• Title/Summary/Keyword: Illegal streaming video

Search Result 7, Processing Time 0.018 seconds

Effecient Techniques to Block Copyright Infringement Illegal Streaming Sites (저작권 침해 불법 스트리밍 사이트 차단을 위한 효율적인 기법)

  • Kim, Chan-hee;Yu, Ho-jei;Kim, Seo-yeon;Oh, Soo-hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.837-844
    • /
    • 2022
  • In proportion to the rapid development of information and communication technology, the damage to copyright infringement is also increasing. In particular, as the OTT platform market has grown significantly in recent years, the speed and distribution of pirated copies that infringe copyright are increasing rapidly compared to the past. Accordingly, the country is trying to prevent copyright infringement by detecting and blocking illegal streaming sites, but it is difficult to expect great results due to the fast production of illegal streaming sites. Therefore, in this paper, we analyze the causes of rapid production of blocked illegal streaming sites, track and analyze 58 illegal streaming sites, and propose ways to effectively block illegal streaming sites based on the analysis results.

A Discriminating Mechanism of Suspected Copyright Infringement Video with Strong Distortion Resistance (왜곡 저항력이 강한 저작권 침해 영상 저작물 판별 기법)

  • Yu, Ho-jei;Kim, Chan-hee;Chung, A-yun;Oh, Soo-hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.387-400
    • /
    • 2021
  • The increase in number of streaming platforms and contents thereof, owing to an advancement of cloud environment, has triggered the rapid proliferation of illegally replicated contents as well as legal contents. This necessitates the development of technology capable of discriminating the copyright infringement of various contents. The Korea Copyright Protection Agency operates a video content demonstration system using AI, but it has limitations on distortions such as resolution changes. In this paper, we propose the powerful mechanism using skeleton, which is resistant against distorted video contents and capable of discriminating copyright infringement of platforms streaming illegal video contents. The proposed mechanism exploits the calculation of Hamming distance to the original video by converting collected data into binary ones for the efficient calculation. As a result of the experiment, the proposed mechanism have demonstrated the discrimination of illegally replicated video contents with an accuracy of 94.79% and average magnitude of 215KB.

A Study on Copyright Infringement over Online Streaming Services by Reconstructing Web Cache (웹 브라우저 캐시 재조립을 통한 온라인 스트리밍 서비스 상의 저작권 침해 가능성에 관한 연구)

  • Lim, Yirang;Chung, Hyunji;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.559-572
    • /
    • 2020
  • As internet technology advances, users can share content online, and many sharing services exist. According to a recently published digital forensic study, when playing an online streaming service, you can restore the played video by reconstructing the Chrome cache file left on local device such as a PC. This can be seen as evidence that the user watched illegal video content. From a different point of view, copyright infringement occurs when a malicious user restores video stream and share it to another site. In this paper, we selected 23 online streaming services that are widely used both at home and abroad. After streaming videos, we tested whether we can recover original video using cache files stored on the PC or not. As a result, the paper found that in most sites we can restore the original video by reconstructing cache files. Furthermore, this study also discussed methodologies for preventing copyright infringement in online streaming service.

System Design and Implementation for New Move Picture Solution EZ-MOV Using FLV (FLV를 이용한 새로운 동명상 솔루션 EZ-MOV 대한 시스템 설계 및 구현)

  • Kwon, O-Byoung;Shin, Hyun-Cheul
    • Convergence Security Journal
    • /
    • v.9 no.2
    • /
    • pp.79-84
    • /
    • 2009
  • Recently, Move Picture Files have the same file format and a compression technique as Window Media Video form. but Moving Pictures using file format and a compression technique have question about Motion blur and compressibility. In this paper, we design and Implement for new Move Picture Solution EZ-MOV using FLV different from developed FLV(Flash Video) in the Macromedia company. EZ-MOV have advantages as follow. first, FLV player is able to compact disk access time and DRM (Digital Rights Management) with a built-in self and unable to an illegal video recording, second, whenever WMV formal file encoded FLV are able to lossless compression to fifty percent, third, FLV is able to Moving Picture streaming no buffering. fourth, FLV file is able streaming service no streaming server. fifth, FLV file is able to streaming service keep pace with download and streaming. sixth, FLV file is able to full duplex service.

  • PDF

Video Contents Security Streaming (동영상 콘텐츠 보안 스트리밍)

  • Kim, Minseh;An, Beongku
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.5
    • /
    • pp.67-74
    • /
    • 2012
  • Since current paid video contents have a security vulnerability, anyone can obtain the information of video contents. In this paper, we analyze current video encryption methods which are used commercially to prevent illegal downloading movies. And we propose an address encryption method which can encrypt and decrypt video contents in program itself. In the performance evaluation, we compare the proposed method with the conventional method to show the improvement of security with the reduced delay for encoding and decoding through encryption.

SVC and CAS Combining Scheme for Support Multi-Device Watching Environment (다중기기 시청환경을 지원하기 위한 SVC와 CAS 결합 기법)

  • Son, Junggab;Oh, Heekuck;Kim, SangJin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1111-1120
    • /
    • 2013
  • CAS used in IPTV or DTV has an environment of sending single type of contents through single streaming. But it can be improved to support users' various video applications through single streaming by combining with SVC. For such an environment, efficiency should be firstly considered, and hierarchical key management methods for billing policy by service levels should be applied. This study aims to look into considerations to apply SVC to CAS and propose SVC encryption in CAS environment. The security of the proposed scheme is based on the safety of CAS and oneway hash function. If the proposed scheme is applied, scalability can be efficiently provided even in the encrypted contents and it is possible to bill users according to picture quality. In addition, the test results show that SVC contents given by streaming service with the average less than 10%overhead can be safely protected against illegal uses.

The Dynamic Group Authentication for P2P based Mobile Commerce (P2P 기반의 모바일 상거래를 위한 동적 그룹 인증)

  • Yun, Sunghyun
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.335-341
    • /
    • 2014
  • To play the networked video contents in a client's mobile device in real time, the contents should be delivered to it by the contents server with streaming technology. Generally, in a server-client based commerce model, the server is in charge of both the authentication of the paid customer and distribution of the contents. The drawback of it is that if the customers' requests go on growing rapidly, the service quality would be degraded results from the problems of overloaded server or restricted network bandwidth. On the contrary, in P2P based networks, more and more the demand for service increasing, the service quality is upgraded since a customer can act as a server. But, in the P2P based network, there are too many servers to manage, it's possible to distribute illegal contents because the P2P protocol cannot control distributed servers. Thus, it's not suitable for commercial purposes. In this paper, the dymanic group authentication scheme is proposed which is suited to P2P based applications. The proposed scheme consists of group based key generation, key update, signature generation and verification protocols. It can control the seeder's state whether the seeder is joining or leaving the network, and it can be applied to hybrid P2P based commerce model where sales transactions are covered by the index server and the contents are distributed by the P2P protocol.