期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Overview of the Impact of the Introduction of the Copyright Act 2020 on Digital Publishing
1
作者 MA Jingyun 《Cultural and Religious Studies》 2024年第1期64-69,共6页
In November 2020,the third amendment of the Copyright Law of the People’s Republic of China was completed and officially implemented in June 2021,which is undoubtedly of great significance to Chinese citizens with a ... In November 2020,the third amendment of the Copyright Law of the People’s Republic of China was completed and officially implemented in June 2021,which is undoubtedly of great significance to Chinese citizens with a growing awareness of copyright.This has also triggered our thinking about the impact of Copyright Law on digital copyright.Through the analysis of the cases after the amendment of the Copyright Law,we find that to a certain extent,the Copyright Law has played a great role in the protection of digital copyright,but it is still unable to achieve comprehensive protection,and there are still some imperfections.From this point of view,the simple legal protection of digital copyright cannot be taken into account.It still needs to be combined with technical protection means,cooperate with social conditions,and work together to create a harmonious and healthy online publishing environment and promote the protection of digital copyright. 展开更多
关键词 digital copyright copyright Law infringement phenomenon
下载PDF
Transparent System for Digital Media Copyright Protection in Mobile Business 被引量:1
2
作者 YANG Cheng ZHANG Lihe +1 位作者 WANG Yongbin LIU Jianbo 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1923-1926,共4页
At present, in mobile business, the secure environment in the terminal of users has not been embedded, many cryptology-based methods can not be directly used to protect the copyright of digital media. Under this situa... At present, in mobile business, the secure environment in the terminal of users has not been embedded, many cryptology-based methods can not be directly used to protect the copyright of digital media. Under this situation, a transparent system based on watermark for digital right management and digital copyright protection is proposed in this paper. The transparent system is called WDRM (watermark-based digital rights management) and transparent to users. Its core is WDRM Agent. In this paper, system inner model and procession are designed in detail at first, including the registration, the downloading, the super distribution, and the cooperation. Because the watermark embedding and the extraction algorithms are the kernel in this architecture, we also discuss how to choose and design the algorithms. Then we establish a package for all algorithms in WDRM Agent. 展开更多
关键词 mobile business information security digital copyright protection digital watermark
下载PDF
A New Watermarking Protocol against Conspiracy
3
作者 ZHANG Jun KOU Weidong FAN Kai CAO Xuefei 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1671-1674,共4页
A trusted third party introduced in watermarking protocols would decrease the security and affect the implementation of the protocols. In this paper, a new watermarking protocol with an un-trusted third party (UTTP)... A trusted third party introduced in watermarking protocols would decrease the security and affect the implementation of the protocols. In this paper, a new watermarking protocol with an un-trusted third party (UTTP) was proposed. Based on the idea of all-or-nothing disclosure of secret (ANDOS), all of the buyer, the seller and the third party didn't know the exact watermark, which was embedded in a digital content for tracing piracy. The proposed protocol provided mechanisms to trace piracy and protect customer's right. In addition, the problem that a seller colluded with UTTP to frame the buyer, namely, the conspiracy problem, could be avoided. 展开更多
关键词 watermarking protocol electronic commerce security digital copyright protection conspiracy problem
下载PDF
A Novel Database Watermarking Technique Using Blockchain as Trusted Third Party
4
作者 Ahmed S.Alghamdi Surayya Naz +3 位作者 Ammar Saeed Eesa Al Solami Muhammad Kamran Mohammed Saeed Alkatheiri 《Computers, Materials & Continua》 SCIE EI 2022年第1期1585-1601,共17页
With widespread use of relational database in various real-life applications,maintaining integrity and providing copyright protection is gaining keen interest of the researchers.For this purpose,watermarking has been ... With widespread use of relational database in various real-life applications,maintaining integrity and providing copyright protection is gaining keen interest of the researchers.For this purpose,watermarking has been used for quite a long time.Watermarking requires the role of trusted third party and a mechanism to extract digital signatures(watermark)to prove the ownership of the data under dispute.This is often inefficient as lots of processing is required.Moreover,certain malicious attacks,like additive attacks,can give rise to a situation when more than one parties can claim the ownership of the same data by inserting and detecting their own set of watermarks from the same data.To solve this problem,we propose to use blockchain technology—as trusted third party—along with watermarking for providing a means of rights protection of relational databases.Using blockchain for writing the copyright information alongside watermarking helps to secure the watermark as changing the blockchain is very difficult.This way,we combined the resilience of our watermarking scheme and the strength of blockchain technology—for protecting the digital rights information from alteration—to design and implement a robust scheme for digital right protection of relational databases.Moreover,we also discuss how the proposed scheme can also be used for version control.The proposed technique works with nonnumeric features of relational database and does not target only selected tuple or portion(subset)from the database for watermark embedding unlike most of the existing techniques;as a result,the chances of subset selection containing no watermark decrease automatically.The proposed technique employs zerowatermarking approach and hence no intentional error(watermark)is added to the original dataset.The results of the experiments proved the effectiveness of the proposed scheme. 展开更多
关键词 WATERMARKING blockchain digital copyright protection relational databases security
下载PDF
A simple fingerprinting scheme for large user groups 被引量:2
5
作者 Defa HU Qiaoliang LI 《Frontiers of Computer Science》 SCIE EI CSCD 2011年第2期163-168,共6页
Digital fingerprinting is an emerging technology to protect multimedia data from piracy, where each distributed copy is labeled with unique identification information. In coded fingerprinting, each codeword of the ant... Digital fingerprinting is an emerging technology to protect multimedia data from piracy, where each distributed copy is labeled with unique identification information. In coded fingerprinting, each codeword of the anti-collusion code is used to represent a user's fingerprint. In real-world applications, the number of potential users can be very large and hence, the used anti- collusion code should be easy to construct and have as many codewords as possible. This paper proposes a simple coded fingerprinting scheme, where the anti- collusion code is constructed with an identity matrix. The main advantage of our scheme is its simplicity, as a large number of fingerprints can easily be generated to accommodate a large number of users. To improve collusion resistance, some transformations are performed on the original fingerprint in the embedding phase and the corresponding inverse transformations are performed on the extracted sequence in the detection phase. 展开更多
关键词 digital fingerprinting digital copyright pro-tection identity matrix collusion resistance
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部