• Title/Summary/Keyword: Digital Contents Protection

Search Result 280, Processing Time 0.023 seconds

A Study on Methodology for Protection of Malicious Traffic in Groupware Network System (그룹웨어시스템상의 악성트래픽 차단 네트워크구조 설계방법)

  • Noh, Si-Choon;Bang, Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.8 no.1
    • /
    • pp.69-76
    • /
    • 2007
  • The blocking of malicious traffic in groupware network system is used to prevent the spread and distribution of malicious traffic. The method protecting from malicious traffic in groupware system is designed to handle the malicious traffic of various routes with the internal course of groupware, which leads to lighten the load of security and traffic. It was impossible to block this kind of traffic at the traditional structure. When the protection of the proposed groupware system is performed, there appears to be a great change for the rate of a load factor at the CPU of Backbone Switch which is connected to the internal gateway. The load factor of CPU, which was increased with the traffic, is now remarkably reduced after the internal gateway is set up. This is to show that a lot of malicious traffic pass through the internal network and that network environment is faced to the menace of many malicious traffics. This paper is to show the efficiency of protection of internal gateway proposed in this study, for the rate of CPU of Backbone Switch was about 17% a day, but was dropped up to the 4% after the malicious traffic was removed.

  • PDF

Security Operation Implementation through Big Data Analysis by Using Open Source ELK Stack (오픈소스 ELK Stack 활용 정보보호 빅데이터 분석을 통한 보안관제 구현)

  • Hyun, Jeong-Hoon;Kim, Hyoung-Joong
    • Journal of Digital Contents Society
    • /
    • v.19 no.1
    • /
    • pp.181-191
    • /
    • 2018
  • With the development of IT, hacking crimes are becoming intelligent and refined. In Emergency response, Big data analysis in information security is to derive problems such as abnormal behavior through collecting, storing, analyzing and visualizing whole log including normal log generated from various information protection system. By using the full log data, including data we have been overlooked, we seek to detect and respond to the abnormal signs of the cyber attack from the early stage of the cyber attack. We used open-source ELK Stack technology to analyze big data like unstructured data that occur in information protection system, terminal and server. By using this technology, we can make it possible to build an information security control system that is optimized for the business environment with its own staff and technology. It is not necessary to rely on high-cost data analysis solution, and it is possible to accumulate technologies to defend from cyber attacks by implementing protection control system directly with its own manpower.

Implementation of A Real Time Watermark Embedding System for Copyright Protection of Digital Broadcasting Contents (디지털 방송 콘텐츠 저작권 보호를 위한 실시간 워터마크 삽입 시스템 구현)

  • Jeong, Yong-Jae;Park, Sung-Mo;Kim, Jong-Nam;Moon, Kwang-Seok
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.10 no.2
    • /
    • pp.100-105
    • /
    • 2009
  • A watermarking for copyright protection of digital contents for broadcasting have to be made for a real-time system. In this paper, we propose a real-time video watermarking chip and system which is hardware based watermark embedding system of SD/HD video. Our chip is implemented by FPGA which is STRATIX device from ALTERA, and our system is implemented by GS1560A and GS1532 devices from GENNUM for HD/SD video signal processing. There was little visual artifact due to watermarking in subjective quality evaluation between the original video and the watermarked one. Embedded watermark was all extracted after a robustness test called natural video attacks such as A/D conversion and MPEG compression. Our implemented watermarking hardware system can be useful in movie production and broadcasting companies that requires real-time based copyright protection system.

  • PDF

A Study on Security Architecture for Digital Content Dissemination (디지탈 컨텐츠 배포를 위한 보안 체계에 관한 연구)

  • 김대엽;주학수
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.147-155
    • /
    • 2003
  • The diffusion of internet infrastructure and a fast increase of Population to use it is becoming a base of the service that can use various information, data and digital contents which were provided through off-line physically and used. Recently, the. techniques for copy deterrence and copyright protection have been important in e-commerce because various contents in digital form can be duplicated easily. The Access Control(AC) technique that only a user having the qualifications can access and use contents normally has been studied. The Conditional Access System(CAS) used in a satellite broadcasting md Digital Right Management System(DRMS) used for contents service are representative models of current commercialized access control. The CAS and DRM can be considered as an access control technique based on the payment based type(PBT). This paper describe the access control method of payment free type(PFT) suggested in [5] which are independent on the payment structure. And then we suggest a new access control method of payment free type which is more efficient than the previous one.

A Study on the Watermarketing of Keyframe-Based for copyright Protection of video (동영상의 저작권 보호를 위한 키 프레임 기반의 워터마킹에 관한 연구)

  • Kim, Dan-Hwan;Oh, Moo-Song
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.1
    • /
    • pp.102-107
    • /
    • 2005
  • With the advancement which development and information communication of the computer is quick about lower with multimedia technical diffusion of network base the necessity the use of the digital image technique which is various regarding the protection of sharp increasing multimedia contents raised its head in the social whole. the copyright protection against a multimedia data hazard the authentication techniques it will be able to confirm the content authentication, ownership authentication, illegal copy of the image which stands is demanded. confronts to the water marking technique of existing and the researches the fact that against a picture is most. In this paper, It does not damage the video data which is a multimedia contents not to be, it inserts copyright information and it protects the right of ownership. It is with a copyright protection which leads the wavelet transform which is a watermark of frequency base from visual system viewpoint in the human being center with it proposes the watermarking technique against a forgery prevention.

