完整後設資料紀錄
DC 欄位語言
dc.contributor.authorKe, Hung-Jui
dc.contributor.authorWang, Shiuh-Jeng
dc.contributor.authorChiang, Wen-Ya
dc.date.accessioned2009-06-02T07:06:59Z
dc.date.accessioned2020-05-25T06:47:39Z-
dc.date.available2009-06-02T07:06:59Z
dc.date.available2020-05-25T06:47:39Z-
dc.date.issued2009-02-09T08:32:39Z
dc.date.submitted2009-02-09
dc.identifier.urihttp://dspace.lib.fcu.edu.tw/handle/2377/11122-
dc.description.abstractIn this paper, we propose two algorithms to confuse the determination of intellectual property rights, when a watermark is the only method of authentication. We attempted to discover the potential drawbacks of Wang’s scheme [10] and highlighted the potential risks. Based on observation of Wang’s algorithms, we found the embedded watermark could be tampered without any knowledge of original secret information, such as the key or the pixel-block size. Our algorithms can make the embedded watermark “chaotic” to confuse intellectual property rights authentication. Both of our algorithms proposed in this paper can cause serious confusion without damaging the original image. The experiment results prove that our algorithms are useful to damage Wang’s scheme.
dc.description.sponsorship淡江大學,台北縣
dc.format.extent6p.
dc.relation.ispartofseries2008 ICS會議
dc.subjectprocedures
dc.subjectwatermark embedding
dc.subjectintellectual rights
dc.subjectinformation hiding
dc.subject.otherInformation Security
dc.titleWatermarking Damage to Risk Multimedia in Intellectual Property Systems
分類:2008年 ICS 國際計算機會議

文件中的檔案:
檔案 描述 大小格式 
ce07ics002008000067.pdf490.7 kBAdobe PDF檢視/開啟


在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。