• Title/Summary/Keyword: Contents Protection

Search Result 1,058, Processing Time 0.025 seconds

IPMP system for a digital contents copyright protection (디지털 콘텐츠 저작권 보호를 위한 IPMP 시스템)

  • Kim, Chang-Su;Yoo, Sung-Jae;Choi, Il-Sun;Song, Jung-Young;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.409-412
    • /
    • 2005
  • A digital content have been utilized extensively without being limited to one territory of communication, computer, broadcasting, Mobile etc. A digital contents industry have been raised to a key point industry of a knowledge information society. An information infra setup of a global unit was processing to the development of Internet therefor copyright protection a digital contents and system for the officer have been desired. Like this, according as digital contents do fetters to MPEG-4 is circulated, copyright problem was risen. So, people had a lot of interests to protect and manage copyright. Hereupon, MPEG of the IS0/IEC established IPMP(Intellectual Property Management and Protection) standard, and supplements and corrects continuously standard. Therefore, existing system does fetters to MPEG-4 need system that process IPMP information. Hereupon. in this paper, designed system module that is processed by IPMP extension standard that progress now, and embodied copyright protection and management system that user can insert and update IPMP information efficiently within whole or specification part of MPEG-4 digital contents.

  • PDF

Biological Infectious Watermarking Model for Video Copyright Protection

  • Jang, Bong-Joo;Lee, Suk-Hwan;Lim, SangHun;Kwon, Ki-Ryong
    • Journal of Information Processing Systems
    • /
    • v.11 no.2
    • /
    • pp.280-294
    • /
    • 2015
  • This paper presents the infectious watermarking model (IWM) for the protection of video contents that are based on biological virus modeling by the infectious route and procedure. Our infectious watermarking is designed as a new paradigm protection for video contents, regarding the hidden watermark for video protection as an infectious virus, video content as host, and codec as contagion medium. We used pathogen, mutant, and contagion as the infectious watermark and defined the techniques of infectious watermark generation and authentication, kernel-based infectious watermarking, and content-based infectious watermarking. We experimented with our watermarking model by using existing watermarking methods as kernel-based infectious watermarking and content-based infectious watermarking medium, and verified the practical applications of our model based on these experiments.

The Undeniable Digital Multi-signature Scheme Suitable for Joint Copyright Protection on Digital Contents (디지털 콘텐츠 공동 저작권 보호에 적합한 부인봉쇄 디지털 다중서명 기법)

  • Yun Sung-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.1
    • /
    • pp.55-63
    • /
    • 2005
  • In undeniable digital signature scheme, the signature can not be verified without the signer's cooperation. The undeniable signature scheme can be used to computerize many applications which can not be done by a conventional digital signature scheme. In this study, we propose the undeniable digital multi-signature scheme which requires many signers and designated verifier The multi-signature can be verified only in cooperation with all signers. The proposed scheme satisfies undeniable property and it is secure against active attacks such as modification and denial of the multi-signature by signers. We also propose copyright protection method of co-authored digital contents as an application of the proposed scheme.

  • PDF

Watermarking Technique for the Digital Contents Protection (디지털콘덴츠 보호를 위한 워터마킹 기술)

  • Song Hag-hyun;Kim Yoon-ho
    • Journal of Digital Contents Society
    • /
    • v.5 no.1
    • /
    • pp.66-72
    • /
    • 2004
  • Beyond the digital world from the analog age, the contents are very easily copied under the illegal conditions and these are rapidly distributed by the information super highway. The increase of ilegal usage and conflict in digital content market would diminish motivation of creators for their work, furthermore break down digital content market on cyberspace. Watermarking technology support to the legal users by the protection technique based chi the digital content copyright protection method(DRM). Most of previous digital watermarking have embeded to the content. In this paper, we have researched the standardization of digital rights management and developed more efficient watermark embedding method.

