期刊文献+
共找到360篇文章
< 1 2 18 >
每页显示 20 50 100
Overview of the Impact of the Introduction of the Copyright Act 2020 on Digital Publishing
1
作者 MA Jingyun 《Cultural and Religious Studies》 2024年第1期64-69,共6页
In November 2020,the third amendment of the Copyright Law of the People’s Republic of China was completed and officially implemented in June 2021,which is undoubtedly of great significance to Chinese citizens with a ... In November 2020,the third amendment of the Copyright Law of the People’s Republic of China was completed and officially implemented in June 2021,which is undoubtedly of great significance to Chinese citizens with a growing awareness of copyright.This has also triggered our thinking about the impact of Copyright Law on digital copyright.Through the analysis of the cases after the amendment of the Copyright Law,we find that to a certain extent,the Copyright Law has played a great role in the protection of digital copyright,but it is still unable to achieve comprehensive protection,and there are still some imperfections.From this point of view,the simple legal protection of digital copyright cannot be taken into account.It still needs to be combined with technical protection means,cooperate with social conditions,and work together to create a harmonious and healthy online publishing environment and promote the protection of digital copyright. 展开更多
关键词 digital copyright Copyright Law infringement phenomenon
下载PDF
Cyberattack Ramifications, The Hidden Cost of a Security Breach
2
作者 Meysam Tahmasebi 《Journal of Information Security》 2024年第2期87-105,共19页
In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term ... In this in-depth exploration, I delve into the complex implications and costs of cybersecurity breaches. Venturing beyond just the immediate repercussions, the research unearths both the overt and concealed long-term consequences that businesses encounter. This study integrates findings from various research, including quantitative reports, drawing upon real-world incidents faced by both small and large enterprises. This investigation emphasizes the profound intangible costs, such as trade name devaluation and potential damage to brand reputation, which can persist long after the breach. By collating insights from industry experts and a myriad of research, the study provides a comprehensive perspective on the profound, multi-dimensional impacts of cybersecurity incidents. The overarching aim is to underscore the often-underestimated scope and depth of these breaches, emphasizing the entire timeline post-incident and the urgent need for fortified preventative and reactive measures in the digital domain. 展开更多
关键词 Artificial Intelligence (AI) Business Continuity Case Studies Copyright Cost-Benefit Analysis Credit Rating Cyberwarfare Cybersecurity Breaches Data Breaches Denial Of Service (DOS) Devaluation Of Trade Name Disaster Recovery Distributed Denial of Service (DDOS) Identity Theft Increased Cost to Raise Debt Insurance Premium Intellectual Property Operational Disruption Patent Post-Breach Customer Protection Recovery Point Objective (RPO) Recovery Time Objective (RTO) Regulatory Compliance Risk Assessment Service Level Agreement Stuxnet Trade Secret
下载PDF
New Fragile Watermarking Technique to Identify Inserted Video Objects Using H.264 and Color Features
3
作者 Raheem Ogla Eman Shakar Mahmood +1 位作者 Rasha I.Ahmed Abdul Monem S.Rahma 《Computers, Materials & Continua》 SCIE EI 2023年第9期3075-3096,共22页
