共查询到20条相似文献,搜索用时 93 毫秒
1.
高等教育正处在信息化的进程中 ,高等教育信息化使高等教育进入了一个崭新的时代 .在高等教育信息化中 ,不可避免地遇到版权问题 ,特别是建设数字图书馆和开展现代远程教育与版权问题息息相关 .本文就以数字图书馆和现代远程教育为重点讨论高等教育信息化中有关版权问题 相似文献
2.
国际标准文本编码(ISTC)的目的是为文本作品提供一个有效的识别系统,使得文本作品信息能够在本地以及国际层面上,在作者、代理商、版权管理者、出版商以及出版供应链中的其他角色之间进行有效表达。这给数字时代的出版业提供了一个很好的数字内容识别管理工具。成功地制定一项国际标准并非易事。然而,自2009年ISO发布该标准后,其遭遇了注册量下滑,注册代理中心停止运营,国际注册管理机构董事会成员退出,标准目前面临废止的窘境。本文从该国际标准的产生背景、内容,发展情况与问题,以及目前正在展开的修订工作着手,探索了该标准的可能应用前景和发展方向。 相似文献
3.
4.
5.
6.
解读ISO标准版权保护政策 总被引:2,自引:0,他引:2
一、ISO标准版权保护政策的产生及发展ISO标准版权保护历史悠久。自1951年制定和出版其第一个“建议”时,ISO就声明其标准及ISO建议归ISO成员所有,1972年ISO决定将“建议”改为“国际标准”,这些“建议”将通过成员国审议逐渐转换为“标准”。这些转换后的标准声明ISO是版权的拥有者,而且版权使用权自动地转移给ISO成员用于制定其本国标准,并规定ISO成员有义务在其国内采取一切必要措施保护ISO知识产权,与此同时,ISO开始在ISO标准和标准草案(DIS)上分别附有版权公告。1993年ISO与IEC(国际电工委员会)共同制定适用于两大组… 相似文献
7.
8.
随着信息技术和网络技术的不断发展,流媒体技术以其诸多优点得到广泛的应用,随之也带来数字媒体版权保护和信息安全难题。而DRM(数字版权管理)且能有效的解决这一难题。基于提出流媒体DRM解决方案目的,在分析流媒体技术的要点和DRM技术基本概念、理论基础、流程以及国内外研究应用现状的基础上,提出一个灵活、安全的流媒体数字版权管理解决方案,以保障流媒体DRM系统的实现。 相似文献
9.
10.
11.
12.
In this position paper we discuss the current status of the core scientific journals in China. Based on discussions of journals’ relation to a small group of full-text database providers, open access publishing and copyright problems, we conclude that China’s digital publishing industry is not yet in a healthy state and some key issues related to revenue, digital piracy and copyright must be solved. 相似文献
13.
The widespread use of Internet and other communication technologies has brought about ease in reproducing, disclosing and distributing digital content. In addition to getting the benefits of information exchange, the digital community is confronted with authentication, forgery and copyright protection issues. Text is the most frequently used medium travelling over the Internet, along with images, audio and video. Majority of the content of books, newspapers, web pages, advertisements, research papers, legal documents and many other documents is basically, plain text. Therefore, copyright protection of plain text is a most important issue. In this article, we propose a robust zero-watermarking algorithm based on prepositions and double letters for copyright protection of plain text. The embedding algorithm uses occurrences of prepositions and double letters in the text to generate a key based on watermark. The extraction algorithm extracts the watermark from the noisy text to identify the original owner. Experimental results illustrate the effectiveness of the proposed algorithm on text encountering combined insertion, deletion and re-ordering attacks, both in the dispersed and localized forms. The results are also compared to a recent work on text watermarking. 相似文献
14.
标准制定过程是一个创作过程,标准构成《著作权法》规定的"作品",应受《著作权法》的保护.众多标准起草人是标准版权的共同所有人,标准制定组织通过约定成为标准版权的实际权利人.本文通过理论分析标准版权保护的法理基础,比较分析域外标准版权政策,提出我国国家标准版权保护的若干政策建议,希望对我国良好标准化治理体制的建立与完善有所裨益. 相似文献
15.
