• Title/Summary/Keyword: Digital copyright

Search Result 533, Processing Time 0.025 seconds

Binary Image Watermarking Based on Grouping Feature Regions (특수런을 이용한 특징영역 분리에 의한 이진영상 워터마킹)

  • 이정환;박세현;노석호
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.177-180
    • /
    • 2002
  • In this paper, an effective digital watermarking method for copyright protection of binary image data is proposed. First, a binary image is grouped into feature regions which have geometrical features and general one. The watermark for authentication is embedded in general regions in order to preserve geometrical features regions. We have used run-length code and special runs for grouping feature regions and general one. For invisibility of watermark, we have embedded the watermark considering transition sensitivity of each pixel in general regions. The proposed method is applied to some binary image such as character, signature, seal, and fingerprint image to evaluate performance. By the experimental results, the proposed method preserve feature regions of original image and have higher invisibility of watermarks.

  • PDF

Watermark Detection Algorithm Using Statistical Decision Theory (통계적 판단 이론을 이용한 워터마크 검출 알고리즘)

  • 권성근;김병주;이석환;권기구;권기용;이건일
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.40 no.1
    • /
    • pp.39-49
    • /
    • 2003
  • Watermark detection has a crucial role in copyright protection of and authentication for multimedia and has classically been tackled by means of correlation-based algorithms. Nevertheless, when watermark embedding does not obey an additive rule, correlation-based detection is not the optimum choice. So a new detection algorithm is proposed which is optimum for non-additive watermark embedding. By relying on statistical decision theory, the proposed method is derived according to the Bayes decision theory, Neyman-Pearson criterion, and distribution of wavelet coefficients, thus permitting to minimize the missed detection probability subject to a given false detection probability. The superiority of the proposed method has been tested from a robustness perspective. The results confirm the superiority of the proposed technique over classical correlation- based method.

A Design of Serious Game Metadata Schema for Reliability and Compatibility (신뢰도와 호환성을 위한 기능성게임 메타데이터 스키마 설계)

  • Yoon, Sun-Jung
    • Journal of Korea Game Society
    • /
    • v.10 no.3
    • /
    • pp.73-82
    • /
    • 2010
  • The Metadata are used for the reuse of core information, distribution and management, protection of copyright and prevention of overlapping investment. Serious game consists of multi-hierarchial multimedia data. And quality information is very important for selection according to the purpose of the game. In this paper, we designed the serious game metadata schema, including multi-media characteristic information and measurable quality information. This study will lay the groundwork for the development of metadata system which can provide serious game users with reliability through quality information, and with compatibility through multi-media characteristic information. Furthermore, we hope this study will be helpful to stable growth in serious game industry.

Scrambling Technology in MPEG Video Environment (MPEG비디오 부호화기 내의 scrambling 기술)

  • Kwon, Goo-Rak;Youn, Joo-Sang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.7
    • /
    • pp.1279-1284
    • /
    • 2009
  • With the advance of multimedia technology, multimedia sharing among multiple devices has become the main issue. This allows users to expect the peer-to-peer distribution of unprotected and protected contents over public network. Inevitably, this situation has caused an incredible piracy activity and Web sites have begun to provide copyrighted A/V data for free. In order to, protect the contents from illegal attacks and distribution, digital right management (DRM) is required. In this paper, we present the minimal cost scrambling scheme for securing the copyrighted multimedia using the data encryption standard (DES) encryption technique. Experimental results indicate that the proposed scrambling techniques achieve a very good compromise between several desirable properties such as speed, security, and file size.

Embedding Binary Watermark Image using DWT Coefficients (이산 웨이블릿 변환계수를 이용한 이진 워터마크 영상)

  • Park, Kwang-Chae;Bae, Ceol-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.10
    • /
    • pp.6317-6321
    • /
    • 2014
  • Multimedia documents can be transferred quickly and easily across the Internet, and has attracted considerable interest in multimedia security and multimedia copyright protection. This paper proposes an animage watermarking scheme embedding a binary watermark image using Discrete Wavelet Transform (DWT) coefficients. The original image is transformed to the wavelet domain and decomposed in subbands. The binary watermark image, as a sequence of bits, is embedded into the middle frequency subbands. The original image is not needed to detect the watermark image. The proposed method detected fewer watermark bits but produced an approximately 10dB higher PSNR than the max/min method.

