• Title/Summary/Keyword: copy paper

Search Result 502, Processing Time 0.029 seconds

Process Analysis of Digital Right Management for Web-Based Multicast Contents

  • Toyib, Wildan;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.12
    • /
    • pp.1601-1612
    • /
    • 2011
  • In recent years, advanced in digital technologies have created significant changes in the way we reproduce, distribute and market Intellectual Property (IP). DRM for multicast contents is complicated risk, the further technology development and human demand, this approaching is still being researched by the scientist and all by the company which is conducting in piracy management reduced, and every country has national policy to make this consortium to limit piracy properties, based on this paper research development, just only two approaching to reduce piracy in DRM they are Industrial Property (IP) and Copyright. In this paper, we are not only figuring and analyzing about the processes to reduce and limit the piracy and unprotected copy law but also describing about the encryption process, watermarking and digital signature process algorithms. The basic concepts of this encryption process for web-based multicast content in DRM are implemented in Java. We conduct this method is a computerized through web based application system approaching to reduce unprotected copy and piracy. Which is used in DRM for multicast content in every section, by providing a fundamental in information technology development, we believe this research is reliable to prove that is unprotected copy, and piracy can be reduced by protecting with this paradigm.

Video Signature using Spatio-Temporal Information for Video Copy Detection (동영상 복사본 검출을 위한 시공간 정보를 이용한 동영상 서명 - 동심원 구획 기반 서술자를 이용한 동영상 복사본 검출 기술)

  • Cho, Ik-Hwan;Oh, Weon-Geun;Jeong, Dong-Seok
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.607-611
    • /
    • 2008
  • This paper proposes new video signature using spatio-temporal information for copy detection. The proposed video copy detection method is based on concentric circle partitioning method for each key frame. Firstly, key frames are extracted from whole video using temporal bilinear interpolation periodically and each frame is partitioned as a shape of concentric circle. For the partitioned sub-regions, 4 feature distributions of average intensity, its difference, symmetric difference and circular difference distributions are obtained by using the relation between the sub-regions. Finally these feature distributions are converted into binary signature by using simple hash function and merged together. For the proposed video signature, the similarity distance is calculated by simple Hamming distance so that its matching speed is very fast. From experiment results, the proposed method shows high detection success ratio of average 97.4% for various modifications. Therefore it is expected that the proposed method can be utilized for video copy detection widely.

  • PDF

A Targeted Counter-Forensics Method for SIFT-Based Copy-Move Forgery Detection (SIFT 기반 카피-무브 위조 검출에 대한 타켓 카운터-포렌식 기법)

  • Doyoddorj, Munkhbaatar;Rhee, Kyung-Hyune
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.5
    • /
    • pp.163-172
    • /
    • 2014
  • The Scale Invariant Feature Transform (SIFT) has been widely used in a lot of applications for image feature matching. Such a transform allows us to strong matching ability, stability in rotation, and scaling with the variety of different scales. Recently, it has been made one of the most successful algorithms in the research areas of copy-move forgery detections. Though this transform is capable of identifying copy-move forgery, it does not widely address the possibility that counter-forensics operations may be designed and used to hide the evidence of image tampering. In this paper, we propose a targeted counter-forensics method for impeding SIFT-based copy-move forgery detection by applying a semantically admissible distortion in the processing tool. The proposed method allows the attacker to delude a similarity matching process and conceal the traces left by a modification of SIFT keypoints, while maintaining a high fidelity between the processed images and original ones under the semantic constraints. The efficiency of the proposed method is supported by several experiments on the test images with various parameter settings.

