Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

71results about How to "Achieve copyright protection" patented technology

Decentralized image copyright protection system and method with infringement real-time detection

The invention relates to the technical field of copyright image protection, and provides a decentralized image copyright protection system and method with infringement real-time detection, and the method comprises the following steps of (1), enabling a registered user to upload an image through a client, and enabling an SIFT image feature extraction algorithm in the system to carry out the featuredata collection on the uploaded image; (2) extracting the invariant characteristics, such as visual angle, translation, affine, brightness, rotation, etc., of an existing copyright image by a user through an SIFT algorithm to form a local feature vector set of the image, and taking the local feature vector set as a registered image feature data set; (3) carrying out distributed storage on the feature data sets in the steps (1) and (2) by utilizing an IPFS (Internet Protocol File System), and constructing a network transmission protocol for persistent and distributed storage and file sharing;and (4) performing comparative analysis and calculation, and judging that the image does not accord with the condition of forming a new work. The system and the method provided by the invention have the characteristics of being tamper-proofing, realizing the high safety, permanent preservation and decentralization, being able to trace, being low in cost, etc.
Owner:施建锋

Copyright protection system, multimedia data transmitting and receiving equipment and method based on cloud media publishing platform

The invention discloses a copyright protection system, multimedia data transmitting and receiving equipment and a method based on a cloud media publishing platform, which are used for the technical field of information to be used for realizing that when multimedia content is published by computing the could publishing platform, the copyright protection to the published multimedia content can be safely and reliably carried out, and the content of a multimedia product can be prevented from being illegally copied or being used without authorization. When the multimedia content is published through an Internet, the content of the multimedia product is used as a data stream, the data stream is scattered, encrypted, dispersedly transmitted and then enters Internet user terminal equipment in sequence, so that the multimedia content can not allow an Internet user terminal to have a complete multimedia file at any node, and meanwhile, the data stream is subject to storage self-damage processing when being decrypted and loaded in an internal storage, so that the multimedia product can be prevented from being illegally used or being used and spread without the authorization, and further, the copyright protection of the multimedia product on the Internet can be realized.
Owner:WUXI RUISHIQING INFORMATION TECH

Infringement detection method and device for live broadcast stream

ActiveCN108881947ASpeed ​​up query matchingPreserve timing informationCharacter and pattern recognitionSelective content distributionComputer networkGranularity
The invention relates to the technology of multimedia processing and particularly relates to an infringement detection method and device for a live broadcast stream. The method and the device are usedfor realizing infringement detection of a live broadcast video. The method comprises the steps of taking a time slice as granularity, extracting live broadcast stream segments from the live broadcaststream, for each live broadcast stream segment, dividing the live broadcast stream segment into a plurality of live broadcast stream sub-segments, extracting content features among the live broadcaststream sub-segments in parallel, and converting the content features into feature indexes; carrying out feature index query matching on the live broadcast stream sub-segments contained in each live broadcast stream segment and each body segment contained in a body, thereby determining unit time body segment content feature hit times of the live broadcast stream relatively to the body within a settime period; and judging that the live broadcast stream infringes copyright when it is determined that the unit time body segment content feature hit times reaches a set times threshold. Infringementcontent of the live broadcast video can be accurately and automatically monitored in real time, and copyright protection in a live broadcast scene is realized.
Owner:ALIBABA GRP HLDG LTD

Compression sensing theory-based interactive supported dual watermark generating and detecting method

The invention provides a compression sensing theory-based interactive supported dual watermark generating and detecting method. The method comprises a watermark generation part and a watermark detection part, wherein the method for generating the watermark comprises the following steps of: embedding a robustness watermark in a vector image by adopting a classical singular value decomposition (SVD) algorithm, extracting a semi-fragile watermark from an image Aw with a robust watermark, and saving the semi-fragile watermark as a zero watermark; and the method for detecting the watermark comprises the following steps of: extracting the robust watermark from the image to be detected, extracting a semi-fragile watermark from the image to be detected, and comparing the semi-fragile watermark with the registered zero watermark to determine the authenticity and completeness of the image content and recover the tempered part. Different from the condition that two watermarks in the conventional dual watermark system work independently and even influence each other, the method ensures that the two watermarks cooperate with each other to realize functions to generate a mutually enhancing effect, namely interactive support, which is mainly reflected in the security aspect and the function aspect.
Owner:HARBIN ENG UNIV

Gray image watermark embedding and extracting method based on singular value decomposition

