会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Method and apparatus for watermarking images
    • 水印图像的方法和装置
    • US06879703B2
    • 2005-04-12
    • US10220776
    • 2002-01-10
    • Ching-Yung LinShih-Fu Chang
    • Ching-Yung LinShih-Fu Chang
    • G06T1/00H04N1/32G06K9/10
    • G06T1/0057G06T1/0042G06T1/005G06T2201/0052G06T2201/0061H04N1/32165H04N1/32187H04N1/32277H04N1/3232H04N2201/3236H04N2201/327
    • Digital watermarks are embedded in image data (102)in order to enable authentication of the image data and/or replacement of rejected portions of the image data. Authentication codes are derived by comparing selected discrete cosine transform (DCT) (104) coefficients within DCT data (106) derived from the original, spatial-domain image data. The authentication codes thus generated are embedded in DCT coefficients (612) other than the ones which were used to derive the authentication codes. The resulting, watermarked data can be sent or made available to one or more recipients who can compress or otherwise use the watermarked data. Image data derived from the watermarked data—e.g, compressed versions of the watermarked data—can be authenticated by: extracting the embedded authentication codes, comparing DCT coefficients derived from the coefficients from which the original authentication codes were generated; and determining whether the compared DCT coefficients are consistent with the extracted authentication codes.
    • 数字水印被嵌入在图像数据(102)中,以便能够对图像数据进行认证和/或替换图像数据的被拒绝的部分。 通过比较从原始的空间域图像数据导出的DCT数据(106)内的选定的离散余弦变换(DCT)(104)系数,导出认证码。 这样生成的认证码被嵌入除了用于导出认证码的那些之外的DCT系数(612)中。 所得到的水印数据可以被发送或使其可用于可压缩或以其他方式使用水印数据的一个或多个接收者。 从水印数据导出的图像数据(例如,水印数据的压缩版本)可以通过以下方式来认证:提取嵌入的认证码,比较从产生原始认证码的系数导出的DCT系数; 以及确定所述比较的DCT系数是否与所提取的认证码一致。
    • 2. 发明授权
    • Method and apparatus for image authentication
    • 图像认证方法和装置
    • US06532541B1
    • 2003-03-11
    • US09235862
    • 1999-01-22
    • Shih-Fu ChangChing-Yung Lin
    • Shih-Fu ChangChing-Yung Lin
    • H04L900
    • G06T1/005G06T1/0028G06T2201/0052G06T2201/0065G06T2201/0081H04L9/3247H04L2209/30H04L2209/608H04N1/32101H04N2201/3235H04N2201/3236
    • A system for authentication of a digital image includes a signature generator for creating a robust digital signature for an original image based on instrument features of the image. An authentication processor extracts a set of invariant features for the original image from the digital signature, generates a corresponding set of invariant features for the present image to be authenticated and compares the two sets of invariant features to determine whether the image has been subjected to malicious manipulation. The invariant features include the polarity and magnitude of the difference between discrete cosine transform coefficients at corresponding coefficient locations in selected image block pairs. The intensity of the original image is also authenticated by comparing a mean value of coefficient of the original image to the mean value of the coefficient of the present image.
