期刊文献+
共找到25篇文章
< 1 2 >
每页显示 20 50 100
Robustness and Statistical Significance of PAM-like Matrices for Cognate Identification
1
作者 Antonella Delmestri Nello Cristianini 《通讯和计算机(中英文版)》 2010年第12期21-31,共11页
关键词 同源配对 统计意义 PAM 鲁棒性 学习系统 识别 矩阵 生物序列分析
下载PDF
An Efficient Information Hiding Scheme Based on Closest Paired Tree Structure Vector Quantization 被引量:1
2
作者 Zhi-Hui Wang Chin-Chen Chang Ting-Yu Lin 《Journal of Electronic Science and Technology》 CAS 2013年第1期15-19,共5页
Information hiding schemes based on vector quantization(VQ) usually require lengthy VQ encoding and decoding processes.In this paper,we propose an efficient information hiding method based on closest paired tree struc... Information hiding schemes based on vector quantization(VQ) usually require lengthy VQ encoding and decoding processes.In this paper,we propose an efficient information hiding method based on closest paired tree structure vector quantization(CPTSVQ).The simulation result shows that the execution time of the proposed scheme is much shorter than that attained by previous approaches. 展开更多
关键词 矢量量化 信息隐藏 树结构 配对 基础 VQ编码 隐藏方法 仿真结果
下载PDF
Load Balance Strategy of Data Routing Algorithm Using Semantics for Deduplication Clusters
3
作者 Ze-Jun Jiang Zhi-Ke Zhang +2 位作者 Li-Fang Wang Chin-Chen Chang Li Liu 《Journal of Electronic Science and Technology》 CAS CSCD 2017年第3期277-282,共6页
The backup requirement of data centres is tremendous as the size of data created by human is massive and is increasing exponentially.Single node deduplication cannot meet the increasing backup requirement of data cent... The backup requirement of data centres is tremendous as the size of data created by human is massive and is increasing exponentially.Single node deduplication cannot meet the increasing backup requirement of data centres.A feasible way is the deduplication cluster,which can meet it by adding storage nodes.The data routing strategy is the key of the deduplication cluster.DRSS(data routing strategy using semantics) improves the storage utilization of MCS(minimum chunk signature) data routing strategy a lot.However,for the large deduplication cluster,the load balance of DRSS is worse than MCS.To improve the load balance of DRSS,we propose a load balance strategy used for DRSS,namely DRSSLB.When a node is overloaded,DRSSLB iteratively migrates the current smallest container of the node to the smallest node in the deduplication cluster until this overloaded node becomes non-overloaded.A container is the minimum unit of data migration.Similar files sharing the same features or file names are stored in the same container.This ensures the similar data groups are still in the same node after rebalancing the nodes.We use the dataset from the real world to evaluate DRSSLB.Experimental results show that,for various numbers of nodes of the deduplication cluster,the data skews of DRSSLB are under predefined value while the storage utilizations of DRSSLB do not nearly increase compared with DRSS,with the low penalty(the data migration rate is only6.5% when the number of nodes is 64). 展开更多
关键词 负载均衡策略 路由算法 数据删除 数据语义 集群 存储利用率 负载平衡策略 中继卫星
下载PDF
Study of Difference-Expansion Embedding Schemes
4
作者 Ke Mao Chin-Feng Lee +1 位作者 Chin-Cheng Chang Run-Hua Shi 《Journal of Electronic Science and Technology》 CAS CSCD 2017年第3期211-216,共6页
Difference expansion(DE) is one of the famous schemes in the field of reversible data hiding.With the high efficiency and simplicity,DE also has received more attention over the years.DE has a good information capacit... Difference expansion(DE) is one of the famous schemes in the field of reversible data hiding.With the high efficiency and simplicity,DE also has received more attention over the years.DE has a good information capacity,but due to its major location map,the pure payload is rather low.Therefore many scholars did relevant improvements which let n pixels as a unit instead of the original two pixels as a unit and can adaptively adjust the number of embedding secret information according to the smoothness degree of the block,which achieves the result of improving the information payload or the image quality.In this paper,the study of DE-based reversible data hiding schemes is comprehensively discussed.The performance of DEbased schemes is evaluated and compared in terms of embedding capacity and stego-image quality. 展开更多
关键词 嵌入 差分 信息隐藏 图像质量 有效载荷 信息能力 光滑程度 秘密信息
下载PDF
Reversible Data Embedding Scheme Using Relationships between Pixel-Values and Their Neighbors
5
作者 Chia-Chen Lin Chin-Chen Chang Yi-Hui Chen 《Journal of Electronic Science and Technology》 CAS 2012年第3期238-249,共12页
