Implementation of Digital Contents Safety Trade System using Encryption Technology

암호 기술을 이용한 디지털 콘텐츠 안전 거래 시스템 구현

  • 양정모 (중부대학교 정보보호학과)
  • Received : 2013.10.23
  • Accepted : 2013.12.06
  • Published : 2013.12.30

Abstract

The amount of digital content grows exponentially by the development of the internet and the change of computing environments and the target also is getting wider. The industry using this digital content has been growing greatly. However, the distribution of pirated digital content is increasing using internet because digital content is easy to store and transmit and the damage is growing. In this paper, we propose safety trading system which can conceal the author's information safely in digital content in order to block illegal distribution of digital content. ARIA encryption algorithm is used to protect the concealed information of author in digital content and it is a help to track the illegal traders by doing fingerprinting of buyer information to digital content and managing the transaction information. The technical support for copyright dispute is to allow by providing the capability to verify illegal edit to original digital contents.

Keywords

References

  1. F Wang, Y. Xiong and J. Liu, "mTreebone: A Collaborative Tree-Mesh Overlay Network for Multicast Video Streaming," IEEE Transactions on Parallel and Distributed Systems, Vol. 21, No. 3, 2010, pp. 379-392. https://doi.org/10.1109/TPDS.2009.77
  2. J. Qingqi Pei, Kefeng Fan, Jianfeng Ma, and Jinxiu Dai, "An Intelligent Digital Content Protection Framework Between Home Network Receiver Devices," IEEE Computational Intelligence and Security, 2006 International Conference on 3-6 , Vol. 2, Nov. 2006, pp. 1032-1036.
  3. 장은겸, 이범석, "네트워크 서비스 환경에서 MPEG-21을 활용한 디지털 콘텐츠 보호 및 컴퓨터 포렌식스 증거 관리 메커니즘," 디지털산업정보학회지, 제6권, 제2호, 2010, pp. 129-140.
  4. J. Xinwen Zhang, Francesco Parisi-Presicce, Ravi Sandhu, and Jaehong Park, "Formal Model and Policy Specication of Usage Control," ACM Transactions on Information and System Security, Vol. 8, No. 4, Nov. 2005, pp. 351-387. https://doi.org/10.1145/1108906.1108908
  5. 권준희, 김성림, "유비쿼터스 환경에서 상황 데이터 기반 모바일 콘텐츠 서비스를 위한 추천 기법," 디지털산업정보학회지, 제6권, 제2호, 2010, pp. 1-9.
  6. Y. Zhang, "Digital Watermarking Technology: A Review," International Conference on Future Computer and Communication, 2009, pp. 250-252.
  7. Lip Y. Por, Ang T. Fong, and B. Delina, "Whitesteg: a new scheme in information hiding using text steganography," WSEAS Transactions on Computers, Vol. 7, 2008, pp. 735-745.
  8. Richard Bergmair, "A comprehensive bibliography of linguistic steganography," In Proceedings of the SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents, Vol. 6505, 2007.
  9. 양정모, IT 융합보안의 길잡이 암호학, 경문사, 2013.
  10. C. Kim, "Differential fault analysis of AES: Toward reducing number of faults," Information Sciences, Vol. 199, 2012, pp. 43-57. https://doi.org/10.1016/j.ins.2012.02.028