안전한 컨텐츠 유통을 위한 방안 연구

  • Published : 2002.02.01

Abstract

스테가노그래피 기반 정보은닉 기술은 디지털 컨텐츠 보호 기술에 일부 적용할 수 있으며 디지털 컨텐츠에 대한 저작권 보호를 위한 방안으로도 접목 가능하다. 디지털 컨텐츠에 대한 저작권을 보호하고 이를 안전하게 유통하기 위해 디지털 워터마킹, 정거프린팅 및 DRM에 관한 연구가 진행되고 있다. 디지털 워터마킹은 컨텐츠 내부에 저작권자 및 판매권자의 소유권 정보를 삽입하는 방식이며, 디지털 핑거프린팅은 구매자에게 고유한 저작권 및 사용권 정보를 삽입하는 방식이다. 이와 같은 두 가지 기국은 각기 다른면을 가지고 있으며, 내부적으로는 아직까지 해결되지 않은 문제점들을 발견할 수 있다. 또한 여러 가지 부분에서 많은 공통점을 발견할 수도 있다. 따라서 본 연구에서는 이와 같은 두 가지 기술 구조를 안전한 컨텐츠 유통 관점에서 살펴보고 이를 접목할 수 있는 방안을 고찰해 본다.

Keywords

References

  1. Information Hiding Lecture Notes in Computer Science v.1174 Steretching the Limits of Steganography Ross Anderson https://doi.org/10.1007/3-540-61996-8_30
  2. Information Hiding Lecture Notes in Computer Science v.1174 A Progress Report on Subliminal-Free Channels Mike Burmester;Yvo Desmedt;Toshiya Itoh;Kouichi Sakurai;Hiroki Shizura;Moti Yung https://doi.org/10.1007/3-540-61996-8_39
  3. Information Hiding Lecture Notes in Computer Science v.114 Information Hiding Therminology Bright Pfitzman
  4. Proc of IHW'98 Steganography An Information Hiding Lecture Notes in Computer Science C. Cachin
  5. Proc of IHW'98 Modeling the Security of Steganographic Systems J. Zollner;H. Federrath;H. Klimant;A. Pfitzmann;R. Piotraschke;A. Westfeld;G. Wickee;G. Wolf
  6. Proc of IHW'98 On Public-Key Steganography in the Presence of an Active Warden Scott Craver
  7. Proc of IHW'99 An Information Theoretic Approach to Steganography and Watermarking Thomas Mittelholzer
  8. Proceedings of ICIP 97 v.1 DCT-based watermark recovering without resorting to the uncorrupted original image A. Piva.(et al) https://doi.org/10.1109/ICIP.1997.647964
  9. Information Hiding Lecture Notes in Computer Science v.1768 Attacks on Steganographic Systems Andress Westfeld;Andress Pfitzmann
  10. IEEE Trans On Image Processing v.6 no.12 Secure spread spectrum watermarking for multimedia I. Cox(et al) https://doi.org/10.1109/83.650120
  11. Information Hiding Lecture Notes in Computer Science v.1174 A Secure Robust Watermark for Multimedia Software Watermarking: Models and dynamic embedding Ingemar. J. Cox;Joe. Kilian;tom Leighton; Talal Shamoon https://doi.org/10.1007/3-540-61996-8_41
  12. In Principles of programming Languages, POPL'99 San Antonio. TX Software Watermarking: Models and dynamic embedding C. Collberg;C. Thomborson
  13. Communications of the ACM v.16 no.10 A Note on the Confinement Problem Lampson. W.B https://doi.org/10.1145/362375.362389
  14. Dicta-93 Electronic watermark A.Z. Tirkel;G.A. Rankin;R.G. Schyndel. W.J;Ho. N.R;A. Mee; C.F. Osborne
  15. ACCV'95 A two-dimensional digital watermark A.Z. Tirkel;R.G. Schyndel;C.F. Osborne
  16. IMA Intellectual Property Project Proceedings Video-Steganography : How to secretly embed a signature in a picture K. Matsui;K. Tanaka
  17. IEEE International Conference on Image Processing, Stp J.K.O. Ruanaidh;W.J. Dowling;F.M. Boland
  18. Technical Report, NEC. Research Institute Secure spread spectrum communication for multimedia C. Cox;J. Killian;T. Leighton;T. Shamoon
  19. Univ. Catholique de Louvain digital Images protection techniques in a broadcast framework: an overview J. F. Delaigel;J.M. Boucqueau;J.J. Quisquater;B. Macq
  20. Proceedings of Intern Congress on Intellectual Property Rights for Specialized Information. Knowledge and New Technologies Embedding robust labels in to images for copyright protection J. Zhao;E. Koch
  21. in Advances in Cryptology-Crypto94, Lecture Notes in Computer Science v.1174 Tracing Traitors Chor. B;A. Fiat;M. Naor
  22. Information Hiding Lecture Notes in Computer Science v.1174 Trials of Traced Traitors Bright Pfitzmann
  23. Advances in Cryptology-Crypto'95. Lecture Notes in Computer Science v.963 Collusion-Secure Fingerprinting for Digital Data Dan Boneh;James Shaw
  24. Advances in Cryptology-EuroCrypt'96. Lecture Notes in Computer Science v.1070 Asymmetric Fingerprinting Birgit Pfitzmann;Matthias Schunter https://doi.org/10.1007/3-540-68339-9_8
  25. Advances in Cryptology-EuroCrypt'97. Lecture Notes in Computer Science v.1233 Anonymous Fingerprinting Michael Waidner https://doi.org/10.1007/3-540-69053-0_8
  26. Advances in Cryptology-Crypto'99. Lecture Notes in Computer Science v.1666 An Efficient Public Key Traitor Tracing Scheme Dan Boneh;Matthew Franklin https://doi.org/10.1007/3-540-48405-1_22
  27. Information Hiding Lecture Notes in Computer Science v.1768 Error-and Collusion-Secure Fingerprinting for Digital Data Hans-Jurgen Guth;Brigit Pfitzmann
  28. Advances in Cryptology-ASIACRYPT 2000, Kyoto. Japan. Efficient Anonymous Fingerprinting with Group Signatures Jan Camenisch
  29. Information Hiding Lecture Notes in Computer Science v.1768 Proving Ownership of digital Content Andre Adelsbach;Birgit Pfitzmann;Ahmad-Reza Sadeghi