首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   200篇
  免费   5篇
  国内免费   14篇
综合类   13篇
化学工业   1篇
金属工艺   1篇
机械仪表   2篇
建筑科学   4篇
武器工业   1篇
无线电   40篇
一般工业技术   7篇
自动化技术   150篇
  2023年   1篇
  2022年   3篇
  2021年   1篇
  2019年   1篇
  2018年   1篇
  2017年   4篇
  2016年   5篇
  2015年   3篇
  2014年   7篇
  2013年   5篇
  2012年   8篇
  2011年   13篇
  2010年   8篇
  2009年   11篇
  2008年   12篇
  2007年   17篇
  2006年   24篇
  2005年   23篇
  2004年   19篇
  2003年   18篇
  2002年   19篇
  2001年   10篇
  2000年   1篇
  1999年   1篇
  1998年   1篇
  1996年   1篇
  1985年   1篇
  1984年   1篇
排序方式: 共有219条查询结果,搜索用时 220 毫秒
1.
In the area of image retrieval from data bases and for copyright protection of large image collections there is a growing demand for unique but easily computable fingerprints for images. These fingerprints can be used to quickly identify every image within a larger set of possibly similar images. This paper introduces a novel method to automatically obtain such fingerprints from an image. It is based on a reinterpretation of an image as a Riemannian manifold. This representation is feasible for gray value images and color images. We discuss the use of the spectrum of eigenvalues of different variants of the Laplace operator as a fingerprint and show the usability of this approach in several use cases. Contrary to existing works in this area we do not only use the discrete Laplacian, but also with a particular emphasis the underlying continuous operator. This allows better results in comparing the resulting spectra and deeper insights in the problems arising. We show how the well known discrete Laplacian is related to the continuous Laplace-Beltrami operator. Furthermore, we introduce the new concept of solid height functions to overcome some potential limitations of the method.  相似文献   
2.
We propose a new multipurpose audio watermarking scheme in which two complementary watermarks are used.For audio copyright protection,the watermark data with copyright information or signature are first encrypted by Arnold transformation.Then the watermark data are inserted in the low frequency largest significant discrete cosine transform(DCT) coefficients to obtain robustness performance.For audio authentication,a chaotic signal is inserted in the high frequency insignificant DCT coefficients to detect tampered regions.Furthermore,the synchronization code is embedded in the audio statistical characteristics to resist desynchronization attacks.Experimental results show that our proposed method can not only obtain satisfactory detection and tampered location,but also achieve imperceptibility and robustness to common signal processing attacks,such as cropping,shifting,and time scale modification(TSM).Comparison results show that our method outperforms some existing methods.  相似文献   
3.
对多媒体产品进行数字水印处理是解决这类产品的版权保护的有效途径。从数字水印的概念、原理和基本特性出发,探讨了如何构造版权水印信息、嵌入用户指定的授权信息、版权水印鉴定等问题。  相似文献   
4.
在1990年12月以前,建筑作品是作为绘画、图形和雕塑作品获得版权保护的.但是建筑本身被认为是一种实用物品,因而不受版权的保护.然而在1989年3月1日,美国加入《伯尔尼公约》.为了履行公约义务,美国国会通过了《1990年建筑作品版权保护法》(简称AWCPA),对《1976年版权法》进行了相应的修正,建筑作品作为独立的一类作品受版权法的保护,拓宽了建筑作品的保护范围,对建筑作品侵权的认定标准也发生变化.  相似文献   
5.
针对现有区块链版权系统在区块存储空间有限和版权验证依赖数据库数据的问题,设计一种文本作品的区块链版权认证模型。通过扩展区块结构将作品内容完整存储在区块链中,解决了数据库存储作品内容易被更改的问题。作品版权验证不再依赖数据库作品内容,依靠区块链的不可篡改性和非对称加密技术的唯一性,保证了作品版权验证过程的安全性。理论分析和模型实验结果表明:该模型适用于十万级别的文本作品的版权认证存储,具有良好的性能和较高的安全性。  相似文献   
6.
The arena of intellectual property encompasses streams that often interrelate and overlap in protecting different aspects of intellectual property. Australian commentators suggest that ‘one of the most troublesome areas in the entire field of intellectual property has been the relationship between copyright protection for artistic works under the Copyright Act 1968 (Cth) and protection for registered designs under the Designs Act 1906 (Cth).’ [McKeough, J., Stewart, A., & Griffith, P. (2004). Intellectual property in Australia (3rd ed.). Chatswood, NSW: Butterworths.] [Ricketson, S., Richardson, M., & Davison, M. (2009). Intellectual property: Cases, materials and commentary (4th ed.). Chatswood, NSW: LexisNexis Butterworths.] This overlap has caused much confusion for both creators of artistic works and industrial designs, as there is an uncertainty of whether protection against infringement is afforded under the Copyright Act 1988 (Cth) or whether the Designs Act 2003 (Cth) will apply. In Australia, there is limited precedent that examines the crossover between copyright and designs. Essentially, the cases that have tested this issue remain unclear as to whether a design applied industrially will invoke copyright protection. The cases demonstrate that there is an inconsistency in this area despite the aims of the new provisions of the Designs Act 2003 (Cth) to close the loopholes between copyright and designs. This paper will discuss and evaluate the relationship between copyright protection for artistic works and protection for registered designs with respect to the Designs Act 2003 (Cth).  相似文献   
7.
Digital fingerprinting has been suggested for copyright protection. Using a watermarking scheme, a fingerprint identifying the buyer is embedded in every copy sold. If an illegal copy appears, it can be traced back to the guilty user. By using collusion-secure codes, the fingerprinting system is made secure against cut-and-paste attacks. In this paper we study the interface between the collusion-secure fingerprinting codes and the underlying watermarking scheme, and we construct several codes which are both error-correcting and collusion-secure. Error-correction makes the system robust against successful attacks on the watermarking layer.  相似文献   
8.
9.
提出一种无失真扩频鲁棒水印方案,该方案通过量化函数对受版权保护的图像的小波域进行量化,产生的二值序列直接作为水印,即特征水印。由于该方案是基于图像内容的,并没有向图像中嵌入任何信息,不需要真正执行IDWT,水印图像没有任何失真,因而扩频水印方案是无失真水印嵌入方案。水印的鲁棒性主要由量化参数决定,而不是像传统的水印方案那样一般由嵌入的水印信息量所决定。  相似文献   
10.
A blind watermarking method using maximum wavelet coefficient quantization   总被引:3,自引:0,他引:3  
This paper proposes a blind watermarking algorithm based on maximum wavelet coefficient quantization for copyright protection. The wavelet coefficients are grouped into different block size and blocks are randomly selected from different subbands. We add different energies to the maximum wavelet coefficient under the constraint that the maximum wavelet coefficient is always maximum in a block. The watermark is embedded the local maximum coefficient which can effectively resist attacks. Also, using the block-based watermarking, we can extract the watermark without using the original image or watermark. Experimental results show that the proposed method is quite robust under either non-geometry or geometry attacks.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号