The 15th China International Animation Copyright Fair concluded successfully at the ACTIF Center in Shipai Town,Dongguan City,also known as the'"Capital of Art Toys in China.n Over 600 Chinese and foreign ent...The 15th China International Animation Copyright Fair concluded successfully at the ACTIF Center in Shipai Town,Dongguan City,also known as the'"Capital of Art Toys in China.n Over 600 Chinese and foreign enterprises and institutions participated in the event,which featured over 2,000 film and animation IPs from more than 40 countries and regions.展开更多
In compliance with“Copyright Law of the People’s Republic of China”,it is agreed by the author(s)of the said article as follows upon signing of this statement:The said article shall be published in Journal of Trans...In compliance with“Copyright Law of the People’s Republic of China”,it is agreed by the author(s)of the said article as follows upon signing of this statement:The said article shall be published in Journal of Trans-lational Neuroscience.The author(s)shall grant the fol-lowing worldwide exclusive rights carried by the said article in different languages to Journal of Translational Neuroscience free of charge:reproductions,distribution,electronic dissemination,translation and compilation.The author(s)authorize(s)Journal of Translational Neu-roscience to register the said article(including all the in-termedia)with the proper copyright authorities.展开更多
Should the article be accepted and published by Meteorological and Environmental Research,the author hereby grants exclusively to the editorial department of Meteorological and Environmental Research the digital repro...Should the article be accepted and published by Meteorological and Environmental Research,the author hereby grants exclusively to the editorial department of Meteorological and Environmental Research the digital reproduction,distribution,compilation and information network transmission rights.展开更多
Should the article be accepted and published by Meteorological and Environmental Research,the author hereby grants exclusively to the editorial department of Meteorological and Environmental Research the digital repro...Should the article be accepted and published by Meteorological and Environmental Research,the author hereby grants exclusively to the editorial department of Meteorological and Environmental Research the digital reproduction,distribution,compilation and information network transmission rights.展开更多
Should the article be accepted and published by Agricultural Science&Technology,the author hereby grants exclusively to the editorial department of Agricultural Science&Technology the digital reproduction,dist...Should the article be accepted and published by Agricultural Science&Technology,the author hereby grants exclusively to the editorial department of Agricultural Science&Technology the digital reproduction,distribution,compilation and information network transmission rights.展开更多
Should the article be accepted and published by Agricultural Science&Technology,the author hereby grants exclusively to the editorial department of Agricultural Science&Technology the digital reproduction,dist...Should the article be accepted and published by Agricultural Science&Technology,the author hereby grants exclusively to the editorial department of Agricultural Science&Technology the digital reproduction,distribution,compilation and information network transmission rights.展开更多
Should the article be accepted and published by Meteorological and Environmental Research,the author hereby grants exclusively to the editorial department of Meteorological and Environmental Research the digital repro...Should the article be accepted and published by Meteorological and Environmental Research,the author hereby grants exclusively to the editorial department of Meteorological and Environmental Research the digital reproduction,distribution,compilation and information network transmission rights.展开更多
The unprecedented scale of large models,such as large language models(LLMs)and text-to-image diffusion models,has raised critical concerns about the unauthorized use of copyrighted data during model training.These con...The unprecedented scale of large models,such as large language models(LLMs)and text-to-image diffusion models,has raised critical concerns about the unauthorized use of copyrighted data during model training.These concerns have spurred a growing demand for dataset copyright auditing techniques,which aim to detect and verify potential infringements in the training data of commercial AI systems.This paper presents a survey of existing auditing solutions,categorizing them across key dimensions:data modality,model training stage,data overlap scenarios,and model access levels.We highlight major trends,including the prevalence of black-box auditing methods and the emphasis on fine-tuning rather than pre-training.Through an in-depth analysis of 12 representative works,we extract four key observations that reveal the limitations of current methods.Furthermore,we identify three open challenges and propose future directions for robust,multimodal,and scalable auditing solutions.Our findings underscore the urgent need to establish standardized benchmarks and develop auditing frameworks that are resilient to low watermark densities and applicable in diverse deployment settings.展开更多
