• Title/Summary/Keyword: 콘텐츠보호

Search Result 1,169, Processing Time 0.027 seconds

Secret Sharing Scheme using Gray Code based on Steganography (스테가노그라피 기반에서 그레이코드를 사용한 비밀공유 기법)

  • Kim, Cheon-Shik;Yoon, Eun-Jun;Hong, You-Sik;Kim, Hyoung-Joong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.1
    • /
    • pp.96-102
    • /
    • 2009
  • Due to the rapid growth of the Internet, it is possible to distribute the digital content efficiently. However, the need for image data protection and secret communication technique is also on the rise because of an infringement of the copyright by malicious attackers. Shamir and Lin-Tsai proposed simple secret image encryption algorithms based on the principle of secret sharing, respectively. However, their secret sharing schemes have a serious problem which can be declined the image quality and it is possible for third party to know embed information. In this paper, we propose a new secret sharing scheme using gray code that can be increased the image quality and security. As a result of our experiment, the proposed scheme is not only shown of good image quality and but also provide enhanced security compare with Shamir and Lin-Tasi's schemes.

A Robust Blind Watermarking for Digital Image Using DWT According to its Resolution (해상도에 따른 DWT 기반 디지털 영상의 강인성 블라인드 워터마킹)

  • Lee, Yongseok;Seo, Youngho;Kim, Dongwook
    • Journal of Broadcast Engineering
    • /
    • v.20 no.6
    • /
    • pp.888-900
    • /
    • 2015
  • This paper proposes a blind watermarking scheme using DWT satisfying robustness, invisibility, and security to protect the ownership of digital image contents. This scheme does not determine any watermarking position by local image information. It rather inserts the watermark information into all the four lowest frequency subbands after transforming the host image by n-level 2-dimensional DWT, depending on, the sizes of the host image and the watermark data. Its watermark insertion methodology uses some weighting factors according to the kind of the subband and its energy level to adjust the invisibility and the robustness of the watermark. This method is experimented for various pixel-value change attacks and geometric attacks with various images having different resolutions and aspect ratios. With the experimental results and by comparing with existing methods, we show that the proposed method has a great deal of general usage with good watermark invisibility and good robustness against attacks.

A Study on Content Protection Framework for E-Book DRM-Agnostic based on Readium SDK (Readium SDK 기반 전자책 DRM의 호환을 위한 콘텐츠 보호 프레임워크에 관한 연구)

  • Kim, Tae-Hyun;Yun, Hui-Don;Kang, Ho-Gab;Cho, Seong-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.7-14
    • /
    • 2016
  • In order to guarantee the compatibility of e-Book viewers based on EPUB 3, IDPF launched Readium SDK v1.0 in January, 2015, which was followed by research on the implementation of Readium LCP specifications for user-friendly DRM functions. The complexity of the Readium SDK, however, makes difficulties in interlocking Readium SDK with LCP modules. Moreover, from the perspective of the Readium SDK, which tries to maintain the architecture, independently of any specific DRM technologies, the strong interlock with LCP, as a one DRM, is not desirable. This study represents a Content Protection Framework Model for compatibility of Readium-SDK-based e-Book DRM in order to hide the complexity of Readium SDK and implement an easy interlock between plural DRM and Readium SDK.

The Design and Implementation of Conditional Access Authentication and Management System for IPTV Service (IPTV 서비스를 위한 수신권한 인증 및 관리 시스템 설계 및 구현)

  • Cho, Yong-Soon;Jin, Du-Seok;Choi, Bong-Kyu;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.516-519
    • /
    • 2008
  • Currently broadcasting and telecommunication has integrated, And IPTV Service has appeared who called TPS(Triple Play Service) which integrated with broadcasting, telecommunication and Phone Service. IPTV provide broadcasting service and VOD(Video on Demand) service, and it must be satisfied digital content security. For this condition, IPTV Forum working on standardization of interface for digital content security. The Security solution for broadcasting and VOD are CAS(Conditional Access System) and DRM(Digital Rights Management). But these solutions manufactured by many vendors, so there is no inter-operablity. And after finished standardization of interface for CAS and DRM system, the problem of inter-operability with them will be issued. For this reason, Rights management system which possible to operate independently with platform is necessary. In this paper, To protect multimedia digital content, we designed and implemented Conditional Access Management System.

  • PDF

Digital License Prototype for Copyright Management of Software Source Code (소프트웨어 소스 코드의 저작권 관리를 위한 디지털 라이센스 프로토타입)

  • Cha, Byung-Rae;Jeong, Jong-Geun;Oh, Soo-Lyul
    • Journal of Internet Computing and Services
    • /
    • v.7 no.5
    • /
    • pp.95-108
    • /
    • 2006
  • The digital contents expand into software source code and maintenance of technology and IPR about source code have a very important meaning to international competition, The recognition about software security is very low specially among these Intellectual Property Rights. On occurring disputation property, we have to prove the fact, there is a problem to discriminate the original source code, Also, it is hard to accurate decision that is correct to complexity and the lack of read and understand ability even if software is reproduced. In this paper, we don't enforce distinction about software reproduction by one individual code unit. And we developed digital license prototype of XML that can distinguish reproduction based on structural conformability of whole source codes. Software has Context Free Grammar in structure and presents BNF notation type, it is apt to present hierarchical structure. Then, we can express architecture of software source code by hierarchical structure to discriminate structural conformability. In this paper, we make a study of the digital licence prototype for discriminate the original source code. Reserved words of software source code by parsing express to XML file that have hierarchical structure. Then, we can express architecture of software source code by tree structure form instead of complex source code.