The transmission of video content over a network raises various issues relating to copyright authenticity,ethics,legality,and privacy.The protection of copyrighted video content is a significant issue in the video ind... The transmission of video content over a network raises various issues relating to copyright authenticity,ethics,legality,and privacy.The protection of copyrighted video content is a significant issue in the video industry,and it is essential to find effective solutions to prevent tampering and modification of digital video content during its transmission through digital media.However,there are stillmany unresolved challenges.This paper aims to address those challenges by proposing a new technique for detectingmoving objects in digital videos,which can help prove the credibility of video content by detecting any fake objects inserted by hackers.The proposed technique involves using two methods,the H.264 and the extraction color features methods,to embed and extract watermarks in video frames.The study tested the performance of the system against various attacks and found it to be robust.The evaluation was done using different metrics such as Peak-Signal-to-Noise Ratio(PSNR),Mean Squared Error(MSE),Structural Similarity Index Measure(SSIM),Bit Correction Ratio(BCR),and Normalized Correlation.The accuracy of identifying moving objects was high,ranging from 96.3%to 98.7%.The system was also able to embed a fragile watermark with a success rate of over 93.65%and had an average capacity of hiding of 78.67.The reconstructed video frames had high quality with a PSNR of at least 65.45 dB and SSIMof over 0.97,making them imperceptible to the human eye.The system also had an acceptable average time difference(T=1.227/s)compared with other state-of-the-art methods. 展开更多
关键词 Video watermarking fragile digital watermark copyright protection moving objects color image features H.264
下载PDF
A Dual Model Watermarking Framework for Copyright Protection in Image Processing Networks
4
作者 Yuhang Meng Xianyi Chen +2 位作者 Xingming Sun Yu Liu Guo Wei 《Computers, Materials & Continua》 SCIE EI 2023年第4期831-844,共14页
Image processing networks have gained great success in many fields,and thus the issue of copyright protection for image processing networks hasbecome a focus of attention. Model watermarking techniques are widely used... Image processing networks have gained great success in many fields,and thus the issue of copyright protection for image processing networks hasbecome a focus of attention. Model watermarking techniques are widely usedin model copyright protection, but there are two challenges: (1) designinguniversal trigger sample watermarking for different network models is stilla challenge;(2) existing methods of copyright protection based on trigger swatermarking are difficult to resist forgery attacks. In this work, we propose adual model watermarking framework for copyright protection in image processingnetworks. The trigger sample watermark is embedded in the trainingprocess of the model, which can effectively verify the model copyright. And wedesign a common method for generating trigger sample watermarks based ongenerative adversarial networks, adaptively generating trigger sample watermarksaccording to different models. The spatial watermark is embedded intothe model output. When an attacker steals model copyright using a forgedtrigger sample watermark, which can be correctly extracted to distinguishbetween the piratical and the protected model. The experiments show that theproposed framework has good performance in different image segmentationnetworks of UNET, UNET++, and FCN (fully convolutional network), andeffectively resists forgery attacks. 展开更多
关键词 Image processing networks copyright protection model watermark
下载PDF
MBE:A Music Copyright Depository Framework Incorporating Blockchain and Edge Computing
5
作者 Jianmao Xiao Ridong Huang +4 位作者 Jiangyu Wang Zhean Zhong Chenyu Liu Yuanlong Cao Chuying Ouyang 《Computer Systems Science & Engineering》 SCIE EI 2023年第12期2815-2834,共20页
