• Title/Summary/Keyword: Illegal Copy

Search Result 99, Processing Time 0.024 seconds

Research on the trend of the protection technique for a Digital Contents (디지털 콘텐츠 보호 기술에 관한 동향 분석)

  • Na Cheol-Hun;Park Jin;Jung Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.4
    • /
    • pp.777-781
    • /
    • 2005
  • It is issued that protecting and managing a copyright are very important to a digitization of multimedia content. All of these techniques are for developing solution about protection and management of the copyright and media service. These have been at the head of the growth of the whole media service, but cause problems such as a illegal copy and distribution. To solve these problems, researchers are performing many projects. We analyze the trend of a multimedia service IPMP(Intellectual Property Management and Protection), DMP(Digital Media Project), ENTHRONE(End-to-end Qos through Integrated Management of Content, Networks and Terminals), and DRM(Digital Rights Management).

Terrestrial DTV Broadcasting Program Protection System based on Program Protection Information (방송프로그램 보호신호에 기반한 지상파 방송프로그램 보호 시스템)

  • Choo, Hyon-Gon;Lee, Joo-Young;Nam, Je-Ho
    • Journal of Broadcast Engineering
    • /
    • v.15 no.2
    • /
    • pp.192-204
    • /
    • 2010
  • As illegal distribution of the terrestial DTV broadcast program occurs very frequently in on-line, the needs to protect broadcast program have increased. In this paper, a new approach to implement a system for terrestial DTV broadcast program protection based on program protection information(PPI) is proposed. In our approach, the broadcast program is recorded with encryption according to redistribution condition of the PPI and packaged into a file with key information and PPI together. And we also define a set of domain protocol for supporting user fair-use of broadcast program. In the proposed system, copy control can also be provided by process of home domain management. Implementation results show that our system can protect broadcast programs with efficiency and can support conditional distribution within home domain in order to satisfy user fair-use.

Detection of Colluded Multimedia Fingerprint using LDPC and BIBD (LDPC와 BIBD를 이용한 공모된 멀티미디어 핑거프린트의 검출)

  • Rhee Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.5 s.311
    • /
    • pp.68-75
    • /
    • 2006
  • Multimedia fingerprinting protects multimedia content from illegal redistribution by uniquely marking every copy of the content distributed to each user. Differ from a symmetric/asymmetric scheme, fingerprinting schemes, only regular user can know the inserted fingerprint data and the scheme guarantee an anonymous before recontributed data. In this paper, we present a scheme which is the algorithm using LDPC(Low Density Parity Check) for detection of colluded multimedia fingerprint and correcting errors. This proposed scheme is consists of the LDPC block, Hopfield Network and the algorithm of anti-collusion code generation. Anti-collusion code based on BIBD(Balanced Incomplete Block Design) was made 100% collusion code detection rate about the linear collusion attack(average, AND and OR) and LD% block for the error bits correction confirmed that can correct error until AWGN 0dB.

A Design on Security Model of Domestic Internet-based Broadcasting Service (국내 인터넷기반 방송서비스의 보안 모델 설계)

  • Seo, Hee-Suk;Kim, Sung-Jun;Ahn, Woo-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.6
    • /
    • pp.183-190
    • /
    • 2012
  • Internet Protocol Television(IPTV) is the use of an IP broadband network to deliver television (cable TV type) services to the end user. Traditional telecommunications service providers as well as alternate service providers and Internet service providers can utilize their IP networks (and broadband consumer access) to deliver broadcast TV, Video on Demand (VOD) and other Internet services to the consumer. As digital technologies progress, illegal copy and redistribution of IPTV content become easier and simpler. Therefore it is required to protect IPTV content or service. In this paper, we analyze the security threats and requirements. We also discuss related issues and solutions for IPTV.

Development of Functional USB Solution to Contain Executable Software Using Scanning Mechanism (스캐닝 기법을 이용한 실행 소프트웨어를 담을 수 있는 기능성 USB 솔루션 개발)

  • Kim, Nam-Ho;Hwang, Bu-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.5
    • /
    • pp.947-952
    • /
    • 2012
  • The technology suggested in this study is the method to contain executable software in a portable storage devices like the USB and install an application program to operate it in any client devices. To solve this problem, we can store pre-scanned information on the above client's files, registry, and services in the device before installing the proper application program to be installed using the scanning method and manage in the USB the resources that generated and changed by post-scanning the information after installing the above application program in the client's device. After that, necessary files in the client to be used can be copied for using, and after use, related files are deleted, and it also includes the process to return to the previous system environment. This method is advantageous in that once any sort of application programs needed to be installed gets to be installed in an external portable storage devices like the USB, the application program installed can be operated in any computer not raising any issues like illegal copy.

