital fingerprinting relational database systems copyright protection attribute weight traitor tracing
下载PDF
GEOMETRICALLY INVARIANT WATERMARKING BASED ON RADON TRANSFORMATION 被引量:19
3
作者 CaiLian DuSidan GaoDuntang 《Journal of Electronics(China)》 2005年第3期301-306,共6页
The weakness of classical watermarking methods is the vulnerability to geometrical distortions that widely occur during normal use of the media. In this letter, a new image- watermarking method is presented to resist ... The weakness of classical watermarking methods is the vulnerability to geometrical distortions that widely occur during normal use of the media. In this letter, a new image- watermarking method is presented to resist Rotation, Scale and Translation (RST) attacks. The watermark is embedded into a domain obtained by taking Radon transform of a circular area selected from the original image, and then extracting Two-Dimensional (2-D) Fourier magnitude of the Radon transformed image. Furthermore, to prevent the watermarked image from degrading due to inverse Radon transform, watermark signal is inversely Radon transformed individually. Experimental results demonstrate that the proposed scheme is able to withstand a variety of attacks including common geometric attacks. 展开更多
关键词 Copyright protection AUTHENTICATION Radon transformation Geometrical at- tacks Invariant centroid
下载PDF
An Audio Zero-Watermark Scheme Based on Energy Comparing 被引量:7
4
作者 YANG Yu LEI Min +3 位作者 CHENG Mingzhi LIU Bohuai LIN Guoyuan XIAO Da 《China Communications》 SCIE CSCD 2014年第7期110-116,共7页
Zero-watermark technique,embedding watermark without modifying carriers,has been broadly applied for copyright protection of images.However,there is little research on audio zerowatermark.This paper proposes an audio ... Zero-watermark technique,embedding watermark without modifying carriers,has been broadly applied for copyright protection of images.However,there is little research on audio zerowatermark.This paper proposes an audio zero-watermark scheme based on energy relationship between adjacent audio sections.Taking use of discrete wavelet transformation(DWT),it gets power approximations,or energies,of audio segments.Then,it extracts the audio profile,i.e.the zero-watermark,according to the relative size of energies of consecutive fragments.The experimental results demonstrate that the proposed scheme is robust against general malicious attacks including noise addition,resampling,low-pass filtering,etc.,and this approach effectively solves the contradiction between inaudibility and robustness. 展开更多
关键词 zero-watermark audio water-marking scheme energy comparing
下载PDF
NEW APPROACH TO COPYRIGHT PROTECTION OF IMAGE AGAINST GEOMETRICAL ATTACKS
5
作者 郝红杰 吴一全 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI 2007年第4期335-342,共8页
To protect the copyright of the image as well as the image quality, a kind of image zero-watermark method based on the Krawtchouk moment invariants and timestamp is proposed. A method is used to protect the image, in ... To protect the copyright of the image as well as the image quality, a kind of image zero-watermark method based on the Krawtchouk moment invariants and timestamp is proposed. A method is used to protect the image, in which features are drawn out from the image as the watermarking. The main steps of the method are presented. Firstly, some low-order moment invariants of the image are extracted. Secondly, the moment invariants and the key are registered to a fair third party to gain the timestamp. Finally, the timestamp can be used to prove who the real owner is. The processing method is simple, only with a few low-order moment invariants to be computed. Experimental results are obtained and compared with those of the method based on geometric moment invariants. Results show that the scheme can well withstand such geometrical attacks as rotating, scaling, cropping, combined attack, translating, removing lines, filtering, and JPEG lossy compression. 展开更多
关键词 image copyright protection digital watermarking geometrical attack Krawtchouk moment invariant
下载PDF
Multipurpose audio watermarking algorithm 被引量:3
6
作者 Ning CHEN Jie ZHU 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2008年第4期517-523,共7页
