Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2003.10C.7.835

Using Staganography method for Protection of Caption Information in the Motion Picture  

Ham, Jun-Sick (광운대학교 대학원 컴퓨터과학과)
Ryou, Hwang-Bin (광운대학교 컴퓨터과학과)
Hong, Seong-Sik (혜전대학 컴퓨터계열)
Abstract
The technical advancement in and the widespread expansion of use of the internet has recently led to an increase in high bandwidth multimedia data usage. This is largely due to an unfettered access to the internet. The intrinsic merit of the internet, however, brings about a side effect:multimedia date can easily be duplicated recklessly. This invokes the problem of intellectual property right violation. Focusing on this matter, multi-faceted studies are being conducted now. This paper aims to provide, by applying steganography and encryption methods into the SMIL files which supply subtitle data, the intellectual property protection of both motion picture and its subtitle data, as well as the integrity of the contents in question. In order to achieve the above goal, the authors show a particular method how to safely embed subtitle data into the given frames, after they separate subtitle data to encrypt them. By doing this, the authors suggests, the intellectual property right to the subtitle data as well as their integrity can be protected and achieved respectively. Besides, an integrity service for motion picture can be made.
Keywords
Information Hiding; Steganography; MPEG; SMIL;
Citations & Related Records
연도 인용수 순위
  • Reference
1 E. Fanz, A. Jerichow, S. Moller, A. Pfitzmann, I. Stierand, 'Computer Based Steganography : How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, At Best,' Proceedings of Information Hiding Workshop, LNCS, Springer-verlag, Vol. 1174, pp. 7-21, 1996   DOI   ScienceOn
2 John L. Mitchell, William B Pennebaker, Chad E. Fogg, Didier J. Legall, 'MPEG Video Compression Standard,' Chapman and Hall, pp. 1003-1996
3 Black Wolf, StegoDos-Black Wolf's Picture Encoder V0.90B, Public Domain, ftp://ftp.csua.berkeley.edu/pub/cypherpunks/steganography/stegodos.zip
4 World Wide Web Consortium, 'Synchronized Multimedia Integration Language (SMIL 2.0),' W3C Recommendation, August, 2001
5 Anonymous, http://www.counterpane.com/blowfish.html, Counterpane Internet Security, Inc., 2001
6 Neil F. Johnson, Sushil Jajodia, 'Lecture Notes in Computer Science,' Workshop on Information Hiding Proceedings, Portland, Oregon, USA, Vol. 1525, pp. 273-289, April, 1998   DOI
7 Neil F. Johnson, Zoran Duric, Sushil Jajodia, 'Infomation Hiding - Steganography and Watermarking - Attacks and Countermeasures,' Kluwer Academic Publishers, pp. 18-44, 2001
8 후지와라 히로시, '그림으로 보는 최신 MPEG,' 교보문고, pp. 130-152, 1998
9 Ivy_research, 'Data Hidingㆍㆍㆍ,' http://vega.icu.ac.kr/~ivy/ivy_research/watermarking.html
10 Henry Hastur, Stealth for PGP v1.1, ftp://ftp.netcom.com. MandelSteg v1.0, ftp://ftp.dsi.unimi.it/pub/security/crypt/code
11 http://sasami2k.com