Image Fingerprint for Contents based Video Copy Detection Using Block Comparison (블록 비교를 이용한 내용기반 동영상 복사 검색용 영상 지문)

  • Na, Sang-Il;Jin, Ju-Kyoun;Cho, Ju-Hee;Oh, Weon-Geun;Jeong, Dong-Seok
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.47 no.5
    • /
    • pp.136-144
    • /
    • 2010
  • Two types of informations are used for content-based video copy detection: spatial information and temporal information. The spatial information means content-based image fingerprint. This image fingerprint must have following characteristic. First, Extraction is simple. Second, pairwise independence for random selected two images. At last, Robust for modifications. This paper proposed image fingerprint method for contents based video copy detection. Proposed method's extraction speed is fast because this method's using block average, first order differentiation and second order differentiation that can be calculated add and minus operation. And it has pairwise independence and robust against modifications. Also, proposed method feature makes binary by comparisons and using coarse to fine structure, so it's matching speed is fast. Proposed method is verified by modified image that modified by VCE7's experimental conditions in MPEG7.

TCP/IP Using Minimal Resources in IoT Systems

  • Lee, Seung-Chul;Shin, Dongha
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.10
    • /
    • pp.125-133
    • /
    • 2020
  • In this paper, we design 4-layer TCP/IP that utilizes minimal memory and processor resources in Internet of Things(IoT) systems. The TCP/IP designed in this paper has the following characteristics. First, memory resource is minimized by using minimal memory allocation. Second, processor resource is minimized by using minimal memory copy. Third, the execution time of the TCP/IP can be completed in a deterministic time. Fourth, there is no memory leak problem. The standard in minimal resources for memory and processor derived in this paper can be used to check whether the network subsystems of the already implemented IoT systems are efficiently implemented. As the result of measuring the amount of memory allocation and copy of the network subsystem of Zephyr, an open source IoT kernel recently released by the Linux Foundation, we found that it was bigger than the standard in minimal resources derived in this paper. The network subsystem of Zephyr was improved according to the design proposed in this paper, confirming that the amount of memory allocation and copy were decreased by about 39% and 67%, respectively, and the execution time was also reduced by about 28%.

A Study on Fashion Accessary Product Development by Using Traditional Hanji IV - Consumer Attitudes and Behaviors Toward Traditional Hanji Products - (전통한지를 활용한 패션 액세서리 상품개발(제4보) - 전통한지로 만든 상품에 대한 소비자 태도와 행동 -)

  • Kim, Yong-Sook
    • Korean Journal of Human Ecology
    • /
    • v.16 no.3
    • /
    • pp.615-622
    • /
    • 2007
  • Jeonju is well-known as a native place of traditional Hanji from ancient times because of it's proper weather, soil, and sunlights. Traditional Hanji is selected one of the Traditional Cultural Contents Industries of Jeonju nationally, and can produce synergy effects on gaining competition if we develop traditional Hanji industry into high-technology by relating cultural contents. The purposes of this study was to identify consumer attitudes and behaviors toward traditional Hanji products. The results of this study were as followed: 1. Representative products of Jeonju City were a rice with vegetables, a traditional Hanji, and a Korean-style house, and these results showed a consistancy with Han-Brand products promoted by Ministry of Culture and Tourism. 2. Many consumers experienced of a box, a copy paper, a book or notebook made of Hanji, but less experienced of fashion accessary products. Consumers had higher interests in wall or window paper and copy paper, but had lower interests in fashion accessary products such as necktie, shawl, and folding fan. More consumers intended to use wall or window paper and copy paper, but intended fashion accessary products less. Many kinds of Hanji products were produced and displayed on a Hanji Crafts House, but only few consumers had experiences. 3. Younger generations had higher interests and experiences of Hanji products, and unmarried officiers or full-time house wives had experiences Hanji crafts more. 4. Consumers were interested in daily necessaries or interior products made of Hanji.

