The rapid development of the digital economy has provided a new impetus for rural residents to extend their working hours.Based on the data collected by the China Labor-force Dynamics Survey(CLDS)in 2014,2016,and 2018...The rapid development of the digital economy has provided a new impetus for rural residents to extend their working hours.Based on the data collected by the China Labor-force Dynamics Survey(CLDS)in 2014,2016,and 2018,this paper measured the development level of the digital economy in China from the perspectives of internet development and digital financial inclusion,and tested the mechanisms of how the digital economy affected rural residents’working hours.The results showed that the digital economy extended rural residents’working hours by expanding information channels and enhancing human capital,and this mechanism was affected by heterogeneity in rural residents’educational background,age,and social capital.Building on these findings,this paper holds that to increase rural residents’income by extending their working hours and achieving common prosperity for all,it is necessary to expand the opportunities for rural residents to participate in skills training and promote their accumulation of human capital.展开更多
In November 2020,the third amendment of the Copyright Law of the People’s Republic of China was completed and officially implemented in June 2021,which is undoubtedly of great significance to Chinese citizens with a ...In November 2020,the third amendment of the Copyright Law of the People’s Republic of China was completed and officially implemented in June 2021,which is undoubtedly of great significance to Chinese citizens with a growing awareness of copyright.This has also triggered our thinking about the impact of Copyright Law on digital copyright.Through the analysis of the cases after the amendment of the Copyright Law,we find that to a certain extent,the Copyright Law has played a great role in the protection of digital copyright,but it is still unable to achieve comprehensive protection,and there are still some imperfections.From this point of view,the simple legal protection of digital copyright cannot be taken into account.It still needs to be combined with technical protection means,cooperate with social conditions,and work together to create a harmonious and healthy online publishing environment and promote the protection of digital copyright.展开更多
Introduction: Iliac particulate cancellous bone and marrow (PCBM) is commonly used as a high-quality reconstruction material;however, PCBM cannot be extracted in sufficient amounts to meet demand. To determine the app...Introduction: Iliac particulate cancellous bone and marrow (PCBM) is commonly used as a high-quality reconstruction material;however, PCBM cannot be extracted in sufficient amounts to meet demand. To determine the appropriate amount of iliac PCBM to be collected, we used digital technology to measure the volume required for jaw reconstruction before surgery. Clinical Case: The patient, a 23-year-old man, underwent surgery for a calcifying odontogenic cyst. A maxillary cyst occupied the left anterior-premolar region (tooth 21 - 25) and the deciduous canine remained;a permanent canine was included in the cyst. We planned to preserve the teeth except for the impacted canine, completely excise the maxillary cyst, and preserve the alveolar ridge morphology. Preoperative digital imaging was used to determine the amount of alveolar ridge reconstruction required and accordingly determine the amount of iliac cancellous bone to be harvested. We used a titanium mesh tray and grafts of iliac particulate cancellous bone and marrow to reconstruct the alveolar ridge. The amount of iliac cancellous bone that needed to be collected was clarified and the supply amount could be collected in just the right amount;thus, the cortical bone of the iliac inner plate could be preserved. The alveolar bone morphology was reconstructed to allow the placement of dental implants as per the preoperative digital surgery. Three years after the operation, no sign of recurrence has been observed. Conclusion: Minimally invasive surgery was performed by clarifying the amount of iliac cancellous bone graft that needs to be harvested, which improved the accuracy of surgery.展开更多
In this paper,we propose a novel wavelet-domain digital image watermarking scheme on copyright protection based on network manufacture environment.It codes the watermarking with error correcting coding and encrypts th...In this paper,we propose a novel wavelet-domain digital image watermarking scheme on copyright protection based on network manufacture environment.It codes the watermarking with error correcting coding and encrypts the watermarking with chaotic encryption.It embeds the watermarking into the coefficients which have large absolute values in the middle-frequency parts got by Discrete Wavelet Transform (DWT) repeatedly.The extraction doesn’t need the original image.Experiment results show that the proposed scheme is easy to implement,and has good robustness to some attacks,such as JPEG compression,average filtering,median filtering,wiener filtering,pepper (?) salt noise,especially to cropping and scaling.In order to solve the prob- lem of the copyright protection of the network manufacture production,the problems of digital image production such as tamper preventing and watermarking attacks preventing and so on are discussed.It solves the problems of manufacture information such as secure exchange and transmissions and production copyright protection and so on.展开更多
