• Title/Summary/Keyword: 디지털 콘텐츠 보호

Search Result 481, Processing Time 0.023 seconds

High-Capacity Reversible Watermarking through Predicted Error Expansion and Error Estimation Compensation (추정 오차 확장 및 오류 예측 보정을 통한 고용량 가역 워터마킹)

  • Lee, Hae-Yeoun;Kim, Kyung-Su
    • The KIPS Transactions:PartB
    • /
    • v.17B no.4
    • /
    • pp.275-286
    • /
    • 2010
  • Reversible watermarking which can preserve the original quality of the digital contents and protect the copyright has been studied actively. Especially, in medical, military, and art fields, the need for reversible watermarking is increasing. This paper proposes a high-capacity reversible watermarking through predicted error expansion and error estimation compensation. Watermark is embedded by expanding the difference histogram between the original value and the predicted value. Differently from previous methods calculating the difference between adjacent pixels, the presented method calculates the difference between the original value and the predicted value, and that increases the number of the histogram value, where the watermark is embedded. As a result, the high capacity is achieved. The inserted watermark is extracted by restoring the histogram between the original value and the predicted value. To prove the performance, the presented algorithm is compared with other previous methods on various test images. The result supports that the presented algorithm has a perfect reversibility, a high image quality, and a high capacity.

Additive Data Insertion into MP3 Bitstream Using linbits Characteristics (Linbits 특성을 이용하여 MP3 비트스트림에 부가적인 정보를 삽입하는 방법에 관한 연구)

  • 김도형;양승진;정재호
    • The Journal of the Acoustical Society of Korea
    • /
    • v.22 no.7
    • /
    • pp.612-621
    • /
    • 2003
  • As the use of MP3 audio compression increased, the demand for the insertion of additive data about copyright or information on music contents has been groved and the related research has been progressed actively. When an additive data is inserted into MP3 bitstream, it should not to happen any distortion of music quality or the change of file size, due to the modification of MP3 bitstream structure. In our study, to make these conditions satisfied, we inserted some additive data to bitstream by modifying some bits of linbits among the quantized integer coefficients having big values. At this time, we consider the characteristics of linbits and their distributions. As a result of subjective sound quality test through MOS test, we confirmed that the quality of MOS 4.6 can be achieved at the data insertion rate of 60 bytes/sec. Using the proposed method, it is possible to effectively insert an additive data such as copyright information or information about media itself, so that various applications like audio database management can be realized.

Secret Sharing Scheme using Gray Code based on Steganography (스테가노그라피 기반에서 그레이코드를 사용한 비밀공유 기법)

  • Kim, Cheon-Shik;Yoon, Eun-Jun;Hong, You-Sik;Kim, Hyoung-Joong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.1
    • /
    • pp.96-102
    • /
    • 2009
  • Due to the rapid growth of the Internet, it is possible to distribute the digital content efficiently. However, the need for image data protection and secret communication technique is also on the rise because of an infringement of the copyright by malicious attackers. Shamir and Lin-Tsai proposed simple secret image encryption algorithms based on the principle of secret sharing, respectively. However, their secret sharing schemes have a serious problem which can be declined the image quality and it is possible for third party to know embed information. In this paper, we propose a new secret sharing scheme using gray code that can be increased the image quality and security. As a result of our experiment, the proposed scheme is not only shown of good image quality and but also provide enhanced security compare with Shamir and Lin-Tasi's schemes.

A Study for Forest Research using Airborne Laser Scanning (항공레이저측량을 이용한 산림조사 방법에 관한 연구)

  • Kim, Eun-Young;Wie, Gwang-Jae;Cho, Heung-Muk;Yang, In-Tae
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.28 no.3
    • /
    • pp.299-304
    • /
    • 2010
  • Depending on the progress of the surveying and information processing technology, the rapidly developing field of spatial information and the 3D real world spatial information for a variety of content on the computer was able to easily access. In this research, to study on the spot or to use aerial photographs to measure trees of the acquired data, calculate the trees height, forest area and capacity, determine the distribution of the density of acquired points in the forest and analyze accurate and objective information was acquired. The United States, Canada and so on through the capacity of trees biomass, forest resource analysis, time series monitoring, wildfire behavior modeling and applied research and has been declared. During worldwide is increasing interest in forest resources. In nationally, extensive research and analysis of the forest consists of the correct management and protection of forest resources to be effective.

