• Title/Summary/Keyword: 디지털콘텐츠 보호

Search Result 481, Processing Time 0.025 seconds

Design of deep learning based hardware accelerator for digital watermarking (디지털 워터마킹을 위한 딥러닝 기반 하드웨어 가속기의 설계)

  • Lee, Jae-Eun;Seo, Young-Ho;Kim, Dong-Wook
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2020.07a
    • /
    • pp.544-545
    • /
    • 2020
  • 본 논문에서는 영상 콘텐츠의 지적재산권 보호를 위하여 딥 러닝을 기반으로 하는 워터마킹 시스템 및 하드웨어 가속기 구조를 제안한다. 제안하는 워터마킹 시스템은 호스트 영상과 워터마크가 같은 해상도를 갖도록 변화시키는 전처리 네트워크, 전처리 네트워크를 거친 호스트 영상과 워터마크를 정합하여 워터마크를 삽입하는 네트워크, 그리고 워터마크를 추출하는 네트워크로 구성된다. 이 중 호스트 영상의 전처리 네트워크와 삽입 네트워크를 하드웨어로 설계한다.

  • PDF

Improvement of AACS Security Framework with Access Control to Personal Contents (개인 콘텐츠 접근제어 기능을 갖는 개선된 AACS 보안 Framework)

  • Kim, Dae-Youb
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.167-174
    • /
    • 2008
  • As both a digital camera and a digital camcorder are popularized in recent years, UCC created by general users is also popularized. Unfortunately, according to that, the lack of privacy is also increasing more and more. The UCC is saved on the recordable media(Media) like DVD and deposited personally as well as distributed through Internet portal service. If you use Internet portal service to put up your contents, you can partially prevent the violation of privacy using security technologies such as authentication and illegal copy protection offered by internet portal service providers. Media also has technologies to control illegal copy. However, it is difficult to protect your privacy if your Media having personal contents is stolen or lost. Therefore, it is necessary to develope an additional security mechanism to guarantee privacy protection when you use Media. In this paper, we describe AACS framework for Media Security and propose improved AACS framework to control the access to personal contents saved on Media.

Digital Video Watermarking Using Frame Division And 3D Wavelet Transform (프레임 분할과 3D 웨이블릿 변환을 이용한 비디오 워터마킹)

  • Kim, Kwang-Il;Cui, Jizhe;Kim, Jong-Weon;Choi, Jong-Uk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.3
    • /
    • pp.155-162
    • /
    • 2008
  • In this paper we proposed a video watermarking algorithm based on a three dimension discrete wavelet transform (3D DWT) and direct spread spectrum (DSS). In the proposed method, the information watermark is embedded into followed frames, after sync watermark is embedded into the first frame. Input frames are divided into sub frames which are located odd row and even row. The sub frames are arranged as 3D frames, and transformed into 3D wavelet domain. In this domain the watermark is embedded using DSS. Existing video watermarking using 3D DWT is non-blind method but, proposed algorithm uses blind method. The experimental results show that the proposed algorithm is robust against frame cropping, noise addition, compression, etc. acquiring BER of 10% or below and sustains level of 40dB or above on the average.

Implementation of Authoring and Consuming System for IPTV Package Contents (IPTV 융합콘텐츠 저작 및 소비 시스템 구현)

  • Ryu, Jee-Woong;Shin, Geuk-Jae;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.5
    • /
    • pp.1164-1170
    • /
    • 2010
  • IPTV hasn't fulfilled the expectations that it will substitute existing digital broadcasting service and serve new type of services such as interactive and multi-channels. Today's IPTV service just seems to change existing service platform to new one. In this situation, Open IPTV service has been on the rise, which make it possible for consumers to choice contents regardless of contents providers. However, the integration of variety service platforms such as rights protection solution is essential to provide Open IPTV service. In this paper, authoring and consuming system for package contents based on MPEG-21 Multimedia Framework which is developed for distributing media resources.

A Robust Multiple Set-Top Box Authentication Scheme for IPTV Against Smart Card Cloning Attack (IPTV 환경에서 스마트카드 복제에 강건한 다중 셋톱박스 인증기법)

  • Lim, Ji-Hwan;Oh, Hee-Kuck;Kim, Sang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.17C no.1
    • /
    • pp.37-46
    • /
    • 2010
  • In an IPTV system, the rights of the content and service provider can be protected by using Conditional Access System (CAS) and Digital Right Management (DRM). In case of the CAS, only the authorized user who has structured authentication keys can decrypt the encrypted content. However, since the CAS establishes a secure channel only between content provider and Smart Card (SC), it cannot protect the system against McCormac Hack attack which eavesdrops on unsecure channel between SC and Set-Top Box (STB) and SC cloning attack. In this paper, we propose a robust multi-STB assisted SC / STB authentication protocol which can protect the IPTV system against not only McCormac Hack attack, but also SC cloning attack. The previous works which bind a STB and a SC during the SC registration phase against the SC cloning attack does not support multi-STB environments. The proposed system which dynamically updates the STB information in subscriber management system using the bi-directional channel characteristic of IPTV system can support the user's multi-STB device effectively.

