• Title/Summary/Keyword: Digital Contents Protection

Search Result 280, Processing Time 0.026 seconds

A Study on Protection Technology Criteria for Preventing Contents Abuse on On-line (온라인상의 콘텐츠 오남용 방지를 위한 보호기술 기준에 대한 연구)

  • Hong, Sung-Hyuk;Yoon, Eun-Jun;Han, Jae-Hong;Park, Jong-Hyuk
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.3
    • /
    • pp.432-437
    • /
    • 2009
  • Due to fast development of communications, knowledge and information have been become digitalized and distributed actively. However, the misuse and abuse of digital properties and security problems frequently take place. In this paper, we analyze the cases of the misuse and abuse of contents and the contents protection technology. We propose important items for protection technology to prevent contents from misuse and abuse based on results of the analyses. These important items are expected to be used as important factors for establishing protection technology standards.

  • PDF

Research on the Trend of Digital Contents Protection Techniques (디지털 컨텐츠의 보호기술에 관한 기술동향 분석)

  • Park, Jin;Na, Cheol-Hun;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.1094-1097
    • /
    • 2005
  • It is issued that protecting and managing a copyright are very important to a digitization of multimedia contents. We analyze the trend of a multimedia service, IPMP(Intellectual Property Management and Protection), DMP(Digital Media Project), ENTHRONE(End-to-end Qos through Integrated Management of Content, Networks and Terminals), and DRM(Digital Rights Management). All of these techniques are for developing solution about protection and management of the copyright and media service. These have been at the head of the growth of the whole media service, but cause problems such as a illegal copy and distribution. To solve these problems, researchers are performing many projects.

  • PDF

A Design and Implementation of Interoperable DRM System Based on DMP (DMP 기반의 상호운용 가능한 DRM 시스템 설계 및 구현)

  • Cho, Tae-Beom;Lee, Sang-Jo;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.5
    • /
    • pp.860-867
    • /
    • 2007
  • Digital Contents are increasing the modification of the contents by individual user and the modified or copied contents are simply distributed though the ultrahigh speed internet and the negative pervasive effect on the contents market is increasing. The solutions for copyright protection from illegally distributing contents are developing by various standardization groups and contents manufacturers and its commercia use is partly practiced. The MPEG was developing the IPMP technique to apply existed MPEG standards as a way of digital contents protection. However, as these IPMP techniques did not provide a satisfactory function for contents protection, the DMP standard was suggested as an alternative plan. In this paper, the system is designed and materialized to apply the TooIPack concept of DMP which ensure the interoperability of DRM system. With this paper, it is expected that the practical use and the possibility of the DMP standard in the DRM market would be verified and DMP standard may presents as a reference model for more systematic standardization operations.

IPMP system for a digital contents copyright protection (디지털 콘텐츠 저작권 보호를 위한 IPMP 시스템)

  • Kim, Chang-Su;Yoo, Sung-Jae;Choi, Il-Sun;Song, Jung-Young;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.409-412
    • /
    • 2005
  • A digital content have been utilized extensively without being limited to one territory of communication, computer, broadcasting, Mobile etc. A digital contents industry have been raised to a key point industry of a knowledge information society. An information infra setup of a global unit was processing to the development of Internet therefor copyright protection a digital contents and system for the officer have been desired. Like this, according as digital contents do fetters to MPEG-4 is circulated, copyright problem was risen. So, people had a lot of interests to protect and manage copyright. Hereupon, MPEG of the IS0/IEC established IPMP(Intellectual Property Management and Protection) standard, and supplements and corrects continuously standard. Therefore, existing system does fetters to MPEG-4 need system that process IPMP information. Hereupon. in this paper, designed system module that is processed by IPMP extension standard that progress now, and embodied copyright protection and management system that user can insert and update IPMP information efficiently within whole or specification part of MPEG-4 digital contents.

  • PDF

A study on the implementation of DRM system in digital home networking (디지털 홈네트워킹 환경에서의 DRM 시스템 구축)

  • Kim, Jong-An;Ryu, Jung-Seob;Han, Pyung-Hee;Kim, Jin-Han
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2005.08a
    • /
    • pp.104-108
    • /
    • 2005
  • Due to the rapid spread of high speed Internet access and the contents digitization, the demand for the copyright protection of digital contents has increased continuously so that the digital rights protection technology becomes one of the inevitable components in the digital content providing services. This paper describes the current trend of DRM(Digital Rights Management) technology and how to implement the system for the protection of digital assets in the digital home networking environment.