This paper explores the dimensions of Artificial Intelligence Law and Breach of Fiduciary duty when using AI research models.The paper also explores Artificial Intelligence in the international realm providing a basis...This paper explores the dimensions of Artificial Intelligence Law and Breach of Fiduciary duty when using AI research models.The paper also explores Artificial Intelligence in the international realm providing a basis for educating international firms.Reading this paper is worth your time because:(1)you will learn about copyrights and artificial intelligence;(2)you will also learn about artificial intelligence and the fascinating developments in money and banking;(3)you will read about the best practices in the disciplines,and international firm concerns and applications of U.S.AI dispositions.This paper will give you parameters so that one may navigate the legal landscape to help you plan and avoid the courts.As we all know,inflation is prevalent,and the best use of resources is essential to stay in business avoiding closure.Those firms domestic and global,who are not aware of the dangers suffer the perils that follow poor resource management practices.Our corporate psychologists and organizational managers heartily agree.展开更多
AI-generated images are a prime example of AI-generated content,and this paper discusses the controversy over their copyrightability.Starting with the general technical principles that lie behind AI’s deep learning f...AI-generated images are a prime example of AI-generated content,and this paper discusses the controversy over their copyrightability.Starting with the general technical principles that lie behind AI’s deep learning for model training and the generation and correction of AI-generated images according to an AI users’instructions to the AI prompt and their parameter settings,the paper analyzes the initial legal viewpoint that as AI-generated images do not have a human creator,they cannot apply for copyright.It goes on to examine the rapid development of AI-generated image technology and the gradual adoption of more open attitudes towards the copyrightability of AI-generated images due to the influence of the promoting technological advancement approach.On the basis of this,the paper further analyzes the criteria for assessing the copyrightability of AI-generated images,by using measures such as originality,human authorship,and intellectual achievements,aiming to clarify the legal basis for the copyrightability of AI-generated images and enhancing the copyright protection system.展开更多
Text-to-video artificial intelligence(AI)is a new product that has arisen from the continuous development of digital technology over recent years.The emergence of various text-to-video AI models,including Sora,is driv...Text-to-video artificial intelligence(AI)is a new product that has arisen from the continuous development of digital technology over recent years.The emergence of various text-to-video AI models,including Sora,is driving the proliferation of content generated through concrete imagery.However,the content generated by text-to-video AI raises significant issues such as unclear work identification,ambiguous copyright ownership,and widespread copyright infringement.These issues can hinder the development of text-to-video AI in the creative fields and impede the prosperity of China’s social and cultural arts.Therefore,this paper proposes three recommendations within a legal framework:(a)categorizing the content generated by text-to-video AI as audiovisual works;(b)clarifying the copyright ownership model for text-to-video AI works;(c)reasonably delineating the responsibilities of the parties who are involved in the text-to-video AI works.The aim is to mitigate the copyright risks associated with content generated by text-to-video AI and to promote the healthy development of text-to-video AI in the creative fields.展开更多
In November 2020,the third amendment of the Copyright Law of the People’s Republic of China was completed and officially implemented in June 2021,which is undoubtedly of great significance to Chinese citizens with a ...In November 2020,the third amendment of the Copyright Law of the People’s Republic of China was completed and officially implemented in June 2021,which is undoubtedly of great significance to Chinese citizens with a growing awareness of copyright.This has also triggered our thinking about the impact of Copyright Law on digital copyright.Through the analysis of the cases after the amendment of the Copyright Law,we find that to a certain extent,the Copyright Law has played a great role in the protection of digital copyright,but it is still unable to achieve comprehensive protection,and there are still some imperfections.From this point of view,the simple legal protection of digital copyright cannot be taken into account.It still needs to be combined with technical protection means,cooperate with social conditions,and work together to create a harmonious and healthy online publishing environment and promote the protection of digital copyright.展开更多