A Novel Video Copy Detection Method based on Statistical Analysis (통계적 분석 기반 불법 복제 비디오 영상 감식 방법)

  • Cho, Hye-Jeong;Kim, Ji-Eun;Sohn, Chae-Bong;Chung, Kwang-Sue;Oh, Seoung-Jun
    • Journal of Broadcast Engineering
    • /
    • v.14 no.6
    • /
    • pp.661-675
    • /
    • 2009
  • The carelessly and illegally copied contents are raising serious social problem as internet and multimedia technologies are advancing. Therefore, development of video copy detection system must be settled without delay. In this paper, we propose the hierarchical video copy detection method that estimates similarity using statistical characteristics between original video and manipulated(transformed) copy video. We rank according to luminance value of video to be robust to spacial transformation, and choose similar videos categorized as candidate segments in huge amount of database to reduce processing time and complexity. The copy videos generally insert black area in the edge of the image, so we remove rig black area and decide copy or not by using statistical characteristics of original video and copied video with center part of frame that contains important information of video. Experiment results show that the proposed method has similar keyframe accuracy to reference method, but we use less memory to save feature information than reference's, because the number of keyframes is less 61% than that of reference's. Also, the proposed method detects if the video is copied or not efficiently despite expansive spatial transformations such as blurring, contrast change, zoom in, zoom out, aspect ratio change, and caption insertion.

Design and Performance Evaluation of Selective DFT Spreading Method for PAPR Reduction in Uplink OFDMA System (OFDMA 상향 링크 시스템에서 PAPR 저감을 위한 선택적 DFT Spreading 기법의 설계와 성능 평가)

  • Kim, Sang-Woo;Ryu, Heung-Gyoon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.18 no.3 s.118
    • /
    • pp.248-256
    • /
    • 2007
  • In this paper, we propose a selective DFT spreading method to solve a high PAPR problem in uplink OFDMA system. A selective characteristic is added to the DFT spreading, so the DFT spreading method is mixed with SLM method. However, to minimize increment of computational complexity, differently with common SLM method, our proposed method uses only one DFT spreading block. After DFT, several copy branches are generated by multiplying with each different matrix. This matrix is obtained by linear transforming the each phase rotation in front of DFT block. And it has very lower computational complexity than one DFT process. For simulation, we suppose that the 512 point IFFT is used, the number of effective sub-carrier is 300, the number of allowed sub-carrier to each user's is 1/4 and 1/3 and QPSK modulation is used. From the simulation result, when the number of copy branch is 4, our proposed method has more than about 5.2 dB PAPR reduction effect. It is about 1.8 dB better than common DFT spreading method and 0.95 dB better than common SLM which uses 32 copy branches. And also, when the number of copy branch is 2, it is better than SLM using 32 copy branches. From the comparison, the proposed method has 91.79 % lower complexity than SLM using 32 copy branches in similar PAPR reduction performance. So, we can find a very good performance of our proposed method. Also, we can expect the similar performance when all number of sub-carrier is allocated to one user like the OFDM.

A Study for Program Similarity on Case Study (사례중심의 프로그램 유사성 및 도용여부에 관한연구)

  • Kim, Yoeng-Won;Lee, Seong-Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.5
    • /
    • pp.1255-1259
    • /
    • 2008
  • This paper deals with a study on copy rate for program when there is a conflict with programs. In this paper, we presented a setting method on weight and degree of importance on each factors because degree of importance on one factor was different from degree of importance onother factors. Based on various factors, we judged on copy rate for program.

Signature Extraction Method from H.264 Compressed Video (H.264/AVC로 압축된 비디오로부터 시그너쳐 추출방법)

  • Kim, Sung-Min;Kwon, Yong-Kwang;Won, Chee-Sun
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.46 no.3
    • /
    • pp.10-17
    • /
    • 2009
  • This paper proposes a compressed domain signature extraction method which can be used for CBCD (Content Based Copy Detection). Since existing signature extraction methods for the CBCD are executed in spatial domain, they need additional computations to decode the compressed video before the signature extraction. To avoid this overhead, we generate a thumbnail image directly from the compressed video without full decoding. Then we can extract the video signature from the thumbnail image. Experimental results of extracting brightness ordering information as the signature for CBCD show that our proposed method is 2.8 times faster than the spatial domain method while maintaining 80.98% accuracy.