• Title/Summary/Keyword: Digital Contents Protection

Search Result 280, Processing Time 0.023 seconds

Study on the Standardization of Game UCI Identification Metadata (게임 UCI 식별 메타데이터 표준화 연구)

  • Yoon, Seon Jeong
    • Journal of Korea Game Society
    • /
    • v.14 no.5
    • /
    • pp.53-60
    • /
    • 2014
  • I designed the game UCI identification metadata to enable the game industry to provide copyright protection of game content, the efficiency of the management and distribution. This was mapped with existing UCI metadata which is composed of 9 elements that are applied to international standards for interoperability. I redefined 3 elements and added 3 more elements for reflecting the characteristics of the game. So it is composed of 12 elements in total. The result is verified by the general user survey and expert interviews. And I will develope the game UCI identification metadata management system with the results of study to be utilized by game agencies.

A Design of Serious Game Metadata Schema for Reliability and Compatibility (신뢰도와 호환성을 위한 기능성게임 메타데이터 스키마 설계)

  • Yoon, Sun-Jung
    • Journal of Korea Game Society
    • /
    • v.10 no.3
    • /
    • pp.73-82
    • /
    • 2010
  • The Metadata are used for the reuse of core information, distribution and management, protection of copyright and prevention of overlapping investment. Serious game consists of multi-hierarchial multimedia data. And quality information is very important for selection according to the purpose of the game. In this paper, we designed the serious game metadata schema, including multi-media characteristic information and measurable quality information. This study will lay the groundwork for the development of metadata system which can provide serious game users with reliability through quality information, and with compatibility through multi-media characteristic information. Furthermore, we hope this study will be helpful to stable growth in serious game industry.

A Study on PRNG based Partial Encryption for Digital Contents Protection (디지털 콘텐츠 보호를 위한 의사난수생성기 기반의 부분암호화 기법 연구)

  • Yoo, SeongMin;Jung, GwangUn;Sin, JinSeob;Kim, SangWoo;Jung, WooTak;Ryou, JaeCheol
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.548-551
    • /
    • 2013
  • 디지털 콘텐츠가 대용량화됨에 따라, 부분암호화는 디지털 콘텐츠 보호를 위한 하나의 방안이 될 수 있다. 부분암호화 시에 고려해야할 사항 중 하나는 복호화를 위해 암호화된 부분의 정보를 별도로 관리해야하는 것이다. 부분암호화 정보의 관리가 제대로 이루어지지 않을 경우, 데이터가 완벽히 복호화 되지 않거나, 보안위협에 노출될 수 있으며, 데이터 전체를 암호화하는 것보다 오히려 더 많은 비용이 발생할 수 있다. 본 논문에서는 이러한 부분암호화 정보를 안전하고, 효율적으로 관리할 수 있는 의사난수생성기와 진리표를 이용한 부분암호화 기법을 제안한다. 제안하는 방법은 복호화 시에 암호화된 부분의 식별을 위해 의사난수생성기 초기화 값과 진리표만 필요하기 때문에 부분암호화 정보를 관리하는데 용이한 장점이 있다.

The Robustness Wavelet Watermarking with Adaptive Weight MASK (적응 가중치 마스크 처리 기반 강인한 웨이브릿 워터마킹)

  • 정성록;김태효
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.4 no.2
    • /
    • pp.46-52
    • /
    • 2003
  • In this paper, the wavelet watermarking algorithm based on adaptive weight MASK processing as a watermark embedded-method for Copyright Protection of Digital contents is Proposed. Because watermark induce as a noise of original image, the watermark size should be limited for preventing quality losses and embedding watermark into images. Therefore, it should be preserve the best condition of the factors, robustness, capacity and visual quality. Tn order to solve this problem, we propose watermarking embedded method by applying adaptive weight MASK to the algorithm and optimize its efficiency. In that result, the watermarked images are improved about external attack. Specifically, correlation coefficient has over 0.8 on both modifications of brightness and contrast. Also, correlation coefficient of wavelet compression of embedded watermark last by over 0.65.

  • PDF

An Adaptive Watermarking Scheme for Three-Dimensional Mesh Models (3차원 메쉬 모델의 적응형 워터마킹 방법)

  • 전정희;호요성
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.40 no.6
    • /
    • pp.41-50
    • /
    • 2003
  • For copyright protection of digital contents, we employ watermarking techniques to embed watermark signals into digital host data. In this paper we propose an adaptive watermarking algorithm for three-dimensional (3-D) mesh models. Watermark signals are inserted into vertex coordinates adaptively according to changes of their position values. While we embed strong watermarks in the areas of large variations, watermarks are weakly inserted in other areas. After we generate triangle strips by traversing the 3-D model and convert the Cartesian coordinates to the spherical coordinate system, we calculate variations of vertex positions along the traversed strips. Then, we insert watermark signals into the vertex coordinates adaptively according to the calculated variations. We demonstrate that imperceptibility of the inserted watermark is significantly improved and show the bit error rate (BER) for robustness.

