Please use this identifier to cite or link to this item:
https://ah.lib.nccu.edu.tw/handle/140.119/68420
DC Field | Value | Language |
---|---|---|
dc.contributor | 應數系 | en_US |
dc.creator | 曾正男 | zh_TW |
dc.creator | Tzeng,Jengnan | en_US |
dc.creator | Hwang,Wen-Liang | en_US |
dc.creator | Chern,I-Liang | en_US |
dc.date | 2005.02 | en_US |
dc.date.accessioned | 2014-08-07T03:35:42Z | - |
dc.date.available | 2014-08-07T03:35:42Z | - |
dc.date.issued | 2014-08-07T03:35:42Z | - |
dc.identifier.uri | http://nccur.lib.nccu.edu.tw/handle/140.119/68420 | - |
dc.description.abstract | We present an asymmetric watermarking method for copyright protection that uses different matrix operations to embed and extract a watermark. It allows for the public release of all information, except the secret key. We investigate the conditions for a high detection probability, a low false positive probability, and the possibility of unauthorized users successfully hacking into our system. The robustness of our method is demonstrated by the simulation of various attacks. | en_US |
dc.format.extent | 1082703 bytes | - |
dc.format.mimetype | application/pdf | - |
dc.language.iso | en_US | - |
dc.relation | IEEE Trans. on Signal Processing,53(2),784-792 | en_US |
dc.title | An Asymmetric Subspace Watermarking Method of Copyright Protection | en_US |
dc.type | article | en |
item.fulltext | With Fulltext | - |
item.languageiso639-1 | en_US | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.cerifentitytype | Publications | - |
item.grantfulltext | restricted | - |
item.openairetype | article | - |
Appears in Collections: | 期刊論文 |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
784-792.pdf | 1.06 MB | Adobe PDF2 | View/Open |
Google ScholarTM
Check
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.