• Title/Summary/Keyword: 비디오 암호화

Search Result 71, Processing Time 0.026 seconds

Design of A Generic and Scalable DRM Scheme using HC-256 Stream Cipher (HC-256 스트림 암호화를 이용한 범용성 및 확장성을 가진 DRM 기법 설계)

  • Park, Jun-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.9B
    • /
    • pp.923-930
    • /
    • 2009
  • Digital Rights Management(DRM) is a term that refers technologies for imposing limitations on the use of digital content for protecting media copyright holders. This paper proposes a generic scheme for digital media copy protection that can be applied to any digital media such as audio, video, etc. The scheme will make it very hard to play a copied content on a foreign platform and to guess secret content encryption keys. Unlike other DRM techniques, the scheme uses the stream cipher HC-256 only for encrypting media content and it allows a client to start content playback immediately following its streamed decryption. As to the encryption, it requires to generate several secret keys for each new client(player copy), rather than for each media content, which makes it scalable in terms of managed keys. Also, for simplicity, the scheme supports the popular unlimited-play-after-download policy only, which would eliminate the necessity for deploying separate server or process for licensing.

A Security Module for Vehicle Network Communication (차량 네트워크 통신용 보안 모듈)

  • Kwon, Byeong-Heon;Park, Jin-Sung
    • Journal of Digital Contents Society
    • /
    • v.8 no.3
    • /
    • pp.371-376
    • /
    • 2007
  • Many modules such as controller, sensor, telematics terminal, navigation, audio and video are connected each other via vehicle network (CAN, MOST, etc). Futhermore, users can have ITS or internet services in moving by connecting to wireless mobile network. These network capabilities can cause a lots of security issues such as data hacking, privacy violation, location tracking and so on. Some possibilities which raise a breakdown or accident by hacking vehicle operation data (sensor, control data) are on the increase. In this paper, we propose a security module which has encryption functionalities and can be used for vehicle network system such as CAN, MOST, etc. This security module can provide conventional encryption algorithms and digital signature processing functionality such as DES, 3-DES, SEED, ECC, and RSA.

  • PDF

Selectively Partial Encryption of Images in Wavelet Domain (웨이블릿 영역에서의 선택적 부분 영상 암호화)

  • ;Dujit Dey
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.6C
    • /
    • pp.648-658
    • /
    • 2003
  • As the usage of image/video contents increase, a security problem for the payed image data or the ones requiring confidentiality is raised. This paper proposed an image encryption methodology to hide the image information. The target data of it is the result from quantization in wavelet domain. This method encrypts only part of the image data rather than the whole data of the original image, in which three types of data selection methodologies were involved. First, by using the fact that the wavelet transform decomposes the original image into frequency sub-bands, only some of the frequency sub-bands were included in encryption to make the resulting image unrecognizable. In the data to represent each pixel, only MSBs were taken for encryption. Finally, pixels to be encrypted in a specific sub-band were selected randomly by using LFSR(Linear Feedback Shift Register). Part of the key for encryption was used for the seed value of LFSR and in selecting the parallel output bits of the LFSR for random selection so that the strength of encryption algorithm increased. The experiments have been performed with the proposed methods implemented in software for about 500 images, from which the result showed that only about 1/1000 amount of data to the original image can obtain the encryption effect not to recognize the original image. Consequently, we are sure that the proposed are efficient image encryption methods to acquire the high encryption effect with small amount of encryption. Also, in this paper, several encryption scheme according to the selection of the sub-bands and the number of bits from LFSR outputs for pixel selection have been proposed, and it has been shown that there exits a relation of trade-off between the execution time and the effect of the encryption. It means that the proposed methods can be selectively used according to the application areas. Also, because the proposed methods are performed in the application layer, they are expected to be a good solution for the end-to-end security problem, which is appearing as one of the important problems in the networks with both wired and wireless sections.

The One Time Biometric Key Generation and Authentication Model for Portection of Paid Video Contents (상용 비디오 콘텐츠 보호를 위한 일회용 바이오메트릭 키 생성 및 인증 모델)

  • Yun, Sunghyun
    • Journal of the Korea Convergence Society
    • /
    • v.5 no.4
    • /
    • pp.101-106
    • /
    • 2014
  • Most peoples are used to prefer to view the video contents rather than the other contents since the video contents are more easy to understand with both their eyes and ears. As the wide spread use of smartphones, the demands for the contents services are increasing rapidly. To promote the contents business, it's important to provide security of subscriber authentication and corresponding communication channels through which the contents are delivered. Generally, symmetric key encryption scheme is used to protect the contents in the channel, and the session key should be upadated periodically for the security reasons. In addition, to protect viewing paid contents by illegal users, the proxy authentication should not be allowed. In this paper, we propose biometric based user authentication and one time key generation models. The proposed model is consist of biometric template registration, session key generation and chanel encryption steps. We analyze the difference and benefits of our model with existing CAS models which are made for CATV contents protection, and also provides applications of our model in electronic commerce area.

