共查询到20条相似文献,搜索用时 93 毫秒
1.
薛兴华 《通信技术政策研究》2005,(4):43-51
随着互联网的迅速发展,网络著作权保护问题开始凸现,自办网站和电信业务活动使用未经授权的他人作品,链接他人网站或网页,以及下载和转载网络原创作品等侵权行为已成为社会关注的焦点。本文在分析了网络著作权的保护对象、网络著作权法律责任的承担和侵权责任的认定、网络著作权的保护及防止自办网站侵权行为的发生等问题的基础上,对如何强化全社会网络著作权保护的法律意识,采取有力措施促进互联网健康发展提出了几点建议。 相似文献
2.
3.
4.
网络的飞速发展为人们的工作、生活带来便利的同时,也对传统著作权提出了巨大的挑战。博客是继E-mail、IM、BBS之后的一种新型沟通工具,博客内容具有原创性、可复制性等特征,应该享有著作权,然而网络的开放性和交互性给博客著作权的保护带来诸多困难。文章以一名博客使用者的视角出发,剖析博客著作权的侵权行为,提出建立一套行之有效的保护措施的必要性及具体解决措施,促进网络的健康发展。 相似文献
5.
数字水印与多媒体著作权保护 总被引:2,自引:0,他引:2
数字水印作为下世纪版权保护的核心技术日益受到人们的广泛重视。在全面介绍这一技术的基础上详细讨论了如何利用它进行多媒体著作版权的保护。不仅给出了具体的实例和详细的算法流程,而且深入讨沦了数字水印技术的目前进展,发展方向及应用前景。 相似文献
6.
曲志红 《通信业与经济市场》2005,(5):18-19
国家版权局和信息产业部16日举行新闻发布会说,经国家版权局局长石宗源和信息产业部部长王旭东签发,我国第一部网络著作权行政管理规章《互联网著作权行政保护办法》已于4月30日发布,将于今年5月30日起正式实施。 相似文献
7.
8.
9.
今年2月17日,下一代光碟Blu-ray Disc和HD DVD采用的著作权保护格式高等内容进入系统AACS(Advanced Access Content System)0.91版本正式公布并开始接受授权。AV设备厂商只要获得AACS LA的授权,就可为其产品分配ID与加密密钥。这样,东芝原订今年HD DVD影碟机的计划有望实现,视频爱好者期盼已久的高清晰度光碟市场坚冰已经破碎。 相似文献
10.
赵戎 《通信业与经济市场》2005,(7):33-33
把付费下载的手机铃声转发给朋友也算侵权?在7月10日“保护知识产权法制宣传周”北京现场活动中,笔者从相关专家处了解到,许多日常生活中的细节都可能存在侵权行为,公众应加强著作权意识。 相似文献
11.
Watermarking digital images for copyright protection 总被引:6,自引:0,他引:6
O'Ruanaidh J.J.K. Dowling W.J. Boland F.M. 《Vision, Image and Signal Processing, IEE Proceedings -》1996,143(4):250-256
A watermark is an invisible mark placed on an image that is designed to identify both the source of an image as well as its intended recipient. The authors present an overview of watermarking techniques and demonstrate a solution to one of the key problems in image watermarking, namely how to hide robust invisible labels inside grey scale or colour digital images 相似文献
12.
A way to discourage illicit reproduction of copyrighted or sensitive documents is to watermark each copy before distribution. A unique mark is embedded in the text whose recipient is registered. The mark can be extracted from a possibly noisy illicit copy, identifying the registered recipient. Most image marking techniques are vulnerable to binarization attack and, hence, not suitable for text marking. We propose a different approach where a text document is marked by shifting certain text lines slightly up or down or words slightly left or right from their original positions. The shifting pattern constitutes the mark and is different on different copies. In this paper we develop and evaluate a method to detect such minute shifts. We describe a marking and identification prototype that implements the proposed method. We present preliminary experimental results which suggest that centroid detection performs remarkably well on line shifts even in the presence of severe distortions introduced by printing, photocopying, scanning, and facsimile transmission 相似文献
13.