  • PDF

A study on the protection of on-line digital contents industry -focused on on-line digital contents industry development act- (온라인디지털콘텐츠산업의 보호에 관한 연구 -온라인디지털콘텐츠산업발전법을 중십으로-)

  • Kang, Sung-Ju
    • The Journal of Information Technology
    • /
    • v.7 no.2
    • /
    • pp.55-67
    • /
    • 2004
  • The copyright law only protects the creative representation of works because it conditionally requires a creativity aspect of works. Due to the lack of protection regime in existing laws and the systems, the online digital contents industrial development act has been enacted to alternatively protect the digital contents providers based on a principle of preventive of illegal competition.

  • PDF

The undeniable digital multisignature scheme suitable for joint copyright protection on digital contents (온라인 디지털 콘텐츠 공동 저작권 보호에 적합한 부인봉쇄 디지털 다중서명 기법)

  • 윤성현;한군희
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.05a
    • /
    • pp.261-267
    • /
    • 2004
  • In undeniable digital signature scheme, the signature can not be verified without the signer's cooperation. The undeniable signature scheme can be used to computerize many applications which can not be done by a conventional digital signature scheme. In this study, we propose the undeniable digital multi-signature scheme which requires many signers and designated verifier. The multi-signature can be verified only in cooperation with all signers. The proposed scheme satisfies undeniable property and it is secure against active attacks such as modification and denial of the multi-signature by signers. We also discuss practical applications such as joint copyright protection on digital contents.

  • PDF

Development of Forensic Marking technology for tracing multiple users (다중 불법콘텐츠 복제자 추적 기술 개발)

  • Kim, Jong-An;Kim, Jin-Han;Kim, Jong-Heum
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.102-106
    • /
    • 2008
  • Forensic Marking is the technology that enables the service providers (SP) to identify the illegal digital contents distributors by first inserting markings (data indicating the user information and playback time) in realtime into the digital contents at time of playback of digital contents, and then later by extracting inserted markings from the contents which are illegally captured from the multimedia device such as IPTV STBs and distributed over the Internet. Digital Rights Management (DRM), which is a very popular content protection technology, has the security hole that can be vulnerable because the encrypted digital contents are transformed into their original plaintext forms after the decrypting process on the STBs. Therefore Forensic Marking (FM) has now become a companion content protection solution to DRM. This article describes a new way of tracking up to 4 illegal content users in FM implementation using the blue-difference chroma component of YCbCr color space. This FM technology has many advantages like fast processing time and easy portability to STB devices compared to that of the traditional watermarking processing in the frequency domain.

  • PDF

A Protection Protocol for License-based Digital Rights (라이선스 기반 디지털 저작권 보호 방안)

  • Shin Weon
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.6
    • /
    • pp.368-377
    • /
    • 2005
  • The Internet technologies allows anybody who has connect a network to access various multimedia information. But, it brings new issues about the violation of intellectual property and copyright of multimedia contents. Digital right managements have been actively studied as approaches to solve them. In this paper, we propose license-based schemes for the protection of contents and its rights on digital right management. The proposed schemes provide limited distribution and superdistribution of contents, and guarantee to securely use contents by usage rules.

  • PDF

Wavelet-based Watermarking using Correlation Comparison (상관도 비교를 이용한 웨이블릿 기반 워터마킹)

  • Lee, Hyun-Suk;Vivi Oktavia;Lee, Won-Hyung
    • Proceedings of the IEEK Conference
    • /
    • 2003.11a
    • /
    • pp.217-220
    • /
    • 2003
  • This paper presents a wavelet-based digital watermarking scheme for color images. We insert watermarks in the DWI domain using spread-spectrum correlation-based watermarking in luminance component of the color image. The watermark, two pseudorandom patterns, is inserted by modifying the wavelet coefficients at subband HL2, LH2, HH2 according to message bits. To detect watermark, we calculate the correlation between the watermarked image and pseudorandom patterns. As compared with correlations, the watermark detector determines embedding message. Experimental results show that the scheme is not only invisible but also robust to various attacks such as JPEG compression, noise addition and so on.

  • PDF