• Title/Summary/Keyword: 디지털 핑거프린팅

Search Result 40, Processing Time 0.025 seconds

Secure Contents Distribution Scheme Using Steganographic Technique and Its Applications (심층암호 기술을 이용한 안전한 콘텐츠 유통과 응용)

  • 이형우;한군희;전병민
    • The Journal of the Korea Contents Association
    • /
    • v.1 no.1
    • /
    • pp.83-92
    • /
    • 2001
  • In this study, we combine information hiding technique with digital contents protection scheme. For providing secure distribution on digital contents, a new paradigm can be proposed after considering both watermarking and fingerprinting techniques. In detail, publicly verifiable digital signature schemes are applied into digital contents. On signing digital copyrights, we can publicly verify its correctness if needed.

  • PDF

A Study on Contents Illegal Copy Protection in Bidden Agent Using Payment Information (지불정보를 이용한 Hidden Agent 컨텐츠 불법 복사 방지에 관한 연구)

  • 이덕규;오형근;이임영
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2002.05d
    • /
    • pp.947-950
    • /
    • 2002
  • 디지털 컨텐츠의 지적 재산권 보호를 위한 디지털 워터마킹 기술 및 핑거프린팅의 연구가 활발히 진행되고 있다. DRM(Digital Rights Management)는 디지털 컨텐츠 지적 재산권 보호뿐만 아니라 컨텐츠에 대한 출판, 유통 및 사용에 필요한 관리와 보호체계이다. 본 논문에서는 컨텐츠 유통과정에서 발생할 수 있는 불법 복사와 같은 불법 행동에 대해 컨텐츠를 안전하게 보호하며 사용자에게 편의성을 제공 할 수 있는 프로토콜을 제시할 것이며 또한 지불의 효율적 사용을 위해 분할성 기능과 함께 화폐 추적과 사용자 추적 기능을 Hidden Agent에 포함하여 제안한다. 이 Hidden Agent는 특별한 설치가 필요 없이 컨텐츠 내에 내포되어 있어 컨텐츠에 대한 지불, 불법복사 및 불법사용에 대해 체크함으로써 불법복사의 사용을 차단할 수 있도록 한다. 또한 사용자들에게 숨겨져 있기 때문에 워터마킹의 역할 또한 대신할 수 있다. 따라서 본 논문에서는 유통과정에서 가장 빈번하게 나타날 수 있는 지불과 불법 복사에 대하여 Hidden Agent를 이용하여 해결하였다.

  • PDF

Scalable Fingerprinting Scheme based on Angular Decoding for LCCA Resilience (선형결합 공모공격에 강인한 각도해석 기반의 대용량 핑거프린팅)

  • Seol, Jae-Min;Kim, Seong-Whan
    • The KIPS Transactions:PartD
    • /
    • v.15D no.5
    • /
    • pp.713-720
    • /
    • 2008
  • Fingerprinting scheme uses digital watermarks to trace originator of unauthorized or pirated copies, however, multiple users may collude and escape identification by creating an average or median of their individually watermarked copies. Previous research works are based on ACC (anti-collusion code) for identifying each user, however, ACC are shown to be resilient to average and median attacks, but not to LCCA and cannot support large number of users. In this paper, we propose a practical SACC (scalable anti-collusion code) scheme and its angular decoding strategy to support a large number of users from basic ACC (anti-collusion code) with LCCA (linear combination collusion attack) robustness. To make a scalable ACC, we designed a scalable extension of ACC codebook using a Gaussian distributed random variable, and embedded the resulting fingerprint using human visual system based watermarking scheme. We experimented with standard test images for colluder identification performance, and our scheme shows good performance over average and median attacks. Our angular decoding strategy shows performance gain over previous decoding scheme on LCCA colluder set identification among large population.