Based on a study of copyright agencies in Beijing area, this paper reviews the historical development of the work of copyright agencies and their agents. It analyzes their business related problems that these copyrigh...Based on a study of copyright agencies in Beijing area, this paper reviews the historical development of the work of copyright agencies and their agents. It analyzes their business related problems that these copyright agencies and agents are facing today. This paper also proposes a few remedial measures that may usher this copyright industry into a more sustainable development and also with a more promising outlook.展开更多
A novel copyright protection scheme for digital content is presented, which is a private watermarking scheme based on the watermark embedding in the DCT domain and watermark extraction Using independent component anal...A novel copyright protection scheme for digital content is presented, which is a private watermarking scheme based on the watermark embedding in the DCT domain and watermark extraction Using independent component analysis (ICA). The system includes the key for watermark extraction and the host image. The algorithm splits the original image into blocks and classifies these blocks based on visual masking, that is, noise visibility function (NVF). Watermark components with different strength are inserted into chosen direct current components of DCT coefficients according to the classifier. The watermark extraction is based on the characteristic of the statistic independence of the host image, watermark and key. Principle component analysis (PCA) whitening process and FastICA techniques are introduced to ensure a blind watermark extraction without requiring the original image. Experirnental results show the proposed technique is robust under attacks such as image filtering and adding noise, cropping and resizing. In addition, the proposed private watermarking system can be improved to the application of the DTV content protection system.展开更多
In this paper,we propose a novel wavelet-domain digital image watermarking scheme on copyright protection based on network manufacture environment.It codes the watermarking with error correcting coding and encrypts th...In this paper,we propose a novel wavelet-domain digital image watermarking scheme on copyright protection based on network manufacture environment.It codes the watermarking with error correcting coding and encrypts the watermarking with chaotic encryption.It embeds the watermarking into the coefficients which have large absolute values in the middle-frequency parts got by Discrete Wavelet Transform (DWT) repeatedly.The extraction doesn’t need the original image.Experiment results show that the proposed scheme is easy to implement,and has good robustness to some attacks,such as JPEG compression,average filtering,median filtering,wiener filtering,pepper (?) salt noise,especially to cropping and scaling.In order to solve the prob- lem of the copyright protection of the network manufacture production,the problems of digital image production such as tamper preventing and watermarking attacks preventing and so on are discussed.It solves the problems of manufacture information such as secure exchange and transmissions and production copyright protection and so on.展开更多
To protect the copyright of the image as well as the image quality, a kind of image zero-watermark method based on the Krawtchouk moment invariants and timestamp is proposed. A method is used to protect the image, in ...To protect the copyright of the image as well as the image quality, a kind of image zero-watermark method based on the Krawtchouk moment invariants and timestamp is proposed. A method is used to protect the image, in which features are drawn out from the image as the watermarking. The main steps of the method are presented. Firstly, some low-order moment invariants of the image are extracted. Secondly, the moment invariants and the key are registered to a fair third party to gain the timestamp. Finally, the timestamp can be used to prove who the real owner is. The processing method is simple, only with a few low-order moment invariants to be computed. Experimental results are obtained and compared with those of the method based on geometric moment invariants. Results show that the scheme can well withstand such geometrical attacks as rotating, scaling, cropping, combined attack, translating, removing lines, filtering, and JPEG lossy compression.展开更多
A method for creating digital image copyright protection is proposed in this paper. The proposed method in this paper is based on visual cryptography defined by Noor and Shamir. The proposed method is working on selec...A method for creating digital image copyright protection is proposed in this paper. The proposed method in this paper is based on visual cryptography defined by Noor and Shamir. The proposed method is working on selection of random pixels from the original digital image instead of specific selection of pixels. The new method proposed does not require that the watermark pattern to be embedded in to the original digital image. Instead of that, verification information is generated which will be used to verify the ownership of the image. This leaves the marked image equal to the original image. The method is based on the relationship between randomly selected pixels and their 8-neighbors’ pixels. This relationship keeps the marked image coherent against diverse attacks even if the most significant bits of randomly selected pixels have been changed by attacker as we will see later in this paper. Experimental results show the proposed method can recover the watermark pattern from the marked image even if major changes are made to the original digital image.展开更多
