期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
Transparent System for Digital Media Copyright Protection in Mobile Business 被引量:1
1
作者 YANG Cheng ZHANG Lihe +1 位作者 WANG Yongbin LIU Jianbo 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1923-1926,共4页
At present, in mobile business, the secure environment in the terminal of users has not been embedded, many cryptology-based methods can not be directly used to protect the copyright of digital media. Under this situa... At present, in mobile business, the secure environment in the terminal of users has not been embedded, many cryptology-based methods can not be directly used to protect the copyright of digital media. Under this situation, a transparent system based on watermark for digital right management and digital copyright protection is proposed in this paper. The transparent system is called WDRM (watermark-based digital rights management) and transparent to users. Its core is WDRM Agent. In this paper, system inner model and procession are designed in detail at first, including the registration, the downloading, the super distribution, and the cooperation. Because the watermark embedding and the extraction algorithms are the kernel in this architecture, we also discuss how to choose and design the algorithms. Then we establish a package for all algorithms in WDRM Agent. 展开更多
关键词 mobile business information security digital copyright protection digital watermark
下载PDF
A New Watermarking Protocol against Conspiracy
2
作者 ZHANG Jun KOU Weidong FAN Kai CAO Xuefei 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1671-1674,共4页
A trusted third party introduced in watermarking protocols would decrease the security and affect the implementation of the protocols. In this paper, a new watermarking protocol with an un-trusted third party (UTTP)... A trusted third party introduced in watermarking protocols would decrease the security and affect the implementation of the protocols. In this paper, a new watermarking protocol with an un-trusted third party (UTTP) was proposed. Based on the idea of all-or-nothing disclosure of secret (ANDOS), all of the buyer, the seller and the third party didn't know the exact watermark, which was embedded in a digital content for tracing piracy. The proposed protocol provided mechanisms to trace piracy and protect customer's right. In addition, the problem that a seller colluded with UTTP to frame the buyer, namely, the conspiracy problem, could be avoided. 展开更多
关键词 watermarking protocol electronic commerce security digital copyright protection conspiracy problem
下载PDF
A Novel Database Watermarking Technique Using Blockchain as Trusted Third Party
3
作者 Ahmed S.Alghamdi Surayya Naz +3 位作者 Ammar Saeed Eesa Al Solami Muhammad Kamran Mohammed Saeed Alkatheiri 《Computers, Materials & Continua》 SCIE EI 2022年第1期1585-1601,共17页
With widespread use of relational database in various real-life applications,maintaining integrity and providing copyright protection is gaining keen interest of the researchers.For this purpose,watermarking has been ... With widespread use of relational database in various real-life applications,maintaining integrity and providing copyright protection is gaining keen interest of the researchers.For this purpose,watermarking has been used for quite a long time.Watermarking requires the role of trusted third party and a mechanism to extract digital signatures(watermark)to prove the ownership of the data under dispute.This is often inefficient as lots of processing is required.Moreover,certain malicious attacks,like additive attacks,can give rise to a situation when more than one parties can claim the ownership of the same data by inserting and detecting their own set of watermarks from the same data.To solve this problem,we propose to use blockchain technology—as trusted third party—along with watermarking for providing a means of rights protection of relational databases.Using blockchain for writing the copyright information alongside watermarking helps to secure the watermark as changing the blockchain is very difficult.This way,we combined the resilience of our watermarking scheme and the strength of blockchain technology—for protecting the digital rights information from alteration—to design and implement a robust scheme for digital right protection of relational databases.Moreover,we also discuss how the proposed scheme can also be used for version control.The proposed technique works with nonnumeric features of relational database and does not target only selected tuple or portion(subset)from the database for watermark embedding unlike most of the existing techniques;as a result,the chances of subset selection containing no watermark decrease automatically.The proposed technique employs zerowatermarking approach and hence no intentional error(watermark)is added to the original dataset.The results of the experiments proved the effectiveness of the proposed scheme. 展开更多
关键词 WATERMARKING blockchain digital copyright protection relational databases security
下载PDF
A Portable Multi-functional Real-time Digital Simulator Dedicated to Protective Relay Testing
4
作者 Liang Zhicheng Ma Xiandong +1 位作者 Wang Haixian Wang Like (Nanjing Automation Research Institute (NARI)) 《Electricity》 1998年第4期27-29,共3页
The paper intfoduces a PC-DSP based real-time digital simulator which is portable in size and aimed at the closed-loop testing of various types of protective relays for their design and application. The simulator can ... The paper intfoduces a PC-DSP based real-time digital simulator which is portable in size and aimed at the closed-loop testing of various types of protective relays for their design and application. The simulator can be widely used in not only concerning utilities but also manufacturers and research / certification institutes because of its many functions. The hardware architecture and software implementation of the simulator are described. The main features and functions of the simulator are also 展开更多
关键词 TIME A Portable Multi-functional Real-time Digital Simulator Dedicated to Protective Relay Testing MMI
下载PDF
IEC61850 standard-based harmonic blocking scheme for power transformers 被引量:1
5
作者 Senthil Krishnamurthy Bwandakassy Elenga Baningobera 《Protection and Control of Modern Power Systems》 2019年第1期123-137,共15页
Transformer Differential and overcurrent schemes are traditionally used as main and backup protection respectively. The differential protection relay (SEL487E) has dedicated harmonic restraint function which blocks th... Transformer Differential and overcurrent schemes are traditionally used as main and backup protection respectively. The differential protection relay (SEL487E) has dedicated harmonic restraint function which blocks the relay tripping during the transformer magnetizing inrush conditions. However, the backup overcurrent relay (SEL751A) applied to the transformer protection does not have harmonic restraint element and trip the overcurrent relay during the inrush conditions. Therefore, major contribution of this research work is the developed harmonic blocking scheme for transformer which uses element (87HB) of the transformer differential relay (SEL487E) to send an IEC61850 GOOSE-based harmonic blocking signal to the backup overcurrent relay (SEL751A) to inhibit from tripping during the transformer magnetizing inrush current conditions. The simulation results proved that IEC61850 standard-based protection scheme is faster than the hardwired signals. Therefore, the speed and reliability of the transformer scheme are improved using the IEC61850 standard-based GOOSE applications. 展开更多
关键词 Transformer protection Overcurrent protection Digital protection scheme Current differential protection Transformer magnetizing inrush current Harmonic blocking IEC 61850 GOOSE message
原文传递
PROTECTING DIGITAL AFTERLIFE
6
作者 LI LI 《Beijing Review》 2011年第48期18-20,共3页
Controversies over the inheritance of online profiles highlight the urgent need for legislation on the status of virtual assets Recently,a woman surnamed Wang in Shenyang City,northeast China’s Liaoning Province,cont... Controversies over the inheritance of online profiles highlight the urgent need for legislation on the status of virtual assets Recently,a woman surnamed Wang in Shenyang City,northeast China’s Liaoning Province,contacted Tencent,operator of China’s most popular instant messaging 展开更多
关键词 PROTECTING DIGITAL AFTERLIFE
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部