The invention discloses a gray image watermark embedding and extracting method based on singular value decomposition. The gray image watermark embedding and extracting method based on singular value decomposition comprises the flowing steps: conducting singular value decomposition on an image and obtaining matrix components; conducting encoding and storage on singular values of a diagonal matrix of a singular value matrix and obtaining watermark signals; blocking a hosting image and choosing image blocks high in masking effect; conducting singular value decomposition on the image blocks and embedding the watermark signals into the image blocks; and conducting inverse transformation of the singular value decomposition on the image blocks. The gray image watermark embedding and extracting method based on singular value decomposition has the advantages that the embedding of the gray image watermark image is achieved, the watermark comprises a plurality of straight information, no using limiting exists on the size of the watermark image, and requirements of enterprises concealing personalized enterprise logos as watermarks can be met; the watermark embedding and extracting method can resist a plurality of image aggressive behaviors, and algorithm robustness is high; gray image watermark embedding and extracting method based on singular value decomposition can effectively detect watermark information content, solves the problem of image being illegally issued and the like, and is of great value for healthy and fast development of internet industries.
Owner:DALIAN NATIONALITIES UNIVERSITY

System and method for realizing real time medium copyright protection

InactiveCN101118576ASolving Copyright Protection IssuesRealize copyrightProgram/content distribution protectionAuthorizationEncryption
The present invention discloses a system which can realize the copyright protection of the media in real time, and includes a content issuance unit used to process the media source content to generate encryption content, CEK is encrypted to generate key encryption information, the encryption content, the key encryption information and the auxiliary information that are generated are sealed to product DCP, the DCP produced is issued to a terminal substitutive unit; an authorized issuance unit used to decrypt the authorized requirement and authorize the certificate, after ensuring the availability of authorization, the authorization information is generated, the authorized information and REK are encrypted to generate encrypted RO, and the encrypted RO is sent to the terminal substitutive unit; and the terminal substitutive unit used to decompose the received the DCP, the encrypted RO is obtained according to discomposed content logo information, the obtained encrypted RO is decrypted to generate the authorized information and the REK, according to the REK, the decomposed key encryption information is decrypted to generate the CEK, according to the CEK, the encrypted content is decrypted to generate the media source content. The present invention discloses a method to realize real time media copyright protection.
Owner:北京数码视讯软件技术发展有限公司

Digital television timing charging and copyright protecting method based on watermarks

The invention discloses a digital television timing charging and copyright protecting method based on watermarks. The digital television timing charging and copyright protecting method comprises the following steps: 1) recording the starting time that a user watches a digital television and the program information; 2) reading a PDK (PERL Development Kit) in a smart card by virtue of a bidirectional set top box, enabling the PDK to generate watermark signals, and carrying out the error correction of coding on the watermark signals; 3) enabling the watermark signals processed by the error correction of coding through a decoder at the time of decoding into the middle-low frequency DCT coefficients of an I frame luminance component after the I frame is researched, and then outputting and playing the middle-low frequency DCT coefficients; 4) billing the digital television by hours through a user management system; 5) extracting watermarks of suspended illegal videos when the suspended illegal videos are played in the program of the digital television, and determining the copyright by utilizing the extracted watermark signals, and further judging the user illegally spreading programs of the digital television. The digital television timing charging and copyright protecting method disclosed by the invention has the advantages of novel and reasonable design, simplicity in operation, low cost, high accuracy in timing charging, and high popularization and application value, and also has the advantage that the source of the copyright infringement can be tracked. The digital television timing charging and copyright protecting method is suitable for the popularization and development of the digital television.
Owner:XIAN UNIV OF SCI & TECH

Multi-functional digital watermarking method for three-dimensional picture

The invention discloses a multi-functional digital watermarking method for a three-dimensional picture. The multi-functional digital watermarking method for the three-dimensional picture includes watermark embedding, watermark extraction and temper localization, to be specific, using the similarity between the characteristic watermark extracted from the left viewpoint picture of an attacked three-dimensional watermark picture and a robust watermark and the similarity between the characteristic watermark extracted from the left viewpoint picture of the attacked three-dimensional watermark picture and a robust watermark as evaluation bases to realize the copyright protection for the three-dimensional picture; locating tempering blocks in the left viewpoint picture and the right viewpoint picture of the attacked three-dimensional watermark image in two steps, for non-matched blocks, realizing the temper detection through judging whether there is a set numerical linear relationship between two corresponding high-frequency DCT coefficients in a DCT coefficient matrix of each non-matched block, and for matched blocks, using characteristic watermarks and embedded fragile watermarks extracted from the matched blocks to realize the temper detection so as to realize the temper localization function of the three-dimensional image.
Owner:深圳荞漾人工智能集团有限公司

