期刊文献+
共找到885篇文章
< 1 2 45 >
每页显示 20 50 100
A Novel Digital Image Watermarking Scheme on Copyright Protection Based on Network Manufacture Environment 被引量:2
1
作者 LIU Quan WANG Jin (School of Information Engineering,Wuhan University of Technology,Wuhan 430070,China 《武汉理工大学学报》 CAS CSCD 北大核心 2006年第S2期552-556,共5页
In this paper,we propose a novel wavelet-domain digital image watermarking scheme on copyright protection based on network manufacture environment.It codes the watermarking with error correcting coding and encrypts th... In this paper,we propose a novel wavelet-domain digital image watermarking scheme on copyright protection based on network manufacture environment.It codes the watermarking with error correcting coding and encrypts the watermarking with chaotic encryption.It embeds the watermarking into the coefficients which have large absolute values in the middle-frequency parts got by Discrete Wavelet Transform (DWT) repeatedly.The extraction doesn’t need the original image.Experiment results show that the proposed scheme is easy to implement,and has good robustness to some attacks,such as JPEG compression,average filtering,median filtering,wiener filtering,pepper (?) salt noise,especially to cropping and scaling.In order to solve the prob- lem of the copyright protection of the network manufacture production,the problems of digital image production such as tamper preventing and watermarking attacks preventing and so on are discussed.It solves the problems of manufacture information such as secure exchange and transmissions and production copyright protection and so on. 展开更多
关键词 network manufacture copyright protection digital watermarking wavelet transform error CORRECTING coding chaotic ENCRYPTION
下载PDF
Novel copyright protection scheme for digital content 被引量:3
2
作者 Fan Kefeng Wang Meihua +1 位作者 Mo Wei Zhao Xinhua 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第2期423-429,共7页
A novel copyright protection scheme for digital content is presented, which is a private watermarking scheme based on the watermark embedding in the DCT domain and watermark extraction Using independent component anal... A novel copyright protection scheme for digital content is presented, which is a private watermarking scheme based on the watermark embedding in the DCT domain and watermark extraction Using independent component analysis (ICA). The system includes the key for watermark extraction and the host image. The algorithm splits the original image into blocks and classifies these blocks based on visual masking, that is, noise visibility function (NVF). Watermark components with different strength are inserted into chosen direct current components of DCT coefficients according to the classifier. The watermark extraction is based on the characteristic of the statistic independence of the host image, watermark and key. Principle component analysis (PCA) whitening process and FastICA techniques are introduced to ensure a blind watermark extraction without requiring the original image. Experirnental results show the proposed technique is robust under attacks such as image filtering and adding noise, cropping and resizing. In addition, the proposed private watermarking system can be improved to the application of the DTV content protection system. 展开更多
关键词 digital content copyright protection digital watermarking noise visibility function independent component analysis.