A novel copyright protection scheme for digital content is presented, which is a private watermarking scheme based on the watermark embedding in the DCT domain and watermark extraction Using independent component anal...A novel copyright protection scheme for digital content is presented, which is a private watermarking scheme based on the watermark embedding in the DCT domain and watermark extraction Using independent component analysis (ICA). The system includes the key for watermark extraction and the host image. The algorithm splits the original image into blocks and classifies these blocks based on visual masking, that is, noise visibility function (NVF). Watermark components with different strength are inserted into chosen direct current components of DCT coefficients according to the classifier. The watermark extraction is based on the characteristic of the statistic independence of the host image, watermark and key. Principle component analysis (PCA) whitening process and FastICA techniques are introduced to ensure a blind watermark extraction without requiring the original image. Experirnental results show the proposed technique is robust under attacks such as image filtering and adding noise, cropping and resizing. In addition, the proposed private watermarking system can be improved to the application of the DTV content protection system.展开更多
A method for creating digital image copyright protection is proposed in this paper. The proposed method in this paper is based on visual cryptography defined by Noor and Shamir. The proposed method is working on selec...A method for creating digital image copyright protection is proposed in this paper. The proposed method in this paper is based on visual cryptography defined by Noor and Shamir. The proposed method is working on selection of random pixels from the original digital image instead of specific selection of pixels. The new method proposed does not require that the watermark pattern to be embedded in to the original digital image. Instead of that, verification information is generated which will be used to verify the ownership of the image. This leaves the marked image equal to the original image. The method is based on the relationship between randomly selected pixels and their 8-neighbors’ pixels. This relationship keeps the marked image coherent against diverse attacks even if the most significant bits of randomly selected pixels have been changed by attacker as we will see later in this paper. Experimental results show the proposed method can recover the watermark pattern from the marked image even if major changes are made to the original digital image.展开更多
At present, in mobile business, the secure environment in the terminal of users has not been embedded, many cryptology-based methods can not be directly used to protect the copyright of digital media. Under this situa...At present, in mobile business, the secure environment in the terminal of users has not been embedded, many cryptology-based methods can not be directly used to protect the copyright of digital media. Under this situation, a transparent system based on watermark for digital right management and digital copyright protection is proposed in this paper. The transparent system is called WDRM (watermark-based digital rights management) and transparent to users. Its core is WDRM Agent. In this paper, system inner model and procession are designed in detail at first, including the registration, the downloading, the super distribution, and the cooperation. Because the watermark embedding and the extraction algorithms are the kernel in this architecture, we also discuss how to choose and design the algorithms. Then we establish a package for all algorithms in WDRM Agent.展开更多
1 Introduction High-speed networking can now deliver Information tomillions of users in seconds.Users In turn can download thedata in electronic format or just print them out with a fewstrokes of the keyboard.The data...1 Introduction High-speed networking can now deliver Information tomillions of users in seconds.Users In turn can download thedata in electronic format or just print them out with a fewstrokes of the keyboard.The data can be easily saved,reorganized and modified electronocally.While informationtechnology provides fast and easy ways to distributeinformation,it also presents challenges.Easy access tocopyrighted materials is resulting in the unauthorizedreproduction of all kinds of information,forcing info...展开更多
This paper analyzes the perception of the librarians in China's Mainland about the copyright during the development of digital libraries with Hong Kong Special Administrative Region(HK SAR) and Taiwan, China as th...This paper analyzes the perception of the librarians in China's Mainland about the copyright during the development of digital libraries with Hong Kong Special Administrative Region(HK SAR) and Taiwan, China as the reference system, through questionnaire survey of copyright cases of the digital libraries by investigating the digital library builders and librarians of 30 universities from China's Mainland, HK SAR and Taiwan,China ranked among the top 500 in the Academic Ranking of World Universities(SJTU Version). The report holds that: 1) The copyright law shall evolve with the times and be revised from time to time; 2) it is imperative to popularize and educate in the copyright law; 3) the guidelines for the use of the copyright law of the education industry shall be developed as soon as possible; and 4) the Collective Management of Copyright Regulations shall be enforced as early as possible.展开更多