A Study on Encryption Method using Hash Chain and Session Key Exchange in DRM System (DRM 시스템에서 해쉬체인과 세션키 교환을 이용한 암호화 기법에 관한 연구)

  • Park, Chan-Kil;Kim, Jung-Jae;Lee, Kyung-Seok;Jun, Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.13C no.7 s.110
    • /
    • pp.843-850
    • /
    • 2006
  • This is devoted to first, to propose a hash chain algorithm that generates more secure key than conventional encryption method. Secondly, we proposes encryption method that is more secure than conventional system using a encryption method that encrypts each block with each key generated by a hash chain algorithm. Thirdly, After identifying the user via wired and wireless network using a user authentication method. We propose a divided session key method so that Although a client key is disclosed, Attackers cannot catch a complete key and method to safely transfer the key using a divided key method. We make an experiment using various size of digital contents files for performance analysis after performing the design and implementation of system. Proposed system can distribute key securely than conventional system and encrypt data to prevent attacker from decrypting complete data although key may be disclosed. The encryption and decryption time that client system takes to replay video data fie is analogous to the conventional method.

SIFT Feature Based Digital Watermarking Method for VR Image (VR영상을 위한 SIFT 특징점 기반 디지털 워터마킹 방법)

  • Moon, Won-Jun;Seo, Young-Ho;Kim, Dong-Wook
    • Journal of Broadcast Engineering
    • /
    • v.24 no.6
    • /
    • pp.1152-1162
    • /
    • 2019
  • With the rapid development of the VR industry, many VR contents are produced and circulated, and the need for copyright protection is increasing. In this paper, we propose a method of embedding and extracting watermarks in consideration of VR production process. In embedding, SIFT is performed by selecting the region where distortion is minimized in VR production, and transformed into frequency domain using DWT and embedded into the QIM method. In extracting process, in order to correct the distortion in the projection process, the top and bottom regions are changed to different projection methods and some middle regions are rotated using 3DoF to extract the watermark. After this processing, extracted watermark has higher accuracy than the conventional watermark method, and the validity of the proposed watermark is shown by showing that the accuracy is maintained even in various attacks.

A Basic Study on the Establishment of the Viewing Environment and Interpretation·Presentation System According to the Cultural Heritage Type (문화유산 유형별 관람환경 및 해석·전달체계 조성에 관한 기초 연구)

  • Kim, Jong-Seung;Kim, Chang-Kyu;Hwang, Kyu-Man;Choi, Yong-Won;Kim, Kyu-Yeon
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.39 no.2
    • /
    • pp.39-49
    • /
    • 2021
  • This study was conducted to establish practical goals for the viewing environment and interpretation and delivery system of cultural heritage and to create an viewing environment according to the classification of cultural heritage types, and the conclusions reached are as follows. First, five goals were set based on the international basic principles of the cultural heritage viewing environment and interpretation and delivery system. Second, based on the set goals, cultural heritage was classified into the first type 'disappeared and hidden heritage', the second type 'stuffed memory heritage', and the third type 'living memory heritage'. Third, the directions for creating the viewing environment for each type of cultural heritage were suggested. The first type has to be able to properly convey cultural heritage to visitors through excavation and digital technology. The second type needs a plan to deliver tangible and intangible values by combining various digital technologies with actual cultural heritage. The third type should emphasize the role of local residents in effectively enjoying the tangible and intangible values ??that already exist. Fourth, it proposed comprehensive considerations in the establishment of the cultural heritage viewing environment and interpretation and delivery system. Based on dynamic and sustainable heritage management, cultural heritage viewing should be valuable, satisfying and enjoyable. In addition, local communities should be actively involved, and tourism and conservation activities should be able to benefit the community. Establishment of a viewing environment should protect and strengthen the authenticity of cultural heritage.