下载PDF
Transparent System for Digital Media Copyright Protection in Mobile Business 被引量:1
3
作者 YANG Cheng ZHANG Lihe +1 位作者 WANG Yongbin LIU Jianbo 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1923-1926,共4页
At present, in mobile business, the secure environment in the terminal of users has not been embedded, many cryptology-based methods can not be directly used to protect the copyright of digital media. Under this situa... At present, in mobile business, the secure environment in the terminal of users has not been embedded, many cryptology-based methods can not be directly used to protect the copyright of digital media. Under this situation, a transparent system based on watermark for digital right management and digital copyright protection is proposed in this paper. The transparent system is called WDRM (watermark-based digital rights management) and transparent to users. Its core is WDRM Agent. In this paper, system inner model and procession are designed in detail at first, including the registration, the downloading, the super distribution, and the cooperation. Because the watermark embedding and the extraction algorithms are the kernel in this architecture, we also discuss how to choose and design the algorithms. Then we establish a package for all algorithms in WDRM Agent. 展开更多
关键词 mobile business information security digital copyright protection digital watermark
下载PDF
Lossless and High Robust Watermarking of Electronic Chart for Copyright Protection
4
作者 Jianguo Sun Junyu Lin +1 位作者 Liguo Zhang Shouzheng Liu 《国际计算机前沿大会会议论文集》 2016年第1期112-113,共2页
With the progression of sea exploration and offshore engineering, electronic charts have come to see widespread use in many intelligent applications. Like other digital products, electronic charts are easy to duplicat... With the progression of sea exploration and offshore engineering, electronic charts have come to see widespread use in many intelligent applications. Like other digital products, electronic charts are easy to duplicate and distribute. Some watermarking solutions have proven defective to prevent copying of electronic charts because it’s as easy to forge as it is to redistribute. If the problems of copyright infringement cannot be solved, the creation of these electronic charts will be limited. The most important characteristic of electronic charts is the topological relationships among vertices, but few algorithms can control this feature. A new watermarking algorithm is here proposed as a means of copyright protection, in which the watermarks will be hosted in the electronic chart by taking into account the preservation of the topology. Sometimes, additional vertices are inserted into the middle of two adjacent vertices, sometimes not, which are governed by the value of the watermark. Experiments show that the improved algorithm is better than similar algorithms; it was found to resist geometric attacks and format exchange attacks. 展开更多
关键词 digital watermarking Electronic charts copyright protection REDUNDANCY EMBEDDING TOPOLOGY
下载PDF
Research on the Copyright Protection Technology of Digital Clothing Effect Diagram
5
作者 Yongqiang Chen Lihua Peng 《国际计算机前沿大会会议论文集》 2017年第1期182-184,共3页
As a kind of digital clothing design works,digital clothing effect diagram shows fast and roughly designer intent expression and needs protection of digital copyright protection technology.A novel digital clothing eff... As a kind of digital clothing design works,digital clothing effect diagram shows fast and roughly designer intent expression and needs protection of digital copyright protection technology.A novel digital clothing effect diagram copyright protection scheme and some algorithms based on digital image watermark technology are proposed,used by two-dimensional chaotic encryption watermark generation algorithm to generate watermark data,watermark embedding algorithm twice using genetic algorithm to obtain the optimal embedding position and embedding strength,and watermark verification algorithm to determine the copyright ownership.Experimental results and analyses show that the proposed scheme and algorithms have the feasibility and effectiveness. 展开更多
关键词 CLOTHING effect DIAGRAM digital copyright protection Image WATERMARK PHOTOSHOP
下载PDF
Fragile Watermarking Based on Robust Hidden Information 被引量:1
6
作者 张新鹏 王朔中 《Journal of Shanghai University(English Edition)》 CAS 2003年第3期261-264,共4页
Block-wise fragile watermarks can be used to reveal maliciously tampered areas in multimedia products. However a forged content containing a cloned fragile watermark can be constructed by using a series of watermarked... Block-wise fragile watermarks can be used to reveal maliciously tampered areas in multimedia products. However a forged content containing a cloned fragile watermark can be constructed by using a series of watermarked data. To defeat this type of counterfeit attack, a novel fragile watermarking technique is proposed in which different pseudo-random data are selected for different host products, and the generated fragile watermark is dependent upon the selected information. While inserting the fragile watermark, the pseudo-random information is also robustly embedded into the host data. Because of the difference between the selected information, different watermarked data cannot be used to forge illegal contents containing a valid fragile watermark. 展开更多
关键词 digital watermarking information hiding fragile robust.