A multipurpose image watermarking technique based on DCT is proposed to notify and protect the copyright of digital products. In order to achieve this objective, the DCT coefficients of each image block are divided in...A multipurpose image watermarking technique based on DCT is proposed to notify and protect the copyright of digital products. In order to achieve this objective, the DCT coefficients of each image block are divided into two parts for embedding the visible and invisible watermarks. The visible watermark is embedded in each DC DCT coefficient and most of the AC DCT coefficients of every block, and the invisible watermark in the rest. Based on the characteristics of Human Visual System (HVS), the embedding strength of the visible watermark is varied in accordance with the underlying content of the host image. The invisible watermark is embedded in a quaternity of midrange frequencies. Experimental results show that the visible watermark is hard to remove and the invisible watermark is robust to common digital signal processing operations.展开更多
文摘The 15th China International Animation Copyright Fair concluded successfully at the ACTIF Center in Shipai Town,Dongguan City,also known as the'"Capital of Art Toys in China.n Over 600 Chinese and foreign enterprises and institutions participated in the event,which featured over 2,000 film and animation IPs from more than 40 countries and regions.
文摘In compliance with“Copyright Law of the People’s Republic of China”,it is agreed by the author(s)of the said article as follows upon signing of this statement:The said article shall be published in Journal of Trans-lational Neuroscience.The author(s)shall grant the fol-lowing worldwide exclusive rights carried by the said article in different languages to Journal of Translational Neuroscience free of charge:reproductions,distribution,electronic dissemination,translation and compilation.The author(s)authorize(s)Journal of Translational Neu-roscience to register the said article(including all the in-termedia)with the proper copyright authorities.
文摘Should the article be accepted and published by Meteorological and Environmental Research,the author hereby grants exclusively to the editorial department of Meteorological and Environmental Research the digital reproduction,distribution,compilation and information network transmission rights.
文摘Should the article be accepted and published by Meteorological and Environmental Research,the author hereby grants exclusively to the editorial department of Meteorological and Environmental Research the digital reproduction,distribution,compilation and information network transmission rights.
文摘Should the article be accepted and published by Agricultural Science&Technology,the author hereby grants exclusively to the editorial department of Agricultural Science&Technology the digital reproduction,distribution,compilation and information network transmission rights.
文摘Should the article be accepted and published by Agricultural Science&Technology,the author hereby grants exclusively to the editorial department of Agricultural Science&Technology the digital reproduction,distribution,compilation and information network transmission rights.
文摘Should the article be accepted and published by Meteorological and Environmental Research,the author hereby grants exclusively to the editorial department of Meteorological and Environmental Research the digital reproduction,distribution,compilation and information network transmission rights.
基金supported in part by NSFC under Grant Nos.62402379,U22A2029 and U24A20237.
文摘The unprecedented scale of large models,such as large language models(LLMs)and text-to-image diffusion models,has raised critical concerns about the unauthorized use of copyrighted data during model training.These concerns have spurred a growing demand for dataset copyright auditing techniques,which aim to detect and verify potential infringements in the training data of commercial AI systems.This paper presents a survey of existing auditing solutions,categorizing them across key dimensions:data modality,model training stage,data overlap scenarios,and model access levels.We highlight major trends,including the prevalence of black-box auditing methods and the emphasis on fine-tuning rather than pre-training.Through an in-depth analysis of 12 representative works,we extract four key observations that reveal the limitations of current methods.Furthermore,we identify three open challenges and propose future directions for robust,multimodal,and scalable auditing solutions.Our findings underscore the urgent need to establish standardized benchmarks and develop auditing frameworks that are resilient to low watermark densities and applicable in diverse deployment settings.
