• Title/Summary/Keyword: 디지털콘텐츠 보호

Search Result 480, Processing Time 0.027 seconds

Extending the OMA DRM Framework for Supporting an Active Content (능동형 콘텐츠 지원을 위한 OMA DRM 프레임워크의 확장)

  • Kim, Hoo-Jong;Jung, Eun-Su;Lim, Jae-Bong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.5
    • /
    • pp.93-106
    • /
    • 2006
  • With the rapid growth of the wireless Internet communication, a new generation of mobile devices have made possible the broad distribution of mobile digital contents, such as image, music, video, games and applications over the wireless Internet. Mobile devices are rapidly becoming the major means to extend communication channels without copy Protection, usage rule controlling and authentication. As a result, mobile digital contents may be illegally altered, copied and distributed among unauthorized mobile devices. In this paper, we take a look at Open Mobile Alliance (OMA) DRM v2.0 in general, its purpose and function. The OMA is uniquely the focal point for development of an open standard for mobile DRM. Next we introduces features for an active content and illustrates the difference between an active content and an inactive content. Enabling fast rendering of an active content, we propose an OMA-based DRM framework. This framework include the following: 1) Extending DCF Header for supporting an selective encryption, 2) Content encryption key management, 3) Rendering API for an active content. Experimental results show that the proposed framework is able to render an active content fast enough to satisfy Quality of Experience. %is framework has been proposed for a mobile device environment, but it is also applicable to other devices, such as portable media players, set-top boxes, or personal computer.

Block-based Audio Authentication Algorithm using Reversible Watermarking (가역 워터마킹을 이용한 블록 단위 오디오 인증 알고리즘)

  • Yeo, Dong-Gyu;Jo, Hyun-Wu;Lee, Hae-Yeoun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.380-383
    • /
    • 2011
  • 데이터 은닉 기술은 디지털 콘텐츠에 기밀 정보를 비가시적으로 삽입하는 기술로서, 소유권 증명, 저작권 보호, 방송 모니터링, 콘텐츠 인증 등의 다양한 목적으로 활용되고 있다. 본 논문에서는 오디오 콘텐츠의 무결성을 인증하고 위조 영역을 탐지하기 위한 가역 워터마킹 기반의 블록 단위의 오디오 콘텐츠 인증 기법을 제안한다. 제안한 기법은 오디오를 작은 크기의 블록으로 나누고 각 블록 단위로 워터마크를 삽입하여 무결성 인증을 수행한다. 또한 차이값 히스토그램 기반 가역 워터마킹 알고리즘을 적용함으로써 높은 품질을 유지하면서도 완전한 원본으로의 복원을 가능케 하였다.

Design of Interoperable DRM System in Home Domain (상호 호환성을 위한 홈 도메인 DRM 설계)

  • Moon, Ju-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.12
    • /
    • pp.117-123
    • /
    • 2010
  • In this paper, we proposed the interoperable DRM(Digital Rights Management) system that allows to redistribute contents safely based on home domain. We tried to solve the problem about contents redistribution between devices under different DRM regime so that we suggested a interoperable DRM system that allow end users to redistribute contents within home domain can solve the restriction and the inconvenience occuring in using contents and at the same time protect the right of contents producer and provider as well. In order that end users can use freely their contents using home digital device without additional payment, we must build a home domain for interoperable DRM system for contents redistribution among devices. If both of exporting device and importing device are authenticated in home domain by HADM(Home Authorized Domain Manager), then the exporting device can redistribute packaged contents under importing DRM regime to the importing device by DIM(DRM Interoperability Manager).