下载PDF
Lossless Digital Watermarking Scheme for Image Maps 被引量:2
7
作者 SUN Jianguo ZHENG Chonghui GAO Di 《China Communications》 SCIE CSCD 2014年第8期125-130,共6页
A lossless digital watermarking scheme,which was zero- perturbation on the content and graphics for the digital image maps,is proposed.During the simulation,the scheme has been utilized to model the copyright protecti... A lossless digital watermarking scheme,which was zero- perturbation on the content and graphics for the digital image maps,is proposed.During the simulation,the scheme has been utilized to model the copyright protection program as a commerce application.Compared to the traditional digital watermarking schemes,our scheme operates in redundancy areas of maps and is scalable to topology changes.Experimental results show that,with respect to the geometric attacks and image transformed,the performance of our scheme is better than the classical algorithms based space or frequency domain with much lower complexity.. 展开更多
关键词 数字水印算法 图像映射 无损 数字影像地图 模拟过程 商务应用 保护程序 拓扑变化
下载PDF
Digital Watermarking Scheme for Securing Textual Database Using Histogram Shifting Model
8
作者 Khalid A.El Drandaly Walid Khedr +1 位作者 Islam S.Mohamed Ayman Mohamed Mostafa 《Computers, Materials & Continua》 SCIE EI 2022年第6期5253-5270,共18页
Information security is one of the most important methods of protecting the confidentiality and privacy of internet users.The greater the volume of data,the more the need to increase the security methods for protectin... Information security is one of the most important methods of protecting the confidentiality and privacy of internet users.The greater the volume of data,the more the need to increase the security methods for protecting data from intruders.This task can be challenging for researchers in terms of managing enormous data and maintaining their safety and effectiveness.Protection of digital content is a major issue in maintaining the privacy and secrecy of data.Toward this end,digital watermarking is based on the concept of information security through the insertion and detection of an embedded watermark in an efficient manner.Recent methodologies in the research on digital watermarking result in data distortion after embedding the watermark.This scenario can reduce the efficiency of detecting watermarks as well as violate data confidentiality.This study adapts a robust reversible histogram shifting(HS)technique for textual data in relational databases.Furthermore,the study presents a digital watermarking scheme intended for document copyright protection and proof of ownership.The major advantage of the proposed watermarking scheme is that it can protect digital data and preserve data quality.To the best of our knowledge,this research methodology is promising for use in the HS expansion model for watermarking data on nonnumeric databases.In addition,the results showed that despite exposing the database to an insertion attacks at 50%and 75%of the watermark,the proposed algorithm can recovermore than half of the embedded watermark in all addition and alteration attacks cases.As a result,the watermark information can be retained and restored completely. 展开更多
关键词 information security digital watermarking information hiding histogram shifting technique
下载PDF
A Robust Digital Watermarking Algorithm Based on Finite-Set Discrete Radon Transform Tight Frame
9
作者 Jiangui Zhang Huibin Qi 《Journal of Computer and Communications》 2020年第12期123-133,共11页
