Digital Wartermarking Based in Normalized Feature Area

2014 ◽  
Vol 556-562 ◽  
pp. 5121-5124
Author(s):  
Shan Hong Zhu ◽  
Pei Tang

With the rapid development of internet and digital technology,digital products become more and more popular,especially due to they can be transmitted conveniently, but the Problem of copyright Protection is also more and more serious.The inapplicability of traditional information security technology for copyrights problem promotes the development of digital watermark. From MIBIN theory, some solutions to these problems are given in this paper.

2010 ◽  
Vol 171-172 ◽  
pp. 468-472
Author(s):  
Wei Wei Li ◽  
Xiang Li

graphic user interface and digital products as a user interface for interactive operations, will undoubtedly become the key to improving the user experience. "Man-machine interface design" as a new and important subject, in a profound impact on computers, mobile phones, PDA, tablet touch device development, the rapid development of computer digital technology and new products are emerging also graphics interface of the far-reaching change.


2019 ◽  
Vol 267 ◽  
pp. 02013
Author(s):  
Xiaobo Ming ◽  
Ying Chen ◽  
Jinhua Guo

Computers are closely related to our life and work. We have entered an era in which computers are not available in all walks of life. Among them, many important documents and materials will be stored in the form of electronic files in the computer. However, computers are not absolutely safe, and cases of information theft occur from time to time. Most people usually keep information confidential in the form of encryption. How to avoid the problem of computer information security. Computer network security involves all aspects. To solve these problems, there are many levels of technology, such as cryptography technology, network security technology and so on. Our country has also done a lot of research on the security protection of computer network technology, and these research results have also achieved certain results in the actual construction of computer network. In order to ensure the normal operation of computer networks, ensure information security and prevent information leakage and theft, a special protection system has been established to ensure the security of computer network information by setting up computer detection, security assessment and other links. However, with the rapid development of science and technology, the updating of electronic products is faster and faster, and the challenge of Wechat for network security information is more severe. How to protect computer network information security needs to be solved urgently, this paper discusses this.


2014 ◽  
Vol 989-994 ◽  
pp. 4086-4090
Author(s):  
Li Yan Liu

With the rapid development of communication technology and Internet technology, as well as the popularization of computer, the application of digital multimedia technology is more and more widely, video, voice and image gathering, editing, storage, and dissemination of digital information has become more and more convenient. However, it is because of the computer and the network popularization and the fragility of the digital information itself, digital multimedia data are more vulnerable to attack, digital products is also very easy to forged and tampered with. According to these digital multimedia data more easily by illegal processing problem, people put forward the concept of digital watermark. Digital watermark technology is used to realize the protection of digital information. In this paper, the digital watermark technology research starting from the practical application, the digital image watermark based on DCT domain is studied.


2020 ◽  
Vol 2 (3) ◽  
pp. 53
Author(s):  
Xiaofeng Ma ◽  
Norriza Hussin

<p>With the rapid development of computer network, the fully opened network has greatly changed people’s production and daily life and the traditional industries are no longer closed. However, there are also many network security problems. To deal with it, this article explores the computer applications based on management of network information security technology. It analyzes the main factors threatening network information security from the security problems caused by computer applications. Combining with the application practice, specific measures are put forward for reference.</p>


2014 ◽  
Vol 610 ◽  
pp. 712-716
Author(s):  
Pian Niu ◽  
Zheng Tao Jiang

With the rapid development of internet, E-mail has already been an indispensable tool of communication. However, because of some inherent technological insufficiencies, users’ weak sense of security and attacks from hackers, E-mail using is facing with many challenges such as virus-carrying E-mails and E-mail bombs, which results in severe consequences in terms of E-mail security. On the basis of studies of severe E-mail security events in recent years and with the application of technologies on information security, this paper attempts to give two kinds of proposals to solve problems concerning E-mail security from the perspectives of government, company, university and individual respectively. The first is a general proposal for all E-mail users and the second is a proposal on improving information security technology.


Animals ◽  
2021 ◽  
Vol 11 (5) ◽  
pp. 1263
Author(s):  
Zhaojun Wang ◽  
Jiangning Wang ◽  
Congtian Lin ◽  
Yan Han ◽  
Zhaosheng Wang ◽  
...  

With the rapid development of digital technology, bird images have become an important part of ornithology research data. However, due to the rapid growth of bird image data, it has become a major challenge to effectively process such a large amount of data. In recent years, deep convolutional neural networks (DCNNs) have shown great potential and effectiveness in a variety of tasks regarding the automatic processing of bird images. However, no research has been conducted on the recognition of habitat elements in bird images, which is of great help when extracting habitat information from bird images. Here, we demonstrate the recognition of habitat elements using four DCNN models trained end-to-end directly based on images. To carry out this research, an image database called Habitat Elements of Bird Images (HEOBs-10) and composed of 10 categories of habitat elements was built, making future benchmarks and evaluations possible. Experiments showed that good results can be obtained by all the tested models. ResNet-152-based models yielded the best test accuracy rate (95.52%); the AlexNet-based model yielded the lowest test accuracy rate (89.48%). We conclude that DCNNs could be efficient and useful for automatically identifying habitat elements from bird images, and we believe that the practical application of this technology will be helpful for studying the relationships between birds and habitat elements.


2021 ◽  
Vol 15 (1) ◽  
Author(s):  
Weidong Chen ◽  
Xiaohui Yuan

AbstractFinancial inclusion has become an important development strategy in many countries, and related research is increasing. Financial inclusion in China has had significant progress recently. It has gradually formed a unique and sustainable development path with supporting policies and regulations as well as rapid development and application of digital technology. While challenges remain, the experience of Chinese financial inclusion provides valuable lessons and research directions for policymakers and researchers.


2012 ◽  
Vol 459 ◽  
pp. 544-548 ◽  
Author(s):  
Wei Liang ◽  
Jian Bo Xu ◽  
Wei Hong Huang ◽  
Li Peng

Network security technology ensures secure data transmission in network. Meanwhile, it brings extra overhead of security system in terms of cost and performance, which seriously affects the rapid development of existing high-speed encryption systems. The existing encryption technology cannot meet the demand of high security, low cost and high real-time. For solving above problems, an ECC encryption engine architecture based on scalable public key cipher and a high-speed configurable multiplication algorithm are designed. The algorithm was tested on FPGA platform and the experiment results show that the system has better computation speed and lower cost overhead. By comparing with other systems, our system has benefits in terms of hardware overhead and encryption time ratio


2013 ◽  
Vol 846-847 ◽  
pp. 1628-1631
Author(s):  
Song Jie Gong ◽  
Lin Di Jin

With the rapid development of electronic commerce, payment is becoming the focus problem of electronic commerce. Electronic cash has become the ideal method of electronic payment for it is able to realize fair, secure, effect electronic transacts. Along with electronic commerce development, electronic cash payment systems are also gradually developing. However, most electronic cashes are facing the security issues. Moreover, the amount of money each electronic cash card contains is fixed at issuance and is available only within a specified system. The key technology is digital signature technology, including blind signature, group signature, and ring signature. The paper researches the security problems of electronic cash in information safety and e-commerce, and discusses the electronic payment and the security problem, which is regarded as the foundation of electronic commerce. The main factors are given that causes security problems of electronic payment, and suggests corresponding precautionary measures.


Sign in / Sign up

Export Citation Format

Share Document