To make audio watermarking accomplish both copyright protection and content authentication with localization, a novel multipurpose audio watermarking scheme is proposed in this paper. The zero-watermarking idea is int... To make audio watermarking accomplish both copyright protection and content authentication with localization, a novel multipurpose audio watermarking scheme is proposed in this paper. The zero-watermarking idea is introduced into the design of robust watermarking algorithm to ensure the transparency and to avoid the interference between the robust watermark and the semi-fragile watermark. The property of natural audio that the VQ indices of DWT-DCT coefficients among neighboring frames tend to be very similar is utilized to extract essential feature from the host audio, which is then used for watermark ex-traction. And, the chaotic mapping based semi-fragile watermark is embedded in the detail wavelet coefficients based on the instantaneous mixing model of the independent component analysis (ICA) system. Both the robust and semi-fragile watermarks can be extracted blindly and the semi-fragile watermarking algorithm can localize the tampering accurately. Simulation results demonstrate the effectiveness of our algorithm in terms of transparency, security, robustness and tampering localization ability. 展开更多
关键词 Multipurpose audio watermarking Copyright protection Content authentication
下载PDF
DCT based multipurpose watermarking technique for image copyright notification and protection 被引量:2
7
作者 姜守达 陆哲明 吴昊天 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2004年第3期237-239,共3页
A multipurpose image watermarking technique based on DCT is proposed to notify and protect the copyright of digital products. In order to achieve this objective, the DCT coefficients of each image block are divided in... A multipurpose image watermarking technique based on DCT is proposed to notify and protect the copyright of digital products. In order to achieve this objective, the DCT coefficients of each image block are divided into two parts for embedding the visible and invisible watermarks. The visible watermark is embedded in each DC DCT coefficient and most of the AC DCT coefficients of every block, and the invisible watermark in the rest. Based on the characteristics of Human Visual System (HVS), the embedding strength of the visible watermark is varied in accordance with the underlying content of the host image. The invisible watermark is embedded in a quaternity of midrange frequencies. Experimental results show that the visible watermark is hard to remove and the invisible watermark is robust to common digital signal processing operations. 展开更多
关键词 copyright notification visible watermark HVS quantization index modulation
下载PDF
Adaptive audio watermarking based on SNR in localized regions 被引量:1
8
作者 吴国民 庄越挺 +1 位作者 吴飞 潘云鹤 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2005年第B08期53-57,共5页
In this paper, a novel localized audio watermarking scheme based on signal to noise ratio (SNR) to determine a scaling parameter a is proposed. The basic idea is to embed watermark in selected high inflexion regions... In this paper, a novel localized audio watermarking scheme based on signal to noise ratio (SNR) to determine a scaling parameter a is proposed. The basic idea is to embed watermark in selected high inflexion regions, and the intensity of embedded watermarks are modified by adaptively adjusting a. As these high inflexion local regions usually correspond to music edges like sound of percussion instruments, explosion or transition of mixed music, which represent the music rhythm or tempo and are very important to human auditory perception, the embedded watermark is especially expected to escape the distortions caused by time domain synchronization attacks. Taking advantage of localization and SNR, the method shows strong robustness against common problems in audio signal processing, random cropping, time scale modification, etc. 展开更多
关键词 Copyright protection Audio watermarking Time scale modification MDCT
下载PDF
Novel Blind Robust Watermarking Based on Chaotic Mixing 被引量:1
9
作者 王东建 蒋铃鸽 +1 位作者 何晨 冯国瑞 《Journal of Shanghai Jiaotong university(Science)》 EI 2004年第2期10-15,共6页
This paper proposed a novel blind robust watermarking scheme. Multi-bits watermark is embedded in the chaotic mixed image blocks. Energy of the watermark is spread to all region of the blocks instead of some individua... This paper proposed a novel blind robust watermarking scheme. Multi-bits watermark is embedded in the chaotic mixed image blocks. Energy of the watermark is spread to all region of the blocks instead of some individual pixels, which entitles the watermark with imperceptibility and high robustness. A class of 1-D Markov chaotic maps is employed to perform image block mixing and watermark encryption ensures security of the system. To prove the validity of this proposed scheme, some objective comparisons with the popular spread spectrum scheme were also presented. The simulation results show that this scheme can survive processing such as high-ratio JPEG compression, Gaussian noise pollution and histogram equalization. 展开更多
关键词 robust watermark chaotic mixing copyright protection
下载PDF
Using the Wavelet as the Private Key for Encrypting the Watermark
10