As a kind of digital clothing design works,digital clothing effect diagram shows fast and roughly designer intent expression and needs protection of digital copyright protection technology.A novel digital clothing eff...As a kind of digital clothing design works,digital clothing effect diagram shows fast and roughly designer intent expression and needs protection of digital copyright protection technology.A novel digital clothing effect diagram copyright protection scheme and some algorithms based on digital image watermark technology are proposed,used by two-dimensional chaotic encryption watermark generation algorithm to generate watermark data,watermark embedding algorithm twice using genetic algorithm to obtain the optimal embedding position and embedding strength,and watermark verification algorithm to determine the copyright ownership.Experimental results and analyses show that the proposed scheme and algorithms have the feasibility and effectiveness.展开更多
Non-fungible token(NFT)emerges with the marvelous explosion of the metaverse.NFT digital works are profoundly impacting the existing copyright system,which needs to be amended and responded to in time.There is a possi...Non-fungible token(NFT)emerges with the marvelous explosion of the metaverse.NFT digital works are profoundly impacting the existing copyright system,which needs to be amended and responded to in time.There is a possibility that it will completely change the distribution pattern of rights and interests in the field of copyright law.Currently,the legal nature of the casting and trading of NFT digital works remains controversial.The liability of NFT digital works creators,as well as service platforms,is required to be further identified.This article starts with an analysis of the right attributes of NFT digital works based on intellectual property law.Subsequently,the related legal issues and countermeasures are discussed,including the exhaustion of the right-holders,the duty of platform management,and the assumption of tort liability arising from the transaction.It is suggested that the NFT digital works should be treated with considerable caution and the legal system of NFT digital works should be constructed in the near future.展开更多
A digital watermark is an invisible mark embedded in a digital image that may be used for a number of different purposes including copyright protection. Due to the urgent need for protecting the copyright of digital p...A digital watermark is an invisible mark embedded in a digital image that may be used for a number of different purposes including copyright protection. Due to the urgent need for protecting the copyright of digital products in digital library, digital watermarking has been proposed as a solution to this problem. This letter describes potential situations that nonlinear theory can be used to enhance robustness and security of the watermark in digital library. Some nonlinear watermark techniques have been enumerated. Experimental results show that the proposed scheme is superior to the general watermark scheme both in security and robustness in digital library.展开更多
The paper presents a set of techniques of digital watermarking by which copyright and user rights messages are hidden into geo-spatial graphics data, as well as techniques of compressing and encrypting the watermarked...The paper presents a set of techniques of digital watermarking by which copyright and user rights messages are hidden into geo-spatial graphics data, as well as techniques of compressing and encrypting the watermarked geo-spatial graphics data. The technology aims at tracing and resisting the illegal distribution and duplication of the geo-spatial graphics data product, so as to effectively protect the data producer’s rights as well as to facilitate the secure sharing of geo-spatial graphics data. So far in the GIS field throughout the world, few researches have been made on digital watermarking. The research is a novel exploration both in the field of security management of geo-spatial graphics data and in the applications of digital watermarking technique. An application software employing the pro- posed technology has been developed. A number of experimental tests on the 1∶500,000 digital bathymetric chart of the South China Sea and 1∶10,000 digital topographic map of Jiangsu Province have been conducted to verify the feasibility of the proposed technology.展开更多
In this paper, a method to fingerprint digital images is proposed, and different watermarked copies with different identification string are made. After determining the number of the customers and the length of the wa...In this paper, a method to fingerprint digital images is proposed, and different watermarked copies with different identification string are made. After determining the number of the customers and the length of the watermark string, this method chooses some values inside the digital image using a characteristic function, and adds watermarks to these values in a way that can protect the product against the attacks happened by comparing two fingerprinted copies.The watermarks are a string of binary numbers -1s and 1s. Every customer will be distinguished by a series of 1s and -1s generated by a pseudo-random generator. The owner of the image can determine the number of customers and the length of the string as well as this method will add another watermarking values to watermark string to protect the product.展开更多