Reversible data embedding is becoming a very important issue in securing images transmitted over the Internet, especially in dealing with sensitive images such as those created for military data and medical data. Base... Reversible data embedding is becoming a very important issue in securing images transmitted over the Internet, especially in dealing with sensitive images such as those created for military data and medical data. Based on the relationships between pixels and their neighbors, we propose a reversible data embedding scheme to embed hidden messages into an original image. In our proposed scheme, a two-layer data embedding approach is used for our proposed data embedding phase. Layer-1 embedding is used to hide secret data. Layer-2 embedding, which is an embedding variant of the proposed layer-1 embedding, is used to hide side information, such as the parameters required to restore the marked image. In our layer-1 embedding, the value of an embedded pixel is determined according to a predetermined threshold and the relationship between the pixel and its neighbors. In our layer-2 embedding, the similar data embedding concept is expanded to the block-based. Experimental results provide supportive data to show that the proposed scheme can provide greater hiding capacity while preserving the image quality of a marked image in comparison with previous work. 展开更多
关键词 数据嵌入 像素值 可逆 邻居 原始图像 网上传输 数据保护 嵌入方法
下载PDF
High-Imperceptibility Data Hiding Scheme for JPEG Images Based on Direction Modification
6
作者 Li Liu Jing Li +2 位作者 Yingchun Wu Chin-Chen Chang Anhong Wang 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期1415-1431,共17页
Data hiding(DH)is an important technology for securely transmitting secret data in networks,and has increasing become a research hotspot throughout the world.However,for Joint photographic experts group(JPEG)images,it... Data hiding(DH)is an important technology for securely transmitting secret data in networks,and has increasing become a research hotspot throughout the world.However,for Joint photographic experts group(JPEG)images,it is difficult to balance the contradiction among embedded capacity,visual quality and the file size increment in existing data hiding schemes.Thus,to deal with this problem,a high-imperceptibility data hiding for JPEG images is proposed based on direction modification.First,this proposed scheme sorts all of the quantized discrete cosine transform(DCT)block in ascending order according to the number of non-consecutive-zero alternating current(AC)coefficients.Then it selects non-consecutive-zero AC coefficients with absolute values less than or equal to 1 at the same frequency position in two adjacent blocks for pairing.Finally,the 2-bit secret data can be embedded into a coefficient-pair by using the filled reference matrix and the designed direction modification rules.The experiment was conducted on 5 standard test images and 1000 images of BOSSbase dataset,respectively.The experimental results showed that the visual quality of the proposed scheme was improved by 1∼4 dB compared with the comparison schemes,and the file size increment was reduced at most to 15%of the comparison schemes. 展开更多
关键词 Data hiding JPEG images coefficient-pair direction modification file size increment
下载PDF
A Steganography Based on Optimal Multi-Threshold Block Labeling
7
作者 Shuying Xu Chin-Chen Chang Ji-Hwei Horng 《Computer Systems Science & Engineering》 SCIE EI 2023年第1期721-739,共19页
Hiding secret data in digital images is one of the major researchfields in information security.Recently,reversible data hiding in encrypted images has attracted extensive attention due to the emergence of cloud servi... Hiding secret data in digital images is one of the major researchfields in information security.Recently,reversible data hiding in encrypted images has attracted extensive attention due to the emergence of cloud services.This paper proposes a novel reversible data hiding method in encrypted images based on an optimal multi-threshold block labeling technique(OMTBL-RDHEI).In our scheme,the content owner encrypts the cover image with block permutation,pixel permutation,and stream cipher,which preserve the in-block correlation of pixel values.After uploading to the cloud service,the data hider applies the prediction error rearrangement(PER),the optimal threshold selection(OTS),and the multi-threshold labeling(MTL)methods to obtain a compressed version of the encrypted image and embed secret data into the vacated room.The receiver can extract the secret,restore the cover image,or do both according to his/her granted authority.The proposed MTL labels blocks of the encrypted image with a list of threshold values which is optimized with OTS based on the features of the current image.Experimental results show that labeling image blocks with the optimized threshold list can efficiently enlarge the amount of vacated room and thus improve the embedding capacity of an encrypted cover image.Security level of the proposed scheme is analyzed and the embedding capacity is compared with state-of-the-art schemes.Both are concluded with satisfactory performance. 展开更多