文摘This paper explores the dimensions of Artificial Intelligence Law and Breach of Fiduciary duty when using AI research models.The paper also explores Artificial Intelligence in the international realm providing a basis for educating international firms.Reading this paper is worth your time because:(1)you will learn about copyrights and artificial intelligence;(2)you will also learn about artificial intelligence and the fascinating developments in money and banking;(3)you will read about the best practices in the disciplines,and international firm concerns and applications of U.S.AI dispositions.This paper will give you parameters so that one may navigate the legal landscape to help you plan and avoid the courts.As we all know,inflation is prevalent,and the best use of resources is essential to stay in business avoiding closure.Those firms domestic and global,who are not aware of the dangers suffer the perils that follow poor resource management practices.Our corporate psychologists and organizational managers heartily agree.
文摘AI-generated images are a prime example of AI-generated content,and this paper discusses the controversy over their copyrightability.Starting with the general technical principles that lie behind AI’s deep learning for model training and the generation and correction of AI-generated images according to an AI users’instructions to the AI prompt and their parameter settings,the paper analyzes the initial legal viewpoint that as AI-generated images do not have a human creator,they cannot apply for copyright.It goes on to examine the rapid development of AI-generated image technology and the gradual adoption of more open attitudes towards the copyrightability of AI-generated images due to the influence of the promoting technological advancement approach.On the basis of this,the paper further analyzes the criteria for assessing the copyrightability of AI-generated images,by using measures such as originality,human authorship,and intellectual achievements,aiming to clarify the legal basis for the copyrightability of AI-generated images and enhancing the copyright protection system.
基金This research is supported by“Research on Legal Issues Caused by Sora from the Perspective of Copyright Law”(YK20240094)of the Xihua University Science and Technology Innovation Competition Project for Postgraduate Students(cultivation project).
文摘Text-to-video artificial intelligence(AI)is a new product that has arisen from the continuous development of digital technology over recent years.The emergence of various text-to-video AI models,including Sora,is driving the proliferation of content generated through concrete imagery.However,the content generated by text-to-video AI raises significant issues such as unclear work identification,ambiguous copyright ownership,and widespread copyright infringement.These issues can hinder the development of text-to-video AI in the creative fields and impede the prosperity of China’s social and cultural arts.Therefore,this paper proposes three recommendations within a legal framework:(a)categorizing the content generated by text-to-video AI as audiovisual works;(b)clarifying the copyright ownership model for text-to-video AI works;(c)reasonably delineating the responsibilities of the parties who are involved in the text-to-video AI works.The aim is to mitigate the copyright risks associated with content generated by text-to-video AI and to promote the healthy development of text-to-video AI in the creative fields.
文摘In November 2020,the third amendment of the Copyright Law of the People’s Republic of China was completed and officially implemented in June 2021,which is undoubtedly of great significance to Chinese citizens with a growing awareness of copyright.This has also triggered our thinking about the impact of Copyright Law on digital copyright.Through the analysis of the cases after the amendment of the Copyright Law,we find that to a certain extent,the Copyright Law has played a great role in the protection of digital copyright,but it is still unable to achieve comprehensive protection,and there are still some imperfections.From this point of view,the simple legal protection of digital copyright cannot be taken into account.It still needs to be combined with technical protection means,cooperate with social conditions,and work together to create a harmonious and healthy online publishing environment and promote the protection of digital copyright.
基金supported by Beijing Planning Office of Philosophy and Social Sciences(Grant No.06BaJG106)
文摘Based on a study of copyright agencies in Beijing area, this paper reviews the historical development of the work of copyright agencies and their agents. It analyzes their business related problems that these copyright agencies and agents are facing today. This paper also proposes a few remedial measures that may usher this copyright industry into a more sustainable development and also with a more promising outlook.
