Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (7)
  • Open Access


    MBE: A Music Copyright Depository Framework Incorporating Blockchain and Edge Computing

    Jianmao Xiao1, Ridong Huang1, Jiangyu Wang1, Zhean Zhong1, Chenyu Liu1, Yuanlong Cao1,*, Chuying Ouyang2

    Computer Systems Science and Engineering, Vol.47, No.3, pp. 2815-2834, 2023, DOI:10.32604/csse.2023.039716

    Abstract Audio copyright is a crucial issue in the music industry, as it protects the rights and interests of creators and distributors. This paper studies the current situation of digital music copyright certification and proposes a music copyright certification framework based on “blockchain + edge computing mode,” abbreviated as MBE, by integrating edge computing into the Hyperledger Fabric system. MBE framework compresses and splits the audio into small chunks, performs Fast Fourier Transform (FFT) to extract the peak points of each frequency and combines them to obtain unique audio fingerprint information. After being confirmed by various nodes on the Fabric alliance… More >

  • Open Access


    New Fragile Watermarking Technique to Identify Inserted Video Objects Using H.264 and Color Features

    Raheem Ogla1,*, Eman Shakar Mahmood1, Rasha I. Ahmed1, Abdul Monem S. Rahma2

    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 3075-3096, 2023, DOI:10.32604/cmc.2023.039818

    Abstract The transmission of video content over a network raises various issues relating to copyright authenticity, ethics, legality, and privacy. The protection of copyrighted video content is a significant issue in the video industry, and it is essential to find effective solutions to prevent tampering and modification of digital video content during its transmission through digital media. However, there are still many unresolved challenges. This paper aims to address those challenges by proposing a new technique for detecting moving objects in digital videos, which can help prove the credibility of video content by detecting any fake objects inserted by hackers. The… More >

  • Open Access


    A Dual Model Watermarking Framework for Copyright Protection in Image Processing Networks

    Yuhang Meng1, Xianyi Chen1,*, Xingming Sun1, Yu Liu1, Guo Wei2

    CMC-Computers, Materials & Continua, Vol.75, No.1, pp. 831-844, 2023, DOI:10.32604/cmc.2023.033700

    Abstract Image processing networks have gained great success in many fields, and thus the issue of copyright protection for image processing networks has become a focus of attention. Model watermarking techniques are widely used in model copyright protection, but there are two challenges: (1) designing universal trigger sample watermarking for different network models is still a challenge; (2) existing methods of copyright protection based on trigger s watermarking are difficult to resist forgery attacks. In this work, we propose a dual model watermarking framework for copyright protection in image processing networks. The trigger sample watermark is embedded in the training process… More >

  • Open Access


    A Image Copyright Protection Method Using Zero-Watermark by Blockchain and IPFS

    Tao Chen1, Zhao Qiu1,*, Gengquan Xie1, Lin Yuan1, Shaohua Duan1, Hao Guo1, Dahao Fu1, Hancheng Huang2

    Journal of Information Hiding and Privacy Protection, Vol.3, No.3, pp. 131-142, 2021, DOI:10.32604/jihpp.2021.026606

    Abstract Behind the popularity of multimedia technology, the dispute over image copyright is getting worse. In the digital watermark prevention technology for copyright infringement, watermark technology is considered to be an important technology to overcome data protection problems and verify the relationship between data ownership. Among the many digital watermarking technologies, zero watermarking technology has been favored in recent years. However, the existing zero watermark technology in the implementation process often needs a trusted third party to store watermarks, which may make the data too central, data storage security is low and copyright registration costs are too high, which creates a… More >

  • Open Access


    A Zero-Watermark Scheme Based on Quaternion Generalized Fourier Descriptor for Multiple Images

    Baowei Wang1,2,3,*, Weishen Wang1, Peng Zhao1, Naixue Xiong4

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 2633-2652, 2022, DOI:10.32604/cmc.2022.022291

    Abstract Most of the existing zero-watermark schemes for medical images are only appropriate for a single grayscale image. When they protect a large number of medical images, repeating operations will cause a significant amount of time and storage costs. Hence, this paper proposes an efficient zero-watermark scheme for multiple color medical images based on quaternion generalized Fourier descriptor (QGFD). Firstly, QGFD is utilized to compute the feature invariants of each color image, then the representative features of each image are selected, stacked, and reshaped to generate a feature matrix, which is then binarized to get a binary feature image. Copyright information… More >

  • Open Access


    A Novel Database Watermarking Technique Using Blockchain as Trusted Third Party

    Ahmed S. Alghamdi1, Surayya Naz2, Ammar Saeed3, Eesa Al Solami1, Muhammad Kamran1,*, Mohammed Saeed Alkatheiri1

    CMC-Computers, Materials & Continua, Vol.70, No.1, pp. 1585-1601, 2022, DOI:10.32604/cmc.2022.019936

    Abstract With widespread use of relational database in various real-life applications, maintaining integrity and providing copyright protection is gaining keen interest of the researchers. For this purpose, watermarking has been used for quite a long time. Watermarking requires the role of trusted third party and a mechanism to extract digital signatures (watermark) to prove the ownership of the data under dispute. This is often inefficient as lots of processing is required. Moreover, certain malicious attacks, like additive attacks, can give rise to a situation when more than one parties can claim the ownership of the same data by inserting and detecting… More >

  • Open Access


    Research on Copyright Protection Method of Material Genome Engineering Data Based on Zero-Watermarking

    Lulu Cui2,3,*, Yabin Xu1,2,3

    Journal on Big Data, Vol.2, No.2, pp. 53-62, 2020, DOI:10.32604/jbd.2020.010590

    Abstract In order to effectively solve the problem of copyright protection of materials genome engineering data, this paper proposes a method for copyright protection of materials genome engineering data based on zero-watermarking technology. First, the important attribute values are selected from the materials genome engineering database; then, use the method of remainder to group the selected attribute values and extract eigenvalues; then, the eigenvalues sequence is obtained by the majority election method; finally, XOR the sequence with the actual copyright information to obtain the watermarking information and store it in the third-party authentication center. When a copyright dispute requires copyright authentication… More >

Displaying 1-10 on page 1 of 7. Per Page