Formulating Strategies from Consumer Opinion Analysis on AI Kids Phone using Text Mining (AI 키즈폰의 소비자리뷰 분석을 통한 제품개선 전략에 대한 연구)

  • Kim, Dohun;Cha, Kyungjin
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.2
    • /
    • pp.71-89
    • /
    • 2019
  • In order to come up with satisfying product and improvement, firms use traditional marketing research methods to obtain consumers' opinions and further try to reflect them. Recently, gathering data from consumer communication platforms like internet and SNS has become popular methods. Meanwhile, with the development of information technology, mobile companies are launching new digital products for children to protect them from harmful content and provide them with necessary functions and information. Among these digital products, Kids Phone, which is a wearable device with safe functions that enable parents to learn childern's location. Kids phone is relatively cheaper and simpler than smartphone but it is noted that there are several problems such as some useless functions and frequent breakdowns. This study analyzes the reviews of Kids phones from domestic mobile companies, identifies the characteristics, strengths and weaknesses of the products, proposes improvement methods strategies for devices and services through SNS consumer analysis. In order to do that customer review data from online shopping malls was gathered and was further analyzed through text mining methods such as TF/IDF, Sentiment Analysis, and network analysis. Customer review data was gathered through crawling Online shopping Mall and Naver Blog/$Caf\acute{e}$. Data analysis and visualization was done using 'R', 'Textom', and 'Python'. Such analysis allowed us to figure out main issues and recent trends regarding kids phones and to suggest possible service improvement strategies based on sentiment analysis.

A study on the structural relationship between resource attraction, entertainment experience, love mark and attachment in tourist destination (관광목적지의 자원매력, 오락적 체험, 러브마크, 애착 간의 구조적 관계)

  • Seo, Gyeong-Do;Lee, Jung-Eun
    • Journal of Digital Convergence
    • /
    • v.20 no.5
    • /
    • pp.261-268
    • /
    • 2022
  • This study tried to understand the meaning of resource attraction, entertainment experience, love mark, and attachment of tourist destinations. A theoretical study was conducted on each research concept to achieve the proposed research purpose. Based on this, an empirical study was conducted after deriving a questionnaire based on this, and a non-face-to-face survey was conducted nationwide using population-proportional sampling. The empirical study was confirmed through the statistical programs SPSS25.0 and AMOS25.0. The resource attractiveness of the tourist destination had a positive (+) relationship with the influence on the tourists' experience. The relationship between the experience and the love mark had a positive (+) relationship. A positive (+) relationship was also formed in the relationship between experience and attachment. However, the relationship between love mark and attachment did not form a significant relationship.Because it reflects regional characteristics, it is a useful material for local culture and history, so protection, preservation, and active program development are required. is needed.

A Study on the Introduction of Library Services Based on Blockchain (블록체인 기반의 도서관 서비스 도입 및 활용방안에 관한 연구)

  • Ro, Ji-Yoon;Noh, Younghee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.33 no.1
    • /
    • pp.371-401
    • /
    • 2022
  • If the blockchain means storing information in a distributed environment that cannot be forged or altered, it is mentioned that this is similar to what librarians collect, preserve, and share authoritative information. In this way, this study examined blockchain technology as a way to collect and provide reliable information, increase work efficiency inside and outside the library, and strengthen cooperative networks. This study attempted to propose various ways to utilize blockchain technology in book relations based on literature surveys and case studies in other fields. To this end, this study first analyzed the field and cases of blockchain application to confirm the possibility and value of blockchain application in the library field, and proposed 12 ways to utilize it based on this. The utilization model was proposed by dividing it into operation and service sectors. In the operation sector, it is a digital identity-based user record storage and authentication function, transparent management and traceable monitoring function, voting-based personnel and recruitment system, blockchain governance-based network efficiency function, and blockchain-based next-generation device management and information integration function. The service sector includes improved book purchase and sharing efficiency due to simplification of intermediaries, digital content copyright protection and management functions, customized service provision based on customer behavior analysis, blockchain-based online learning platforms, sharing platforms, and P2P-based reliable information sharing platforms.