• Title/Summary/Keyword: 핑거프린트

Search Result 91, Processing Time 0.025 seconds

Detection of Colluded Multimedia Fingerprint by Neural Network (신경회로망에 의한 공모된 멀티미디어 핑거프린트의 검출)

  • Noh Jin-Soo;Rhee Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.4 s.310
    • /
    • pp.80-87
    • /
    • 2006
  • Recently, the distribution and using of the digital multimedia contents are easy by developing the internet application program and related technology. However, the digital signal is easily duplicated and the duplicates have the same quality compare with original digital signal. To solve this problem, there is the multimedia fingerprint which is studied for the protection of copyright. Fingerprinting scheme is a techniques which supports copyright protection to track redistributors of electronic inform on using cryptographic techniques. Only regular user can know the inserted fingerprint data in fingerprinting schemes differ from a symmetric/asymmetric scheme and the scheme guarantee an anonymous before recontributed data. In this paper, we present a new scheme which is the detection of colluded multimedia fingerprint by neural network. This proposed scheme is consists of the anti-collusion code generation and the neural network for the error correction. Anti-collusion code based on BIBD(Balanced Incomplete Block Design) was made 100% collusion code detection rate about the average linear collusion attack, and the hopfield neural network using (n,k)code designing for the error bits correction confirmed that can correct error within 2bits.

Cheking System using FingerPrint method (핑거프린트 기법을 이용한 출결 시스템)

  • Lee, SunMin;Kim, JiEun;Moon, Nammee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.10a
    • /
    • pp.129-130
    • /
    • 2016
  • 실내 위치인식 기술인 핑거 프린트 기법을 이용해 출결을 확인함으로써 짧은 수업시간에 신속하고 정확하게 출석을 확인하는 것이 본 연구의 목적이다. 부정 출석을 막기 위해 핑거프린트를 이용한 실내 위치인식으로 학생들이 수업장소에 와있는지를 확인하고, 대리 출석을 막기 위해 출석확인을 하는 모바일기기의 고유 정보를 가져와 하나의 모바일 기기에서 한 번의 출석확인만 가능하도록 하였다. 또한 출석체크만 하고 수업을 빠져나가는 것을 방지하기 위해 수업 장소에 머무른 시간 또한 체크를 하였다. 향후 출석 시스템만이 아니라 출석 데이터로 출석이 성적에 미치는 영향 등 다양한 방면으로 활용될 수 있을 것이라 생각한다.

Security Analysis and Improvement of an Anonymous Asymmetric Fingerprinting Scheme with Trusted Third Party (익명적 비대칭 핑거프린팅 기법의 보안 취약성 분석 및 개선 방안)

  • Kwon, Sae-Ran
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.5
    • /
    • pp.396-403
    • /
    • 2009
  • An anonymous asymmetric fingerprinting protocol combined with watermarking techniques, is one of the copyright protection technologies keeping both right of a seller and that of a buyer, where a seller and an anonymous buyer perform such a protocol that employs various cryptographic tools in order that the seller does not know the exact watermarked copy that the buyer receives, while inserting an invisible non-removable fingerprint i.e., each different unique watermark, into each copy of the digital content to be sold. In such a protocol innocent buyers are kept anonymous during transactions, however, the unlawful reseller is unambiguously identified with a real identity as a copyright violator. In 2007, Yong and Lee proposed an anonymous asymmetric fingerprinting scheme with trusted third party. In this paper we point out the weakness of their scheme such as: the buyer with intention can remove the fingerprint in the watermarked content, because he/she can decrypt the encrypted fingerprint with a symmetric key using man-in-the-middle-attack; a real identity of a buyer can be revealed to the seller through the identification process even though he/she is honest. Furthermore, we propose an improved secure and efficient anonymous asymmetric fingerprinting scheme which enables to reduce the number of communication between the participants.