<div style="text-align:justify;"> Digital watermarking technology plays a powerful role in the effective protection of digital media copyright, image authentication, image sharing, image information tr...<div style="text-align:justify;"> Digital watermarking technology plays a powerful role in the effective protection of digital media copyright, image authentication, image sharing, image information transmission and other fields. Driven by strong demand, digital image watermarking technology has aroused widespread research interest and has gradually developed into one of the most active research directions in information science. In this paper, we present a novel robust digital watermarking algorithm based on discrete radon transform tight frame in finite-set (FDRT). FDRT of the zero mean image is a tight frame, the frame boundary <em><strong>A</strong></em> = <em><strong>B</strong></em> = 1, the dual of the frame is itself. The decomposition and reconstruction of the FDRT tight frame will not cause the phenomenon of image distortion. The embedding of hidden watermark is to add a weak signal to the strong background of the original image. Watermark extraction is to effectively identify the embedded weak signal. The feasibility of the watermarking algorithm is analyzed from two aspects of information hiding and robustness. We select the independent Gaussian random vector as the watermark series, and the peak signal-to-noise ratio (PSNR) as the visual degradation criterion of the watermark image. Basing the FDRT compact stand dual operator, we derived the relationship among the strength parameter, square sum of watermark series, the PSNR. Using Checkmark system, the simulation results show that the algorithm is robust enough to some very important image processing attacks such as lossy compression, MAP, filtering, segmentation, edge enhancement, jitter, quadratic modulation and general geometric attack (scaling, rotation, shearing), etc. </div>展开更多
With the continuous development of information technology in China,the era of digital publishing has arrived,overthrowing the traditional publishing paradigm.Compared with mass publications and professional publicatio...With the continuous development of information technology in China,the era of digital publishing has arrived,overthrowing the traditional publishing paradigm.Compared with mass publications and professional publications,teaching research publications are unique.In the field of education,they play a guiding role in the teaching work and in promoting the development of education in China.The editorial work of teaching research publications should be innovated in the digital era.In order to ensure the dissemination value and depth of content of teaching research publications,as well as to provide high-quality publications with leading value for money,editorial transformation and work innovation should be carried out in time,taking into account the characteristics of the digital era.This paper makes a detailed analysis of the existing problems in the editorial work of teaching research publications to propose innovative strategies for the editorial work of teaching research publications in the digital era.展开更多
基金This paper is part of the Youth Program of Science and Technology Research of Chongqing Municipal Education Commission(KJQN202300545)Youth Program of National Social Science Fund of China(21CJY001)Science and Technology Research Program of Chongqing Municipal Education Commission(KJQN202300567).
文摘The rapid development of the digital economy has provided a new impetus for rural residents to extend their working hours.Based on the data collected by the China Labor-force Dynamics Survey(CLDS)in 2014,2016,and 2018,this paper measured the development level of the digital economy in China from the perspectives of internet development and digital financial inclusion,and tested the mechanisms of how the digital economy affected rural residents’working hours.The results showed that the digital economy extended rural residents’working hours by expanding information channels and enhancing human capital,and this mechanism was affected by heterogeneity in rural residents’educational background,age,and social capital.Building on these findings,this paper holds that to increase rural residents’income by extending their working hours and achieving common prosperity for all,it is necessary to expand the opportunities for rural residents to participate in skills training and promote their accumulation of human capital.
文摘In November 2020,the third amendment of the Copyright Law of the People’s Republic of China was completed and officially implemented in June 2021,which is undoubtedly of great significance to Chinese citizens with a growing awareness of copyright.This has also triggered our thinking about the impact of Copyright Law on digital copyright.Through the analysis of the cases after the amendment of the Copyright Law,we find that to a certain extent,the Copyright Law has played a great role in the protection of digital copyright,but it is still unable to achieve comprehensive protection,and there are still some imperfections.From this point of view,the simple legal protection of digital copyright cannot be taken into account.It still needs to be combined with technical protection means,cooperate with social conditions,and work together to create a harmonious and healthy online publishing environment and promote the protection of digital copyright.
