Nowadays, image copyright protection is one of the key points of information security in the field of education. Based on the transient property of human vision, the anti-theft and copyright protection strategies are proposed based on the idea of animation synthesis. In this paper, experiments are designed and compared from multiple perspectives. The results show that the strategy based on animation synthesis can not only ensure the browsing effect of images, but also effectively achieve the purpose of preventing interception via screenshot and protecting the legitimate rights of the original images.
References
[1]
Qin, Y. (2012) The Application of Computer Application Technology in the Field of Digital Media Copyright Protection. Silicon, 21, 2.
[2]
Zhang, X.B. (2011) An Anti-Theft Protection Method for Network Pictures Based on Process Control. Computer Applications and Software, No. 7, 294-295.
[3]
Hsu, C.T. and Wu, J.L. (1999) Hidden Digital Watermark in Images. IEEE Transactions on Image Processing, 8, 58-68. https://doi.org/10.1109/83.736686
[4]
Fan, K.F. (2011) Research on Key Technology and Evaluation Method of Digital Media Content Protection System. Master’s Thesis, Xi’an Electronic Technology University, Xi’an, 15-22.
[5]
Fridrich, J., Goljan, M. and Memon, N.D. (2000) Further Attacks on Yeung-Mintzer Fragile Watermarking Scheme. Proceedings of SPIE—The International Society for Optical Engineering, Vol. 3971, San Jose. https://doi.org/10.1117/12.384997
[6]
Sun, J.G., Liang, K. and Xia, S.Z. (2013) Research of Lossless Digital Watermarking Technology. Applied Mechanics & Materials, 333-335, 1219-1223.
https://doi.org/10.4028/www.scientific.net/AMM.333-335.1219
[7]
Wong, P.W. (1998) A Public Key Watermarking for Image Verification and Authentication. Proc.ieee Int.conf.image Processing, 1, 455-459.
[8]
Cox, I.J., Kilian, J., Leighton, T. and Shamoon, T. (1996) A Secure, Robust Watermark for Multimedia. In: Anderson, R., Ed., Information Hiding. IH 1996. Lecture Notes in Computer Science, Vol. 1174, Springer, Berlin, Heidelberg.
https://doi.org/10.1007/3-540-61996-8_41
[9]
Then, H. (2007) Support Vector Machine and Hyperplanes in Digital Watermark Detection. TENCON 2007—2007 IEEE Region 10 Conference IEEE, Taipei, 30 October-2 November 2007.
[10]
Saxena, V. and Gupta, J.P. (2007) Towards Increasing the Robustness of Image Watermarking Scheme against Histogram Equalization Attack. 2007 IEEE 15th Signal Processing and Communications Applications, Eskisehir, 11-13 June 2007.
https://doi.org/10.1109/SIU.2007.4298813
[11]
Hua, D., Zhang, J. and Chai, X. (2014) The Design and Implementation of Flash Animation Watermarking. IEEE Workshop on Electronics IEEE, Ottawa, 8 May 2014, 489-491.
[12]
Deng, H., Jin, S.I. and Wang, G. (2011) Design Method of Digital Watermark Based on Flash Animation. Computer Programming Skills & Maintenance, 14, 99-100.
[13]
Sakib, S., Milenkovic, A. and Ray, B. (2020) Flash Watermark: An Anticounterfeiting Technique for NAND Flash Memories. IEEE Transactions on Electron Devices, 67, 4172-4177. https://doi.org/10.1109/TED.2020.3015451