• Title/Summary/Keyword: Mobile DRM System

Search Result 30, Processing Time 0.03 seconds

A Study on DRM System for Digital Contents Protection based on Advanced Authentication Protocol (디지털 콘텐츠 보호를 위한 향상된 인증 프로토콜 보안 시스템에 관한 연구)

  • Jung, Young-Hoon;Kim, Hyun-Chul;Lee, Kwang-Hyung;Jun, Moon-Seog
    • Proceedings of the KAIS Fall Conference
    • /
    • 2006.05a
    • /
    • pp.360-363
    • /
    • 2006
  • 본 논문에서는 디지털 콘텐츠의 암호화키를 Puzzle기법을 사용하여 Puzzle을 재배치하고 재배치한 조합도를 공개키로 암호화 하여 유선을 통하여 전송하고, 조합을 위해 사용된 해쉬값을 OTP를 생성하여 무선으로 사용자에게 전송하는 알고리즘을 제안하고, 재배치된 Puzzl 및 OTP를 E-mail과 Mobile phone을 이용하여 높은 수준의 안전성을 제안하였다. 제안 시스템을 설계하고 구현한 후 성능 평가를 위해 다양한 콘텐츠 파일을 이용하여 실험을 수행하여 제안한 시스템이 기존 시스템에 비해 높은 보안성을 검증하였다.

  • PDF

Design and Implementation of Mobile Security System for Content Rights Management in Wireless Internet Environment (무선 인터넷 환경에서 컨덴츠 저작권 보호를 위한 모바일 보안시스템의 설계 및 구현)

  • Kim, Hoo-Jong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11c
    • /
    • pp.1945-1948
    • /
    • 2003
  • 무선 인터넷이 활성화되면서 다양한 형태의 무선 컨텐츠가 상용화되고 있으며, 이와 동시에 불법적인 컨텐츠의 유통이 성행하게 되어 컨텐츠 보안을 위한 디지털 저작권 관리(DRM: Digital Rights Management)시스템이 요구되고 있다. 본 논문에서는 무선 인터넷 환경에서 유통되는 디지털 컨텐츠의 저작권 보호를 위한 모바일 보안 시스템을 제안하였다. 특히, 본 시스템에서 단말의 처리 능력을 고려하여 컨텐츠 부분 암호화 기법을 적용하여 신속한 복호화 수행이 가능하도록 설계하였다. 본 시스템을 적용할 경우 컨텐츠의 권리보호는 물론이며, 제한적인 모바일 디바이스에서 기존보다 신속한 수행이 가능해지는 효과를 기대할 수 있다.

  • PDF

A Study on DRM Model using Electronic Cash System (영상 이동변위 기반의 휴대 장치의 새로운 사용자 인터페이스)

  • Jin, Hong-Yik;Park, Sea-Nae;Sim, Dong-Gyu;NamKung, Jae-Chan
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.4
    • /
    • pp.454-461
    • /
    • 2008
  • This paper is regarding a new input interface based on displacement of mobile devices having a camera. The mobile device can capture consecutive images by the camera, the displacement of the device is estimated by computing the displacement between consecutive images in real-time. The proposed system extracts feature points based on SUSAN comer detector which has low computational complexity. We generate Voronoi domain by using the two-pass algorithm to match extracted features. Finally, the displacement of a mobile device is estimated by calculating SAD values between two consecutive images. We evaluated the performance of the proposed algorithm with 1500 images. True matching accuracy of the proposed algorithm is 90% and the computation for each image is conducted in 5m sec.

  • PDF

The Study on Design and Implementation of MSEC-based Group Key Management Protocol for Corporate Secret Distribution (기업비밀유통을 위한 MSEC 기반 그룹 키 관리 프로토콜 설계와 구현 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.11 no.6
    • /
    • pp.87-110
    • /
    • 2010
  • Recently competitive Korean companies are suffered from financial loss due to illegal exposure of their own proprietary know-how secrets, since it is difficult to watch hidden illegal channels to leak them due to their digitalization. Today the DRM-based system designed to protect such secrets is insufficient to prevent it, since DRM-based protection system cannot defend the intelligent robbery of secrets, in special, employee's robbery. The MSEC is much appropriate to secure secrets against employee's robbery. Our paper notes that IGMP, MSEC and SNMP can work easily together to realize secure system that satisfy strong security condition for prevention from leaking secrets. Since the previous research was on the architectural design for prevention of illegal exposure, this paper proposes the efficient protocol based on MSEC protocol. Our protocol satisfies the strong security conditions that the principles that the secret should be stored/distributed only in an encrypted shape, and should be separated physically from its encryption key, and should be carried in registered mobile storage separate from its processing device, and should be verified in terms of both user and device. Thus this paper proposes both the protocol for secret document distribution and its group key management.