关键词 Reversible data hiding encryption image prediction error compression multi-threshold block labeling
下载PDF
Online Maximum Loadability Monitoring Scheme for Smart Grid 被引量:1
8
作者 Heng-Yi Su Yi-Chung Chen Jia-Chuan Lin 《Journal of Power and Energy Engineering》 2015年第4期170-177,共8页
This paper presents an algorithm based on Thevenin equivalent network for voltage stability evaluation. The proposed algorithm provides a technique for online predicting the largest possible margin to voltage collapse... This paper presents an algorithm based on Thevenin equivalent network for voltage stability evaluation. The proposed algorithm provides a technique for online predicting the largest possible margin to voltage collapse of an electrical power system. An online maximum loadability determination algorithm is developed by transforming the impedance margin, obtained from the Thevenin equivalent network, into the loading margin at each of the load buses in a power system. Furthermore, the proposed algorithm also takes system load trends into account for practical applications. The effectiveness of the proposed algorithm is tested on the IEEE 14 and 57 bus test systems. Simulation results have shown that the proposed algorithm is useful and practical for online voltage instability monitoring. 展开更多
关键词 MAXIMUM Lodability ONLINE MONITORING Smart GRID Thevenin EQUIVALENT VOLTAGE Stability
下载PDF
Fast Image Coding Algorithm Using Indirect-Index Codebook Based on SMVQ
9
作者 Bin-Bin Xia An-Hong Wang +1 位作者 Chin-Chen Chang Li Liu 《Journal of Electronic Science and Technology》 CAS CSCD 2016年第2期183-190,共8页
Side-match vector quantization(SMVQ) achieves better compression performance than vector quantization(VQ) in image coding due to its exploration of the dependence of adjacent pixels. However, SMVQ has the disadvantage... Side-match vector quantization(SMVQ) achieves better compression performance than vector quantization(VQ) in image coding due to its exploration of the dependence of adjacent pixels. However, SMVQ has the disadvantage of requiring excessive time during the process of coding. Therefore, this paper proposes a fast image coding algorithm using indirect-index codebook based on SMVQ(IIC-SMVQ) to reduce the coding time. Two codebooks, named indirect-index codebook(II-codebook) and entire-state codebook(ES-codebook), are trained and utilized. The II-codebook is trained by using the Linde-Buzo-Gray(LBG) algorithm from side-match information, while the ES-codebook is generated from the clustered residual blocks on the basis of the II-codebook. According to the relationship between these two codebooks,the codeword in the II-codebook can be regarded as an indicator to construct a fast search path, which guides in quickly determining the state codebook from the ES-codebook to encode the to-be-encoded block. The experimental results confirm that the coding time of the proposed scheme is shorter than that of the previous SMVQ. 展开更多
关键词 图像编码算法 码本 间接 编码时间 矢量量化 相邻像素 边缘匹配 搜索路径
下载PDF
Protecting User Privacy in a Multi-Path Information-Centric Network Using Multiple Random-Caches
10
作者 Wei-Bo Chu Li-Fang Wang +1 位作者 Ze-Jun Jiang Chin-Chen Chang 《Journal of Computer Science & Technology》 SCIE EI CSCD 2017年第3期585-598,共14页
缓冲的在里面网络是信息中央的网络(ICN ) 为有效内容倡导的基本机制交货。然而,这新机制也由于缓存窥探带严肃的隐私风险攻击。这个问题的一个有效答案是随机缓存的,在在一个路由器的缓存随机模仿缓存的地方撞击或为每个内容的一个... 缓冲的在里面网络是信息中央的网络(ICN ) 为有效内容倡导的基本机制交货。然而,这新机制也由于缓存窥探带严肃的隐私风险攻击。这个问题的一个有效答案是随机缓存的,在在一个路由器的缓存随机模仿缓存的地方撞击或为每个内容的一个缓存失误请求 / 探查。在这份报纸,我们调查使用的有效性多重对随机缓存在一条多路径保护缓存隐私 ICN。我们为描绘多路径 ICN 的隐私与建议模型随机缓存,并且分析二不同攻击情形:1 ) 基于前缀的攻击并且 2 ) 基于后缀的攻击。同类、异构的缓存被考虑。我们的分析在多路径 ICN 显示出那一个对手罐头潜在地更增加由采用基于前缀的攻击的隐私信息。而且,异构的缓存比的提供好一些的隐私保护在两攻击下面的同类的。多路径的隐私上的不同参数的效果随机缓存进一步被调查,并且有它的单个路径的对应物的比较基于数字评估被执行。在这份报纸的分析和结果在设计并且评估多路径提供卓见 ICN 我们什么时候考虑隐私。 展开更多
关键词 信息中央的网络(ICN ) 用户隐私 缓冲窥探 随机缓存 多路径
原文传递
Enhanced Delegation Based Authentication Protocol for Secure Roaming Service with Synchronization
11
作者 Hsing-Bai Chen Yung-Hsiang Lai +1 位作者 Kuei-Wan Chen Wei-Bin Lee 《Journal of Electronic Science and Technology》 CAS 2011年第4期345-351,共7页
Portable communication systems can provide mobile users with global roaming services. Recently, Youn and Lim proposed a delegation-based authentication protocol which achieves unlinkability for secure roaming services... Portable communication systems can provide mobile users with global roaming services. Recently, Youn and Lim proposed a delegation-based authentication protocol which achieves unlinkability for secure roaming services. This paper indicates that there are two drawbacks in Youn and Lim's protocol: 1) the synchronization problem will lead to a fail in on-line authentication; and 2) the exhaustive search puts a heavy burden on the off-line authentication process. Moreover, based on Youn and Lim's protocol, a remedy is proposed to address these problems. It is worthwhile to note that the proposed remedy not only keeps the original advantages but also enhances the security and performance. 展开更多