A Design and Implementation of a Secure Internet Phone System (인터넷 폰 보안 시스템의 설계 및 구현)

  • Park, Jae-Hui;Kim, Il-Min
    • The KIPS Transactions:PartC
    • /
    • v.9C no.2
    • /
    • pp.157-162
    • /
    • 2002
  • In this study, the secure Internet phone system using digital signature and data encryption with DES algorithm and EDE algorithm was implemented. And new key distribution algorithm was suggested utilizing the Diffie-bellman algorithm. For reducing processing time, a table combined with S-BOX and P-BOX of the DES was used. The proposed system was implemented with Java and the results showed the processing time using DES algorithm for encryption was 1.46 seconds and that of EDE algorithm was 3.25 seconds respectively. This system can be applied to Protect the copyright of sound products and data using internet.

Digital Watermarking of Medical Images (의료영상의 디지털 워터마킹)

  • Lee, Sang-Bock;Lee, Sam-Yol;Lee, Jun-Haeng
    • Journal of radiological science and technology
    • /
    • v.27 no.2
    • /
    • pp.13-19
    • /
    • 2004
  • This study proposes how to insert a strong watermark creating a big change in the areas of edge and texture. While conversion by existing Fourier transformation can acquire information for all ranges of frequency domain from the image, Wavelet transformation can manipulate edge and texture area selectively. Therefore, through wavelet transformation concerned area may be selected and watermarks in copyright formation are inserted. Our proposed algorithm was compared to Xia's watermarking technique using wavelet transformation. Its fidelity and robustness were tested with attack methods used in existing papers and it turns out that the proposed algorithm using HVS properties is more superior to Xia's techniques.

  • PDF

Digital Watermarking Algorithm of Still Image Using Human Visual System Characteristics (인간시각체계 특성을 이용한 정지영상 디지털 워터마킹 알고리즘)

  • 지남현;전병민
    • The Journal of the Korea Contents Association
    • /
    • v.3 no.2
    • /
    • pp.31-38
    • /
    • 2003
  • This paper proposes method to insert soong Watermark considering dull HVS properties to big change of Edge and Texture area. While conversion of existent Fourier form can acquire information for whole frequency ingredient of image, but Wavelet transform can look for Edge and Texture area locally. Therefore, use Wavelet transform to use HVS properites, and compare with Xia's Watermarking techniques to use Wavelet transform simply arid experimented these proposal algorithm. Experimented about fidelity and robusthness by attack method that is used in existing paper, and as a result, confirmed that proposal algorithm that use HVS properties is more superior than Xia's techniques.

  • PDF

A Study on the Process of Policy Change of Hyper-scale Artificial Intelligence: Focusing on the ACF (초거대 인공지능 정책 변동과정에 관한 연구 : 옹호연합모형을 중심으로)

  • Seok Won, Choi;Joo Yeoun, Lee
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.18 no.2
    • /
    • pp.11-23
    • /
    • 2022
  • Although artificial intelligence(AI) is a key technology in the digital transformation among the emerging technologies, there are concerns about the use of AI, so many countries have been trying to set up a proper regulation system. This study analyzes the cases of the regulation policies on AI in USA, EU and Korea with the aim to set up and improve proper AI policies and strategies in Korea. In USA, the establishment of the code of ethics for the use of AI is led by private sector. On the other side, Europe is strengthening competitiveness in the AI industry by consolidating regulations that are dispersed by EU members. Korea has also prepared and promoted policies for AI ethics, copyright and privacy protection at the national level and trying to change to a negative regulation system and improve regulations to close the gap between the leading countries and Korea in AI. Moreover, this study analyzed the course of policy changes of AI regulation policy centered on ACF(Advocacy Coalition Framework) model of Sabatier. Through this study, it proposes hyper-scale AI regulation policy recommendations for improving competitiveness and commercialization in Korea. This study is significant in that it can contribute to increasing the predictability of policy makers who have difficulties due to uncertainty and ambiguity in establishing regulatory policies caused by the emergence of hyper-scale artificial intelligence.

Characteristics and Current Status of Library E-book Purchase Contracts (도서관의 전자책 수급 계약의 특성과 실태)

  • Hosin Lee
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.57 no.1
    • /
    • pp.435-456
    • /
    • 2023
  • This study aims to check whether e-book purchase contracts have sufficient requirements to serve as legal basis for e-book lending outside the library, and also to understand the current status and characteristics of the library's e-book purchase contracts. To this end, the legal and technical environment related to e-book lending was reviewed, and the elements that must be included in the license contract were summarized as the legal basis for e-book lending. Based on this, it was analyzed whether these requirements were properly reflected in actual contract cases. For three years from 2020 to 2022, the actual 43 contracts that were bid through the Korea On-line E-Procurement System were inspected, and then problems were pointed out, and improvement measures were proposed.