Wavelet tree quantization for copyright protection watermarking 总被引:10,自引:0,他引:10
Shih-Hao Wang Yuan-Pei Lin 《IEEE transactions on image processing》2004,13(2):154-165
This paper proposes a wavelet-tree-based blind watermarking scheme for copyright protection. The wavelet coefficients of the host image are grouped into so-called super trees. The watermark is embedded by quantizing super trees. The trees are so quantized that they exhibit a large enough statistical difference, which will later be used for watermark extraction. Each watermark bit is embedded in perceptually important frequency bands, which renders the mark more resistant to frequency based attacks. Also, the watermark is spread throughout large spatial regions. This yields more robustness against time domain geometric attacks. Examples of various attacks will be given to demonstrate the robustness of the proposed technique. 相似文献
14.
Shi-Jinn Horng Didi Rosiyadi Tianrui Li Terano Takao Minyi Guo Muhammad Khurram Khan 《Journal of Visual Communication and Image Representation》2013,24(7):1099-1105
An efficient blind copyright protection for e-government document images is proposed through a combination of the discrete cosine transform (DCT) and the singular value decomposition (SVD) based on genetic algorithm (GA). This combination could lead the watermarked image to be resistant to various attacks as well as to improve its performance, security and robustness. DCT, in this case, is applied to the entire image and mapped by a zigzag manner to four areas from the lowest to the highest frequencies. SVD, meanwhile, is applied in each area and then the singular value of DCT-transformed host image, subsequently, is modified in each area with the quantizing value using GA to increase the visual quality and the robustness. The host image is not needed in the watermark extraction and it is more useful than non-blind one in real-world applications. Experiment results demonstrate that the proposed method outperforms other existing methods under several types of attacks. 相似文献
15.
Majid Masoumi Shervin Amiri 《AEUE-International Journal of Electronics and Communications》2013,67(6):528-535
Due to the replicable nature of video many illegal copies of the original video can be made. So it demands to deliver methods for preventing illegal copying. This paper identifies a new digital watermarking approach for copyright protection of video based on wavelet transformation. First, the motion part of color video is detected by scene change analysis, and then by applying 3D wavelet transformation over detected motion part, 10 sub-bands of wavelet coefficients are obtained. In order to insert the watermark, 3D coefficients of HL, LH and HH with their third level are selected. After all, by using a spread spectrum technique, the watermark is embedded into the selected wavelet coefficients. In extraction step, the original video is not needed, namely, blind detection. So, the resultant watermarking scheme can be used for public watermarking applications, where the original video is not available for watermark extraction. The experimental results show a good performance of the proposed method for transparency and robustness. Furthermore, the robustness of the proposed method against various kinds of attacks such as median filtering, Gaussian noise, frame dropping, frame averaging, frame swapping and lots of lossy compression including MPEG-4, MPEG-2, and H.264 shows the fidelity of our claim. 相似文献
16.
Watermarking-based copyright protection of sequential functions 总被引:1,自引:0,他引:1
Watermarking is one of several techniques available today to deter copyright infringement in electronic systems. The technique consists of implanting indelible stamps in the circuit's inner structure, while not disrupting its functionality nor degrading its performance significantly. In this paper, a novel method is proposed for the creation of watermarks in regular sequential functions. This is an important class of functions, as it is the basis of most digital controllers. Algorithms are proposed for implanting robust watermarks to minimize the overhead and, ultimately, to reduce the impact on performance. Detection methods have been discussed in the presence of infringement attacks. The resilience of the method in several tampering regimes has been estimated. Examples illustrate the suitability of the approach 相似文献
17.
Several ways to protect software are examined. Patents confer a limited monopoly, which protects the patent holder against all later independent developers of the same or equivalent program. Utility-patent applications typically require several thousand dollars in fees and costs prior to issuance of the patent. Design-patent applications are relatively much cheaper to file and process through the Patent Office. Copyright protects the literal code, and possibly the programs' structure and organization, against copying. Copyright registration applications can usually be prepared for a few hundred dollars, including any attorney time. Trade-secret protection for software is a viable alternative, if the program cannot be easily copied by purchasers. The cost for protecting a trade secret depends on the measures necessary to keep the information from general public disclosure 相似文献
18.
19.
《IEE Review》1994,40(1):40-41
1993 brought a series of changes in the protection and licensing of software, which mark a shift in the legal and commercial balance between suppliers and users. In particular, they introduced a number of additional rights for software users, some of which will apply irrespective of anything in the relevant contract. Everyone involved in the development, licensing or use of computer programs should therefore be aware of the changes. Here, the author outlines what every software supplier and user should know about these latest developments in software protection 相似文献