Energy and Statistical Filtering for a Robust Audio Fingerprinting System (강인한 오디오 핑거프린팅 시스템을 위한 에너지와 통계적 필터링)

  • Jeong, Byeong-Jun;Kim, Dae-Jin
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.5
    • /
    • pp.1-9
    • /
    • 2012
  • The popularity of digital music and smart phones led to develope noise-robust real-time audio fingerprinting system in various ways. In particular, The Multiple Hashing(MLH) of fingerprint algorithms is robust to noise and has an elaborate structure. In this paper, we propose a filter engine based on MLH to achieve better performance. In this approach, we compose a energy-intensive filter to improve the accuracy of Q/R from music database and a statistic filter to remove continuity and redundancy. The energy-intensive filter uses the Discrite Cosine Transform(DCT)'s feature gathering energy to low-order bits and the statistic filters use the correlation between searched fingerprint's information. Experimental results show that the superiority of proposed algorithm consists of the energy and statistical filtering in noise environment. It is found that the proposed filter engine achieves more robust to noise than Philips Robust Hash(PRH), and a more compact way than MLH.

A Survey of Copyright Protection Schemes for Multimedia Data (멀티미디에 데이터를 위한 저작권 보호기법에 대한 고찰)

  • Kim, Young-Jun;Lee, Sung-Min;Lee, Jean-Ho;Kim, Tai-Yun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2000.10a
    • /
    • pp.153-156
    • /
    • 2000
  • 인터넷을 비롯한 통신기술의 비약적인 발전과 보급, Mpeg, Jpeg 등의 멀티미디어 데이터 압축기술의 발전으로 인하여 문서, 사진, 동영상, 오디오 데이터 등의 다양한 매체들이 디지털화되어 고속으로 전송이 가능하게 되었다. 이러한 멀티미디어 컨텐츠(Multimedia Contents)에 대해 누구나 쉽게 저장과 접근, 이용 가능하게 됨으로써 저작물에 대한 소유권 문제가 큰 이슈로 부각되었다. 본 논문에서는 이러한 멀티미디어 데이터의 저작권을 보호하기 위한 방법들을 살펴보고 각 기법의 특성을 고찰한다. 또한 각 기법들간의 관계 및 체계를 분류하고 저작권 보호에 효율적인 워터마킹(Watermarking)기법과 스테가노그라피(Steganography) 및 핑거프린팅(Fingerprinting)기법을 비교 분석한다.

  • PDF

A Study on a Illegal Copy Protection model using Hidden Agent in Embedded Computing Environment (임베디드 컴퓨팅 환경에서 은닉 에이전트를 이용한 불법복사 방지 모델에 관한 연구)

  • Lee, Deok-Gyu;Kim, Tai-Hoon;Yeo, Sang-Soo;Kim, Seok-Soo;Park, Gil-Cheol;Cho, Seong-Eon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.2
    • /
    • pp.180-190
    • /
    • 2008
  • There have been researches into digital Watermarking technology or Fingerprinting vigorously to safeguard Protective rights for knowledge and poverty for digital contents. DRM(Digital Rights Management) is not only Protective rights for knowledge and poverty, but also management and systems that are necessary to put out, circulate and use for contents. This paper proposes two kinds of ideas. One is protecting contents from illegal acts such as illegal copies when the contents are in the process of circulation. The other is the protocol that can give users convenience. Hidden Agents are used so that contents are protected from illegal copies and illegal use in the contents and cuts off those illegal acts. The Agent will be installed without any special setup. In addition, it can replace roles of Watermarking as a protection. Therefore, this paper shows the solution of illegal copies that happens frequently.

  • PDF

A Study on a Illegal Copy Protection Model using Hidden Agent in Embedded Computing Environment (임베디드 컴퓨팅 환경에서 은닉 에이전트를 이용한 불법복사 방지 모델에 관한 연구)

  • Lee, Deok-Gyu;Han, Jong-Wook;Chung, Kyo-Il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.709-712
    • /
    • 2007
  • There have been researches into digital Watermarking technology or Fingerprinting vigorously to safeguard Protective rights for knowledge and poverty for digital contents. DRM(Digital Rights Management) is not only Protective rights for knowledge and poverty, but also management and systems that are necessary to put out, circulate and use for contents. This paper proposes two kinds of ideas. One is protecting contents from illegal acts such as illegal copies when the contents are in the process of circulation. The other is the protocol that can give users convenience. Hidden Agents are used so that contents are protected from illegal copies and illegal use in the contents and cuts off those illegal acts. The Agent will be installed without any special setup. In addition, it can replace roles of Watermarking as a protection. Therefore, this paper shows the solution of illegal copies that happens frequently.

