• Title/Summary/Keyword: Data Copyright

Search Result 260, Processing Time 0.035 seconds

Management of Reliability and Delivery for Software Object Material (소프트웨어 목적물의 전달체계 분석과 신뢰성 검증)

  • Kim, Do-Hyeun;Lee, Kyu-Tae
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.2
    • /
    • pp.51-57
    • /
    • 2019
  • On increasing illegal software copyright, the need for similarity analysis is now rising. The reliability of object material are becoming important when it's moving from developer to evaluation experts. Object material as a comparison data, is the important data to the evaluation expert which is delivered from agencies such as courts and police stations. The object material is submitted at first to the Copyright Commission and then delivered to the evaluation expert with safe. However, if the similarity result is not satisfied to the both side, they will claim to the reliability of the object material such as source code modification or revision etc. Software objects is produced in a file format and are recognized as being able to be modified. Therefore, the reliability to the object material is studied in various ways, and a forensic is proposed as one method. This study showed the suggestion to keep reliability of the object material through the actual evaluation cases.

Data-Hiding Method using Digital Watermark in the Public Multimedia Network

  • Seo, Jung-Hee;Park, Hung-Bog
    • Journal of Information Processing Systems
    • /
    • v.2 no.2
    • /
    • pp.82-87
    • /
    • 2006
  • In spite of the rapid development of the public network, the variety of network-based developments currently raises numerous risks factors regarding copyright violation, the prohibition and distribution of digital media utilization, safe communication, and network security. Among these problems, multimedia data tend to increase in the distributed network environment. Hence, most image information has been transmitted in the form of digitalization. Therefore, the need for multimedia contents protection must be addressed. This paper is focused on possible solutions for multimedia contents security in the public network in order to prevent data modification by non-owners and to ensure safe communication in the distributed network environment. Accordingly, the Orthogonal Forward Wavelet Transform-based Scalable Digital Watermarking technique is proposed in this paper.

A Blind Vector Digital Watermarking for GIS using the Closest Pair of Points (최근점 쌍을 이용한 벡터 맵 디지털 워터마킹)

  • Kim, Jung-Yeop;Park, Soo-Hong
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.6
    • /
    • pp.536-544
    • /
    • 2009
  • This paper proposed a novel vector digital watermarking method to protect copyright. The proposed method embeds watermarks after finding the closest pair of points and calculating the distance of the points. We tested the robustness of the method through several attacks on watermarked data. The experimental results show that the proposed method has more robustness than previous methods. And the new method doesn't change the topology of the vector data. Therefore, this method can be 'the vector digital watermarking for GIS.

Data Hiding Technique using the Characteristics of Neighboring Pixels and Encryption Techniques

  • Jung, Soo-Mok
    • International journal of advanced smart convergence
    • /
    • v.11 no.4
    • /
    • pp.163-169
    • /
    • 2022
  • In this paper, we propose a data hiding technique that effectively hides confidential data in the LSB of an image pixel by using the characteristics of the neighboring pixels of the image and the encryption techniques. In the proposed technique, the boundary surface of the image and the flat surface with little change in pixel values are investigated. At the boundary surface of the image, 1 bit of confidential data is encrypted and hidden in the LSB of the boundary pixel to preserve the characteristics of the boundary surface. In the pixels of the plane where the change in pixel value is small, 2 bits secret data is encrypted and hidden in the lower 2 bits of the corresponding pixel. In this way, when confidential data is hidden in an image, the amount of confidential data hidden in the image is greatly increased while maintaining excellent image quality. In addition, the security of hidden confidential data is strongly maintained. When confidential data is hidden by applying the proposed technique, the amount of confidential data concealed increases by up to 92.2% compared to the existing LSB method. The proposed technique can be effectively used to hide copyright information in commercial images.

A Robust Reversible Data Hiding Scheme with Large Embedding Capacity and High Visual Quality

  • Munkbaatar, Doyoddorj;Park, Young-Ho;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.7
    • /
    • pp.891-902
    • /
    • 2012
  • Reversible data hiding scheme is a form of steganography in which the secret embedding data can be retrieved from a stego image for the purpose of identification, copyright protection and making a covert channel. The reversible data hiding should satisfy that not only are the distortions due to artifacts against the cover image invisible but also it has large embedding capacity as far as possible. In this paper, we propose a robust reversible data hiding scheme by exploiting the differences between a center pixel and its neighboring pixels in each sub-block of the image to embed secret data into extra space. Moreover, our scheme enhances the embedding capacity and can recover the embedded data from the stego image without causing any perceptible distortions to the cover image. Simulation results show that our proposed scheme has lower visible distortions in the stego image and provides robustness to geometrical image manipulations, such as rotation and cropping operations.

Watermarking Technique using Image Characteristics

  • Jung, Soo-Mok
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.187-193
    • /
    • 2021
  • In this paper, we propose an image watermarking technique that effectively hides confidential data in the LSB of image pixels by utilizing the characteristics of the image. In the proposed technique, the image is precisely divided into boundary surface and normal region other than the boundary surface and performs different processing. The boundary surface existing in the image is created by meeting different regions and contains important information of the image. One bit of confidential data is concealed in the LSB of the pixel at the boundary surface to preserve the characteristics of the boundary surface. In normal region other than the boundary surface, the pixel values are similar, and the change with the adjacent pixel values is smooth. Based on this property, even if the 2 bits of confidential data are hidden in the lower 2 bits of the pixel in the normal region, the difference cannot be visually distinguished. When confidential data is concealed in an image as described above, the amount of confidential data concealed in an image can be increased while maintaining excellent image quality. Concealing confidential data by applying the proposed method increases the amount of confidential data concealed by up to 84.6% compared to the existing method. The proposed technique can be effectively used for commercial image watermarking that hides copyright information.