Android Application Code Protection Scheme Using Fingerprint Authentication and Dynamic Loading (지문 인증과 동적 로딩을 이용한 안드로이드 애플리케이션 코드 보호 기법)

  • Lyoo, Hwahn-il;Suk, Jae-Hyuk;Park, Jin-Hyung;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1361-1372
    • /
    • 2017
  • If an external attacker takes from a victim's smartphone a copy of a secret application or an application to which fingerprinting technique is applied, secret information can be leaked or the legitimate user can be misunderstood as an illegal redistributor, which results in a serious security problem. To solve this problem, this paper proposes an Android application code protection scheme using fingerprint authentication and dynamic loading. The proposed scheme divides one application into CLR(Class LoadeR) and SED(SEperated Dex). CLR is an APK file with the ability to dynamically load the SED, and the SED is a file containing the classes required to run the application. The SED is stored inside the smartphone after being encrypted, and the SED can be decrypted only if the user is successfully authenticated using his or her fingerprint. The proposed scheme can protect the application code from the attacker who physically acquired user's smartphone.

The Watermarking Method Using by Binary Image (이진영상을 이용한 워터마킹 기법)

  • Lim Hyun-Jin;Lee Seung-Kyu;Kim Tea-Ho;Park Mu-Hun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.163-166
    • /
    • 2006
  • The field of medical images has been digitalized as the development of computer and the digitalization of the medical instruments. As a result it causes a lot of problems such as an illegal copy related to medical images and property right of the medical images. Therefore, digital watermarking is used for discrimination whether the data are modified or not. It is also used to protect both the property right of medical images and the private life of many patients. The proposed theories, the Non-blind and the Blind method, have two problems. One is needed an original image and the other is using a gaussian watermarking. This paper proposes the new Blind Watermarking using binary images in order to easily recognize the results of watermark. This algorithm is described that an watermark of a binary image is wavelet-transformed, and then a transformed watermark is inserted in medium-band of frequency domains of original image by the Circular Input method. The propose method presented the good performance of over 0.97 in NC.

  • PDF

A Plagiarism Detection Technique for Source Codes Considering Data Structures (데이터 구조를 고려한 소스코드 표절 검사 기법)

  • Lee, Kihwa;Kim, Yeoneo;Woo, Gyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.6
    • /
    • pp.189-196
    • /
    • 2014
  • Though the plagiarism is illegal and should be avoided, it still occurs frequently. Particularly, the plagiarism of source codes is more frequently committed than others since it is much easier to copy them because of their digital nature. To prevent code plagiarism, there have been reported a variety of studies. However, previous studies for plagiarism detection techniques on source codes do not consider the data structures although a source code consists both of data structures and algorithms. In this paper, a plagiarism detection technique for source codes considering data structures is proposed. Specifically, the data structures of two source codes are represented as sets of trees and compared with each other using Hungarian Method. To show the usefulness of this technique, an experiment has been performed on 126 source codes submitted as homework results in an object-oriented programming course. When both the data structures and the algorithms of the source codes are considered, the precision and the F-measure score are improved 22.6% and 19.3%, respectively, than those of the case where only the algorithms are considered.

POCS Based Digital Watermarking in Buyer-Seller Watermarking Protocal (Buyer-Seller 워터마킹 프로토콜 상에서 POCS 기반의 디지털 워터마킹)

  • Kwon, Seong-Geun;Lee, Ji-Hye;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.5
    • /
    • pp.569-582
    • /
    • 2007
  • Digital watermarking technique for copyright protection and prevention of illegal copy and distribution can provide the reliable transaction to both buyer and seller in e-commerce through the cryptographic protocol such as 'Buyer-seller watermarking protocol'. Recently there has been researched about some cryptographic protocols for watermarking system but there has no yet mentioned about the implementation of practical watermarking technique in protocol. This paper presents the watermark embedding technique based on POCS in buyer-seller watermarking protocol. The proposed method designs the robust convex set based on EZW and the invisible convex set using PSNR and then projects into two sets until the convergence condition is satisfied. Experimental results verified that BER of watermark that is embedded by the proposed method has lower 0.02-0.10 than BER of the conventional method.

  • PDF

A Study on the Secure Storage Device for Protecting Cryptographic Keys in Untrusted DRM Client Systems (신뢰할 수 없는 DRM 클라이언트 시스템 하에서 키 보호를 위한 Secure Storage Device의 연구)

  • 이기정;권태경;황성운;윤기송
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.2
    • /
    • pp.3-13
    • /
    • 2004
  • DRM is the ability to brand digital contents with features that ensure copy Protection and affect the way in which digital contents are played back. DRM is a technology that enables the secure distribution, promotion and sale of digital contents on the Internet. The DRM Client System that operates on the untrusted user environments has to meet the requirements of the contents owner, including copyright and contents protection. After the DRM Client System is installed on the untrusted user environments, it verifies and plays digital contents. With these procedures it cuties out user authentication, contents decryption, and license management. During these procedures, the sensitive data, including authentication information, decryption data and license data, must be secured against any illegal access from users. The goal of this thesis is to introduce the implementation of Secure Storage Device which can protect user's authentication key, cryptographic key, and license data in safe where the DRM Client System is running.