Kamred Udham Singh Hatem Salem Abu-Hamatta Abhishek Kumar Achintya Singhal Mamoon Rashid A. K. Bashir 《计算机、材料和连续体(英文)》2022,70(2):2525-2542
Teleradiology plays a vital role in the medical field, which permits transmitting medical and imaging data over a communication network. It ensures data reliability and provides convenient communication for clinical interpretation and diagnostic purposes. The transmission of this medical data over a network raises the problems of legal, ethical issues, privacy, and copyright authenticity. The copyright protection of medical images is a significant issue in the medical field. Watermarking schemes are used to address these issues. A gray-level or binary image is used as a watermark frequently in color image watermarking schemes. In this paper, the authors propose a novel non-blind medical image watermarking scheme based on 2-D Lifting Wavelet Transform (LWT), Multiresolution Singular Value Decomposition (MSVD), and LU factorization to improve the robustness and authenticity of medical images. In this scheme, multiple color watermarks are embedded into the colored DICOM (Digital Imaging and Communications in Medicine) images obtained from Color Doppler images (DICOM format), and the average results achieved by our proposed scheme is 46.84 db for Peak Signal-to-Noise Ratio (PSNR), 37.46 db for Signal-to-Noise Ratio (SNR), 0.99 for Quality of Image and 0.998 for Normalized Correlation for various image processing attacks. These results make our watermarking technique an ideal candidate for medical image watermarking. 相似文献
16.
17.
在 ODRL 2. 0 版权描述语言的基础上,提出了一种适用于数字印刷企业资产版权保护的许可证模型,并设计了一种基于 ODRL 2. 0 许可证的数字印刷版权保护模型。 分析了 ODRL 2. 0 的核心模型、抽象模型、补偿模型和 XML 编码,给出了一个适用于数字印刷企业的许可证实例和 XML 编码。 分析了现有的资产版权保护模型的缺陷和不足,提出了侧重于许可证文件应用性的扩充和改进模型。 该模型扩充了版权保护模型,提高了实用性和安全性。 相似文献
18.
针对当前对标准版权保护存在的一些不同看法,本文从版权、专有出版权的定义、国内外关于标准版权的规定等方面入手,分析标准的作品属性,针对强制性标准和推荐性标准的不同法律属性,提出强制性标准作为技术性法规不受著作权法保护,推荐性标准作为法人作品应当受到著作权法保护,并由标准批准发布机构作为版权主体的观点。 相似文献
19.
CAD图形数据数字水印技术综述 总被引:1,自引:1,他引:1
数字水印技术正成为网络环境下CAD图形的版权保护和侵权检测研究的热点。综述了目前国内外针对CAD图形水印技术所做的相关工作,分析了CAD图形在数据表示及使用方式上的特点、CAD图形嵌入数字水印的要求以及CAD图形数据信息冗余的类型;按空域、变换域及参数变换分类方法,概括了目前典型的针对CAD图形数据的数字水印算法,讨论了其优缺点。指出了对CAD图形数字水印技术还存在的问题以及对该领域未来可能的研究方向和研究重点进行了展望。 相似文献
20.
Image processing networks have gained great success in many fields, and thus the issue of copyright protection for image processing networks has become a focus of attention. Model watermarking techniques are widely used in model copyright protection, but there are two challenges: (1) designing universal trigger sample watermarking for different network models is still a challenge; (2) existing methods of copyright protection based on trigger s watermarking are difficult to resist forgery attacks. In this work, we propose a dual model watermarking framework for copyright protection in image processing networks. The trigger sample watermark is embedded in the training process of the model, which can effectively verify the model copyright. And we design a common method for generating trigger sample watermarks based on generative adversarial networks, adaptively generating trigger sample watermarks according to different models. The spatial watermark is embedded into the model output. When an attacker steals model copyright using a forged trigger sample watermark, which can be correctly extracted to distinguish between the piratical and the protected model. The experiments show that the proposed framework has good performance in different image segmentation networks of UNET, UNET++, and FCN (fully convolutional network), and effectively resists forgery attacks. 相似文献