Audio copyright is a crucial issue in the music industry,as it protects the rights and interests of creators and distributors.This paper studies the current situation of digital music copyright certification and propo... Audio copyright is a crucial issue in the music industry,as it protects the rights and interests of creators and distributors.This paper studies the current situation of digital music copyright certification and proposes a music copyright certification framework based on“blockchain+edge computing mode,”abbreviated as MBE,by integrating edge computing into the Hyperledger Fabric system.MBE framework compresses and splits the audio into small chunks,performs Fast Fourier Transform(FFT)to extract the peak points of each frequency and combines them to obtain unique audio fingerprint information.After being confirmed by various nodes on the Fabric alliance chain,audio fingerprint information and copyright owner information are recorded on the chain and broadcast to all participants.Blockchain technology’s characteristics of being tamper-proof and traceable not only reform the trust mechanism of copyright protection but also endow edge computing with the ability to resist tampering and single-point attack,greatly enhancing the robustness of the music copyright certification system.Meanwhile,edge computing mode improves Fabric blockchain’s processing speed and transaction throughput.Experimental results show that MBE’s performance is better than traditional systems regarding efficiency,storage demand and security.Compared to the traditional Fabric system without edge computing mode,MBE exhibits a 53%higher deposition efficiency and a 48%lower storage space requirement. 展开更多
关键词 Blockchain copyright protection audio fingerprinting smart contracts
下载PDF
国内外知识产权管理软件研发现状分析 被引量:2
6
作者 马海群 孙扬民 《现代图书情报技术》 CSSCI 北大核心 2004年第2期56-59,共4页
在简述知识产权管理软件研发背景及其社会价值的基础上,重点分析了国内外现有知识产权管理软件的开发状况,并举例介绍了几个国外应用比较广泛的知识产权管理软件,同时还对知识产权管理软件今后的发展方向进行一定程度的描述与预测。
关键词 知识产权管理 计算机软件 软件开发 Patentpro OFFICIAL COPYRIGHT SOFTWARE
下载PDF
数字版权保护中DCI编码方案及数字证书研究 被引量:4
7
作者 杨树林 孙丽 胡洁萍 《北京印刷学院学报》 2012年第6期38-41,共4页
数字版权标志符为数字内容在互联网上提供唯一的版权身份标志,为确保在网络环境中能够精准定位和检索数字作品、确认版权主体提供了技术基础。建立数字版权标志符体系是我国数字版权管理发展的迫切要求。通过研究DCI(数字版权标志符)的... 数字版权标志符为数字内容在互联网上提供唯一的版权身份标志,为确保在网络环境中能够精准定位和检索数字作品、确认版权主体提供了技术基础。建立数字版权标志符体系是我国数字版权管理发展的迫切要求。通过研究DCI(数字版权标志符)的概念、设计原则,分析了国外相关研究的现状,提出了适合我国版权保护的DCI编码方案,并给出了应用于移动互联网的加密机制、数字证书及DCI嵌入方案。研究结果表明,采用上述方法,兼容性好,易于与国际上的DOI(digital object identifier)接轨,加密机制及数字证书的设计适合在移动互联网上应用。 展开更多
关键词 数字版权保护 DCI(digital COPYRIGHT identifier) 椭圆曲线密码 数字证书
下载PDF
Copyleft思潮:对网络著作权扩张的反思 被引量:4
8
作者 温晓红 《现代传播(中国传媒大学学报)》 CSSCI 北大核心 2009年第2期112-115,共4页
随着网络技术的发展,Copyleft应运而生。作为一种新的著作权理念,它力促自由软件的产生与传播,对传统的著作权制度体系(Copyright)构成了挑战。但是,Copyleft并不企图全面否定Copyright,而是以承认Copyright作为存在的前提条件。本文从C... 随着网络技术的发展,Copyleft应运而生。作为一种新的著作权理念,它力促自由软件的产生与传播,对传统的著作权制度体系(Copyright)构成了挑战。但是,Copyleft并不企图全面否定Copyright,而是以承认Copyright作为存在的前提条件。本文从Copyleft思潮的兴起和发展,探讨Copy-left思潮的实质和影响。 展开更多
关键词 COPYRIGHT COPYLEFT 自由软件 著作权
下载PDF
Copyright与Copyleft的经济学分析 被引量:2
9
作者 聂盛 《科技与经济》 CSSCI 2009年第2期63-65,共3页
Copyleft是一种全新的知识产权理念,它将知识产品的权利对外开放,对传统的版权(Copyright)制度提出了挑战,引起人们的广泛关注。通过从经济学角度对Copyright及Copyleft制度进行了比较分析,认为Copyleft满足了网络社会知识集体生产的需... Copyleft是一种全新的知识产权理念,它将知识产品的权利对外开放,对传统的版权(Copyright)制度提出了挑战,引起人们的广泛关注。通过从经济学角度对Copyright及Copyleft制度进行了比较分析,认为Copyleft满足了网络社会知识集体生产的需求,是对Copyright的超越与补充;两者都是人们在利益最大化原则下对知识产品产权形式的理性选择,并将长期共存。 展开更多
关键词 COPYRIGHT COPYLEFT 知识产权
下载PDF
Copyleft:在版权保护下的信息共享规则 被引量:3
10
作者 王闻贤 《黑龙江省政法管理干部学院学报》 2003年第2期14-17,共4页
知识产权代替整个知识保护已经不符合世界的潮流。有专家建议知识产权保护制度的基点应是以符合社会发展的现实要求为前提 ,在权利人利益和社会公众利益之间维持恰如其分的平衡。于是COPYLEFT应运这样的需要而生 ,它并不否定COPYRIGHT ... 知识产权代替整个知识保护已经不符合世界的潮流。有专家建议知识产权保护制度的基点应是以符合社会发展的现实要求为前提 ,在权利人利益和社会公众利益之间维持恰如其分的平衡。于是COPYLEFT应运这样的需要而生 ,它并不否定COPYRIGHT ,是版权保护的延伸 ,核心思想是“信息共享 ,源代码共享”。 展开更多
关键词 COPYLEFT 自由软件 COPYRIGHT 自由
下载PDF
Copyleft:在版权保护下的信息共享规则 被引量:3
11
作者 王闻贤 《上海高校图书情报工作研究》 2003年第1期18-22,共5页
知识产权代替整个知识保护已经不符合世界潮流。有专家建议知识产权保护制度的基点应是以符合社会发展的现实要求为前提,在权利人利益和社会公众利益之间维持恰如其分的平衡。于是COPYLEFT应运而生,它并不否定COPYRIGHT,而是版权保护的... 知识产权代替整个知识保护已经不符合世界潮流。有专家建议知识产权保护制度的基点应是以符合社会发展的现实要求为前提,在权利人利益和社会公众利益之间维持恰如其分的平衡。于是COPYLEFT应运而生,它并不否定COPYRIGHT,而是版权保护的延伸,核心思想是"信息共享,源代码共享"。 展开更多