文摘Introduction: Iliac particulate cancellous bone and marrow (PCBM) is commonly used as a high-quality reconstruction material;however, PCBM cannot be extracted in sufficient amounts to meet demand. To determine the appropriate amount of iliac PCBM to be collected, we used digital technology to measure the volume required for jaw reconstruction before surgery. Clinical Case: The patient, a 23-year-old man, underwent surgery for a calcifying odontogenic cyst. A maxillary cyst occupied the left anterior-premolar region (tooth 21 - 25) and the deciduous canine remained;a permanent canine was included in the cyst. We planned to preserve the teeth except for the impacted canine, completely excise the maxillary cyst, and preserve the alveolar ridge morphology. Preoperative digital imaging was used to determine the amount of alveolar ridge reconstruction required and accordingly determine the amount of iliac cancellous bone to be harvested. We used a titanium mesh tray and grafts of iliac particulate cancellous bone and marrow to reconstruct the alveolar ridge. The amount of iliac cancellous bone that needed to be collected was clarified and the supply amount could be collected in just the right amount;thus, the cortical bone of the iliac inner plate could be preserved. The alveolar bone morphology was reconstructed to allow the placement of dental implants as per the preoperative digital surgery. Three years after the operation, no sign of recurrence has been observed. Conclusion: Minimally invasive surgery was performed by clarifying the amount of iliac cancellous bone graft that needs to be harvested, which improved the accuracy of surgery.
基金Funded by the National Natural Science Foundation of China(No.50335020)the International Cooperation Project(No.2003CA007)
文摘In this paper,we propose a novel wavelet-domain digital image watermarking scheme on copyright protection based on network manufacture environment.It codes the watermarking with error correcting coding and encrypts the watermarking with chaotic encryption.It embeds the watermarking into the coefficients which have large absolute values in the middle-frequency parts got by Discrete Wavelet Transform (DWT) repeatedly.The extraction doesn’t need the original image.Experiment results show that the proposed scheme is easy to implement,and has good robustness to some attacks,such as JPEG compression,average filtering,median filtering,wiener filtering,pepper (?) salt noise,especially to cropping and scaling.In order to solve the prob- lem of the copyright protection of the network manufacture production,the problems of digital image production such as tamper preventing and watermarking attacks preventing and so on are discussed.It solves the problems of manufacture information such as secure exchange and transmissions and production copyright protection and so on.
基金This project was supported by the Digital TV Special Foundation of National Development and Reform Commission ofChina (040313) Home Coming Scholars Science Activity Foundation of Ministry of Personnel (20041231) the Graduate In-novation Foundation of Xidian University (innovaion 0509)
文摘A novel copyright protection scheme for digital content is presented, which is a private watermarking scheme based on the watermark embedding in the DCT domain and watermark extraction Using independent component analysis (ICA). The system includes the key for watermark extraction and the host image. The algorithm splits the original image into blocks and classifies these blocks based on visual masking, that is, noise visibility function (NVF). Watermark components with different strength are inserted into chosen direct current components of DCT coefficients according to the classifier. The watermark extraction is based on the characteristic of the statistic independence of the host image, watermark and key. Principle component analysis (PCA) whitening process and FastICA techniques are introduced to ensure a blind watermark extraction without requiring the original image. Experirnental results show the proposed technique is robust under attacks such as image filtering and adding noise, cropping and resizing. In addition, the proposed private watermarking system can be improved to the application of the DTV content protection system.