Comparing of Blind Watermarking Method using DWT and CAT (DWT와 셀룰라 오토마타 변환을 이용한 블라인드 워터마킹 비교)

  • Gong, Hui;Shin, Jin-Wook;Yoon, Sook;Park, Dong-Sun
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.4
    • /
    • pp.92-100
    • /
    • 2011
  • In this paper, we propose a novel blind digital watermarking method based on a cellular automata transform (CAT). CAT is based on dynamic systems known as cellular automata(CA) and uses transform bases which are differently defined by a rule number, the number of neighbors, the number of cells, and an initial state, etc. The proposed CAT based method is compared with a blind watermarking method based on DWT which is commonly used for a domain transform in signal processing. We analyse properties on changes of DWT coefficients and CAT coefficients under various attacks and determine optimal parameters for a watermarking method robust to attacks. The simulations show that the watermarked images with high PSNR and MSSIM look visually identical to originals and are robust against most of typical image processing attacks. Moreover, the proposed CAT based watermarking method is superior to the DWT based one in robustness to most of typical image processing attacks including JPEG compression, median and average filtering, scaling, cropping, and histogram equalization.

Copyright Protection for the Video image with Coded Watermarking (암호화 워터마킹을 사용한 비디오 영상의 저작권 보호)

  • Park, Young;Kim, Hang-Rae;Rhu, Ho-Joon;Kim, Jae-Won
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.11a
    • /
    • pp.120-123
    • /
    • 2003
  • In this paper, a digital watermarking scheme whichis effective in protecting a copyright of video image under an image transformation and impulse noise is proposed. The proposing scheme is to use a coded watermark that insert the personal ID of copyrighter. The recovery ability is improved by the coded watermark. Also the coded watermark is abel to trace the illegal distributors. Binary image is used as watermark image, the value of PSNR and recovered rates of watermark are obtained in order to confirm the required invisibility and robustness in watermark system. The experimental results show that image quality is less degraded as the PSNR of 98.21 ㏈. It is also observed that excellent watermark recovery is achieved under the image transformation and impulse noise.

  • PDF

Digital Image Watermarking using Subband Correlation Wavelet Domain (웨이블릿 영역의 부대역 상관도를 이용한 디지털 영상 워터마킹)

  • 서영호;박진영;김동욱
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.40 no.6
    • /
    • pp.51-60
    • /
    • 2003
  • The watermarking is the technique that embeds or extracts the certain data without the change of the original data for the copyright protection of the multimedia contents. Watermark-embedded contents must not be distinguished by human's eye and must be robust to the various image processing and the intentional distortions. In this paper, we propose a new watermarking technique applied in the wavelet domain which has both the spatial and frequency information of a image. For both the robustness and the invisibility, the positions for embedding the watermark is selected with the multi-threshold. We search the similarity between highly correlated coefficients in the each subband and decide the mark space after verifying the significance in the specified subband. The similarity is represented by the coefficient difference between the subbands and its distribution is used in the watermark embedding and extracting. The embedded watermark can be extracted without the original image using the relationship of the subbands. By these properties the proposed watermarking algorithm has the invisibility and the robustness to the attacks such as JPEG compression and the general image processing.

Suggestions for Improvement of Youth Internet Regulation: Focusing on Youth Internet Regulation of the Major Country (청소년 인터넷규제 개선방향에 대한 제언: 주요국의 청소년 인터넷규제를 중심으로)

  • Song, Eun-Ji
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.11
    • /
    • pp.690-698
    • /
    • 2013
  • Advanced digital environment, ease of life would bring significant benefits, but rather indiscriminate access to information have occurred new social problems. Especially the youth and children using the Internet to increase in population resulting from harmful information on the Internet, concerns about the negative impact increases establish policies for the protection of youth and children emphasizes the importance of various activities international community. Despite major countries aim to self-regulation minimize the direct regulation through collaboration with the private sector cultivation and campaign, continuing education, Korea was analyzed that implement direct and coercive enforcement regulations such as 'internet game shut down' and insufficient social infrastructure to create activities. Therefore, in order to create a positive internet environment, self-regulation is essential with private experts and organizations based on cooperation and indirect regulation.

The Study of Evaluation of University Students' Health Behaviors (대학생의 건강행위 평가 연구)

  • Lee, Grace Changkeum;Park, Yeon-Suk
    • Journal of Digital Convergence
    • /
    • v.15 no.12
    • /
    • pp.517-529
    • /
    • 2017
  • The purpose of this study is to develop and evaluate the scale for university students' health behaviors. This research is based on Roger's(1975) Protection Motivation Theory and Weinstein(1988)'s Precaution Adoption Process Model as theoretical frameworks. The contents of the scale were first abstracted from personal depth interviews of qualitative study on university students' health behavior experiences and review of its related literature. The initial items consisted of 76 behavior questions and 34 perception questions. After conducting the preliminary test, 33 behavior questions and 24 perception questions were selected for the final test by revisions on the basis of the result of the content validity test and the item understanding test. The questionnaires for the final test were distributed to 400 students enrolled in three universities. The questionnaires collected from 373 participants were analyzed by the SPSS program. From the examination of construct validity, item correlation, and factor relation turned out to be relevant. Five factors were determined from 27 items with a cumulative explained variance of 54.498 %. After examining reliability and validity of the collected dat, 27 items were finalized as the scale for university students' health behaviors.