<div style="text-align:justify;"> Digital watermarking technology plays a powerful role in the effective protection of digital media copyright, image authentication, image sharing, image information tr... <div style="text-align:justify;"> Digital watermarking technology plays a powerful role in the effective protection of digital media copyright, image authentication, image sharing, image information transmission and other fields. Driven by strong demand, digital image watermarking technology has aroused widespread research interest and has gradually developed into one of the most active research directions in information science. In this paper, we present a novel robust digital watermarking algorithm based on discrete radon transform tight frame in finite-set (FDRT). FDRT of the zero mean image is a tight frame, the frame boundary <em><strong>A</strong></em> = <em><strong>B</strong></em> = 1, the dual of the frame is itself. The decomposition and reconstruction of the FDRT tight frame will not cause the phenomenon of image distortion. The embedding of hidden watermark is to add a weak signal to the strong background of the original image. Watermark extraction is to effectively identify the embedded weak signal. The feasibility of the watermarking algorithm is analyzed from two aspects of information hiding and robustness. We select the independent Gaussian random vector as the watermark series, and the peak signal-to-noise ratio (PSNR) as the visual degradation criterion of the watermark image. Basing the FDRT compact stand dual operator, we derived the relationship among the strength parameter, square sum of watermark series, the PSNR. Using Checkmark system, the simulation results show that the algorithm is robust enough to some very important image processing attacks such as lossy compression, MAP, filtering, segmentation, edge enhancement, jitter, quadratic modulation and general geometric attack (scaling, rotation, shearing), etc. </div> 展开更多
关键词 digital watermarking Data Mining Discrete Radon Transform Tight Frame copyright protection information hiding Finite-Set
下载PDF
Information hiding scheme for vector maps based on fingerprint certification
10
作者 门朝光 孙建国 曹刘娟 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2009年第6期766-770,共5页
An information hiding scheme for vector maps is presented to identify the source after the vector map is leaked in some key application areas. In this scheme, the fingerprint image of the map owner can be converted in... An information hiding scheme for vector maps is presented to identify the source after the vector map is leaked in some key application areas. In this scheme, the fingerprint image of the map owner can be converted into a character string as the watermark, and then the watermark will be embedded into the coordinate descriptions of the attribute file by the "0-bit value" programming method. This programming algorithm ensures that the accuracy is lossless and the graphics is unchanged for any vector map. Experiments show that the presented hiding scheme has stable robustness, the average similarity rate is 97.2% for fingerprints matching and the false non-match rate is 1.38% in the blocking test. In the opening test, the former reaches 84.46% and the latter reaches 5.56%. 展开更多
关键词 信息隐藏 矢量地图 指纹认证 指纹图像 文件描述 编程算法 向量图 匹配率
下载PDF
New Fragile Watermarking Technique to Identify Inserted Video Objects Using H.264 and Color Features
11
作者 Raheem Ogla Eman Shakar Mahmood +1 位作者 Rasha I.Ahmed Abdul Monem S.Rahma 《Computers, Materials & Continua》 SCIE EI 2023年第9期3075-3096,共22页
The transmission of video content over a network raises various issues relating to copyright authenticity,ethics,legality,and privacy.The protection of copyrighted video content is a significant issue in the video ind... The transmission of video content over a network raises various issues relating to copyright authenticity,ethics,legality,and privacy.The protection of copyrighted video content is a significant issue in the video industry,and it is essential to find effective solutions to prevent tampering and modification of digital video content during its transmission through digital media.However,there are stillmany unresolved challenges.This paper aims to address those challenges by proposing a new technique for detectingmoving objects in digital videos,which can help prove the credibility of video content by detecting any