Hybrid-Watermarking for DWT Based Authentication and Detection of Image Modification (DWT기반 이미지 인증 및 변형 검출을 위한 혼합 워터마킹)

  • Kim Dong-Seo;Joo Nak-Keun;Kang Tae-Hwan
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.1
    • /
    • pp.170-178
    • /
    • 2006
  • In this paper, the hybrid-watermarking method to make it possible to the authentication, modification detection and copyright protection of the digital image was proposed. After the original image is transformed by the DWT(Discrete Wavelet Transform), the encrypted watermark information is embedded into the LSB(Least Significant Bit) of LL band on the low frequence domain for authenticating and detecting modified position in the image. And watermark information is embedded by exchanging the wavelet coefficient for the copyright protection. Thereby, we can authenticate the modification and detect the modified location by extracting the values of LSB on the low frequence domain. And we can perceive the copyright information of original image by extracting the embedded watermark on the high frequence domain.

  • PDF

Geometric Multiple Watermarking Scheme for Mobile 3D Content Based on Anonymous Buyer-Seller Watermarking Protocol (익명 Buyer-Seller 워터마킹 프로토콜 기반 모바일 3D 콘텐츠의 기하학적 다중 워터마킹 기법)

  • Lee, Suk-Hwan;Kwon, Seong-Geun;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.2
    • /
    • pp.244-256
    • /
    • 2009
  • This paper presents multiple watermarking method for the copyright protection and the prevention of illegal copying of mobile 3D contents. The proposed method embeds an unique watermark and a WCA watermark into the spatial and encryption domains of mobile 3D content based on anonymous Buyer-Seller watermarking protocol. The seller generates an unique watermark and embeds it into the distribution of vertex data of 3D content object. After receiving the encrypted watermark from WCA, the seller embeds it into the encrypted vertex data by using operator that satisfies the privacy homo morphic property. The proposed method was implemented using a mobile content tool, Power VR MBX and experimental results verified that the proposed method was capable of copyright protection and preventing illegal copying, as the watermarks were also accurately extracted in the case of geometrical attacks, such as noise addition, data accuracy variation, and data up/down scaling.

  • PDF

Wavelet Watermarking of Digital Image Date (디지털 이미지 데이터의 웨이브릿 워터마킹)

  • Lee Jeong-Gi;Hue Jin;Lee Gwang;Lee Ho-Yeong;Lee Joon
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.11a
    • /
    • pp.490-494
    • /
    • 2005
  • Multispectral image is wavelet trans formed and classified into one of three classes considering reference characteristics of the subband with the lowest resolution. Recently, aegis of authentitation and creator's copyright has become a matter of great concern by the diffusion of multimedia technique and the growth of the internet and the easily duplicated property of digital data. Consequently, many active researches have been made to protect copyright and to assure integrity by inserting watermark into the digital data. In this paper, watermark is repeated through the entire image and adapted to the content of the image.

  • PDF

Video Fingerprinting System through Zero-based Code Modulation Technique (제로기반 코드 변조 기법을 통한 비디오 핑거프린팅 시스템)

  • Choi Sun Young;Lee Hae-Yeoun;Kang In Koo;Lee Heung-Kyu
    • The KIPS Transactions:PartB
    • /
    • v.12B no.4 s.100
    • /
    • pp.443-450
    • /
    • 2005
  • Digital fingerprinting is a contents-protection technique, where customer information is inserted into digital contents. Fingerprinted contents undergo various attacks. Especially, attackers can remove easily the inserted fingerprint by collusion attacks, because digital fingerprinting inserts slightly different codes according to the customers. Among collusion attacks, averaging attack is a simple, fast, and efficient attack. In this paper, we propose a video fingerprinting system that is robust to the averaging attack. In order to achieve code efficiency and robustness against the averaging attack, we adopt anti-collusion code (fingerprint code) from GD-PBIBD theory. When the number of users is increased, the size of fingerprint code also grows. Thus, this paper addresses a zero-based code modulation technique to embed and detect this fingerprint code efficiently. We implemented a blind video fingerprinting system based on our proposed technique and performed experiments on various colluding cases. Based on the results, we could detect most of colluders. In the worst case, our scheme could trace at least one colluder successfully.