A Preliminary Cut-off Indoor Positioning Scheme Using Beacons (비콘을 활용하여 실내위치 찾는 사전 컷-오프 방식)

  • Kim, Dongjun;Park, Byoungkwan;Son, Jooyoung
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.2
    • /
    • pp.110-115
    • /
    • 2017
  • We propose a new indoor positioning algorithm named Cut-off algorithm. This algorithm cuts off candidates of beacons and reference points in advance, before looking for K neighbor reference points which are guessed to be closest to the user's actual location. The algorithm consists of two phases: off-line phase, and on-line phase. In the off-line phase, RSSI and UUID data from beacons are gathered at reference points placed in the indoor environment, and construct a fingerprint map of the data. In the on-line phase, the map is reduced to a smaller one according to the RSSI data of beacons received from the user's device. The nearest K reference points are selected using the reduced map, which are used for estimating user's location. In both phases, relative ranks of the peak signals received from each beacon are used, which smoothen the fluctuations of the signals. The algorithm is shown to be more efficient in terms of accuracy and estimating time.

Performance Analysis of Indoor Localization Algorithm Using Virtual Access Points in Wi-Fi Environment (Wi-Fi 환경에서 가상 Access Point를 이용한 실내 위치추정 알고리즘의 성능분석)

  • Labinghisa, Boney;Lee, Dong Myung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.3
    • /
    • pp.113-120
    • /
    • 2017
  • In recent years, indoor localization has been researched for the improvement of its localization accuracy capability in Wi-Fi environment. The fingerprint and RF propagation models has been the main approach in determining indoor positioning. With the use of fingerprint, a low-cost, versatile localization system can be achieved without the use of external hardware. However, only a few research have been made on virtual access points (VAPs) among indoor localization models. In this paper, the idea of indoor localization system using fingerprint with the addition of VAP in Wi-Fi environment is discussed. The idea is to virtually add APs in the existing indoor Wi-Fi system, this would mean additional virtually APs in the network. The experiments of the proposed algorithm shows the positive results when 2VAPs are used compared with only APs. A combination of 3APs and 2VAPs in the 3rd case had the lowest average error of 3.99 among its 4 scenarios.

Video Fingerprinting System through Zero-based Code Modulation Technique (제로기반 코드 변조 기법을 통한 비디오 핑거프린팅 시스템)

  • Choi Sun Young;Lee Hae-Yeoun;Kang In Koo;Lee Heung-Kyu
    • The KIPS Transactions:PartB
    • /
    • v.12B no.4 s.100
    • /
    • pp.443-450
    • /
    • 2005
  • Digital fingerprinting is a contents-protection technique, where customer information is inserted into digital contents. Fingerprinted contents undergo various attacks. Especially, attackers can remove easily the inserted fingerprint by collusion attacks, because digital fingerprinting inserts slightly different codes according to the customers. Among collusion attacks, averaging attack is a simple, fast, and efficient attack. In this paper, we propose a video fingerprinting system that is robust to the averaging attack. In order to achieve code efficiency and robustness against the averaging attack, we adopt anti-collusion code (fingerprint code) from GD-PBIBD theory. When the number of users is increased, the size of fingerprint code also grows. Thus, this paper addresses a zero-based code modulation technique to embed and detect this fingerprint code efficiently. We implemented a blind video fingerprinting system based on our proposed technique and performed experiments on various colluding cases. Based on the results, we could detect most of colluders. In the worst case, our scheme could trace at least one colluder successfully.

DRM Implementation by Multimedia Fingerprint (멀티미디어 핑거프린트에 의한 DRM 구현)

  • Rhee, Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.3
    • /
    • pp.50-56
    • /
    • 2009
  • Recently, according to the product variety of multimedia content some problems are occurred as like an illegal copying, an illegal distribution and a copyright infringement etc. So, for the solution of these problems, some methods were proposed as like watermarking which inserts the information of copyright to the content and the cipher for authentication to DRM which prevents an illegal copying using RSA. In this paper, the multimedia fingerprint based on BIBD code is inserted to the bit-plane of the image content for DRM with RSA, and while the decoding processing. The experiment is operated with the consideration of the image transmission and the transformation. As a result it confirmed that the multimedia fingerprint code inserted in image is detected 60% upper at AWGN 7dB and detected completely 100% at AWGN 10dB upper on PSNR 30, 40, 70 and 80 of Stirmark attacks.