fake objects inserted by hackers.The proposed technique involves using two methods,the H.264 and the extraction color features methods,to embed and extract watermarks in video frames.The study tested the performance of the system against various attacks and found it to be robust.The evaluation was done using different metrics such as Peak-Signal-to-Noise Ratio(PSNR),Mean Squared Error(MSE),Structural Similarity Index Measure(SSIM),Bit Correction Ratio(BCR),and Normalized Correlation.The accuracy of identifying moving objects was high,ranging from 96.3%to 98.7%.The system was also able to embed a fragile watermark with a success rate of over 93.65%and had an average capacity of hiding of 78.67.The reconstructed video frames had high quality with a PSNR of at least 65.45 dB and SSIMof over 0.97,making them imperceptible to the human eye.The system also had an acceptable average time difference(T=1.227/s)compared with other state-of-the-art methods. 展开更多
关键词 Video watermarking fragile digital watermark copyright protection moving objects color image features H.264
下载PDF
数字图像多功能水印综述
12
作者 赵蕾 桂小林 +1 位作者 邵屹杨 戴慧珺 《计算机辅助设计与图形学学报》 EI CSCD 北大核心 2024年第2期195-222,共28页
数字图像多功能水印技术通过将多种类型的水印嵌入到同一图像,以实现2种及以上的图像保护功能(版权保护、内容认证、篡改恢复等).当前,数字图像多功能水印算法仍面临着性能和应用场景等方面的挑战.为促进图像多功能水印的进一步发展,首... 数字图像多功能水印技术通过将多种类型的水印嵌入到同一图像,以实现2种及以上的图像保护功能(版权保护、内容认证、篡改恢复等).当前,数字图像多功能水印算法仍面临着性能和应用场景等方面的挑战.为促进图像多功能水印的进一步发展,首先系统地梳理了数字图像水印技术,包括其系统特性、常见分类、关键技术与成果,以及其可实现的功能与应用场景;在此基础上,对近10年来不同类别的多功能水印嵌入模型(融合水印嵌入、零水印嵌入、水印串行嵌入、水印并行嵌入)的相关工作进行归纳与分析;最后,总结了当前数字图像多功能水印技术的不足,展望了后续研究与发展趋势.综合分析发现,多水印的嵌入难免对水印综合性能造成损失,且多功能水印在真实应用场景中的效果仍待改善.人工智能等新技术在数字图像多功能水印中的应用有望提升算法性能. 展开更多
关键词 数字图像水印 多功能水印 版权保护 内容认证 篡改恢复
下载PDF
一种基于认证文件的双方验证模型水印方案
13
作者 吴瑕 郑洪英 肖迪 《计算机工程与科学》 CSCD 北大核心 2024年第4期647-656,共10页
随着边缘计算框架和联邦学习协议的结合,越来越多的深度学习模型版权保护工作被提出,但仅从发送方角度进行所有权验证,无法为接收方提供帮助。大量研究指出,在端-边-云联邦学习系统中,存在恶意用户试图无贡献获取公共模型,甚至向公共模... 随着边缘计算框架和联邦学习协议的结合,越来越多的深度学习模型版权保护工作被提出,但仅从发送方角度进行所有权验证,无法为接收方提供帮助。大量研究指出,在端-边-云联邦学习系统中,存在恶意用户试图无贡献获取公共模型,甚至向公共模型投毒,为此,有必要给接收方提供模型所有权验证方案。该研究在现有神经网络水印方案的基础上,提出了一种基于认证文件的双方验证模型水印方案,添加了认证文件生成步骤,并以模型结构调整实现双方对模型的所有权验证。通过实验验证了所提方案的可行性、鲁棒性以及获得的水印嵌入速度提升。 展开更多
关键词 边缘计算 联邦学习 深度神经网络 模型版权保护 数字水印
下载PDF
人工智能生成内容模型的数字水印技术研究进展
14
作者 郭钊均 李美玲 +4 位作者 周杨铭 彭万里 李晟 钱振兴 张新鹏 《网络空间安全科学学报》 2024年第1期13-39,共27页
人工智能(AI)正在改变世界,人工智能生成内容(AIGC)是当前最前沿的技术之一。探讨人工智能生成内容的演变历程,介绍从AI到AIGC的技术变迁,讨论AIGC引发的相关问题和挑战以及应对策略。同时,关注全球范围内的法律法规和国际动向,分析不... 人工智能(AI)正在改变世界,人工智能生成内容(AIGC)是当前最前沿的技术之一。探讨人工智能生成内容的演变历程,介绍从AI到AIGC的技术变迁,讨论AIGC引发的相关问题和挑战以及应对策略。同时,关注全球范围内的法律法规和国际动向,分析不同国家和组织在人工智能监管方面采取的举措,尤其是中国在全球AI治理中的贡献。着重介绍的是AIGC模型的数字水印(DigitalWatermarking)技术。数字水印已有多年发展的历史,在多媒体确权、防伪、认证等方面发挥了重要作用,随着AIGC的兴起,数字水印在模型保护、内容溯源、样本保护等方面又开始发挥新的作用。关于AIGC模型的数字水印技术研究进展的介绍,将为理解AIGC安全领域的发展提供新的视角维度,为研究AIGC领域的应用实践提供参考。 展开更多
关键词 数字水印 大模型安全 大模型版权保护 大模型水印 生成物版权保护 生成物溯源
下载PDF
A New Mechanism Based on Similar Clouds Watermark for Database’s Information Security 被引量:4
15
作者 HUANGMin CAOJia-heng +1 位作者 PENGZhi-yong ZENGCheng 《Wuhan University Journal of Natural Sciences》 CAS 2004年第4期415-419,共5页
This paper studies the digit watermark technology of numeric attributes in relational database for database's information security. It proposes a new mechanism based on similar clouds watermark and gives the conce... This paper studies the digit watermark technology of numeric attributes in relational database for database's information security. It proposes a new mechanism based on similar clouds watermark and gives the concept of similar clouds. The algorithm SCWA that can insert the meaning watermark and detect it from the watermarked data is described. The mechanism can effectively and broadly scatter the watermark in the database; therefore the watermark is very robust. Key words copyright protection - digit watermark - similar clouds - clouds model CLC number TP 311. 52 Foundation item: Supported by the National Natural Science Foundation of China (60273072) and 863 Hi-technique Research (2002AA4Z3450)Biography: HUANG Min(1979-), female, Ph. D candidate, research direction: database's information security 展开更多