作者 何小帆 《Journal of Chongqing University》 CAS 2002年第1期16-20,共5页
Watermarking is an effective approach to the copyright protection of digital media such as audio, image, and video. By inspiration from cryptography and considering the immensity of the set of all possible wavelets, i... Watermarking is an effective approach to the copyright protection of digital media such as audio, image, and video. By inspiration from cryptography and considering the immensity of the set of all possible wavelets, it is presented that in wavelet domain watermarking, the associated wavelet can be considered as the private key for encrypting the watermark so as to enhance the security of the embedded mark. This idea is partly supported by the fact that from computational complexity viewpoint, it is very time-consuming to search over the immense set of all candidate wavelets for the right one if no a priori knowledge is known about it. To verify our proposal, the standard image 'Lena' is first watermarked in a specific wavelet domain, the watermark recovery experiments are then conducted in the wavelet domain for a set of wavelets with the one used for mark embedded in it,separately. It follows from the experimental results that the mark can be recovered only in the right wavelet domain, which justifies the suggestion. 展开更多
关键词 Digital watermark WATERMARKING CRYPTOGRAPHY Private key cryptographic system WAVELET Daubechies wavelet
下载PDF
Music Protection Based on Digital Watermarking and Encryption
11
作者 徐常凯 王耀才 《Journal of China University of Mining and Technology》 2003年第1期60-65,共6页
Two fast and robust digital watermarking schemes for compressed music format and MIDI format are put forward, which are suitable for on-line distribution through the Internet. For compressed music, the watermark is em... Two fast and robust digital watermarking schemes for compressed music format and MIDI format are put forward, which are suitable for on-line distribution through the Internet. For compressed music, the watermark is embedded in partially uncompressed domain and the embedding scheme is closely related to music content. For MIDI, the watermark is embedded in virtual notes that are generated and randomly hide among the MIDI notes. This paper also presents a method for controlling usage and protecting against copying of digital music contents and their associated players. The digital music contents and their players installed in one computer cannot be used if they are copied to another computer. Even in the same computer, the duplicated digital music contents are not usable. The usage associated to the music content will restrict the running time and times. Also the music can be played and it will be automatically updated after each playing. The digital music cannot be accessible if its permitted usage expires. 展开更多
关键词 digital watermarking ENCRYPTION copy protection usage control security key digital music
下载PDF
Onsite Testing of Ammonium Oxalate Treatment Applied to Historical Salt-Infested Limestone
12
作者 Tabitha Dreyfuss JoAnn Cassar 《Journal of Civil Engineering and Architecture》 2017年第2期175-183,共9页
Ammonium oxalate treatment, previously extensively studied on limestone in the laboratory, was applied to powdering historical stonework (limestone) situated on the shoreline in the Mediterranean Island of Malta. Th... Ammonium oxalate treatment, previously extensively studied on limestone in the laboratory, was applied to powdering historical stonework (limestone) situated on the shoreline in the Mediterranean Island of Malta. This paper presents the results obtained from onsite testing that aimed at evaluating the treatment in terms of its aesthetic performance, the depth of treatment, the mechanical properties of the consolidated stone and the influence on water transport. To this end, the testing program included colorimetry, DRMS (drilling resistance measurement system) and water absorption through the contact sponge method. This study is Part One of the final phase of a wider research program which included two previous phases progressing from treating this same very porous stone type in a laboratory-based controlled environment to uncontrolled site conditions, seeking to quantify this treatment's effectiveness in the field. Results showed that onsite consolidation was achieved and that although some changes in colour and water absorption were brought about by the treatment, these were within acceptable tolerance limits. Besides carrying out these treatments and evaluations directly on the coast, this study anticipates further studies which will look at rural and urban sites where the types and concentrations of salts are expected to be different. 展开更多
关键词 Historical stonework limestone consolidation ammonium oxalate treatment onsite treatment onsite testing.
