完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | Ke, Hung-Jui | |
dc.contributor.author | Wang, Shiuh-Jeng | |
dc.contributor.author | Chiang, Wen-Ya | |
dc.date.accessioned | 2009-06-02T07:06:59Z | |
dc.date.accessioned | 2020-05-25T06:47:39Z | - |
dc.date.available | 2009-06-02T07:06:59Z | |
dc.date.available | 2020-05-25T06:47:39Z | - |
dc.date.issued | 2009-02-09T08:32:39Z | |
dc.date.submitted | 2009-02-09 | |
dc.identifier.uri | http://dspace.lib.fcu.edu.tw/handle/2377/11122 | - |
dc.description.abstract | In this paper, we propose two algorithms to confuse the determination of intellectual property rights, when a watermark is the only method of authentication. We attempted to discover the potential drawbacks of Wang’s scheme [10] and highlighted the potential risks. Based on observation of Wang’s algorithms, we found the embedded watermark could be tampered without any knowledge of original secret information, such as the key or the pixel-block size. Our algorithms can make the embedded watermark “chaotic” to confuse intellectual property rights authentication. Both of our algorithms proposed in this paper can cause serious confusion without damaging the original image. The experiment results prove that our algorithms are useful to damage Wang’s scheme. | |
dc.description.sponsorship | 淡江大學,台北縣 | |
dc.format.extent | 6p. | |
dc.relation.ispartofseries | 2008 ICS會議 | |
dc.subject | procedures | |
dc.subject | watermark embedding | |
dc.subject | intellectual rights | |
dc.subject | information hiding | |
dc.subject.other | Information Security | |
dc.title | Watermarking Damage to Risk Multimedia in Intellectual Property Systems | |
分類: | 2008年 ICS 國際計算機會議 |
文件中的檔案:
檔案 | 描述 | 大小 | 格式 | |
---|---|---|---|---|
ce07ics002008000067.pdf | 490.7 kB | Adobe PDF | 檢視/開啟 |
在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。