关键词 自由软件 COPYLEFT COPYRIGHT 信息共享 源代码共享 版权保护
下载PDF
文化经济学为什么对著作权置之不理? 被引量:2
12
作者 Ruth Towse 郑小倩 《文化艺术研究》 2010年第1期243-252,共10页
本文主张应该将著作权政策视作文化政策不可或缺的一部分;文化经济学家对补贴在文化政策中的意义给予了很多的关注和讨论,但是对于著作权问题却很少提及。尽管如此,由于在文化政策以及艺术工作者的劳动力市场方面具有独到的阐释力,文化... 本文主张应该将著作权政策视作文化政策不可或缺的一部分;文化经济学家对补贴在文化政策中的意义给予了很多的关注和讨论,但是对于著作权问题却很少提及。尽管如此,由于在文化政策以及艺术工作者的劳动力市场方面具有独到的阐释力,文化经济学可以被用于分析著作权问题并证明著作权是创意产业中激发创造力的一个有效因素。本文将文化补贴和著作权均视为政策工具,将两者进行对比并初步探讨了当前的文化政策中与著作权密切相关的两个问题,即著作权中介协会的规范管理以及目前流行的"版权补偿金"之说,认为这类问题是文化经济学者有能力也有义务解决的问题。 展开更多
关键词 文化经济学 著作权问题 COPYRIGHT 文化政策 艺术工作者 劳动力市场 激发创造力 版权补偿金 政策工具 有效因素 意义给予 经济学家 规范管理 创意产业 补贴 阐释力 中介 证明 义务 学者
下载PDF
A New Mechanism Based on Similar Clouds Watermark for Database’s Information Security 被引量:4
13
作者 HUANGMin CAOJia-heng +1 位作者 PENGZhi-yong ZENGCheng 《Wuhan University Journal of Natural Sciences》 CAS 2004年第4期415-419,共5页
This paper studies the digit watermark technology of numeric attributes in relational database for database's information security. It proposes a new mechanism based on similar clouds watermark and gives the conce... This paper studies the digit watermark technology of numeric attributes in relational database for database's information security. It proposes a new mechanism based on similar clouds watermark and gives the concept of similar clouds. The algorithm SCWA that can insert the meaning watermark and detect it from the watermarked data is described. The mechanism can effectively and broadly scatter the watermark in the database; therefore the watermark is very robust. Key words copyright protection - digit watermark - similar clouds - clouds model CLC number TP 311. 52 Foundation item: Supported by the National Natural Science Foundation of China (60273072) and 863 Hi-technique Research (2002AA4Z3450)Biography: HUANG Min(1979-), female, Ph. D candidate, research direction: database's information security 展开更多
关键词 copyright protection digit watermark similar clouds clouds model
下载PDF
Novel copyright protection scheme for digital content 被引量:3
14
作者 Fan Kefeng Wang Meihua +1 位作者 Mo Wei Zhao Xinhua 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第2期423-429,共7页
A novel copyright protection scheme for digital content is presented, which is a private watermarking scheme based on the watermark embedding in the DCT domain and watermark extraction Using independent component anal... A novel copyright protection scheme for digital content is presented, which is a private watermarking scheme based on the watermark embedding in the DCT domain and watermark extraction Using independent component analysis (ICA). The system includes the key for watermark extraction and the host image. The algorithm splits the original image into blocks and classifies these blocks based on visual masking, that is, noise visibility function (NVF). Watermark components with different strength are inserted into chosen direct current components of DCT coefficients according to the classifier. The watermark extraction is based on the characteristic of the statistic independence of the host image, watermark and key. Principle component analysis (PCA) whitening process and FastICA techniques are introduced to ensure a blind watermark extraction without requiring the original image. Experirnental results show the proposed technique is robust under attacks such as image filtering and adding noise, cropping and resizing. In addition, the proposed private watermarking system can be improved to the application of the DTV content protection system. 展开更多
关键词 digital content copyright protection digital watermarking noise visibility function independent component analysis.
下载PDF
A Novel Digital Image Watermarking Scheme on Copyright Protection Based on Network Manufacture Environment 被引量:2
15
作者 LIU Quan WANG Jin (School of Information Engineering,Wuhan University of Technology,Wuhan 430070,China 《武汉理工大学学报》 CAS CSCD 北大核心 2006年第S2期552-556,共5页