基金This project was supported by the Digital TV Special Foundation of National Development and Reform Commission ofChina (040313) Home Coming Scholars Science Activity Foundation of Ministry of Personnel (20041231) the Graduate In-novation Foundation of Xidian University (innovaion 0509)
文摘A novel copyright protection scheme for digital content is presented, which is a private watermarking scheme based on the watermark embedding in the DCT domain and watermark extraction Using independent component analysis (ICA). The system includes the key for watermark extraction and the host image. The algorithm splits the original image into blocks and classifies these blocks based on visual masking, that is, noise visibility function (NVF). Watermark components with different strength are inserted into chosen direct current components of DCT coefficients according to the classifier. The watermark extraction is based on the characteristic of the statistic independence of the host image, watermark and key. Principle component analysis (PCA) whitening process and FastICA techniques are introduced to ensure a blind watermark extraction without requiring the original image. Experirnental results show the proposed technique is robust under attacks such as image filtering and adding noise, cropping and resizing. In addition, the proposed private watermarking system can be improved to the application of the DTV content protection system.
基金Funded by the National Natural Science Foundation of China(No.50335020)the International Cooperation Project(No.2003CA007)
文摘In this paper,we propose a novel wavelet-domain digital image watermarking scheme on copyright protection based on network manufacture environment.It codes the watermarking with error correcting coding and encrypts the watermarking with chaotic encryption.It embeds the watermarking into the coefficients which have large absolute values in the middle-frequency parts got by Discrete Wavelet Transform (DWT) repeatedly.The extraction doesn’t need the original image.Experiment results show that the proposed scheme is easy to implement,and has good robustness to some attacks,such as JPEG compression,average filtering,median filtering,wiener filtering,pepper (?) salt noise,especially to cropping and scaling.In order to solve the prob- lem of the copyright protection of the network manufacture production,the problems of digital image production such as tamper preventing and watermarking attacks preventing and so on are discussed.It solves the problems of manufacture information such as secure exchange and transmissions and production copyright protection and so on.
文摘To protect the copyright of the image as well as the image quality, a kind of image zero-watermark method based on the Krawtchouk moment invariants and timestamp is proposed. A method is used to protect the image, in which features are drawn out from the image as the watermarking. The main steps of the method are presented. Firstly, some low-order moment invariants of the image are extracted. Secondly, the moment invariants and the key are registered to a fair third party to gain the timestamp. Finally, the timestamp can be used to prove who the real owner is. The processing method is simple, only with a few low-order moment invariants to be computed. Experimental results are obtained and compared with those of the method based on geometric moment invariants. Results show that the scheme can well withstand such geometrical attacks as rotating, scaling, cropping, combined attack, translating, removing lines, filtering, and JPEG lossy compression.
文摘A method for creating digital image copyright protection is proposed in this paper. The proposed method in this paper is based on visual cryptography defined by Noor and Shamir. The proposed method is working on selection of random pixels from the original digital image instead of specific selection of pixels. The new method proposed does not require that the watermark pattern to be embedded in to the original digital image. Instead of that, verification information is generated which will be used to verify the ownership of the image. This leaves the marked image equal to the original image. The method is based on the relationship between randomly selected pixels and their 8-neighbors’ pixels. This relationship keeps the marked image coherent against diverse attacks even if the most significant bits of randomly selected pixels have been changed by attacker as we will see later in this paper. Experimental results show the proposed method can recover the watermark pattern from the marked image even if major changes are made to the original digital image.
文摘A multipurpose image watermarking technique based on DCT is proposed to notify and protect the copyright of digital products. In order to achieve this objective, the DCT coefficients of each image block are divided into two parts for embedding the visible and invisible watermarks. The visible watermark is embedded in each DC DCT coefficient and most of the AC DCT coefficients of every block, and the invisible watermark in the rest. Based on the characteristics of Human Visual System (HVS), the embedding strength of the visible watermark is varied in accordance with the underlying content of the host image. The invisible watermark is embedded in a quaternity of midrange frequencies. Experimental results show that the visible watermark is hard to remove and the invisible watermark is robust to common digital signal processing operations.