The Efficient Multipurpose Convertible Undeniable Signature Scheme (효율적인 다목적 전환 부인봉쇄 서명 기법)

  • Han Kun-Hee;Yun Sung-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.3
    • /
    • pp.83-91
    • /
    • 2005
  • The digital signature can be verified and disavowed only with cooperation of the signer in 'undeniable signature scheme. A signed confidential document of a company can be copied and delivered to a rival company. If a conventional signature scheme is used to sign the document, it can be confirmed as authentic by verifying the signature without the signer's cooperation. However, if the company doesn't want the document to be verified as authentic by the rival company, it is recommended to use the undeniable signature scheme. Convertible undeniable signature scheme has additional property that the signer can convert undeniable signature to the ordinary one. The document signed by undeniable signature scheme that is no longer confidential can be opened to public use by converting the signature to the ordinary one. In this study, the efficient multipurpose convertible undeniable signature scheme based on El-Gamal signature scheme is proposed. The proposed scheme satisfies undeniable property and can convert undeniable signature to the ordinary one. The number of public keys and signatures are less than those of Boyar's convertible signature scheme. It also reduces the number of communication steps of the signature confirmation protocol.

  • PDF

A Categorization Method based on RCBAC for Enhanced Contents and Social Networking Service for User (사용자를 위한 향상된 콘텐츠 및 소셜 네트워킹 서비스 제공을 위한 RCBAC 기반 분류 방법)

  • Cho, Eun-Ae;Moon, Chang-Joo;Park, Dae-Ha
    • Journal of Digital Contents Society
    • /
    • v.13 no.1
    • /
    • pp.101-110
    • /
    • 2012
  • Recently, social network sites are very popular with the enhancement of mobile device function and distribution. This gives rise to the registrations of the people on the social network sites and the usage of services on the social sites is also getting active. However, social network sites' venders do not provide services enough compared to the demand of users' to share contents from diverse roots by users effectively. In addition, the personal information can be revealed improperly in processes sharing policies and it is obvious that it raises a privacy invasion problem when users access the contents created from diverse devices according to the relationship by policies. However, the existing methods for the integration management of social network are weak to solve this problem. Thus, we propose a model to preserve user privacy, categorize contents efficiently, and give the access control permissions at the same time. In this paper, we encrypt policies and the trusted third party classifies the encrypted policies when the social network sites share the generated contents by users. In addition, the proposed model uses the RCBAC model to manage the contents generated by various devices and measures the similarity between relationships after encrypting when the user policies are shared. So, this paper can contribute to preserve user policies and contents from malicious attackers.

Development of the XML Security Platform for E-Commerce (XML 기반 안전한 전자상거래를 위한 보안 플랫폼 개발)

  • Moon, K.Y.;Lee, J.S.;Kim, J.H.;Lee, J.Y.;Sohn, S.W.
    • Electronics and Telecommunications Trends
    • /
    • v.17 no.6 s.78
    • /
    • pp.29-38
    • /
    • 2002
  • XML 전자문서는 전자상거래를 위한 전자문서의 표준으로 받아 들여지고 있으며 안전한 전자상거래를 위해서는 XML 정보보호가 무엇보다도 먼저 해결되어야 한다. 본 논문에서는 인터넷 상에서 XML을 기반으로 하는 전자문서 교환 시스템의 안전한 문서 교환을 위한 정보보호 서비스 구현을 소개한다. XML 기반 전자문서 교환 시스템은 주로 인터넷에서 상거래를 위해 사용자 인증, 데이터 무결성 보장, 송수신에 대한 부인 봉쇄 등 다양한 보안 기능에 대해 필요하다. 또한 본 논문은 이러한 보안 기능을 충족시키는 XML 기반 정보보호 서비스인 ESES(ETRI Secure E-commerce Services)를 제안한다. ESES는 XML 문서 뿐 아니라 전자상거래 시 교환되는 디지털 콘텐츠를 위한 보안 서비스 제공을 목적으로 하며, 자바기반의 암호 구조를 바탕으로 XML 기반 전자서명, XML 기반 암복호, XML 기반 키 복구, 인증서 처리 기능 등을 지원한다.