Application of 3D Digital Documentation to Natural Monument Fossil Site (천연기념물 화석산지의 3차원 디지털 기술 적용)

  • Kong, Dal-Yong;Lim, Jong-Deock;Wohn, Kwang-Yeon;Ahn, Jae-Hong;Kim, Kyung-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.11
    • /
    • pp.492-502
    • /
    • 2011
  • 20 fossil sites of numerous fossil sites in Korea have been designated as Natural Monument for protection and conservation. Many of the sites which is located at the coastal area have been gradually disfigured by natural weathering, erosion and human activity. Thus the conservation of the original form and the documentation for the original figure are necessary. In this study, we applied 3D digital documentation to Natural Monument No. 394, Haenam Uhangri dinosaur, pterosaur, and bird footprint fossil site, for maintaining the original form of the dinosaur footprints. We were able to obtain the 3D digital data on two dinosaur footprint sites, a high resolution distributional map, and more accurate digital data of the dinosaur footprints applied the rendering method by ambient occlusion. 3D digital data on the dinosaur footprints is worth for the conservation and research data, moreover content for applying to the various fields such as to make 3D brochure, interactive contents, and so on.

Development of E-Book Reader System for Q+ Platform (Q+ 플랫폼을 위한 전자책 리더 개발)

  • 이은정;조수선
    • Proceedings of the CALSEC Conference
    • /
    • 2001.08a
    • /
    • pp.503-510
    • /
    • 2001
  • Q+-reader, an E-Book reader system for XML based contents is introduced. The system is developed for the embedded platform, called Q+, which targets for the digital home electronics systems. The system supports XML contents and CSS based styling as described in Open e-Book standard. The system renders the e-book contents for users, so the contents are secured for a proper use. This will found an essential part of business infra for electronic books with copyright protection. The system was developed in Java language to be used in various platforms, and has an open architecture to be reusable for other standards as well.

  • PDF

Development of E-Book Reader System for Q+Platform (전자책 유통을 위한 리더 시스템 개발)

  • 이은정
    • Journal of Internet Computing and Services
    • /
    • v.2 no.4
    • /
    • pp.83-90
    • /
    • 2001
  • Q+-reader, an E-Book reader system for XML based contents is introduced, The system is developed for the embedded platform, called Q+, which targets for the digital home electronics systems, The system supports XML contents and CSS based styling as described in Open e-book standard. The system renders the e-book contents for users, sc the contents are secured for a proper use. This will found an essential part of business infra for electronic books with copyright protection, The system was developed in Java language to be used in various platform;, and has an open architecture to be reusable for other standards as well.

  • PDF

Applied Method to Trusted Digital Content Distribution Architecture (신뢰할 수 있는 디지털 콘텐츠 유통 아키텍처 방안)

  • Kim, Hye-Ri;Hong, Seng-Phil;Lee, Chul-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.151-162
    • /
    • 2008
  • As the innovative internet technologies and multimedia are being rapidly developed, digital content is a remarkable new growth industry and supplied by various channel. For example, domestic sales volume in digital contents marked an annual increase of 14.7% since 2003. Against the merits of digital content distribution, Information reengineering aspects are getting more serious issues in these days such as infringement of copyright, flood of inappropriate content, invasion and infringement of privacy, etc. In this paper, we are making a suggestion of the TDCDA-Trusted Digital Content Distribution Architecture in order to solve above problems. TDCDA is provided to how well-define and design the trusted path in digital contents distribution in internet environments using a secure distribution mechanism, digital content integrity and copyright protection. Finally, we also proposed the TDCDA algorithm and applicable guidelines for feasible approach in real computing environment.

DCT and Homomorphic Encryption based Watermarking Scheme in Buyer-seller Watermarking Protocol

  • Seong, Teak-Young;Kwon, Ki-Chang;Lee, Suk-Hwan;Moon, Kwang-Seok;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.12
    • /
    • pp.1402-1411
    • /
    • 2014
  • Buyer-seller watermarking protocol is defined as the practice of imperceptible altering a digital content to embed a message using watermarking in the encryption domain. This protocol is acknowledged as one kind of copyright protection techniques in electronic commerce. Buyer-seller watermarking protocol is fundamentally based on public-key cryptosystem that is operating using the algebraic property of an integer. However, in general usage, digital contents which are handled in watermarking scheme mostly exist as real numbers in frequency domain through DCT, DFT, DWT, etc. Therefore, in order to use the watermarking scheme in a cryptographic protocol, digital contents that exist as real number must be transformed into integer type through preprocessing beforehand. In this paper, we presented a new watermarking scheme in an encrypted domain in an image that is based on the block-DCT framework and homomorphic encryption method for buyer-seller watermarking protocol. We applied integral-processing in order to modify the decimal layer. And we designed a direction-adaptive watermarking scheme by analyzing distribution property of the frequency coefficients in a block using JND threshold. From the experimental results, the proposed scheme was confirmed to have a good robustness and invisibility.