  • PDF

A Study for Forest Research using Airborne Laser Scanning (항공레이저측량을 이용한 산림조사 방법에 관한 연구)

  • Kim, Eun-Young;Wie, Gwang-Jae;Cho, Heung-Muk;Yang, In-Tae
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.28 no.3
    • /
    • pp.299-304
    • /
    • 2010
  • Depending on the progress of the surveying and information processing technology, the rapidly developing field of spatial information and the 3D real world spatial information for a variety of content on the computer was able to easily access. In this research, to study on the spot or to use aerial photographs to measure trees of the acquired data, calculate the trees height, forest area and capacity, determine the distribution of the density of acquired points in the forest and analyze accurate and objective information was acquired. The United States, Canada and so on through the capacity of trees biomass, forest resource analysis, time series monitoring, wildfire behavior modeling and applied research and has been declared. During worldwide is increasing interest in forest resources. In nationally, extensive research and analysis of the forest consists of the correct management and protection of forest resources to be effective.

A Study of Interception for a Spam Attack of VoIP Service (VoIP서비스의 스팸 공격에 대한 차단 연구)

  • Lee, In-Hee;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.241-250
    • /
    • 2006
  • Regarding a spam attack and the interception that a spinoff is largest among weakness of VoIP service at these papers study. Write scenario of a spam attack regarding VoIP service, and execute Call spam, Instant Messaging spam, Presence spam attack. A spam attack is succeeded in laboratories, and prove, and confirm damage fact of a user in proposals of a spam interception way of VoIP service, 1) INVITE Request Flood Attack 2) Black/White list, 3) Traceback, 4) Black Hole-Sink Hole, 5) Content Filtering, 6) Consent based Communication, 7) Call act pattern investigation, 8) Reputation System Propose, and prove. Test each interception plan proposed in VoIP networks, and confirm security level of a spam interception. Information protection of VoIP service is enlarged at WiBro, BcN, and to realize Ubiquitous Security through result of research of this paper contribute, and may make.

  • PDF

Policies of Broadcasting and Telecommunication In Smart Media Convergence Age: Focus on the Policy Paradigm and Public Relations Strategies for Dynamic Quality of Life (스마트미디어융합시대 방송통신정책: 삶의 질을 위한 정책 패러다임과 정책 PR을 중심으로)

  • Park, Sung-Ho
    • Journal of Digital Convergence
    • /
    • v.9 no.5
    • /
    • pp.99-111
    • /
    • 2011
  • Nowadays, the rapid progress and worldwide use of smart-media(SNS) has resulted in coming of the smart media convergence age. In practice, however, the effectiveness of smart media convergence society is limited by the difficulties of using it, which include accessibility, waiting for loading, clutter, old information, privacy risks, expensive communication, etc. The conquest of these difficulties must be policy target of broadcasting and telecommunication for high quality of communication life. From this perspective, this paper proposes a new policy of broadcasting and telecommunication based on the dynamic quality of life for the smart media convergence society. This smart convergence policy will not promote only the development and production of smart media contents but also its stable supply and it will secure the accessibility and privacy. In conclusion, this paper reveals that the components of quality of life are important elements of broadcasting and communication policies which will eventually lead to the popular use of smart media and enhance its quality.

Efficiency Analysis of Government Budget to HRD Program in the field of Information Technology : IT Research Center Case (정보통신분야 HRD사업에 대한 정부예산 지원의 효율성 분석 : 대학의 IT연구센터를 중심으로)

  • Lee, Jung-Mann;Cheon, Won-Suk
    • Journal of Digital Convergence
    • /
    • v.10 no.4
    • /
    • pp.55-62
    • /
    • 2012
  • This paper analyze the DEA(Data Envelopment Analysis) efficiency of government budget to HRD program(ITRC) and correlation and regression between its inputs and outputs in the field of information technology. First, empirical results show that the relationship between the supporting period of government budget and scientific research & HRD outputs is respectively irrelevant. Second, another finding is that the relationship between government budget and HRD output is positive. Finally, DEA efficiency analysis implicates that SW/digital contents, digital TV, information security, intelligence robot, next generation PC, next generation mobile telecommunication, home network, mathematics, IT SoC are more efficient than any other technology fields.

Automated Driving Car and Changes of Media Industry (자율주행차와 미디어 산업 변화)

  • Do, Joonho;Kim, Hee-Kyung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.5
    • /
    • pp.15-23
    • /
    • 2020
  • Automated driving car is drawing attention as a seminal service representing 4th industrial revolution era based on 5G network, AI, IOT and sensor technology. automated driving car is expected to evolve into the final level which does not require driver's input. Drivers are able to consume new additional time in private space. Many industries started to compete to control these time and space. Media industry is expecting quite big change due to the introduction of automated driving cars. This research examines the impact of the media industry and social & institutional issues of automated driving cars based on depth interviews of experts. The introduction of automated driving cars is giving new opportunity for media industry as contents provider. Telcos and IT corporations are expected to compete each other to get the control of infotainment systems of automated driving cars. The reform of current regulations regarding car driving is pointed as important task to protect private information and the introduction of automated driving cars.