关键词 认证协议 全球漫游 同步问题 安全性 代表团 服务 身份验证 移动用户
下载PDF
A Photo Certificate-A Framework for Generating Visualized Public Key Certificates
12
作者 Wei-Bin Lee Chien-Chen Huang Chia-Chen Lin 《Journal of Electronic Science and Technology》 CAS 2011年第4期339-344,共6页
In the proposed photo certificate, the principal component is the image, for example, the user's photo. User-related fields, such as the subject's name, the issuer's name, and the expiration period, which ... In the proposed photo certificate, the principal component is the image, for example, the user's photo. User-related fields, such as the subject's name, the issuer's name, and the expiration period, which are meaningful to users, are embedded into the surface of the photo by using a visible watermark algorithm, so that the reader can capture this information without the requirement for special software. The remaining fields in the certificate are embedded into a marked photo. Later, the whole photo certificate is cryptographically signed by certification authority (CA) private key to guarantee the integrity of our photo certificate. By such arrangement, the certificate's verification is divided into two layers. The first layer is human visual system oriented and the second layer is the software-oriented. User can determine whether the user's photo and its subject's name are consistent and check whether the expired period is valid first. The second layer's verification is lunched only when the first layer's verification is passed. To sum up, the proposed photo certificate not only inherits the functions of a traditional certificate, but also provides a friendlier operational environment of X.509 certificate. 展开更多
关键词 密钥证书 可视化 框架 图片 人类视觉系统 软件需求 水印算法 操作环境
下载PDF
Secret Sharing Using Visual Cryptography
13
作者 Chin-Chen Chang Bo Li Jung-San Lee 《Journal of Electronic Science and Technology》 CAS 2010年第4期289-299,共11页
Compared with the traditional cryptography,visual cryptography(VC) decrypts secret images referring to the characteristics of human vision,rather than the cryptography knowledge or complex computations.Furthermore,see... Compared with the traditional cryptography,visual cryptography(VC) decrypts secret images referring to the characteristics of human vision,rather than the cryptography knowledge or complex computations.Furthermore,seeing to the freeness of the secret key,the whole process of encryption as well as decryption for the visual cryptography meets a fast dealing course.As to the security concern,it is able to guarantee that no one can have access to any clues about the content of a secret image from individual cover images.Thus,owing to the studies on this area,the target of light-weighted cryptography is reached.Now the visual cryptography has been developed from the meaningless shadows to the meaningful ones.Seeing to the highly developed technique,some advanced VC techniques are introduced in this survey,respectively. 展开更多
关键词 视觉密码 秘密共享 超声检查 安全问题 风险投资 加密 游离度 重量轻
下载PDF
Distortion-Free Data Embedding Scheme for High Dynamic Range Images
14
作者 Chin-Chen Chang Thai-Son Nguyen Chia-Chen Lin 《Journal of Electronic Science and Technology》 CAS 2013年第1期20-26,共7页
Distortion-free data embedding is a technique which can assure that not only the secret data is correctly extracted but also the cover media is recovered without any distortion after secret data is extracted completel... Distortion-free data embedding is a technique which can assure that not only the secret data is correctly extracted but also the cover media is recovered without any distortion after secret data is extracted completely.Because of these advantages,this technique attracts the attention of many researchers.In this paper,a new distortion-free data embedding scheme for high dynamic range(HDR) images is proposed.By depending on Cartesian product,this scheme can obtain higher embedding capacity while maintaining the exactly identical cover image and stego image when using the tone mapping algorithms.In experimental results,the proposed scheme is superior to Yu et al.'s scheme in regard to the embedding rate?an average embedding rate of 0.1355 bpp compared with Yu et al.'s scheme(0.1270 bpp). 展开更多
关键词 数据嵌入 动态范围 图像 免费 笛卡尔乘积 无失真 机密数据 介质回收
下载PDF
A Visual Secret Sharing Scheme for Progressively Restoring Secrets
15
作者 Chin-Chen Chang Yi-Pei Hsieh Chi-Cheng Liao 《Journal of Electronic Science and Technology》 CAS 2011年第4期325-331,共7页