下载PDF
Intellectual Property: Access to Culture and Sustainable Competition
13
作者 Ingrida Veiksa 《Journal of Modern Accounting and Auditing》 2013年第2期297-303,共7页
This paper deals with intellectual property protection problems in the information society, when it is so easy to access unauthorised content (to pirate). Society does not care much about the damages of right owners... This paper deals with intellectual property protection problems in the information society, when it is so easy to access unauthorised content (to pirate). Society does not care much about the damages of right owners. Internet is often considered as a "public place", and works on Internet are considered as "displayed in public places" from which a lawful restriction of rights is permitted. It promotes unfair competition and hinders the development of sustainable business. Lawful use of protected copyright content is a tool for ensuring equal and sustainable competition level among entrepreneurs. On Internet, there are many copyright-protected works available. Many members of society wish to get an access to these works, which means that a solution should be found. For private and non-commercial use, there should be reasonable limitations. Combating piracy on Intemet using enforcement tools alone does not yield results. Piracy should be placed in a frame accepted by a civilized society, and the society and authors should get the maximum benefits from it. 展开更多
关键词 copyright information society COMPETITION PIRACY "culture access" fee
下载PDF
浅谈版权标记的现实意义及其用法 被引量:2
14
作者 秦珂 《中国科技期刊研究》 CSSCI 北大核心 2008年第4期606-607,共2页
本文简介国际版权法和一些国家关于版权标记的相关法规,一些国际期刊使用版权标记的做法;分析了我国期刊维护权益存在的法律障碍和使用版权标记的现状;阐述了版权标记对我国期刊维护权益的现实意义和具体使用方法。
关键词 期刊版权 版权标记 版权保
原文传递
Copyright Protection Mode for Geological Information Sharing under the Environment for Network
15
作者 Ruixue Jiang 《International English Education Research》 2015年第11期84-86,共3页
Using copyright rules clear government of geological information property rights is the main path to realization of geological information socially sharing. For China's current laws have an institute basic principle ... Using copyright rules clear government of geological information property rights is the main path to realization of geological information socially sharing. For China's current laws have an institute basic principle of geological information protected by copyright law, we need to detailed thinking the copyright subject, write content, licensing and other aspects, combine the geological information sharing mechanism. 展开更多
关键词 Geological Information Property Right Database Right
下载PDF
日本知识产权战略大纲 被引量:4
16
作者 钱孟姗 《网络法律评论》 2004年第1期284-313,共30页
前言日本经济所面临的环境依然很严峻,需要通过提高日本的国际竞争力来进行社会和经济的复苏。要把科技、文化等诸多领域的创造成果,与产业的发展和国民生活水平的提高结合起来,因而实现"知识产权立国"这一目标。为了朝着这... 前言日本经济所面临的环境依然很严峻,需要通过提高日本的国际竞争力来进行社会和经济的复苏。要把科技、文化等诸多领域的创造成果,与产业的发展和国民生活水平的提高结合起来,因而实现"知识产权立国"这一目标。为了朝着这一目标实施各项改革,知识产权战略大纲给出了日本政府有关实现"知识产权立国"目标的基本构想。 展开更多
关键词 经济产业省 研究开发成果 科学技术会议 研究机构 文部科学省 创造成果 假冒产品 国际竞争力 版权保
原文传递
A block-based secure and robust watermarking scheme for color images based on multi-resolution decomposition and de-correlation
17
作者 Muhammad IMRANz Bruce AHARVEY +1 位作者 Muhammad ATIF Adnan Ali MEMON 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2019年第7期946-964,共19页
This paper presents a block-based secure and robust watermarking technique for color images based on multi-resolution decomposition and de-correlation.The principal objective of the presented scheme is to simultaneous... This paper presents a block-based secure and robust watermarking technique for color images based on multi-resolution decomposition and de-correlation.The principal objective of the presented scheme is to simultaneously meet all the four requirements(robustness,security,imperceptibility,and capacity)of a good watermarking scheme.The contribution of this study is to basically achieve the four contradictory requirements that a good watermarking scheme must meet.To do so,different approaches are combined in a way that the