Fingerprint-Based 1-out-of-n Access Control Technique for Media Service Protection in IPTV Broadcasting System (IPTV의 미디어 서비스 보호를 위한 지문 인식 기반의 1-out-of-n 접근 통제 기법)

  • Lee, Ji-Seon;Rhee, Hyun-Sook;Kim, Hyo-Dong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.4B
    • /
    • pp.687-694
    • /
    • 2010
  • IPTV(Internet Protocol Television) is an emerging technology in which telecommunication and broadcasting technologies are converged. IPTV service providers usually multicast scrambled contents. And only legitimate subscribers who pass the access control can de-scramble and use the contents. In order to ensure revenues, providers oftentimes employ password-based authentication protocols that ensure secure authentication processes between set-top box and smart card. In this paper, we propose a fingerprint-based 1-out-of-n authentication protocol which provides convenient and more secure authentication process in some organizational environments. The proposed scheme shows that only those who provide legitimate fingerprint information can be authenticated even in a situation that both password and smart card are compromised.

Digital Imaging Source Identification Using Sensor Pattern Noises (센서 패턴 잡음을 이용한 디지털 영상 획득 장치 판별)

  • Oh, Tae-Woo;Hyun, Dai-Kyung;Kim, Ki-Bom;Lee, Hae-Yeoun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.12
    • /
    • pp.561-570
    • /
    • 2015
  • With the advance of IT technology, contents from digital multimedia devices and softwares are widely used and distributed. However, novice uses them for illegal purpose and hence there are needs for protecting contents and blocking illegal usage through multimedia forensics. In this paper, we present a forensic technique for identifying digital imaging source using sensor pattern noise. First, the way to acquire the sensor pattern noise which comes from the imperfection of photon detector against light is presented. Then, the way to identify the similarity of digital imaging sources is explained after estimating the sensor pattern noises from the reference images and the unknown image. For the performance analysis of the proposed technique, 10 devices including DSLR camera, compact camera, smartphone and camcorder are tested and quantitatively analyzed. Based on the results, the proposed technique can achieve the 99.6% identification accuracy.

Wavelet-based Electronic Watermarking Algorithm for Digital Holography Interference Patterns (디지털 홀로그래피 간섭패턴을 위한 웨이블릿 기반의 전자적인 워터마킹 알고리듬)

  • Choi, Hyun-Jun;Seo, Young-Ho;Wi, Sung-Min;Yoo, Ji-Sang;Kim, Dong-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.10
    • /
    • pp.1751-1758
    • /
    • 2008
  • Digital holography interference pattern generated by a computer calculation (CGH) is one of the most expensive contents and its usage is being expanded. Thus, it is highly necessary to protect the ownership of digital hologram. In this paper a hologram-domain and a frequency-domain electronic watermarking schemes were proposed. The hologram-domain scheme was only to compare the results to the ones from frequency-domain scheme and the frequence-domain scheme used 2-dimensional against the attaks. Especially the MDWT-domain scheme was very high robustness such that th error ratio at the worst case was only 3%. Thus, we expect that it is used as a good watermarking scheme of digital hologram with high performance.

A study on metaverse of China's Dunhuang Frescoes through COSPACES EDU (COSPACES EDU를 통한 중국 둔황 원시벽화 메타버스 연구)

  • Liu, Bo-Ya;Oh, Seung-Hwan
    • Journal of Digital Convergence
    • /
    • v.19 no.11
    • /
    • pp.463-470
    • /
    • 2021
  • Due to natural and human factors, dunhuang frescoes in China have gradually degenerated. China has conducted digital transformation of frescoes since 1990. However, it requires expensive research costs. Most of the visitors passively accept transformation contents and lack subjective participation. The paper focuses on produces a prototype of Dunhuang frescoes on the CoSpaces EDU. It was implemented as a metaverse through procedures such as transforming the cave into 3D, mapping images to the cave model and developing CoBlocks. The research puts forward a more specific methodology without expensive costs of development. The paper makes it easier to realize the immersive and interactive virtual Dunhuang frescoes world, to improve the tourism contents and educational effect. This research carries on the statistics to the product result which develops according to the user experience of 100 different ages, has obtained the good feedback. The research results need to be improved is to strengthen the processing of graphic details. Therefore, Optimization and improvement of the result will be carried out in the future research.

Evolution of Internet Trademark Infringement in the U.S. (미국 인터넷상표권 침해관련 법률의 변화에 관한 연구)

  • Kang, Joon Mo
    • Journal of Digital Convergence
    • /
    • v.12 no.10
    • /
    • pp.61-71
    • /
    • 2014
  • Global commerce is apparently here to bind Korean firms as well as Koreans. The advertising, buying and selling of goods and services recognizes no borders. As a result, enforcing territorially based trademark rights has become ever more challenging. Remote trademark owners who peacefully coexisted in a time before the internet and increasing globalism are now bumping heads. The internet also has made it easier for unscrupulous operators to deceive consumers and divert customers from established businesses by misappropriating trademarks on web-sites and in domain names. U.S. federal courts have been willing to help American businesses halt trademark infringements that reaches outside the United States. This is particularly true for e-business, via the internet, and the trend toward enforcement seems to be in favor of the trademark owner. This article discusses this trend as well as the extraterritorial enforcement of trademark rights by U.S. courts under the Lanham Act. It also offers suggestions for protecting valuable trademark rights worldwide. This paper will contribute to global Korean firms and Koreans who carefully read arguments in this valuable literature.