• Title/Summary/Keyword: content authentication

Search Result 131, Processing Time 0.031 seconds

A Service Protection Scheme based on non-CAS for Mobile IPTV Service (Mobile IPTV 서비스 환경을 위한 non-CAS 기반의 서비스 보호 기법)

  • Roh, Hyo-Sun;Jung, Sou-Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.2
    • /
    • pp.27-35
    • /
    • 2011
  • Due to the advancement of IPTV technologies, Mobile IPTV service is needed to be supported for service and content protection. CAS is generally used in the IPTV service to protect service and content. However, the CAS is not efficient in the Mobile IPTV. The CAS needs too much bandwidth for Service Key update to the each subscriber. Moreover, the CAS is increasing computation burden for the service key refreshment in the key management server when the subscriber frequently changes of the IPTV service group. To solve the problems, we used hierarchical key structure based on pre-shared key that is securely stored into smart card or USIM and do not use the EMM for Service Key update. As a result, the proposed scheme decreases computation burden at the key management server and wireless bandwidth burden in the Mobile IPTV service.

Quantitative aspects of the hydrolysis of ginseng saponins: Application in HPLC-MS analysis of herbal products

  • Abashev, Mikhail;Stekolshchikova, Elena;Stavrianidi, Andrey
    • Journal of Ginseng Research
    • /
    • v.45 no.2
    • /
    • pp.246-253
    • /
    • 2021
  • Background: Ginseng is one of the most valuable herbal supplements. It is challenging to perform quality control of ginseng products due to the diversity of bioactive saponins in their composition. Acid or alkaline hydrolysis is often used for the structural elucidation of these saponins and sugars in their side chains. Complete transformation of the original ginsenosides into their aglycones during the hydrolysis is one of the ways to determine a total saponin group content. The main hurdle of this approach is the formation of various by-products that was reported by many authors. Methods: Separate HPLC assessment of the total protopanaxadiol, protopanaxatriol and ocotillol ginsenoside contents is a viable alternative to the determination of characteristic biomarkers of these saponin groups, such as ginsenoside Rf and pseudoginsenoside F11, which are commonly used for authentication of P. ginseng Meyer and P. quinquefolius L. samples respectively. Moreover, total ginsenoside content is an ideal aggregated parameter for standardization and quality control of ginseng-based medicines, because it can be directly applied for saponin dosage calculation. Results: Different hydrolysis conditions were tested to develop accurate quantification method for the elucidation of total ginsenoside contents in herbal products. Linearity, limits of quantification, limits of detection, accuracy and precision were evaluated for the developed HPLC-MS method. Conclusion: Alkaline hydrolysis results in fewer by-products than sugar elimination in acidic conditions. An equimolar response, as a key parameter for quantification, was established for several major ginsenosides. The developed approach has shown acceptable results in the analysis of several different herbal products.

Exploring the quality standard of Phellinus spp through β-glucan content and sensory evaluation (β-glucan 함량과 관능검사를 통한 상황버섯 품질기준 모색)

  • Shin, Yong-Wook
    • The Korea Journal of Herbology
    • /
    • v.32 no.4
    • /
    • pp.47-52
    • /
    • 2017
  • Objective : Phellinus spp. mushroom is an object of interest because it has excellent anticancer effect. Owing to the similalarities in the morphology, Phellinus linteus and Phellinus baumii are often used as same Sang Hwang Mushroom in the Korean market.. The quality control for mushrooms is needed because there are many differences in the efficacy according to cultivation method and cultivation area. Therefore, a reliable authentication method of these herbal medicine is necessary to compare and measure the amount of beta-glucan which is known to have a hypoglycemic effect, from the mushrooms collected in various regions Methods : 7 samples of medicinal mushrooms supplying phellinus spp. were collected in Korea, China and Cambodia. We investigated the hardness, colors, extract ratio, ${\alpha}-amylase$ and ${\alpha}-glucosidase$ inhibitory activities, glucose transporter 4 (GLUT-4) expressions of water extracts from Phellinus spp and also MTT assay were examined for cell toxicity. Results : The results revealed that Phellinus spp.water Ext.inhibited ${\alpha}-glucosidase$ activity. glucose transporter 4 (GLUT-4), the key insulin signaling pathway transcription factor, was remarkably increased by the Phellinus baumii water extract Conclusions : These results suggest that The more yellowish the mushroom is, the lower the hardness, the more the content of ${\beta}-glucan$ is proportional. Because the more ${\beta}-glucan$, the greater the effect of hypoglycemia. compared to the hypoglycemic effect, Phellinus Baumii grown at hanging on selves for 7 month in the green house is the best.

Digital Watermarking Technique of Compressed Multi-view Video with Layered Depth Image (계층적 깊이 영상으로 압축된 다시점 비디오에 대한 디지털 워터마크 기술)

  • Lim, Joong-Hee;Shin, Jong-Hong;Jee, Inn-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.1
    • /
    • pp.1-9
    • /
    • 2009
  • In this paper, proposed digital image watermarking technique with lifting wavelet transformation. This watermark technique can be easily extended in video content fields. Therefore, we apply this watermark technique to layered depth image structure that is efficient compression method of multi-view video with depth images. This application steps are very simple, because watermark is inserted only reference image. And watermarks of the other view images borrow from reference image. Each view image of multi-view video may be guaranteed authentication and copyright.