Robust video zero-watermarking method based on polar complex exponential transformation and residual neural network

PendingCN111984942ACopyright protectionSolve the extraction problem of robust featuresImage enhancementImage analysisPattern recognitionAlgorithm
The invention discloses a robust video zero-watermarking method based on polar complex exponential transformation and a residual neural network, and the method comprises the steps: carrying out the preprocessing of a video, and selecting a key frame of each group of shots; encrypting the original watermark of the video; obtaining an invariant moment of the key frame by means of polar complex exponential transformation; sending the invariant moment into a pre-trained deep residual neural network model; extracting robust content characteristics of the key frame; carrying out exclusive-OR operation on the robust content characteristics and the encrypted watermarks; generating a unique robust zero-watermark signal of the video, selecting a key frame from the to-be-verified video, extracting robust content characteristics of the key frame, and performing exclusive-OR operation on the robust content characteristics and the robust zero-watermark signal corresponding to the to-be-verified video to obtain an original watermark, thereby realizing copyright verification of the video. According to the robust video zero-watermark method, the balance problem between robustness and imperceptibility is solved, the desynchronization attack resistance is improved, and the copyright of video media can be effectively protected.
Owner:XIAN UNIV OF TECH

Immune and digital image watermarking method for leveled rights management of digital works

The invention relates to an immune and digital image watermarking method for leveled rights management of digital works. The method comprises a part of watermark embedded and leveled quality lock control processing and a part of leveled rights management and protection; watermark embedded and leveled quality lock control processing is composed of a watermark embedding process and a leveled quality lock control process; the watermark embedding process comprises watermark pre-processing, copyright watermark embedding, rights watermark embedding and quality lock and control thereof, and after watermark embedding, different levels of image qualities are locked and controlled in the leveled manner; and leveled rights management and protection is formed by key distribution and rights distribution. According to the invention, leveled using rights and copyright rights protection are realized, related rights are separated effectively and are thus not overlapped, attacks according to similarity of adjacent pixels can be prevented effectively, and thus, the method serves as a rights management mode in the authorization mode, is highly safe, and provides technical support for safe sharing of digital image works in a digital community.
Owner:HAINAN UNIVERSITY

Screening method and a screening system for work input based on a block chain

The invention relates to a screening method and a screening system for work input based on a block chain. The method comprises the following steps that author information and to-be-recorded works areinput into one or more network nodes based on a block chain network, the network nodes where the author information and the to-be-recorded works are input serve as broadcast nodes, and the network nodes where the author information and the to-be-recorded works are not input serve as response nodes; The broadcast node broadcasts author information and to-be-recorded works to the response node; Calling the stored works by the response nodes, comparing the similarity with the to-be-recorded works, and storing author information and the to-be-recorded works if the similarity between the to-be-recorded works and the stored works is smaller than a similarity threshold value. According to the method and system, similarity comparison is conducted on the to-be-recorded work and the stored work, ifthe similarity between the to-be-recorded work and the stored work is smaller than the similarity threshold value, the to-be-recorded work and author information are stored, a user can conveniently input personal information and work information through a block chain, and therefore copyright protection is achieved.
Owner:BEIJING RZXT TECH DEV CO LTD

Method for limiting protected data in storing device from being copied to personal computer (PC) end

The invention provides a method for limiting protected data in a storing device from being copied to a personal computer (PC) end. The method includes that the protected data is copied to the storing device with a normal method; the storing device performs address analysis and recording storage on the protected data; the storing device detects a data reading command sent by the PC end and an address of data needing to be read when the storing device is connected with the PC end; the storing device compares the address required by the PC end to be accessed with an address of the protected data which are recorded and stored; and if the address required to be accessed is located in the address of the data recorded and stored, the data are transmitted to the PC end after being modified, and otherwise, the data are directly read and transmitted to the PC end. The method for limiting the protected data in the storing device from being copied to the PC end is simple to achieve, convenient to use, and dispensed with a complex authorization mechanism. The storing device can achieve the data copy limiting only through the method of firmware modifying, hardware modifying is not required, and hardware cost is not increased.
Owner:SINO WEALTH ELECTRONICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products