A Parallel Implementation of the Order-Preserving Multiple Pattern Matching Algorithm using Fingerprints of Texts (텍스트의 핑거프린트를 이용한 순위다중패턴매칭 알고리즘 병렬 구현)

  • Park, Somin;Kim, Youngho;Sim, Jeong Seop
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.11a
    • /
    • pp.57-60
    • /
    • 2020
  • 순위다중패턴매칭문제는 길이가 n인 텍스트 T와 패턴들의 집합 P' = {P1,P2…,Pk}가 주어졌을 때, P'에 속하는 패턴들과 상대적인 순위가 일치하는 T의 모든 부분문자열들의 위치를 찾는 문제이다. P'에서 가장 짧은 패턴의 길이가 m, 가장 긴 패턴의 길이를 $\bar{m}$, 모든 패턴들의 길이의 합을 M, q개의 연속된 문자들을 q-그램이라 할 때, 기존에 텍스트의 핑거프린트를 이용하여 순위다중패턴매칭문제를 $O(q!+nqlogq+Mlog\bar{m}+nM)$ 시간에 해결하는 알고리즘이 제시되었다. 본 논문에서는 텍스트의 핑거프린트를 활용하여 O(max(q!,M,n))개의 스레드를 이용하여 순위다중패턴매칭문제를 평균적으로 $O(\bar{m}+qlogq+n/q!)$ 시간에 해결하는 병렬 구현 방법을 제시한다. 실험 결과, n = 1,000,000, k = 1,000, m = 5, q = 3일 때, 본 논문에서 제시하는 병렬 구현 방법은 기존의 순차 알고리즘보다 약 19.8배 빠르게 수행되었다.

Design and implementation of Image Content Tracking System using Fingerprinting (핑거프린팅을 이용한 이미지 콘텐츠 추적시스템 설계 및 구현)

  • 서영호;김원겸;이선화;황치정
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.41 no.5
    • /
    • pp.99-109
    • /
    • 2004
  • This paper proposes a new method for tracking image contents, which are re-distributed on the Internet using a web-robot and fingerprinting scheme. The fingerprinting is an extended technique of watermarking and embeds identity of the customer into the content as a fingerprint in a way that is very difficult to erase. The fingerprint in the content can be used widely in the field of the copyright protection technique because it identifies the content itself and includes the information about the original customer. In this paper we discuss an active image tracking system using a web-robot and fingerprinting scheme. In the proposed system the information of the original customer is embedded as a fingerprint into the image content before distribution and also stored into DB. The distributed contents are collected by the web-robot and fingerprinting information is extracted from the contents. Finally the identifying of contents is done by comparing the extracted fingerprint with the selling history of the content.

A Design and Implementation of Positioning System Using Characteristics of Outdoor Environments and Weak Signal Strength (저준위 신호세기와 실외 환경 특징을 활용한 측위 시스템 설계 및 구현)

  • Lee, Hyoun-Sup;Kim, Jin-Deog
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.11
    • /
    • pp.2411-2418
    • /
    • 2011
  • The most typically utilized positioning method in the existing indoor WPS that is a positioning method utilizing distributed wireless network is the finger print. Its positioning is carried out by calculating the difference between the AP information map and WiFi AP signal collected. However, there are problems like low accuracy and high cost when the existing method and the radio map formation are applied to outdoors. In this paper, the characteristics of the existing WPS are surveyed and their problems are examined. In addition, we propose a new WPS using weak signal and a method to construct radio map in order to solve the above problems. And then, the results of experimental test will be analyzed.