• Title/Summary/Keyword: Collusion

Search Result 120, Processing Time 0.026 seconds

A New Video Watermarking Scheme Resistant to Collusion and Synchronization Attacks

  • Kim, Ki-Jung
    • International Journal of Contents
    • /
    • v.5 no.2
    • /
    • pp.32-37
    • /
    • 2009
  • A new video watermarking scheme with robustness against collusion and synchronization attacks is presented. We propose to embed only a few copies of the watermark along the temporal axis into frames, which are located at the borders of each two different plotlines of the video. As a result, each change of the video plotline is transformed into pulse, which is used for watermark embedding and extraction. In addition, since we embed a watermark only into a small number of frames, the distortions of the video are reduced to minimum. Experimental results show the robustness of the proposed scheme.

An Empirical Analysis on the Price Effects of Fuel Surcharge Collusion in Air Cargo Industry (항공화물 유류할증료 담합의 가격효과에 대한 실증분석)

  • Sonn, Yang-Hoon;Jeong, Jinook
    • Environmental and Resource Economics Review
    • /
    • v.22 no.4
    • /
    • pp.727-757
    • /
    • 2013
  • This paper estimates the effects of Air Cargo companies' fuel surcharge collusion on the final airfreight prices. We show that the final prices have not been generally higher than the 'but-for prices,' and even been significantly lower for some companies. We analyze the possible reasons for such findings, and conclude that the collusion on fuel surcharges has not been successful due to the oil price hike in the cartel period. We also find that the oil price elasticities of fuel surcharges are significantly lower than 1.

Detection of Colluded Multimedia Fingerprint by Neural Network (신경회로망에 의한 공모된 멀티미디어 핑거프린트의 검출)

  • Noh Jin-Soo;Rhee Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.4 s.310
    • /
    • pp.80-87
    • /
    • 2006
  • Recently, the distribution and using of the digital multimedia contents are easy by developing the internet application program and related technology. However, the digital signal is easily duplicated and the duplicates have the same quality compare with original digital signal. To solve this problem, there is the multimedia fingerprint which is studied for the protection of copyright. Fingerprinting scheme is a techniques which supports copyright protection to track redistributors of electronic inform on using cryptographic techniques. Only regular user can know the inserted fingerprint data in fingerprinting schemes differ from a symmetric/asymmetric scheme and the scheme guarantee an anonymous before recontributed data. In this paper, we present a new scheme which is the detection of colluded multimedia fingerprint by neural network. This proposed scheme is consists of the anti-collusion code generation and the neural network for the error correction. Anti-collusion code based on BIBD(Balanced Incomplete Block Design) was made 100% collusion code detection rate about the average linear collusion attack, and the hopfield neural network using (n,k)code designing for the error bits correction confirmed that can correct error within 2bits.

Detection of Colluded Multimedia Fingerprint using LDPC and BIBD (LDPC와 BIBD를 이용한 공모된 멀티미디어 핑거프린트의 검출)

  • Rhee Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.5 s.311
    • /
    • pp.68-75
    • /
    • 2006
  • Multimedia fingerprinting protects multimedia content from illegal redistribution by uniquely marking every copy of the content distributed to each user. Differ from a symmetric/asymmetric scheme, fingerprinting schemes, only regular user can know the inserted fingerprint data and the scheme guarantee an anonymous before recontributed data. In this paper, we present a scheme which is the algorithm using LDPC(Low Density Parity Check) for detection of colluded multimedia fingerprint and correcting errors. This proposed scheme is consists of the LDPC block, Hopfield Network and the algorithm of anti-collusion code generation. Anti-collusion code based on BIBD(Balanced Incomplete Block Design) was made 100% collusion code detection rate about the linear collusion attack(average, AND and OR) and LD% block for the error bits correction confirmed that can correct error until AWGN 0dB.

Improving Security and Privacy-Preserving in Multi-Authorities Ciphertext-Policy Attribute-Based Encryption

  • Hu, Shengzhou;Li, Jiguo;Zhang, Yichen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.10
    • /
    • pp.5100-5119
    • /
    • 2018
  • Most of existing privacy-preserving multi-authorities attribute-based encryption schemes (PP-MA-ABE) only considers the privacy of the user identity (ID). However, in many occasions information leakage is caused by the disclosing of his/her some sensitive attributes. In this paper, we propose a collusion-resisting ciphertext-policy PP-MA-ABE (CRPP-MACP-ABE) scheme with hiding both user's ID and attributes in the cloud storage system. We present a method to depict anonymous users and introduce a managerial role denoted by IDM for the management of user's anonymous identity certificate ($AID_{Cred}$). The scheme uses $AID_{Cred}$ to realize privacy-preserving of the user, namely, by verifying which attribute authorities (AAs) obtain the blinded public attribute keys, pseudonyms involved in the $AID_{Cred}$ and then distributes corresponding private keys for the user. We use different pseudonyms of the user to resist the collusion attack launched by viciousAAs. In addition, we utilize IDM to cooperate with multiple authorities in producing consistent private key for the user to avoid the collusion attack launched by vicious users. The proposed CRPP-MACP-ABE scheme is proved secure. Some computation and communication costs in our scheme are finished in preparation phase (i.e. user registration). Compared with the existing schemes, our scheme is more efficient.