States of Art: Watermarking Technology for Electronic Commerce of Digital Contents (디지털 컨텐츠 전자 상거래를 위한 워커마킹 기술의 동향)

  • 최종욱
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 1999.10a
    • /
    • pp.7-30
    • /
    • 1999
  • 현재 방송과 비디오, 신문 등의 매체를 통해 배포되고 있는 컨텐츠를 향후 인터넷을 통해 디지털 유료 서비스하기 위해서는 저작물에 대한 복제와 불법 유통을 막을 수 있는 기술의 개발이 필요하다. 현재 주문형 음악 서비스에서 사용하고 있는 방법은 서비스 제공자에서 사용자까지 전달되는 과정에서 키(Key)를 사용하여 암호화하는 방법이 있으나 일단 적법한 사용자에 의해서 부호화되고 나면 불법 복제 및 유통을 막을 수 없다는 문제점이 있다. 워터마킹 기술은 네트워크를 통해서 전달되는 멀티미디어 컨텐츠 속에 저작권 소유지의 표시를 숨겨두는 기술로서 지적 재산권 분쟁 있을 경우 재산권을 주장할 수 있는 근거가 된다. 즉, 워터마킹 기술은 인터넷을 기반으로 발달하고 있는 영상, 영화, 오디오, 만화 등의 디지털 컨텐츠의 저작권을 보호하기 위해 로고, 상표, 인감, 직인 등의 저작자 정보를 숨겨두는 기술이라고 할 수 있다. 본 논문에서는 최근 빠르게 발달하고 있는 디지털 워터마킹 기술을 소개하고 동향을 분석하여 국내의 워터마킹 기술의 발전 방향을 제시하고자 한다.

  • PDF

Copyright Protection using Encryption of DCT Coefficients and Motion Vector in Video Codec of Mobile Device (모바일 기기내의 비디오 코덱에서 DCT 계수와 움직임 벡터의 암호화를 이용한 저작권 보호)

  • Kwon, Goo Rak;Kim, Young Ro
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.1
    • /
    • pp.41-46
    • /
    • 2008
  • With widespread use of the Internet and improvements in streaming media and compression technology, digital music, video, and image can be distributed instantaneously across the Internet to end-users. However, most conventional Digital Right Management are often not secure and fast enough to process the vast amount of data generated by the multimedia applications to meet the real-time constraints. In this paper, we propose the copyright protection using encryption of DCT coefficients and motion vector in MPEG-4 video codec of mobile device. This paper presents a new Digital Rights Management that modifies the Motion Vector of Macroblock for mobile device. Experimental results indicate that the proposed DRM can not only achieve very low cost of the encryption but also enable separable authentication to individual mobile devices such as Portable Multimedia Player and Personal Digital Assistants. The performance of the proposed methods have low complexity and low increase of bit rate in overhead.

A Study of VPN Performance on HFC Network (HFC망에서의 VPN성능에 관한 연구)

  • 김선희;문종섭;임종인
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.691-700
    • /
    • 2003
  • 어디서나 접속할 수 있는 인터넷의 광역성과 최근 들어 인터넷을 통한 전자상거래의 급진전, 네트웍을 통한 다양한 형태의 원격 접속 확대 등으로 이제 많은 기업들이 통신비가 상대적으로 저렴하면 서도 기밀성이 보장되는 인터넷을 기반으로 하는 Internet Protocol Virtual Private Network(IP VPN) 도입을 서두르고 있다 VPN은 공중망 인프라를 공유하여 구축된 가상 사설망을 의미한다. IP VPN으로 기업은 본사와 지사를 연결하는 Intranet, 협력사와 연결되는 Extranet 그리고 최근 들어 급증하고 있는 이동 근무자와 재택 근무자를 회사에 안전하게 연결시킬 수 있는 원격 접속 등을 경제적으로 구축할 수 있다. 또한 광케이블과 동축케이블이 혼합된 Hybrid Fiber & Coaxial(HFC)망이 초고속인터넷, 디지털방송, 주문형비디오(VOD) 등의 멀티미디어 서비스를 수용하기에 가장 좋은 방안으로 최근 각광을 받고 있다. HFC망은 기존의 CATV망을 기반으로 하므로 신규 투자비가 적게 들면서도 다양한 형태의 고속 데이터 통신이 가능하다. 이에 본 논문에서는 HFC망에서의 IP VPN의 성능을 전송 프로토콜과 암호화 알고리즘을 달리 하면서 어떤 요소가 성능에 얼마나 영향을 주는지와 요소간 상호작용이 어떻게 일어나는지, 또한 어떤 조합으로 VPN 통신을 할 때 가장 좋은 성능을 보이는지를 비교 분석한다.

