• Title/Summary/Keyword: Digital Contents Protection

Search Result 280, Processing Time 0.027 seconds

GMPLS Technology for Next Generation Multimedia Internet Services (차세대 멀티미디어 인터넷 서비스를 위한 GMPLS기술)

  • Jang Hee-Seon;Shin Hyun-Cheul
    • Journal of Digital Contents Society
    • /
    • v.3 no.2
    • /
    • pp.143-152
    • /
    • 2002
  • In this paper, we present the general interface, label-switched path structure and link bundling in GMPLS to improve the scalability. The LMP protocol is also introduced to efficiently manage the internal link, and the signaling protocol, hierarchical path setup, hi-directional LSP setup and suggested label method are presented. Finally, the techniques of protection and restoration are presented. In specific, various applicable restoration techniques in GMPLS are discussed.

  • PDF

A Study on the Performance Improvement of DM-SS Watermarking with RS code in OFDM/QPSK Wireless channel Environment (OFDM/QPSK 무선 채널 환경에서 RS 부호화 기법을 적용한 DM-SS 워터마킹 성능 개선에 관한 연구)

  • Jo Song-Back;Kim Ji-Woong;Kang Heau-Jo
    • Journal of Digital Contents Society
    • /
    • v.5 no.4
    • /
    • pp.316-320
    • /
    • 2004
  • In this paper, we propose OFDM/QPSK technique for copyright protection of image data to insert watermark. And, we improve performance of restoration watermark by Reed-Solomon coding that robust burst error. In here, we consider several factors about external effect of image over OFDM/QPSK transmission system.

  • PDF

A Study on a Digital Watermarking Method for Still Images

  • Onuki, Tomokazu;Adachi, Takeharu;Hasegawa, Madoka;Kato, Shigeo
    • Proceedings of the IEEK Conference
    • /
    • 2000.07a
    • /
    • pp.19-22
    • /
    • 2000
  • In this paper, we propose a watermarking method for still images using Discrete Cosine Transform (DCT). Watermarking is a copyright protection technique for digital contents by hiding secret information into the contents. The proposed method embeds the watermark information into DCT coefficients. To obtain a watermarked image that is not only high quality but also has robustness for compression, we considered a method to change the degree of embedding by utilizing the activity of each DCT block. The simulation results show that the proposed scheme can obtain huh quality watermarked images and we can extract most of the embedded data even if they are compressed by JPEG scheme.

  • PDF

A Study on Protection of Iris and fingerprint Data Based on Digital Watermarking in Mid-Frequency Band (중간 주파수 영역에서의 디지털 워터마킹 기법에 의한 홍채 및 지문 데이터 보호 연구)

  • Jeong, Dae-Sik;Park, Kang-Ryoung
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.9
    • /
    • pp.1227-1238
    • /
    • 2005
  • Recently, with the advance of network and internet technologies, it is appeared the Problem that the digital contents such as image, voice and video are illegally pirated and distributed. To protect the copyright of the digital contents, the digital watermarking technology of inserting the provider's information into the contents has been widely used. In this paper, we propose the method of applying the digital watermarking into biometric information such as fingerprint and iris in order to prevent the problem caused by steal and misuse. For that, we propose the method of inserting watermark in frequency domain, compare the recognition performance before and aster watermark inserting. Also, we experiment the robustness of proposed method against blurring attack, which is conventionally taken on biometrics data. Experimental results show that our proposed method can be used for protecting iris and fingerprint data, efficiently.

  • PDF

A Study on the Fingerprinting scheme without Trusted Third Party (신뢰기관 비참여의 핑커프린팅 기법에 관한 연구)

  • Yong, Seung-Lim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.7
    • /
    • pp.81-88
    • /
    • 2009
  • Fingerprinting scheme is a technique which supports the copyright protection to track redistributors of digital content using cryptographic techniques. These schemes enable the original merchant to identify the original buyer of the digital data by embedding fingerprints into digital contents. Asymmetric property of fingerprinting schemes is important to keep the buyer's privacy. In this paper, we propose a symmetric encryption based fingerprinting protocol without trusted third party. Our scheme enables the reduction of computational costs for the encryption using symmetric key encryption scheme. Since a trusted third party doesn't take part in making the fingerprint of each buyer, the protocol doesn't need to control the trusted third party and it is more secure against collusion attack.