关键词 copyright protection digit watermark similar clouds clouds model
下载PDF
A Novel Database Watermarking Technique Using Blockchain as Trusted Third Party 被引量:1
16
作者 Ahmed S.Alghamdi Surayya Naz +3 位作者 Ammar Saeed Eesa Al Solami Muhammad Kamran Mohammed Saeed Alkatheiri 《Computers, Materials & Continua》 SCIE EI 2022年第1期1585-1601,共17页
With widespread use of relational database in various real-life applications,maintaining integrity and providing copyright protection is gaining keen interest of the researchers.For this purpose,watermarking has been ... With widespread use of relational database in various real-life applications,maintaining integrity and providing copyright protection is gaining keen interest of the researchers.For this purpose,watermarking has been used for quite a long time.Watermarking requires the role of trusted third party and a mechanism to extract digital signatures(watermark)to prove the ownership of the data under dispute.This is often inefficient as lots of processing is required.Moreover,certain malicious attacks,like additive attacks,can give rise to a situation when more than one parties can claim the ownership of the same data by inserting and detecting their own set of watermarks from the same data.To solve this problem,we propose to use blockchain technology—as trusted third party—along with watermarking for providing a means of rights protection of relational databases.Using blockchain for writing the copyright information alongside watermarking helps to secure the watermark as changing the blockchain is very difficult.This way,we combined the resilience of our watermarking scheme and the strength of blockchain technology—for protecting the digital rights information from alteration—to design and implement a robust scheme for digital right protection of relational databases.Moreover,we also discuss how the proposed scheme can also be used for version control.The proposed technique works with nonnumeric features of relational database and does not target only selected tuple or portion(subset)from the database for watermark embedding unlike most of the existing techniques;as a result,the chances of subset selection containing no watermark decrease automatically.The proposed technique employs zerowatermarking approach and hence no intentional error(watermark)is added to the original dataset.The results of the experiments proved the effectiveness of the proposed scheme. 展开更多
关键词 watermarking blockchain digital copyright protection relational databases security
下载PDF
DWT-Based Robust Color Image Watermarking Scheme 被引量:1
17
作者 刘连山 李人厚 高琦 《Journal of Southwest Jiaotong University(English Edition)》 2005年第2期130-134,共5页
A scheme of embedding an encrypted watermark into the green component of a color image is proposed. The embedding process is implemented in the discrete wavelet transformation (DWT) domain, The original binary water... A scheme of embedding an encrypted watermark into the green component of a color image is proposed. The embedding process is implemented in the discrete wavelet transformation (DWT) domain, The original binary watermark image is firstly encrypted through scrambling technique, and then spread with two orthogonal pseudo-random sequences whose mean values are equal to zero, and finally embedded into the DWT low frequency sub-band of green components, The coefficients whose energies are larger than the others are selected to hide watermark, and the hidden watermark strength is determined by the energy ratio between the selected coefficients energies and the mean energy of the subband. The experiment results demonstrate that the proposed watermarking scheme is very robust against the attacks such as additive noise, low-pass filtering, scaling, cropping image, row (or column ) deleting, and }PEG compression. 展开更多