A Study on DRM System for Multimedia Contents Protection base on Advanced Authentication Protocol (멀티미디어 콘텐츠 보호를 위한 향상된 인증 프로토콜 보안 시스템에 관한 연구)

  • Lee Kwang-Hyung;Jung Young-Hoon;Lee Young-Gu;Kim Hyun-Chul;Jun Moon-Seog
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.933-936
    • /
    • 2006
  • 본 논문에서는 디지털 콘텐츠의 암호화를 Puzzle기법을 사용하여 Puzzle을 재배치하고 재배치한 조합도를 공개키로 암호화 하여 유선을 통하여 전송하고, 조합도 암호화키 OTP를 생성하여 무선으로 사용자에게 전송하는 알고리즘을 제안하고, 재배치된 Puzzle기법과 Puzzle조합도 및 OTP를 E-mail과 Mobile phone을 이용하여 높은 수준의 사용자 Deviec와 사용자 인증을 제안하였다. 제안 시스템을 설계하고 구현한 후 성능 평가를 위해 다양한 콘텐츠 파일을 이용하여 실험을 수행하여 제안한 시스템이 기존 시스템에 비해 높은 보안성을 검증하였다.

  • PDF

A Study on Adaptive Cryptography Methods based on Context Information under Mobile Environment (모바일 환경에서 상황 정보에 기반한 적응형 암호화 기법에 관한 연구)

  • Chang, Hye-Young;Choi, Jong-Cheon;Yun, Young-Min;Cho, Seong-Je
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.1001-1004
    • /
    • 2007
  • 휴대폰, MP3 플레이어 등의 모바일 기기가 일반화되고 SoC(System-on-a-Chip) 기술이 발전하면서 모바일 콘텐츠의 이용 및 모바일 DRM(디지털 저작권 관리)에 대한 관심이 증가되었다. 모바일 기기의 경우 한정된 컴퓨팅 자원으로 인해 큰 멀티미디어 파일에 대한 암호화 연산의 오버헤드가 크며 그에 따른 전력 에너지 소모 또한 큰 부담이 된다. 본 논문에서는 모바일 환경에서 대상 데이터의 중요도 및 자원의 상태에 따라 에너지 소모를 줄일 수 있는 적응형 암호화 기법에 대해 제안한다. 제안하는 주요 방법으로, 저가의 콘텐츠에 대해서는 부분 암호화 기법 적용, 중간 가격 파일에 대한 다중 암호 방식의 적용, 모바일 기기의 사양에 따라 서로 다른 암호화 기법의 적용, 통신 상태나 배터리 용량에 따른 암호화 기법의 적용 등이 있다.

  • PDF

A Study on Fingerprinting Robustness Indicators for Immersive 360-degree Video (실감형 360도 영상 특징점 기술 강인성 지표에 관한 연구)

  • Kim, Youngmo;Park, Byeongchan;Jang, Seyoung;Yoo, Injae;Lee, Jaechung;Kim, Seok-Yoon
    • Journal of IKEEE
    • /
    • v.24 no.3
    • /
    • pp.743-753
    • /
    • 2020
  • In this paper, we propose a set of robustness indicators for immersive 360-degree video. With the full-fledged service of mobile carriers' 5G networks, it is possible to use large-capacity, immersive 360-degree videos at high speed anytime, anywhere. Since it can be illegally distributed in web-hard and torrents through DRM dismantling and various video modifications, however, evaluation indicators that can objectively evaluate the filtering performance for copyright protection are required. In this paper, a robustness indicators is proposed that applies the existing 2D Video robustness indicators and considers the projection method and reproduction method, which are the characteristics of Immersive 360-degree Video. The performance evaluation experiment has been carried out for a sample filtering system and it is verified that an excellent recognition rate of 95% or more has been achieved in about 3 second execution time.

A Study on Data Reference Model for a Cost Management System on Small Business Food Franchise (소형외식프랜차이즈업체의 원가관리시스템을 위한 데이터참조모델에 대한 연구)

  • Lee, Min Jung;Eu, Yoon-Sun;Park, Sang Chan;Kim, SeokHun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.9
    • /
    • pp.165-175
    • /
    • 2013
  • Though the number of food franchises has been increased these days, there has not been less success for food franchise than failure. One of the several failures is the distrust between franchisor and franchisee factors because the franchisee thought its franchisor does not make its accounts and operations transparent. In order to resolve it, the large business food franchise has used the ERP system, however, small business franchise has run a very simple information system, which is linked to POS system and consists of simple functions to insert or inquire the result of data on sales and order etc to identify the status of both franchisor and franchisee because of financial difficulties and manpower shortage. Thus, small business franchise needs the cost management between them with low cost for efficient business administration. In this study, we suggest the data reference model (DRM) which covers the cost management system and is able to be linked to any POS system. The DRM is a framework whose primary purpose is to enable information linking and reuse across the any POS-based information systems via the classification, structure, model, exchange and management of data.

