Browse > Article
http://dx.doi.org/10.5909/JBE.2013.18.2.196

Technologies for Forensic Marking Certification  

Oh, Weon-Geun (Creative Content Research Laboratory, ETRI)
Publication Information
Journal of Broadcast Engineering / v.18, no.2, 2013 , pp. 196-203 More about this Journal
Abstract
The importance of Digital Rights Protection technologies, especially the forensic marking, is getting larger and larger as the demand for the digital contents is increased. But the technologies for the evaluation of forensic marking is not set up properly due to the conflicts between interested parties and technical difficulties. Therefore to evaluate the performance of forensic marking objectively, image and video modification items/levels and evaluation criteria are essential. This paper suggests the quantitative system for evaluating the performance of forensic marking objectively. By providing the opportunity to evaluate the Digital Rights Protection product in objective and quantitative manner, forensic marking industry can expedite its technology development and consumer can get objective and universally validated performance result. It is expected this technology could help revitalizing the related industries and help expediting the development of forensic mark technologies.
Keywords
Forensic Marking; DRM; Evaluation; Certification;
Citations & Related Records
연도 인용수 순위
  • Reference
1 2012 Annual Report on Copyright Protection, Korea Federation of Copyright Organization Copyright Protection Center
2 [2010-24 Trend Analysis on Copyright Technology] Watermark/ Forensic Mark Technology, Korea Copyright Commission
3 Verimatrix(http://www.verimatrix.com/)
4 Vobile(http://www.vobileinc.com/)
5 Enswers Inc.(http://www.enswers.net/)
6 Civolution(http://www.civolution.com/)
7 Luo Weiqi, Qu Zhenhua, Pan Feng, and Huang Jiwu,"A survey of passive technology for digital image forensics," Front. Comput. Sci. China 2(1), pp.1−11. 2007   DOI   ScienceOn
8 White Paper,"Identifying and Managing Digital Media: A Technology Comparison of Digital Watermarking and Fingerprinting," DIGIMARC, 2010
9 Kang Hyeon RHEE,"Evaluation of Multimedia Fingerprinting Image."Multimedia - A Multidisciplinary Approach to Complex Issues, Published by InTech(www.intechopen.com), pp.141-158 March 2012
10 Xin-Wei Li, Bao-Long Guo, and Xian-Xiang Wu."On Collusion Attack for Digital Fingerprinting."Journal of Information Hiding and Multimedia Signal Processing, Volume 2, Number 4, pp.366-376, October 2011
11 Hui feng, Hefei Ling, Fuhao Zou, Weiqi Yan, and Zhengding Lu,"Collusion Attack Optimization Strategy for Digital Fingerprinting,"ACM Transactions on Multimedia Computing, Communications and Applications, Vol. 8, No. S2, Article 36, September 2012
12 Viktor Wahadaniah, Yong Liang Guan, and Hock Chuan Chua,"A New Collusion Attack and Its Performance Evaluation," IWDW 2002, LNCS 2613, pp.64-80, 2003
13 Hefei Ling, Hui Feng, Fuhao Zou, Weiqi Yan, and Zhengding Lu,"A Novel Collusion Attack Strategy for Digital Fingerprinting," IWDW 2010, LNCS 6526, pp. 224-238, 2011
14 Ferdin Joe J and Vaikunda Rja T,"Enhanced Robustness for Digital Images Using Geometric Attack simulation," International Conference on Modelling, Optimization and Computing(ICOMC-2012), Procedia 38(2012), pp.2672-2678, 2012
15 Yong-Seok Seo, Young-Ho Su, and Chi-Jung Hwang,"DWT-based Image Fingerprinting Scheme Resistant against Geometrical Distortion and Lossy Compression."Proceedings on ICACT 2009, pp.1321-1324, Feb. 2009
16 Valery Korzhik, Anton Ushmotkin, and Artem Razmov."Collusion-resistant fingerprints based on real superimposed codes,"International Journal of Computer Science and Applications, Vol. 7 No. 3, pp. 1-8, 2010