文摘A method for creating digital image copyright protection is proposed in this paper. The proposed method in this paper is based on visual cryptography defined by Noor and Shamir. The proposed method is working on selection of random pixels from the original digital image instead of specific selection of pixels. The new method proposed does not require that the watermark pattern to be embedded in to the original digital image. Instead of that, verification information is generated which will be used to verify the ownership of the image. This leaves the marked image equal to the original image. The method is based on the relationship between randomly selected pixels and their 8-neighbors’ pixels. This relationship keeps the marked image coherent against diverse attacks even if the most significant bits of randomly selected pixels have been changed by attacker as we will see later in this paper. Experimental results show the proposed method can recover the watermark pattern from the marked image even if major changes are made to the original digital image.
基金Supported by the China Next Generation Internet (CNGI)2004 of National Development and Reform Commission (CNGI-04-12-2A) the State Administration of Radio Fil mand Television (2005-02-2)
文摘At present, in mobile business, the secure environment in the terminal of users has not been embedded, many cryptology-based methods can not be directly used to protect the copyright of digital media. Under this situation, a transparent system based on watermark for digital right management and digital copyright protection is proposed in this paper. The transparent system is called WDRM (watermark-based digital rights management) and transparent to users. Its core is WDRM Agent. In this paper, system inner model and procession are designed in detail at first, including the registration, the downloading, the super distribution, and the cooperation. Because the watermark embedding and the extraction algorithms are the kernel in this architecture, we also discuss how to choose and design the algorithms. Then we establish a package for all algorithms in WDRM Agent.
文摘1 Introduction High-speed networking can now deliver Information tomillions of users in seconds.Users In turn can download thedata in electronic format or just print them out with a fewstrokes of the keyboard.The data can be easily saved,reorganized and modified electronocally.While informationtechnology provides fast and easy ways to distributeinformation,it also presents challenges.Easy access tocopyrighted materials is resulting in the unauthorizedreproduction of all kinds of information,forcing info...
基金supported by the Ministry of Education of China(Grant No.06JA870001)
文摘This paper analyzes the perception of the librarians in China's Mainland about the copyright during the development of digital libraries with Hong Kong Special Administrative Region(HK SAR) and Taiwan, China as the reference system, through questionnaire survey of copyright cases of the digital libraries by investigating the digital library builders and librarians of 30 universities from China's Mainland, HK SAR and Taiwan,China ranked among the top 500 in the Academic Ranking of World Universities(SJTU Version). The report holds that: 1) The copyright law shall evolve with the times and be revised from time to time; 2) it is imperative to popularize and educate in the copyright law; 3) the guidelines for the use of the copyright law of the education industry shall be developed as soon as possible; and 4) the Collective Management of Copyright Regulations shall be enforced as early as possible.
文摘As a kind of digital clothing design works,digital clothing effect diagram shows fast and roughly designer intent expression and needs protection of digital copyright protection technology.A novel digital clothing effect diagram copyright protection scheme and some algorithms based on digital image watermark technology are proposed,used by two-dimensional chaotic encryption watermark generation algorithm to generate watermark data,watermark embedding algorithm twice using genetic algorithm to obtain the optimal embedding position and embedding strength,and watermark verification algorithm to determine the copyright ownership.Experimental results and analyses show that the proposed scheme and algorithms have the feasibility and effectiveness.
基金supported by the major project of the National Social Science Foundation“Research on the Social Impact and Governance Path of Internet Platforms”(21&ZD195)
文摘Non-fungible token(NFT)emerges with the marvelous explosion of the metaverse.NFT digital works are profoundly impacting the existing copyright system,which needs to be amended and responded to in time.There is a possibility that it will completely change the distribution pattern of rights and interests in the field of copyright law.Currently,the legal nature of the casting and trading of NFT digital works remains controversial.The liability of NFT digital works creators,as well as service platforms,is required to be further identified.This article starts with an analysis of the right attributes of NFT digital works based on intellectual property law.Subsequently,the related legal issues and countermeasures are discussed,including the exhaustion of the right-holders,the duty of platform management,and the assumption of tort liability arising from the transaction.It is suggested that the NFT digital works should be treated with considerable caution and the legal system of NFT digital works should be constructed in the near future.
基金Supported in part by the National Natural Science Foundation of China (No.60072044).