Awareness Activation of Dance Copyrights and Research of Effectiveness Plans (무용의 저작권 인식 활성화와 실효성 방안 연구)

  • LEE, Seoeun
    • Trans-
    • /
    • v.2
    • /
    • pp.1-38
    • /
    • 2017
  • Dance, as an art which expresses thoughts and emotions by movement human, is included in work that its copyright has to be protected, choreographers who are creators and dancers who are performing can exercise their rights included in copyright laws. However, artists who work in the dancing scene have lack of awareness about copyrights and the application level is low. The purpose of this thesis is to look into the current status and issues about dance copyright and to discuss activation plans and effectiveness plans for dance copyrights. The main point is to check into the level of awareness for dance copyrights with choreographers, dancers and students majoring in dance who are in charge of the art of dancing, to present issues about the necessity of the dance copyrights protection plans by analyzing interviews-in-depth and to prepare the dance copyrights protection plans which are concretely realistic. For the research methods, first, I looked into ideas and contents about copyrights through a document research and then, wanted to prepare theoretical background by reviewing actual cases of performing art copyrights related to dance. Next, I carried out surveys about awareness of copyrights with students majoring in dance, choreographers and dancers then carried out analysis of actual proof. Also, I chose three famous dancers who are actively performing in the current dancing scene and did interviews-in-depth about dance copyrights then carried out a recording analysis. I tried to complement the analysis by discussing deeper which I couldn't deal with in the previous surveys and to contemplate awareness activation of dance copyrights and plans. As a result of the research, the level of the awareness about dance copyrights through age, major, education and career was very low. The level of awareness was almost same compared to the previous research 10 years ago. 'Music', which can be an element of copyright issue in dance, was the highest in rate, and dance was recognized as an art which is combined with various elements as a combination work. The way of protection for works of choreography and performance only used data preservation and contracts and didn't register copyrights or record in dace notation. Majority of responders answered that they couldn't have any education about copyrights while they were recognizing the necessity of education and management for copyrights. The analysis of interviews-in-depth was also matched to the result of the previous surveys and a deeper discussion about the status of dance copyrights and issues was carried out. The plans of effectiveness for dance copyrights through the result of previous research are as followings. First, an advanced education is necessary above all to increase the awareness and application of copyrights in dancing scene. Long-term education like study curriculums and short-term education like special courses and seminars should be combined, and education about copyrights for dance groups, choreographers, dancers and students majoring in dance should keep on going. Second, revision of performing art works is necessary for the activation of dance copyrights, and establishing a dance copyright association to manage copyrights systematically and training dance copyright experts are necessary as well. Third, as the way of copyright protection for choreographers and dancers, an establishment for relation gain and loss about copyrights is necessary when creating dance works and performing, and registration of dance works should be activated. Also, the dancing scene should sign contracts for choreography and performance and this contract culture should be activated, and it should systematically preserve and manage choreography and performance records through basic ways. Hereby, it is considered to prepare a foundation to foster the awareness of dance copyrights and activate dance copyrights.

  • PDF

Selective Encryption Scheme for Vector Map Data using Chaotic Map

  • Bang, N.V.;Moon, Kwang-Seok;Lim, Sanghun;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.7
    • /
    • pp.818-826
    • /
    • 2015
  • With the rapid interest in Geographic Information System (GIS) contents, a large volume of valuable GIS dataset has been distributed illegally by pirates, hackers, or unauthorized users. Therefore the problem focus on how to protect the copyright of GIS vector map data for storage and transmission. But GIS vector map data is very large and current data encryption techniques often encrypt all components of data. That means we have encrypted large amount of data lead to the long encrypting time and high complexity computation. This paper presents the selective encryption scheme using hybrid transform for GIS vector map data protection to store, transmit or distribute to authorized users. In proposed scheme, polylines and polygons in vector map are targets of selective encryption. We select the significant objects in polyline/polygon layer, and then they are encrypted by the key sets generated by using Chaotic map before changing them in DWT, DFT domain. Experimental results verified the proposed algorithm effectively and error in decryption is approximately zero.

An Implementation on the Digital Audio Watermarking for High Quality Audio

  • Park, Jong-Tae;Kang Hyeon RHEE
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.454-457
    • /
    • 2002
  • In this paper, we proposed digital audio watermarking algorithm for high quality audio. Nowadays, digital watermark used to confirm to digital copyright protection, not only digital image but also digital audio is active in the digital watermarking study. In this paper, we proposed digital audio watermarking algorithm using psychoacoustics model and MDCT/IMDCT (Modified Discrete Cosine Transform/Inverse Modified Discrete Cosine Transform) for the high quality audio watermark. In the proposed scheme, we used to 441KHz, 128kbps and stereo audio data for audio watermarking algorithm. Audio data is passed by MDCT; watermark can be inserted into the frequency domain with 256,1024 and 2048 interval.

  • PDF

Secure Steganographic Model for Audio e-Book Streaming Service (오디오 e-Book 스트리밍을 지원하는 스테가노그래피 모델)

  • Lee, Yun-Jung;Lee, Bong-Kyu;Kim, Chul-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.12
    • /
    • pp.5878-5884
    • /
    • 2011
  • We present steganographic service model and algorism that fit feature of streaming audio book service in order to hide information of copyright and certificate of it. Secret information is encrypted with random numger by secret key that client and server share, so that increase confidentiality. We made secret data distributed randomly and evenly, and improved throughput by simplifying additional computations considering streaming environment.