    • 用于认证数字图像的系统包括签名生成器,用于基于图像的乐器特征为原始图像创建鲁棒的数字签名。 认证处理器从数字签名中提取原始图像的一组不变特征,为要验证的当前图像生成相应的一组不变特征,并比较两组不变特征,以确定图像是否已经受到恶意 操纵。 不变特征包括所选图像块对中相应系数位置处的离散余弦变换系数之间的差异的极性和幅度。 通过将原始图像的系数的平均值与当前图像的系数的平均值进行比较,也可以对原始图像的强度进行认证。
    • 4. 发明授权
    • Determining the importance of data items and their characteristics using centrality measures
    • 使用中心性措施确定数据项的重要性及其特征
    • US08818918B2
    • 2014-08-26
    • US13096220
    • 2011-04-28
    • Ching-Yung LinHanghang TongJimeng SunSpyridon PapadimitriouU Kang
    • Ching-Yung LinHanghang TongJimeng SunSpyridon PapadimitriouU Kang
    • G06F17/30G06F15/18
    • G06N5/003
    • Computer-implemented methods, systems, and articles of manufacture for determining the importance of a data item. A method includes: (a) receiving a node graph; (b) approximating a number of neighbor nodes of a node; and (c) calculating a average shortest path length of the node to the remaining nodes using the approximation step, where this calculation demonstrates the importance of a data item represented by the node. Another method includes: (a) receiving a node graph; (b) building a decomposed line graph of the node graph; (c) calculating stationary probabilities of incident edges of a node graph node in the decomposed line graph, and (d) calculating a summation of the stationary probabilities of the incident edges associated with the node, where the summation demonstrates the importance of a data item represented by the node. Both methods have at least one step carried out using a computer device.
    • 用于确定数据项的重要性的计算机实现的方法,系统和制造。 一种方法包括:(a)接收节点图; (b)近似一个节点的邻居节点数; 和(c)使用近似步骤计算节点与剩余节点的平均最短路径长度,其中该计算表明由节点表示的数据项的重要性。 另一种方法包括:(a)接收节点图; (b)构建节点图的分解线图; (c)计算分解线图中节点图形节点的入射边缘的固定概率,以及(d)计算与节点相关联的入射边缘的固定概率的总和,其中求和表示数据项的重要性 由节点表示。 两种方法都使用计算机设备进行至少一个步骤。
    • 5. 发明授权
    • Privacy-aware on-line user role tracking
    • 隐私权在线用户角色跟踪
    • US08775335B2
    • 2014-07-08
    • US13198790
    • 2011-08-05
    • Ching-Yung LinHanghang TongFei Wang
    • Ching-Yung LinHanghang TongFei Wang
    • G06F15/18
    • G06K9/00523G06K9/6247G06Q30/02
    • Access is obtained to a first nonnegative factor matrix and a second nonnegative factor matrix obtained by factorizing a nonnegative asymmetric matrix which represents a set of data which tracks time-stamped activities of a plurality of entities. The first nonnegative factor matrix is representative of initial role membership of the entities, and the second nonnegative factor matrix is representative of initial role activity descriptions. At a given one of the time stamps, while holding a change in the first nonnegative factor matrix constant, a change in the second nonnegative factor matrix is updated to reflect time variance of the set of data at the given one of the time stamps, without accessing actual data values at previous ones of the time stamps. At the given one of the time stamps, while holding a change in the second nonnegative factor matrix constant, a change in the first nonnegative factor matrix is updated, to reflect the time variance of the set of data at the given one of the time stamps, without accessing the actual data values at the previous ones of the time stamps. The role membership of the entities and the role activity descriptions, at the given one of the time stamps, are updated based on the updating steps. A suitable technique for nonnegative symmetric matrices is also provided.
    • 获得第一非负因子矩阵和第二非负因子矩阵,该第二非负因子矩阵通过对表示一组跟踪多个实体的时间戳活动的数据的非负非对称矩阵进行分解而获得。 第一个非负因子矩阵代表实体的初始角色成员,第二个非负因子矩阵代表初始角色活动描述。 在给定的一个时间戳中,在保持第一非负因子矩阵常数的变化的同时,更新第二非负因子矩阵的变化,以反映给定的一个时间戳上的数据集的时间方差,而没有 访问以前的时间戳的实际数据值。 在给定的一个时间标记中,在保持第二非负因子矩阵常数的变化的同时,更新第一非负因子矩阵的变化,以反映给定的一个时间戳的数据集的时间方差 ,而不访问前一个时间戳的实际数据值。 在给定的一个时间戳上,实体的角色成员身份和角色活动描述将根据更新步骤进行更新。 还提供了一种用于非负对称矩阵的合适技术。