Secure Data Management based on Proxy Re-Encryption in Mobile Cloud Environment (모바일 클라우드 환경에서 안전한 프록시 재암호화 기반의 데이터 관리 방식)

  • Song, You-Jin;Do, Jeong-Min
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.4B
    • /
    • pp.288-299
    • /
    • 2012
  • To ensure data confidentiality and fine-grained access control in business environment, system model using KP-ABE(Key Policy-Attribute Based Encryption) and PRE(Proxy Re-Encryption) has been proposed recently. However, in previous study, data confidentiality has been effected by decryption right concentrated on cloud server. Also, Yu's work does not consider a access privilege management, so existing work become dangerous to collusion attack between malicious user and cloud server. To resolve this problem, we propose secure system model against collusion attack through dividing data file into header which is sent to privilege manager group and body which is sent to cloud server and prevent modification attack for proxy re-encryption key using d Secret Sharing, We construct protocol model in medical environment.

Fully Collusion-Resistant Trace-and-Revoke Scheme in Prime-Order Groups

  • Park, Jong-Hwan;Rhee, Hyun-Sook;Lee, Dong-Hoon
    • Journal of Communications and Networks
    • /
    • v.13 no.5
    • /
    • pp.428-441
    • /
    • 2011
  • A trace-and-revoke scheme is a type of broadcast encryption scheme for content protection on various platforms such as pay-per-view TV and DVD players. In 2006, Boneh and Waters (BW) presented a fully collusion-resistant trace-and-revoke scheme. However, a decisive drawback of their scheme is to require composite-order groups. In this paper, we present a new trace-and-revoke scheme that works in prime-order groups. Our scheme is fully collusion-resistant and achieves ciphertexts and private keys of size O($\sqrt{N}$) for N users. For the same level of security, our scheme is better than the BW scheme in all aspects of efficiency. Some superior features include 8.5 times faster encryption, 12 times faster decryption, and 3.4 times shorter ciphertexts. To achieve our goal, we introduce a novel technique where, by using asymmetric bilinear maps in prime-order groups, the cancellation effect same as in composite-order groups can be obtained.

A Study on the Realization of the Actuality Represented in Ayu Utami's Saman (『사만』에 나타난 아유 우따미의 현실인식에 관한 고찰)

  • Kim, Jang Gyem
    • The Southeast Asian review
    • /
    • v.22 no.2
    • /
    • pp.171-199
    • /
    • 2012
  • Saman, a novel written by Ayu Utami, has been recognized as the symbol of the politico-social changes, which began to occur since the collapse of Suharto' New Order regime in 1998. In the novel, Ayu Utami showed the spirits of resistance against various absurd socio-political circumstances during the New Order era such as pressure on discussion, abuse of power, politics-business collusion, patriarchism, and suppression of gender. In representing those spirits, Ayu Utami used unconventional structure-making, fresh feedback and multilayered descriptions of the figures, which brought her a fame as the pioneer of the Fragrant Literature (Angkatan Wangi or chick-lit). Ayu Utami particularly criticized that, under the name of sustaining the national integrity and identity, the New Order regime enhanced patriarchal system, which consequently infringed gender equality and women's rights to self-determination. In addition, Ayu Utami argued that the abuse of power and politics-business collusion, which were prevalent during the New Order period, destroyed lives of the masses and the Indonesian society.

A Test of Individual Firm's Collusive Behavior: The Case of Purchase Price Fixing in the Iron Scrap Market (담합 사례 연구: 철스크랩 구매가격 담합 사건에서 개별 기업의 담합 실행 여부에 대한 실증적 검증)

  • Yangsoo Jin
    • Journal of Industrial Convergence
    • /
    • v.22 no.5
    • /
    • pp.11-21
    • /
    • 2024
  • In the steel industry, there is a perception that "collusion has become a long-standing practice" and it is expected that the authorities' legal response to collusion will be strengthened in the future. This necessarily requires improving the accuracy of the legal response, the most important of which is to accurately identify whether the allegedly colluding firms actually did collude. This study focuses on the recent iron scrap price-fixing case and examines whether a single accused firm actually engaged in price-fixing in a situation where there is a mix of firms that acted independently of the collusion and firms that actually engaged in price-fixing. The results of the analysis allow us to infer that the accused steelmaker did not actually collude, which is consistent with the authorities' final judgment against the steelmaker. In the real world, some collusions are carried out by only a subset of firms in a market, and in these cases, there are often disputed firms as to whether or not they carried out the collusion. This study can serve as an analytic guide for industries, including the steel industry, to verify the behavior of individual firms, especially those whose collusive practices are disputed.

The Political Economy of Multilateral Cooperations in the Management of Renewable Resources : Fisheries Resources case (갱생자원의 다자간 협력의 정치경제 :수산자원의 경우)

  • Kim, Eun-Chae
    • The Journal of Fisheries Business Administration
    • /
    • v.39 no.1
    • /
    • pp.115-132
    • /
    • 2008
  • This study raises the question about why do many international fisheries organizations or regional fisheries agreements come into existence, sustain, and develop prior to the internationally recognized institution such as United Nations Convention on the Law of the Sea(UNCLOS). In oder to solve the problem, I will investigate the characteristics of fisheries as renewable resources and propose the collusion model where it is based on the cost-benefit analysis. Especially, if once a fooall large number of fishing is implemented, they are immediately depleted. Consequently they are extinct and no longer exploitable. Thus each interest nations or participants will be better off if they are cooperative and will be worse off if they are competitive or noncooperative in a resource management. Therefore, many of the internationally recognized fisheries institutions and agreements have been made and developed in these days.

  • PDF