Visual secret sharing has received more and more attention over the past years due to the fact that neither complex computation nor cryptographic knowledge is required to decrypt the secret image directly according to... Visual secret sharing has received more and more attention over the past years due to the fact that neither complex computation nor cryptographic knowledge is required to decrypt the secret image directly according to the characteristics of the human vision system. Considering the issue of sharing the secret image at multiple image resolutions with the meaningful shadows, in this paper, we present a friendly progressive visual secret sharing scheme without expanding the image size in the shadows and the reconstructed secret image based on applying a 2?2-sized block-wise operation to generate the shadows block by block. The proposed method can achieve these benefits: 1) the generated shadows are meaningful, and their sizes are not expanded, and 2) the secret image can be recovered at different resolutions by stacking different quantities of shadows together. The experimental results also show that the proposed method is superior to other compared schemes. 展开更多
关键词 秘密共享方案 可视化 人类视觉系统 图像共享 图像分辨率 秘密分享 阴影 块操作
下载PDF
A Novel(n,n)Secret Image Sharing Scheme Based on Sudoku
16
作者 Zhi-Hui Wang Cheng Guo Chin-Chen Chang 《Journal of Electronic Science and Technology》 CAS 2013年第1期44-50,共7页
Recently, Chang et al. proposed a Sudoku-based secret image sharing scheme. They utilized the Sudoku grid to generate meaningful shadow images, and their scheme satisfied all essential requirements. Based on Chang et ... Recently, Chang et al. proposed a Sudoku-based secret image sharing scheme. They utilized the Sudoku grid to generate meaningful shadow images, and their scheme satisfied all essential requirements. Based on Chang et al.'s scheme, we propose a novel (n, n) secret image sharing scheme based on Sudoku. In the proposed scheme, a secret image can be shared among n different cover images by generating n shadow images, and the secret image can be reconstructed without distortion using only these n shadow images. Also, the proposed scheme can solve the overflow and underflow problems. The experimental results show that the visual quality of the shadow images is satisfactory. Furthermore, the proposed scheme allows for a large embedding capacity. 展开更多
关键词 图像共享 视觉质量 阴影 不失真 子图像 大容量 图片
下载PDF
3D Multilayered Turtle Shell Models for Image Steganography
17
作者 Ji-Hwei Horng Juan Lin +1 位作者 Yanjun Liu Chin-Chen Chang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2020年第11期879-906,共28页
By embedding secret data into cover images,image steganography can produce non-discriminable stego-images.The turtle shell model for data hiding is an excellent method that uses a reference matrix to make a good balan... By embedding secret data into cover images,image steganography can produce non-discriminable stego-images.The turtle shell model for data hiding is an excellent method that uses a reference matrix to make a good balance between image quality and embedding capacity.However,increasing the embedding capacity by extending the area of basic structures of the turtle shell model usually leads to severe degradation of image quality.In this research,we innovatively extend the basic structure of the turtle shell model into a three-dimensional(3D)space.Some intrinsic properties of the original turtle shell model are well preserved in the 3D version.Theoretic analysis shows that the new proposed models have good performance both in the image quality and in the complexity of the reference matrix.Our experimental results justify the theoretic conclusions. 展开更多
关键词 3D turtle shell data hiding reference matrix image quality
下载PDF
Sub-pixel change detection for urban land-cover analysis via multi-temporal remote sensing images 被引量:2
18
作者 Peijun DU Sicong LIU +2 位作者 Pei LIU Kun TAN Liang CHENG 《Geo-Spatial Information Science》 SCIE EI 2014年第1期26-38,共13页
Conventional change detection approaches are mainly based on per-pixel processing,which ignore the sub-pixel spectral variation resulted from spectral mixture.Especially for medium-resolution remote sensing images use... Conventional change detection approaches are mainly based on per-pixel processing,which ignore the sub-pixel spectral variation resulted from spectral mixture.Especially for medium-resolution remote sensing images used in urban landcover change monitoring,land use/cover components within a single pixel are usually complicated and heterogeneous due to the limitation of the spatial resolution.Thus,traditional hard detection methods based on pure pixel assumption may lead to a high level of omission and commission