文摘A digital watermark is an invisible mark embedded in a digital image that may be used for a number of different purposes including copyright protection. Due to the urgent need for protecting the copyright of digital products in digital library, digital watermarking has been proposed as a solution to this problem. This letter describes potential situations that nonlinear theory can be used to enhance robustness and security of the watermark in digital library. Some nonlinear watermark techniques have been enumerated. Experimental results show that the proposed scheme is superior to the general watermark scheme both in security and robustness in digital library.
基金Under the auspices of Jiangsu Provincial Science and Technology Fundation of Surveying and Mapping (No. 200416 )
文摘The paper presents a set of techniques of digital watermarking by which copyright and user rights messages are hidden into geo-spatial graphics data, as well as techniques of compressing and encrypting the watermarked geo-spatial graphics data. The technology aims at tracing and resisting the illegal distribution and duplication of the geo-spatial graphics data product, so as to effectively protect the data producer’s rights as well as to facilitate the secure sharing of geo-spatial graphics data. So far in the GIS field throughout the world, few researches have been made on digital watermarking. The research is a novel exploration both in the field of security management of geo-spatial graphics data and in the applications of digital watermarking technique. An application software employing the pro- posed technology has been developed. A number of experimental tests on the 1∶500,000 digital bathymetric chart of the South China Sea and 1∶10,000 digital topographic map of Jiangsu Province have been conducted to verify the feasibility of the proposed technology.
基金Supported by the National Natural Science Foundation(No.69882002,69772035)National "863" Programme(863-ZT05-2)
文摘In this paper, a method to fingerprint digital images is proposed, and different watermarked copies with different identification string are made. After determining the number of the customers and the length of the watermark string, this method chooses some values inside the digital image using a characteristic function, and adds watermarks to these values in a way that can protect the product against the attacks happened by comparing two fingerprinted copies.The watermarks are a string of binary numbers -1s and 1s. Every customer will be distinguished by a series of 1s and -1s generated by a pseudo-random generator. The owner of the image can determine the number of customers and the length of the string as well as this method will add another watermarking values to watermark string to protect the product.
文摘<div style="text-align:justify;"> Digital watermarking technology plays a powerful role in the effective protection of digital media copyright, image authentication, image sharing, image information transmission and other fields. Driven by strong demand, digital image watermarking technology has aroused widespread research interest and has gradually developed into one of the most active research directions in information science. In this paper, we present a novel robust digital watermarking algorithm based on discrete radon transform tight frame in finite-set (FDRT). FDRT of the zero mean image is a tight frame, the frame boundary <em><strong>A</strong></em> = <em><strong>B</strong></em> = 1, the dual of the frame is itself. The decomposition and reconstruction of the FDRT tight frame will not cause the phenomenon of image distortion. The embedding of hidden watermark is to add a weak signal to the strong background of the original image. Watermark extraction is to effectively identify the embedded weak signal. The feasibility of the watermarking algorithm is analyzed from two aspects of information hiding and robustness. We select the independent Gaussian random vector as the watermark series, and the peak signal-to-noise ratio (PSNR) as the visual degradation criterion of the watermark image. Basing the FDRT compact stand dual operator, we derived the relationship among the strength parameter, square sum of watermark series, the PSNR. Using Checkmark system, the simulation results show that the algorithm is robust enough to some very important image processing attacks such as lossy compression, MAP, filtering, segmentation, edge enhancement, jitter, quadratic modulation and general geometric attack (scaling, rotation, shearing), etc. </div>
文摘With the continuous development of information technology in China,the era of digital publishing has arrived,overthrowing the traditional publishing paradigm.Compared with mass publications and professional publications,teaching research publications are unique.In the field of education,they play a guiding role in the teaching work and in promoting the development of education in China.The editorial work of teaching research publications should be innovated in the digital era.In order to ensure the dissemination value and depth of content of teaching research publications,as well as to provide high-quality publications with leading value for money,editorial transformation and work innovation should be carried out in time,taking into account the characteristics of the digital era.This paper makes a detailed analysis of the existing problems in the editorial work of teaching research publications to propose innovative strategies for the editorial work of teaching research publications in the digital era.