  • PDF

Spammer Detection using Features based on User Relationships in Twitter (관계 기반 특징을 이용한 트위터 스패머 탐지)

  • Lee, Chansik;Kim, Juntae
    • Journal of KIISE
    • /
    • v.41 no.10
    • /
    • pp.785-791
    • /
    • 2014
  • Twitter is one of the most famous SNS(Social Network Service) in the world. Twitter spammer accounts that are created easily by E-mail authentication deliver harmful content to twitter users. This paper presents a spammer detection method that utilizes features based on the relationship between users in twitter. Relationship-based features include friends relationship that represents user preferences and type relationship that represents similarity between users. We compared the performance of the proposed method and conventional spammer detection method on a dataset with 3% to 30% spammer ratio, and the experimental results show that proposed method outperformed conventional method in Naive Bayesian Classification and Decision Tree Learning.

Design and Implementation of the DRM Supporting Smart Multimedia Streaming in Ubi-Home (Ubi-Home에서의 지능적 멀티미디어 스트리밍을 지원하는 DRM 설계 및 구현)

  • Park Jong-Hyuk;Lee Sang-Jin;Hong In-Hwa;Ahn Tae-Won;Lee Deok-Gyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.3C
    • /
    • pp.293-301
    • /
    • 2006
  • In this paper, we design and implement the UHSNS-DRM(Ubi-Home Smart Multimedia Streaming-Digital Right Management) in Ubi-Home. The proposed system support flexible distribution platform for digital content copyright protection and management in Ubi-Home. This system also can provide multimedia streaming service to authorized users who are using PC, STB, PDA, and Portable Device, etc. Furthermore, we adopt concept of domain authentication and it help to improve the efficiency of license management for all devices in Ubi-Home. We design user's location recognition algorithm in order to provide intelligent services. Of course, this algorithm is applied for the proposed system. Start after striking space key 2 times.

Wavelet Based Intelligence image Watermarking Using Machine Vision of LabVIEW (LabVIEW의 Machine Vision을 이용한 웨이블릿 기반 지능형 이미지 Watermarking)

  • 송윤재;강두영;김형권;안태천
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2004.10a
    • /
    • pp.521-524
    • /
    • 2004
  • Recently, acgis of authentication and crcator's copyright has become a matter of great concern by the diffusion of multimedia technique and the growth of the internet and the easily duplicated property of digital data. Consequently, many active researches have been made to protect copyright and to assure integrity by inserting watermark into the digital data. In this paper, watermark is repealed through the entire image and adapted to the content of the image. Achieved by an underlying process of transforming the digital image to the frequency domain by wavelet transform, which has three (vertical, horizontal, diagonal) directions and Multi-resolution features, and then choosing frequency area inferior to the human perceptibility and significant for invisible and robust watermark. We realize wavelet based image watermarking using Machine Vision of LabVIEW.

  • PDF

Enhance the Performance of Contents Streaming Services using improve the DRM System (DRM 시스템 개선을 통한 콘텐츠 스트리밍 서비스 개선)

  • Lee, Jeong-Gi;Jeong, Yang-Kwon;Kim, Dong-Hyun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.3 no.4
    • /
    • pp.240-246
    • /
    • 2008
  • This paper propose a method to enhance the performance of digital contents streaming services with the improve DRM system by maximizing the distribute computing performance and minimizing the overheads of security threatens caused by increasing users and sharing contents in P2P environments. By improving authentication protocols and license protocols to perform decryption and execution simultaneously by only download of the license, streaming services are more enhanced rather than existing DRM systems. For evaluate the performance, this paper compared execution time of existing DRM systems which decrypt the encrypted data file before execute with improved DRM system which execute and decrypt the encrypted data file simultaneously. In experiment, improved DRM system can maintain steady bandwidth and reduce the execution time in compare to existing DRM systems.

  • PDF

Reversible Watermarking Based On Advanced Histogram Shifting (개선된 히스토그램 쉬프팅 기법을 이용한 리버서블 워터마킹)

  • Hwang, Jin-Ha;Kim, Jong-Weon;Choi, Jong-Uk
    • The KIPS Transactions:PartC
    • /
    • v.14C no.1 s.111
    • /
    • pp.39-44
    • /
    • 2007
  • In this paper, we propose a reversible watermarking method to recover an original image after the watermark has been extracted. Most watermarking algorithms cause degradation of image quality in original digital content in the process of embedding watermark. In the proposed algorithm, the original image can be obtained when the degradation is removed from the watermarked image after extracting watermark information. In the proposed method, we utilize histogram shifting concept and Location Map structure. We could solve the Filp-Flop problem by using Location Map structure and enlarge the information embedding capacity by embedding recursively. Experimental results demonstrate that the embedding information as large as 120k bits can be realized while the invisibility as high as 41dB can be maintained.

A Digital Hologram Encryption Method Using Data Scrambling of Frequency Coefficients

  • Choi, Hyun-Jun
    • Journal of information and communication convergence engineering
    • /
    • v.11 no.3
    • /
    • pp.185-189
    • /
    • 2013
  • A digital hologram generated by a computer calculation (computer-generated hologram or capture using charge-coupled device [CCD] camera) is one of the most expensive types of content, and its usage is expanding. Thus, it is highly necessary to protect the ownership of digital holograms. This paper presents an efficient visual security scheme for holographic image reconstruction with a low scrambling cost. Most recent studies on optical security concentrate their focus on security authentication using optical characteristics. However, in this paper, we propose an efficient scrambling method to protect a digital hologram. Therefore, we introduce in this paper several scrambling attempts in both the spatial domain and frequency domain on the basis of the results of analyzing the properties of the coefficients in each domain. To effectively hide the image information, 1/4, 1/256, and 1/16,384 of the original digital hologram needs to be scrambled for the spatial-domain scheme, Fresnel-domain scheme, and discrete cosine transform-domain scheme, respectively. The encryption schemes and the analyses in this paper can be expected to be useful in the research on encryption and other works on digital holograms.