  • PDF

Development of Forensic Marking technology for tracing multiple users (다중 불법콘텐츠 복제자 추적 기술 개발)

  • Kim, Jong-An;Kim, Jin-Han;Kim, Jong-Heum
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.102-106
    • /
    • 2008
  • Forensic Marking is the technology that enables the service providers (SP) to identify the illegal digital contents distributors by first inserting markings (data indicating the user information and playback time) in realtime into the digital contents at time of playback of digital contents, and then later by extracting inserted markings from the contents which are illegally captured from the multimedia device such as IPTV STBs and distributed over the Internet. Digital Rights Management (DRM), which is a very popular content protection technology, has the security hole that can be vulnerable because the encrypted digital contents are transformed into their original plaintext forms after the decrypting process on the STBs. Therefore Forensic Marking (FM) has now become a companion content protection solution to DRM. This article describes a new way of tracking up to 4 illegal content users in FM implementation using the blue-difference chroma component of YCbCr color space. This FM technology has many advantages like fast processing time and easy portability to STB devices compared to that of the traditional watermarking processing in the frequency domain.

  • PDF

Implementation of a Real Time Watermarking Hardware System for Copyright Protection of a Contents in Digital Broadcasting (디지털 방송에서 콘텐츠의 저작권 보호를 위한 실시간 워터마킹 하드웨어 시스템 구현)

  • Jeong, Yong-Jae;Kim, Jong-Nam;Moon, Kwang-Seok
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.9
    • /
    • pp.51-59
    • /
    • 2009
  • A watermarking for copyright protection of digital contents for broadcasting have to be made for a real-time system. In this paper, we propose a real-time video watermarking system which is hardware-based watermarking system of SD/HD (standard definition/high definition) video with the STRATIX FPGA device from ALTERA. There was little visual artifact due to watermarking in subjective quality evaluation between the original video and the watermarked one in our experiment. Embedded watermark was extracted after robustness testscalled natural video attacks such as A/D (analog/digital) conversion. Our implemented watermarking hardware system can be useful in movie production and broadcasting companies that requires real-time contents protection systems.

A Protection Protocol for License-based Digital Rights (라이선스 기반 디지털 저작권 보호 방안)

  • Shin Weon
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.6
    • /
    • pp.368-377
    • /
    • 2005
  • The Internet technologies allows anybody who has connect a network to access various multimedia information. But, it brings new issues about the violation of intellectual property and copyright of multimedia contents. Digital right managements have been actively studied as approaches to solve them. In this paper, we propose license-based schemes for the protection of contents and its rights on digital right management. The proposed schemes provide limited distribution and superdistribution of contents, and guarantee to securely use contents by usage rules.

  • PDF

Contents Protection Method usign White Box Cryptography (화이트박스 암호를 이용한 콘텐츠 보호 방법)

  • Lee, Yun-Kyung;Kim, Sin-Hyo;Mun, Hye-Ran;Chung, Byung-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.627-628
    • /
    • 2010
  • S. Chow proposes white-box cryptography mechanism of AES algorithm(WBC-AES) in 2002. WBC mechanism is implementation method which is resistant to white-box attack. We describe the WBC-AES and contents protection method using it.

  • PDF

Wavelet-based Watermarking using Correlation Comparison (상관도 비교를 이용한 웨이블릿 기반 워터마킹)

  • Lee, Hyun-Suk;Vivi Oktavia;Lee, Won-Hyung
    • Proceedings of the IEEK Conference
    • /
    • 2003.11a
    • /
    • pp.217-220
    • /
    • 2003
  • This paper presents a wavelet-based digital watermarking scheme for color images. We insert watermarks in the DWI domain using spread-spectrum correlation-based watermarking in luminance component of the color image. The watermark, two pseudorandom patterns, is inserted by modifying the wavelet coefficients at subband HL2, LH2, HH2 according to message bits. To detect watermark, we calculate the correlation between the watermarked image and pseudorandom patterns. As compared with correlations, the watermark detector determines embedding message. Experimental results show that the scheme is not only invisible but also robust to various attacks such as JPEG compression, noise addition and so on.

  • PDF

A Development Strategy of Harmful Information Protection System (유해정보 선별차단 시스템의 발전방향)

  • 이승민;남택용;장종수
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.721-723
    • /
    • 2004
  • As the Internet use has been spreading worldwide, illegal and harmful contents have been increasing on the Internet, which has become a very serious social problem. To prevent children form exposing themselves to such illegal and harmful contents on the Internet, harmful information protection systems have been developed. We examine component technologies of harmful information protection systems including text and image-based filtering solutions as well as url-based filtering solution. Also we examine the related trends and strategies which effectively prevent access to the harmful contents.

  • PDF