关键词 digital watermark Discrete wavelet transformation Color image copyright protection
下载PDF
Digital Watermark-based Security Technology for Geo-spatial Graphics Data 被引量:2
18
作者 JIA Peihong CHEN Yunzhen +1 位作者 MA Jinsong ZHU Dakui 《Chinese Geographical Science》 SCIE CSCD 2006年第3期276-281,共6页
The paper presents a set of techniques of digital watermarking by which copyright and user rights messages are hidden into geo-spatial graphics data, as well as techniques of compressing and encrypting the watermarked... The paper presents a set of techniques of digital watermarking by which copyright and user rights messages are hidden into geo-spatial graphics data, as well as techniques of compressing and encrypting the watermarked geo-spatial graphics data. The technology aims at tracing and resisting the illegal distribution and duplication of the geo-spatial graphics data product, so as to effectively protect the data producer’s rights as well as to facilitate the secure sharing of geo-spatial graphics data. So far in the GIS field throughout the world, few researches have been made on digital watermarking. The research is a novel exploration both in the field of security management of geo-spatial graphics data and in the applications of digital watermarking technique. An application software employing the pro- posed technology has been developed. A number of experimental tests on the 1∶500,000 digital bathymetric chart of the South China Sea and 1∶10,000 digital topographic map of Jiangsu Province have been conducted to verify the feasibility of the proposed technology. 展开更多
关键词 数字水印 安全性 地理空间图形数据 南海
下载PDF
APPLICATION OF NONLINEAR WATERMARK TECHNIQUES IN DIGITAL LIBRARIES 被引量:1
19
作者 Zhao Jian Zhou Mingquan 《Journal of Electronics(China)》 2005年第5期524-527,共4页
A digital watermark is an invisible mark embedded in a digital image that may be used for a number of different purposes including copyright protection. Due to the urgent need for protecting the copyright of digital p... A digital watermark is an invisible mark embedded in a digital image that may be used for a number of different purposes including copyright protection. Due to the urgent need for protecting the copyright of digital products in digital library, digital watermarking has been proposed as a solution to this problem. This letter describes potential situations that nonlinear theory can be used to enhance robustness and security of the watermark in digital library. Some nonlinear watermark techniques have been enumerated. Experimental results show that the proposed scheme is superior to the general watermark scheme both in security and robustness in digital library. 展开更多
关键词 数字图书馆 数字水印 数字图象 著作权保护
下载PDF
A ROBUST METHOD FOR FINGERPRINTING DIGITAL IMAGES
20
作者 Saad Amer 《Journal of Electronics(China)》 2001年第3期193-203,共11页
In this paper, a method to fingerprint digital images is proposed, and different watermarked copies with different identification string are made. After determining the number of the customers and the length of the wa... In this paper, a method to fingerprint digital images is proposed, and different watermarked copies with different identification string are made. After determining the number of the customers and the length of the watermark string, this method chooses some values inside the digital image using a characteristic function, and adds watermarks to these values in a way that can protect the product against the attacks happened by comparing two fingerprinted copies.The watermarks are a string of binary numbers -1s and 1s. Every customer will be distinguished by a series of 1s and -1s generated by a pseudo-random generator. The owner of the image can determine the number of customers and the length of the string as well as this method will add another watermarking values to watermark string to protect the product. 展开更多
关键词 SECURITY Fingerprinting IMAGES digital watermarking copyright protection
下载PDF
上一页 1 2 45 下一页 到第
使用帮助 返回顶部