• Title/Summary/Keyword: 워터마크

Search Result 802, Processing Time 0.03 seconds

Development of Digital Watermark Inserting and Detecting System for MPEG-2 Codec (MPEG-2 Codec에 대한 디지털 워터마크 삽입 및 검출 시스템 개발)

  • Hwang, Seon-Cheol
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.59 no.4
    • /
    • pp.390-394
    • /
    • 2010
  • This paper describes a study on developing an insert and detect system of digital watermark to the MPEG-2 coder and decoder. Digital watermark inserting system substitutes a coefficient among the DCT coefficients for new one. This replacement performs in MPEG-2 PS format. Watermark detecting system analyzes the input data stream of MPEG-2 and detect the probability of occurrence of a specific code or watermarking code. Our inserting system had very high invisibility and the PSNR of the results was 130 dB around. And our detection rate of watermark was over 99% in digital format and over 85% in analog captured format according to the quality of contents.

디지털 오디오의 인티넷 방송 서비스를 위한 저작물 식별 코드 은닉 기술$^{(1)}$

  • 신승원;김종원;최종욱
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2004.05a
    • /
    • pp.103-106
    • /
    • 2004
  • 본 논문은 인터넷을 이용한 방송 서비스에서 저작권 보호 및 저작물 식별을 위한 고유 식별 정보(unique identification)를 삽입, 추출하는 기술을 제안한다. 인터넷을 통한 방송 서비스의 활성화를 위해서는 저작권의 보호와 저작물의 불법 사용 방지, 저작물에 대한 저작권료 지불, 그리고 차후에 불법 사용자의 적발 등을 할 수 있는 기술이 필요하다. 본 논문에서 제안하는 기술은 사용자 관련 정보와 음악의 식별 정보를 저작물에 삽입하여 다운로드 받은 음악 파일이나 또는 청취 중에 녹음한 음악 파일의 불법 복제를 막는 방법이다. 저작물을 불법으로 유통시킬 경우에 유통된 음악 파일에서 삽입된 식별코드를 추출하여 음악 파일의 불법 유통경로를 추적하여 불법 사용자를 적발할 수 있도록 하였다. 이러한 기능을 만족시키기 위해서 인터넷 서비스에서 널리 이용되는 MP3, AAC, WMA 등과 같은 손실 압축을 거친 이후에도 삽입된 워터마크를 검출할 수 있으며, 일반 사용자들이 손쉽게 접할 수 있는 섞어 신호처리에도 강인한 특성을 갖는 기술을 제안한다.

  • PDF

Illegal apk file detectioning system architecture (불법 복제 앱 전송 탐지 시스템 구조)

  • Kim, Sungmin;Kim, Eunhoe;Choi, Jaeyoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.04a
    • /
    • pp.506-509
    • /
    • 2012
  • 스마트폰이 일반화되면서 앱 시장의 활성화와 함께 불법 앱 배포 및 사용으로 인한 많은 문제들이 발생하고 있다. 본 논문에서는 이러한 불법 앱의 배포를 막고 저작권을 강화하기 위한 하나의 방법으로써 네트워크에서 전송 중인 불법 앱을 탐지하고 신고하는 불법 앱 전송 탐지 시스템을 제안한다. HTTP와 FTP 같이 파일 전송에 많이 사용되는 통신 프로토콜을 대상으로 패킷 스니핑, 분석, 조합 과정을 통해 네트워크로 전송중인 앱 파일을 복원하며, 내부에 삽입된 워터마크를 추출하여 저작권 정보를 확인함으로써 불법 앱 전송 여부를 판단한다. 본 논문에서 제안하는 불법 복제 앱 전송 탐지 시스템은 네트워크 디바이스 수준에서 패킷 스니핑을 수행하여, 불법 앱엽 전송 탐지를 위한 시스템의 성능 저하를 최소화한다. 또한 스니핑한 패킷들을 효율적으로 조합하고 앱 파일 여부를 식별할 수 있는 기준을 제안하며, 중앙 신고 서버를 통한 탐지 결과 확인을 위한 서비스를 제공한다.