errors inevitably,degrading the overall accuracy of change detection.In order to address this issue and find a possible way to exploit the spectral variation in a sub-pixel level,a novel change detection scheme is designed based on the spectral mixture analysis and decision-level fusion.Nonlinear spectral mixture model is selected for spectral unmixing,and change detection is implemented in a sub-pixel level by investigating the inner-pixel subtle changes and combining multiple composition evidences.The proposed method is tested on multi-temporal Landsat Thematic Mapper and China–Brazil Earth Resources Satellite remote sensing images for the land-cover change detection over urban areas.The effectiveness of the proposed approach is confirmed in terms of several accuracy indices in contrast with two pixel-based change detection methods(i.e.change vector analysis and principal component analysis-based method).In particular,the proposed sub-pixel change detection approach not only provides the binary change information,but also obtains the characterization about change direction and intensity,which greatly extends the semantic meaning of the detected change targets. 展开更多
关键词 change detection sub-pixel level processing multi-temporal images spectral mixture model back propagation neural network remote sensing
原文传递
New Sealed-Bid Electronic Auction with Fairness,Security and Efficiency 被引量:1
19
作者 吴家麒 张真诚 林詠章 《Journal of Computer Science & Technology》 SCIE EI CSCD 2008年第2期253-264,共12页
Electronic sealed-bid auction schemes usually have a common drawback,the third party(auction host)can conspire with a malicious bidder to leak all bidding prices before the opening stage.It results in the malicious bi... Electronic sealed-bid auction schemes usually have a common drawback,the third party(auction host)can conspire with a malicious bidder to leak all bidding prices before the opening stage.It results in the malicious bidder wining the auction with an optimal bidding price.Recently,Liaw et al.proposed an auction protocol for electronic online bidding in which they designed a deposit deduction certification for government procurement.However,it also has above mentioned flaw.Moreover,we further found that there were some extra security drawbacks in their protocol.First,the bidder can forge a bidding receipt to claim that he/she is a valid auction winner.Second,it may suffer from the third party forging attack.Third,their protocol leaked some bidders' private information to the third party,such as the bidder's bank account number and the authorization code.Thus,it cannot protect the bidder's privacy at all.In this paper,we not only point out the drawbacks from the previous scheme but also propose a new electronic auction scheme to overcome the above mentioned drawbacks.Furthermore,the computational complexity can be decreased in our online sealed-bid auction scheme. 展开更多
关键词 电子 安全技术 计算机技术 信息安全
原文传递
Blockchain-based Internet of Musical Things
20
作者 Luca Turchet Chan Nam Ngo 《Blockchain(Research and Applications)》 2022年第3期60-69,共10页
Blockchain technology is impacting several industries,including the creative industries and those operating in the Internet of Things(IoT).Lately,researchers'attention has been devoted to the application of blockc... Blockchain technology is impacting several industries,including the creative industries and those operating in the Internet of Things(IoT).Lately,researchers'attention has been devoted to the application of blockchain in the recorded music industry.However,thus far,no research has investigated the use of such technology in the Internet of Musical Things(IoMusT).The IoMusT is a new area emerging in industry and academy as an extension of the IoT to the musical domain.The IoMusT itself,as the IoT,is a distributed network of musical things,which are objects augmented with information and communication technologies serving a musical purpose.The IoMusT vision requires,above all,IoT features such as decentralization,seamless authentication,transparency,data integrity and privacy,and self-maintenance,as well as the musical domain features such as efficient handling of copyrights and speed of royalties payment.Such features can be brought by blockchain.In this paper,we investigate the integration of blockchain technology with the IoMusT,and we name such synthesis“Blockchain-based IoMusT”.We present a vision for this new paradigm in terms of the novel opportunities that are enabled,and we propose a set of application scenarios enabled by technological integration.Finally,we outline the open research directions in this promising area. 展开更多
关键词 Internet of Musical Things Blockchain Music industry PRIVACY SECURITY Internet of Things
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部