Fast Stream Cipher AA32 for Software Implementation (소프트웨어 구현에 적합한 고속 스트림 암호 AA32)

  • Kim, Gil-Ho;Park, Chang-Soo;Kim, Jong-Nam;Cho, Gyeong-Yeon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.6B
    • /
    • pp.954-961
    • /
    • 2010
  • Stream cipher was worse than block cipher in terms of security, but faster in execution speed as an advantage. However, since so far there have been many algorithm researches about the execution speed of block cipher, these days, there is almost no difference between them in the execution speed of AES. Therefore an secure and fast stream cipher development is urgently needed. In this paper, we propose a 32bit output fast stream cipher, AA32, which is composed of ASR(Arithmetic Shifter Register) and simple logical operation. Proposed algorithm is a cipher algorithm which has been designed to be implemented by software easily. AA32 supports 128bit key and executes operations by word and byte unit. As Linear Feedback Sequencer, ASR 151bit is applied to AA32 and the reduction function is a very simple structure stream cipher, which consists of two major parts, using simple logical operations, instead of S-Box for a non-linear operation. The proposed stream cipher AA32 shows the result that it is faster than SSC2 and Salsa20 and satisfied with the security required for these days. Proposed cipher algorithm is a fast stream cipher algorithm which can be used in the field which requires wireless internet environment such as mobile phone system and real-time processing such as DRM(Digital Right Management) and limited computational environments such as WSN(Wireless Sensor Network).

An Embedding /Extracting Method of Audio Watermark Information for High Quality Stereo Music (고품질 스테레오 음악을 위한 오디오 워터마크 정보 삽입/추출 기술)

  • Bae, Kyungyul
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.2
    • /
    • pp.21-35
    • /
    • 2018
  • Since the introduction of MP3 players, CD recordings have gradually been vanishing, and the music consuming environment of music users is shifting to mobile devices. The introduction of smart devices has increased the utilization of music through music playback, mass storage, and search functions that are integrated into smartphones and tablets. At the time of initial MP3 player supply, the bitrate of the compressed music contents generally was 128 Kbps. However, as increasing of the demand for high quality music, sound quality of 384 Kbps appeared. Recently, music content of FLAC (Free License Audio Codec) format using lossless compression method is becoming popular. The download service of many music sites in Korea has classified by unlimited download with technical protection and limited download without technical protection. Digital Rights Management (DRM) technology is used as a technical protection measure for unlimited download, but it can only be used with authenticated devices that have DRM installed. Even if music purchased by the user, it cannot be used by other devices. On the contrary, in the case of music that is limited in quantity but not technically protected, there is no way to enforce anyone who distributes it, and in the case of high quality music such as FLAC, the loss is greater. In this paper, the author proposes an audio watermarking technology for copyright protection of high quality stereo music. Two kinds of information, "Copyright" and "Copy_free", are generated by using the turbo code. The two watermarks are composed of 9 bytes (72 bits). If turbo code is applied for error correction, the amount of information to be inserted as 222 bits increases. The 222-bit watermark was expanded to 1024 bits to be robust against additional errors and finally used as a watermark to insert into stereo music. Turbo code is a way to recover raw data if the damaged amount is less than 15% even if part of the code is damaged due to attack of watermarked content. It can be extended to 1024 bits or it can find 222 bits from some damaged contents by increasing the probability, the watermark itself has made it more resistant to attack. The proposed algorithm uses quantization in DCT so that watermark can be detected efficiently and SNR can be improved when stereo music is converted into mono. As a result, on average SNR exceeded 40dB, resulting in sound quality improvements of over 10dB over traditional quantization methods. This is a very significant result because it means relatively 10 times improvement in sound quality. In addition, the sample length required for extracting the watermark can be extracted sufficiently if the length is shorter than 1 second, and the watermark can be completely extracted from music samples of less than one second in all of the MP3 compression having a bit rate of 128 Kbps. The conventional quantization method can extract the watermark with a length of only 1/10 compared to the case where the sampling of the 10-second length largely fails to extract the watermark. In this study, since the length of the watermark embedded into music is 72 bits, it provides sufficient capacity to embed necessary information for music. It is enough bits to identify the music distributed all over the world. 272 can identify $4*10^{21}$, so it can be used as an identifier and it can be used for copyright protection of high quality music service. The proposed algorithm can be used not only for high quality audio but also for development of watermarking algorithm in multimedia such as UHD (Ultra High Definition) TV and high-resolution image. In addition, with the development of digital devices, users are demanding high quality music in the music industry, and artificial intelligence assistant is coming along with high quality music and streaming service. The results of this study can be used to protect the rights of copyright holders in these industries.