Similar Software Code Detection Using Side Channel Leakage in Microcontrollers (단일 부채널 전력 파형을 사용한 마이크로컨트롤러 상에서 소프트웨어 표절 탐지)

  • Kim, Hyun-Jun;Jang, Kyung-Bae;Kim, Kyung-Ho;Seo, Hwa-Jeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.05a
    • /
    • pp.150-153
    • /
    • 2020
  • 부채널 정보를 사용하여 마이크로 컨트콜러 상에서 표절 된 코드를 탐지하는 새로운 방법을 제시한다. 제안 기법은 애플리케이션을 보호하기 위해 추가로 워터 마킹 할 필요가 없이 코드를 실행하는 마이크로 컨트롤러의 유출데이터를 워터 마크로서 사용 할 수 있다. 두 가지 다른 구현의 각각 하나의 부채널 파형에 대한 절대 상관 계수를 기반으로 분석 한다. 어셈블리 언어로 작성된 다양한 테스트 응용 프로그램을 사용 Xmaga128 마이크로 컨트롤러에서 평가하였다. 제안 기법은 어셈블리 코드를 수정하는 공격자에게도 강력하며 코드에 대한 정보와 입력에 대한 접근이 불가능 하여도 탐지가 가능하다.

Video Copyright Protection through Watermarking of Wavelet Transform based on the Frequency (주파수기반 웨이브릿 변환의 워터마킹을 통한 동영상 저작권 보호에 관한 연구)

  • Han, Mi-Ja;Kim, Dan-Hwan;Jung, Chang-Ryul;Jeong, Byeong-Yeol;Lee, Sung-Keun;Koh, Jin-Kwang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.535-539
    • /
    • 2008
  • With the advancement which development and information communication of the computer is quick about lower with multimedia technical diffusion of network base the necessity the use of the digital image technique which is various regarding the protection of sharp increasing multimedia contents raised its head in the social whole. The copyright protection against a multimedia data hazard the authentication techniques it will be able to confirm the content authentication, ownership authentication, illegal copy of the image which stands is demanded. confronts to the water marking technique of existing and the researches the fact that against a picture is most. In this paper, It does not damage the video data. As inserts copyright information and it protects the copyright. It is with a copyright protection which leads the wavelet transform which is a watermark of frequency base from visual system viewpoint in the human being center with it proposes the watermarking technique against a forgery prevention.

  • PDF

A Polyline Watermarking Scheme for GIS Vector Map (GIS 벡터맵 폴리라인 워터마킹 방법)

  • Kim, Jun-Hee;Lee, Suk-Hwan;Kwon, Seong-Geun;Park, Seung-Seob;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.4
    • /
    • pp.582-593
    • /
    • 2010
  • Recently the commercial value of GIS(geographic information system) has been increased with growing application demands of spatial information in life space. Also, GIS has been expanded to the integrated information system that provides the ease access to map information by public users and also the combined service of GIS map data and various multimedia contents. But several security problems of GIS map data have brought up at GIS industries, such as the illegal copy and distribution of GIS map data. Furthermore, the copyright protection of GIS map data has not been researched yet compared with image and video contents. This paper presents a polyline based watermarking scheme for the copyright protection of GIS vector map. The proposed scheme analyzes the structure of vector map and embeds adaptively the watermark by using the distance distribution of polyline components. From experimental results, we verified that the proposed scheme satisfies the invisibility and the robustness of geometrical attacks.

A Study on the Watermarketing of Keyframe-Based for copyright Protection of video (동영상의 저작권 보호를 위한 키 프레임 기반의 워터마킹에 관한 연구)

  • Kim, Dan-Hwan;Oh, Moo-Song
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.1
    • /
    • pp.102-107
    • /
    • 2005
  • With the advancement which development and information communication of the computer is quick about lower with multimedia technical diffusion of network base the necessity the use of the digital image technique which is various regarding the protection of sharp increasing multimedia contents raised its head in the social whole. the copyright protection against a multimedia data hazard the authentication techniques it will be able to confirm the content authentication, ownership authentication, illegal copy of the image which stands is demanded. confronts to the water marking technique of existing and the researches the fact that against a picture is most. In this paper, It does not damage the video data which is a multimedia contents not to be, it inserts copyright information and it protects the right of ownership. It is with a copyright protection which leads the wavelet transform which is a watermark of frequency base from visual system viewpoint in the human being center with it proposes the watermarking technique against a forgery prevention.

3D Mesh Watermarking Using Projection onto Convex Sets (볼록 집합 투영 기법을 이용한 3D 메쉬 워터마킹)

  • Lee Suk-Hwan;Kwon Seong-Geun;Kwon Ki-Ryong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.2 s.308
    • /
    • pp.81-92
    • /
    • 2006
  • This paper proposes a robustness watermarking for 3D mesh model based on projection onto convex sets (POCS). After designing the convex sets for robustness and invisibility among some requirements for watermarking system, a 3D-mesh model is projected alternatively onto two constraints convex sets until the convergence condition is satisfied. The robustness convex set are designed for embedding the watermark into the distance distribution of the vertices to robust against the attacks, such as mesh simplification, cropping, rotation, translation, scaling, and vertex randomization. The invisibility convex set are designed for the embedded watermark to be invisible. The decision values and index that the watermark was embedded with are used to extract the watermark without the original model. Experimental results verify that the watermarked mesh model has invisibility and robustness against the attacks, such as translation, scaling, mesh simplification, cropping, and vertex randomization.