Utilizing animation contents for e-learning performance enhancement: focus on private information security (대구경북 서비스 콘텐츠 활성화를 위한 애니메이션 콘텐츠가 학습성과의 연관관계 연구: 개인정보보안을 중심으로)

  • Jung, Jason J.
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.2
    • /
    • pp.471-476
    • /
    • 2011
  • As information and communication technologies (ICTs) has been developed, it is getting more important for internet users to consider many security issues (e.g., privacy protection). In this paper we claims that animation contents make a positive influence on teaching such computer securities, and investigate what features of animation contents will be the most important relationships with performance of the teaching process. Once we have obtained the survey results from students, two main features (i.e., characters and plots) of the animation contents have positively influenced the performance of e-learning systems.

Robust Audio Watermarking in Frequency Domain for Copyright Protection (저작권 보호를 위한 주파수 영역에서의 강인한 오디오 워터마킹)

  • Dhar, Pranab Kumar;Kim, Jong-Myon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.2
    • /
    • pp.109-117
    • /
    • 2010
  • Digital watermarking has drawn extensive attention for protecting digital contents from unauthorized copying. This paper proposes a new watermarking scheme in frequency domain for copyright protection of digital audio. In our proposed watermarking system, the original audio is segmented into non-overlapping frames. Watermarks are then embedded into the selected prominent peaks in the magnitude spectrum of each frame. Watermarks are extracted by performing the inverse operation of watermark embedding process. Simulation results indicate that the proposed scheme is robust against various kinds of attacks such as noise addition, cropping, resampling, re-quantization, MP3 compression, and low pass filtering. Our proposed watermarking system outperforms Cox's method in terms of imperceptibility, while keeping comparable robustness with the Cox's method. Our proposed system achieves SNR (signal-to-noise ratio) values ranging from 20 dB to 28 dB. This is in contrast to Cox's method which achieves SNR values ranging from only 14 dB to 23 dB.

A Study on Licence Management Model for Contents Circulation which Ubiquitous Environment is Safe (유비쿼터스 환경의 안전한 콘텐츠 유통을 위한 라이센스 관리 모델 연구)

  • Cho, Hyun-Seob;Oh, Myoung-Kwan
    • Proceedings of the KAIS Fall Conference
    • /
    • 2011.05a
    • /
    • pp.366-370
    • /
    • 2011
  • This paper propose an interested digital rights protection scheme using license agent to address problems facing contemporary DRM approached : static digital rights management, and limited application to on-line environment. We introduce a dynamic mission control technology to realize dynamic digital rights management. And we incorporate license agent to on- and off-line monitoring and tracking. The proposed system prevent illegal access and use by using PKI security method, real time action monitoring for user, data security for itself.

  • PDF

Hybrid-Watermarking for DWT Based Authentication and Detection of Image Modification (DWT기반 이미지 인증 및 변형 검출을 위한 혼합 워터마킹)

  • Kim Dong-Seo;Joo Nak-Keun;Kang Tae-Hwan
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.1
    • /
    • pp.170-178
    • /
    • 2006
  • In this paper, the hybrid-watermarking method to make it possible to the authentication, modification detection and copyright protection of the digital image was proposed. After the original image is transformed by the DWT(Discrete Wavelet Transform), the encrypted watermark information is embedded into the LSB(Least Significant Bit) of LL band on the low frequence domain for authenticating and detecting modified position in the image. And watermark information is embedded by exchanging the wavelet coefficient for the copyright protection. Thereby, we can authenticate the modification and detect the modified location by extracting the values of LSB on the low frequence domain. And we can perceive the copyright information of original image by extracting the embedded watermark on the high frequence domain.

  • PDF

Development of Managing Security Services System Protection Profile (보안관제시스템 보호프로파일 개발)

  • Son, Seung-Wan;Kim, Kwang-Seok;Choi, Jung-Won;Lee, Gang-Soo
    • Journal of Digital Contents Society
    • /
    • v.16 no.2
    • /
    • pp.345-353
    • /
    • 2015
  • Security Management System is a system which operates in the security control center for security control. All living things across the Internet in recent years, with the rapid increase in the subscriber base has increased the need for network security dramatically depending on yirueojim through web services, thus cyber security sheriff, I have a big issue to build a security management system, each agency and perform control tasks. But the security functional requirements for security management system would not specified exactly, in developing a security management system to build and design a situation that PP's needs require a lot of trouble. In this paper, we develop a Managed Security System Protection Profile for the security functional requirements specification of the security management system.