  • PDF

Classification of Online Tracking Technology and Implications in User Perspective (온라인 트래킹 기술 분류 및 이용자 관점에서의 시사점)

  • Lee, Bohan;Rha, Jong-Youn
    • Journal of Digital Convergence
    • /
    • v.16 no.9
    • /
    • pp.159-172
    • /
    • 2018
  • This study searched and analyzed online tracking technologies. It tried to understand what to consider when establishing policies related to online tracking. Online tracking technologies were classified into 'general cookies', 'super cookies', 'fingerprinting', 'device ID tracking' and 'cross-device tracking'. Political considerations should include the layers of online tracking, the subjects of tracking technology, purpose of use, duration and storage format of information, and development of technology. The implications of this study are as follows: first, policy makers and industry should be aware that the degree of risk perceived by users may vary according to the characteristics of online tracking technology. Secondly, it is necessary to understand factors that affect the classification of online tracking technology. Finally, in the industry, preemptive measures such as building an integrated privacy system are needed to relieve anxiety of users and to build trust.

Performance of Indoor Positioning using Visible Light Communication System (가시광 통신을 이용한 실내 사용자 단말 탐지 시스템)

  • Park, Young-Sik;Hwang, Yu-Min;Song, Yu-Chan;Kim, Jin-Young
    • Journal of Digital Contents Society
    • /
    • v.15 no.1
    • /
    • pp.129-136
    • /
    • 2014
  • Wi-Fi fingerprinting system is a very popular positioning method used in indoor spaces. The system depends on Wi-Fi Received Signal Strength (RSS) from Access Points (APs). However, the Wi-Fi RSS is changeable by multipath fading effect and interference due to walls, obstacles and people. Therefore, the Wi-Fi fingerprinting system produces low position accuracy. Also, Wi-Fi signals pass through walls. For this reason, the existing system cannot distinguish users' floor. To solve these problems, this paper proposes a LED fingerprinting system for accurate indoor positioning. The proposed system uses a received optical power from LEDs and LED-Identification (LED-ID) instead of the Wi-Fi RSS. In training phase, we record LED fingerprints in database at each place. In serving phase, we adopt a K-Nearest Neighbor (K-NN) algorithm for comparing existing data and new received data of users. We show that our technique performs in terms of CDF by computer simulation results. From simulation results, the proposed system shows that a positioning accuracy is improved by 8.6 % on average.

A Study on Identification System for Abnormally Scanned Cartoon Books (비정상 북스캔 만화 저작물 식별방법에 관한 연구)

  • Kim, Tae-Hyun;Yoon, Hee-Don;Kang, Ho-Gab;Cho, Seong-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.3
    • /
    • pp.35-41
    • /
    • 2015
  • In order to solve the problems that fingerprinting technologies and image identification technologies for digital music and videos identification scanned have not yet been enough to identify scanned cartoon books, the copyright project granted from the Korea Copyright Commission(Project title: Identification and Copy Protection Technology of Scanned Text/Comic Books) secured basic solutions for scanned cartoon books. The first result of the research project in 2013 was focused on the identification technology applied to abnormally scanned cartoon books. As subsequent research for the project, studies in the year of 2014 has been to provide solutions to identify cartoon books which abnormally scanned and occurred with transformations and distortions and solutions to protect the system from trials to devitalize functions of the identification system through various attacks. This paper is to propose a model for a system for identifying abnormally scanned cartoon books as a way of enhancing the identification rates for identifying abnormal bookscans and transformation attacks.