e-Passport Security Technology using Biometric Information Watermarking (바이오정보 워터마킹을 이용한 전자여권 보안기술)

  • Lee, Yong-Joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.115-124
    • /
    • 2011
  • There has been significant research in security technology such as e-passport standards, as e-passports have been introduced internationally. E-passports combine the latest security technologies such as smart card, public key infrastructure, and biometric recognition, so that these technologies can prevent unauthorized copies and counterfeits. Biometric information stored in e-passports is the most sensitive personal information, and it is expected to bring the highest risk of damages in case of its forgery or duplication. The present e-passport standards cannot handle security features that verify whether its biometric information is copied or not. In this paper, we propose an e-passport security technology in which biometric watermarking is used to prevent the copy of biometric information in the e-passport. The proposed method, biometric watermarking, embeds the invisible date of acquisition into the original data during the e-passport issuing process so that the human visual system cannot perceive its invisibly watermarked information. Then the biometric sample, having its unauthorized copy, is retrieved at the moment of reading the e-passport from the issuing database. The previous e-passport security technology placed an emphasis on both access control readers and anti-cloning chip features, and it is expected that the proposed feature, copy protection of biometric information, will be demanded as the cases of biometric recognition to verify personal identity information has increased.

Image Watermarking for Copyright Protection of Images on Shopping Mall (쇼핑몰 이미지 저작권보호를 위한 영상 워터마킹)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.4
    • /
    • pp.147-157
    • /
    • 2013
  • With the advent of the digital environment that can be accessed anytime, anywhere with the introduction of high-speed network, the free distribution and use of digital content were made possible. Ironically this environment is raising a variety of copyright infringement, and product images used in the online shopping mall are pirated frequently. There are many controversial issues whether shopping mall images are creative works or not. According to Supreme Court's decision in 2001, to ad pictures taken with ham products is simply a clone of the appearance of objects to deliver nothing but the decision was not only creative expression. But for the photographer's losses recognized in the advertising photo shoot takes the typical cost was estimated damages. According to Seoul District Court precedents in 2003, if there are the photographer's personality and creativity in the selection of the subject, the composition of the set, the direction and amount of light control, set the angle of the camera, shutter speed, shutter chance, other shooting methods for capturing, developing and printing process, the works should be protected by copyright law by the Court's sentence. In order to receive copyright protection of the shopping mall images by the law, it is simply not to convey the status of the product, the photographer's personality and creativity can be recognized that it requires effort. Accordingly, the cost of making the mall image increases, and the necessity for copyright protection becomes higher. The product images of the online shopping mall have a very unique configuration unlike the general pictures such as portraits and landscape photos and, therefore, the general image watermarking technique can not satisfy the requirements of the image watermarking. Because background of product images commonly used in shopping malls is white or black, or gray scale (gradient) color, it is difficult to utilize the space to embed a watermark and the area is very sensitive even a slight change. In this paper, the characteristics of images used in shopping malls are analyzed and a watermarking technology which is suitable to the shopping mall images is proposed. The proposed image watermarking technology divide a product image into smaller blocks, and the corresponding blocks are transformed by DCT (Discrete Cosine Transform), and then the watermark information was inserted into images using quantization of DCT coefficients. Because uniform treatment of the DCT coefficients for quantization cause visual blocking artifacts, the proposed algorithm used weighted mask which quantizes finely the coefficients located block boundaries and coarsely the coefficients located center area of the block. This mask improves subjective visual quality as well as the objective quality of the images. In addition, in order to improve the safety of the algorithm, the blocks which is embedded the watermark are randomly selected and the turbo code is used to reduce the BER when extracting the watermark. The PSNR(Peak Signal to Noise Ratio) of the shopping mall image watermarked by the proposed algorithm is 40.7~48.5[dB] and BER(Bit Error Rate) after JPEG with QF = 70 is 0. This means the watermarked image is high quality and the algorithm is robust to JPEG compression that is used generally at the online shopping malls. Also, for 40% change in size and 40 degrees of rotation, the BER is 0. In general, the shopping malls are used compressed images with QF which is higher than 90. Because the pirated image is used to replicate from original image, the proposed algorithm can identify the copyright infringement in the most cases. As shown the experimental results, the proposed algorithm is suitable to the shopping mall images with simple background. However, the future study should be carried out to enhance the robustness of the proposed algorithm because the robustness loss is occurred after mask process.