In this paper,we propose a novel wavelet-domain digital image watermarking scheme on copyright protection based on network manufacture environment.It codes the watermarking with error correcting coding and encrypts th... In this paper,we propose a novel wavelet-domain digital image watermarking scheme on copyright protection based on network manufacture environment.It codes the watermarking with error correcting coding and encrypts the watermarking with chaotic encryption.It embeds the watermarking into the coefficients which have large absolute values in the middle-frequency parts got by Discrete Wavelet Transform (DWT) repeatedly.The extraction doesn’t need the original image.Experiment results show that the proposed scheme is easy to implement,and has good robustness to some attacks,such as JPEG compression,average filtering,median filtering,wiener filtering,pepper (?) salt noise,especially to cropping and scaling.In order to solve the prob- lem of the copyright protection of the network manufacture production,the problems of digital image production such as tamper preventing and watermarking attacks preventing and so on are discussed.It solves the problems of manufacture information such as secure exchange and transmissions and production copyright protection and so on. 展开更多
关键词 network manufacture COPYRIGHT protection digital WATERMARKING wavelet transform error CORRECTING coding chaotic ENCRYPTION
下载PDF
Research of Anti-Plagiarism Monitoring System Model 被引量:2
16
作者 SHEN Yang YUAN Zhongshang +1 位作者 LIU Lu DONG Hui 《Wuhan University Journal of Natural Sciences》 CAS 2007年第5期937-940,共4页
We proposed a flexible anti-plagiarism system model based on user-defined plagiarism standards. We also proposed PlagLazy and format-legacy phenomena that plagiarist will remain format-legacy such as soft-enter symbol... We proposed a flexible anti-plagiarism system model based on user-defined plagiarism standards. We also proposed PlagLazy and format-legacy phenomena that plagiarist will remain format-legacy such as soft-enter symbol in his DOC document after plagiarizing material from web and corresponding optimized algorithm which improves the speed of comparison. Our model is suitable for the anti-plagiarism and monitoring of large document collections, and it can also be used in digital library, E-learning and other fields. 展开更多
关键词 anti-plagiarism PLAGIARISM information fingerprints copyright protection format-legacy
下载PDF
Chaos-Based Multipurpose Image Watermarking Algorithm 被引量:2
17
作者 ZHU Congxu LIAO Xuefeng LI Zhihua 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1675-1678,共4页
To achieve the goal of image content authentication and copyright protection simultaneously, this paper presents a novel image dual watermarking method based on chaotic map. Firstly, the host image was split into many... To achieve the goal of image content authentication and copyright protection simultaneously, this paper presents a novel image dual watermarking method based on chaotic map. Firstly, the host image was split into many nonoverlapping small blocks, and the block-wise discrete cosine transform (DCT) is computed. Secondly, the robust watermarks, shuffled by the chaotic sequences, are embedded in the DC coefficients of blocks to achieve the goal of copyright protection. The semi-fragile watermarks, generated by chaotic map, are embedded in the AC coefficients of blocks to obtain the aim of image authentication. Both of them can be extracted without the original image. Simulation results demonstrate the effectiveness of our algorithm in terms of robustness and fragility. 展开更多
关键词 copyright protection image authentication multipurpose watermarking chaos theory
下载PDF
A Weighted Algorithm for Watermarking Relational Databases 被引量:2
18
作者 CUI Xinchun QIN Xiaolin SHENG Gang 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期79-82,共4页