  • PDF

SVC and CAS Combining Scheme for Support Multi-Device watching Environment (다중기기 시청 환경을 지원하기 위한 SVC와 CAS 결합 기법)

  • Son, Junggab;Lee, Hoonjung;Oh, Heekuck
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.907-910
    • /
    • 2011
  • IPTV나 DTV에서 사용하는 CAS는 하나의 스트리밍으로 하나의 콘텐츠만을 전송하는 환경이지만 SVC와의 결합을 통해 사용자의 다양한 비디오 어플리케이션을 단일 스트리밍으로 지원하도록 개선할 수 있다. 이러한 환경에서는 효율성을 우선적으로 설계하여야 하며, 서비스 등급별 과금 정책을 위해 계층적 키 관리 기법의 적용이 필요하다. 본 논문에서는 CAS에 SVC를 적용함에 있어 발생할 수 있는 문제점들에 대해 살펴보고 CAS환경에서의 SVC 암호화기법에 대해 제안한다. 제안하는 기법의 안전성은 기존 CAS와 단방향 해시 함수의 안전성에 기반하며, 기존 CAS에 비교적 적은 오버헤드로 적용이 가능하다는 장점이 있다.

A Study on Digital Watermarking of MPEG Coded Video Using Wavelet Transform (웨이블릿 변환를 이용한 MPEG 디지털동영상 워터마킹에 관한 연구)

  • Lee, Hak-Chan;Jo, Cheol-Hun;Song, Jung-Won
    • The KIPS Transactions:PartB
    • /
    • v.8B no.5
    • /
    • pp.579-586
    • /
    • 2001
  • Digital watermarking is to embed imperceptible mark into image, video, audio, and text data to prevent the illegal copy of multimedia data. arbitrary modification, and also illegal sales of the copies without agreement of copyright ownership. In this paper, we study for the embedding and extraction of watermark key using wavelet in the luminance signal in order to implement the system to protect the copyright for image MPEG. First, the original image is analyzed into frequency domain by discrete wavelet transform. The RSA(Rivest, Shamir, Aldeman) public key of the coded target is RUN parameter of VLD(variable length coding). Because the high relationship among the adjacent RUN parameters effect the whole image, it prevents non-authorizer not to possess private key from behaving illegally. The Results show that the proposed method provides better moving picture and the distortion more key of insert than direct coded method on low-frequency domain based DCT.

  • PDF

Adaptive Data Hiding Techniques for Secure Communication of Images (영상 보안통신을 위한 적응적인 데이터 은닉 기술)

  • 서영호;김수민;김동욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.5C
    • /
    • pp.664-672
    • /
    • 2004
  • Widespread popularity of wireless data communication devices, coupled with the availability of higher bandwidths, has led to an increased user demand for content-rich media such as images and videos. Since such content often tends to be private, sensitive, or paid for, there exists a requirement for securing such communication. However, solutions that rely only on traditional compute-intensive security mechanisms are unsuitable for resource-constrained wireless and embedded devices. In this paper, we propose a selective partial image encryption scheme for image data hiding , which enables highly efficient secure communication of image data to and from resource constrained wireless devices. The encryption scheme is invoked during the image compression process, with the encryption being performed between the quantizer and the entropy coder stages. Three data selection schemes are proposed: subband selection, data bit selection and random selection. We show that these schemes make secure communication of images feasible for constrained embed-ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of data hiding achieved with the computation requirements imposed on the wireless devices. Experiments conducted on over 500 test images reveal that, by using our techniques, the fraction of data to be encrypted with our scheme varies between 0.0244% and 0.39% of the original image size. The peak signal to noise ratios (PSNR) of the encrypted image were observed to vary between about 9.5㏈ to 7.5㏈. In addition, visual test indicate that our schemes are capable of providing a high degree of data hiding with much lower computational costs.