four requirements are achieved.For instance,to obtain imperceptibility,the three color channels(red,green,and blue)are de-correlated using principal component analysis,and the first principal component(de-correlated red channel)is chosen for watermark embedding.Afterwards,to achieve robustness,the de-correlated channel is decomposed using a discrete wavelet transform(DWT),and the approximate band(the other three bands are kept intact to preserve the edge information)is further decomposed into distinct blocks.The random blocks are chosen based on a random generated key.The random selected blocks are further broken down into singular values and vectors.Based on the mutual dependency on singular values and vectors’matrices,the values are modified depending on the watermarking bits,and their locations are saved and used as another key,required when the watermark is to be extracted.Consequently,two-level authentication levels ensure the security,and using both singular values and vectors increases the capacity of the presented scheme.Moreover,the involvement of both left and right singular vectors along with singular values in the watermarking embedding process strengthens the robustness of the proposed scheme.Finally,to compare the presented scheme with the state-of-the-art schemes in terms of imperceptibility(peak signal-to-noise ratio and structural similarity index),security(with numerous fake keys),robustness(normalized correlation and bit error rate),and capacity,the Gonzalez and Kodak datasets are used.The comparison shows significant improvement of the proposed scheme over existing schemes. 展开更多
关键词 Copyright protection Data hiding Multi-resolution decomposition De-correlation SECURITY
原文传递
A robust intelligent audio watermarking scheme using support vector machine
18
作者 Mohammad MOSLEH Hadi LATIFPOUR +2 位作者 Mohammad KHEYRANDISH Mahdi MOSLEH Najmeh HOSSEINPOUR 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2016年第12期1320-1330,共11页
Rapid growth in information technology and computer networks has resulted in the universal use of data transmission in the digital domain. However, the major challenge faced by digital data owners is protection of dat... Rapid growth in information technology and computer networks has resulted in the universal use of data transmission in the digital domain. However, the major challenge faced by digital data owners is protection of data against unauthorized copying and distribution. Digital watermark technology is starting to be considered a credible protection method to mitigate the potential challenges that undermine the efficiency of the system. Digital audio watermarking should retain the quality of the host signal in a way that remains inaudible to the human hearing system. It should be sufficiently robust to be resistant against potential attacks, One of the major deficiencies of conventional audio watermarking techniques is the use of non-intelligent decoders in which some sets of specific rules are used for watermark extraction. This paper presents a new robust intelligent audio water- marking scheme using a synergistic combination of singular value decomposition (SVD) and support vector machine (SVM). The methodology involves embedding a watermark data by modulating the singular values in the SVD transform domain. In the extraction process, an intelligent detector using SVM is suggested for extracting the watermark data. By learning the destructive effects of noise, the detector in question can effectively retrieve the watermark. Diverse experiments under various conditions have been carried out to verify the performance of the proposed scheme. Experimental results showed better imperceptibility, higher robustness, lower payload, and higher operational efficiency, for the proposed method than for conventional techniques. 展开更多
关键词 Audio watermarking Copyright protection Singular value decomposition (SVD) Machine learning Support vector machine (SVM)
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部