A weighted algorithm for watermarking relational databases for copyright protection is presented. The possibility of watermarking an attribute is assigned according to its weight decided by the owner of the database. ... A weighted algorithm for watermarking relational databases for copyright protection is presented. The possibility of watermarking an attribute is assigned according to its weight decided by the owner of the database. A one-way hash function and a secret key known only to the owner of the data are used to select tuples and bits to mark. By assigning high weight to significant attributes, the scheme ensures that important attributes take more chance to be marked than less important ones. Experimental results show that the proposed scheme is robust against various forms of attacks, and has perfect immunity to subset attack. 展开更多
关键词 weighted algorithm watermarking relational databases copyright protection
下载PDF
A Visual Cryptography Based Digital Image Copyright Protection 被引量:6
19
作者 Adel Hammad Abusitta 《Journal of Information Security》 2012年第2期96-104,共9页
A method for creating digital image copyright protection is proposed in this paper. The proposed method in this paper is based on visual cryptography defined by Noor and Shamir. The proposed method is working on selec... A method for creating digital image copyright protection is proposed in this paper. The proposed method in this paper is based on visual cryptography defined by Noor and Shamir. The proposed method is working on selection of random pixels from the original digital image instead of specific selection of pixels. The new method proposed does not require that the watermark pattern to be embedded in to the original digital image. Instead of that, verification information is generated which will be used to verify the ownership of the image. This leaves the marked image equal to the original image. The method is based on the relationship between randomly selected pixels and their 8-neighbors’ pixels. This relationship keeps the marked image coherent against diverse attacks even if the most significant bits of randomly selected pixels have been changed by attacker as we will see later in this paper. Experimental results show the proposed method can recover the watermark pattern from the marked image even if major changes are made to the original digital image. 展开更多
关键词 IMAGE WATERMARK PATTERN Visual CRYPTOGRAPHY Digital IMAGE COPYRIGHT
下载PDF
Transparent System for Digital Media Copyright Protection in Mobile Business 被引量:1
20
作者 YANG Cheng ZHANG Lihe +1 位作者 WANG Yongbin LIU Jianbo 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1923-1926,共4页
At present, in mobile business, the secure environment in the terminal of users has not been embedded, many cryptology-based methods can not be directly used to protect the copyright of digital media. Under this situa... At present, in mobile business, the secure environment in the terminal of users has not been embedded, many cryptology-based methods can not be directly used to protect the copyright of digital media. Under this situation, a transparent system based on watermark for digital right management and digital copyright protection is proposed in this paper. The transparent system is called WDRM (watermark-based digital rights management) and transparent to users. Its core is WDRM Agent. In this paper, system inner model and procession are designed in detail at first, including the registration, the downloading, the super distribution, and the cooperation. Because the watermark embedding and the extraction algorithms are the kernel in this architecture, we also discuss how to choose and design the algorithms. Then we establish a package for all algorithms in WDRM Agent. 展开更多
关键词 mobile business information security digital copyright protection digital watermark
下载PDF
上一页 1 2 18 下一页 到第
使用帮助 返回顶部