• Title/Summary/Keyword: copyright paper

Search Result 571, Processing Time 0.026 seconds

A Study on Integrity Verification and Tamper Detection of Digital Image (디지털 영상의 무결성 검증과 변형 검출에 관한 연구)

  • Woo, Chan-Il;Goo, Eun-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.10
    • /
    • pp.203-208
    • /
    • 2019
  • Digital watermarking was developed to protect copyright by discouraging the illegal copying of digital content. On the other hand, recently, watermarking has also been used to verify the integrity of digital content, such as medical images, and detect illegal manipulation or distortion locations. Watermarking should be tenacious so as to protect copyright from illegal copying and should remain firm to the content through a range of attacks, such as distortion or filtering. At the same time, however, it should be removed easily even in a slight transformation of the material to verify the integrity. Therefore, this paper proposes a watermarking technique that easily checks and verifies the deformation or manipulation of digital images. In the proposed method, the entire image was examined in $16{\times}16$ blocks to check for deformation of the image. When deformation was detected, further inspection proceeded in $4{\times}4$ blocks and the location where deformation occurred was identified.

Reversible Watermarking in JPEG Compression Domain (JPEG 압축 영역에서의 리버서블 워터마킹)

  • Cui, Xue-Nan;Choi, Jong-Uk;Kim, Hak-Il;Kim, Jong-Weon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.6
    • /
    • pp.121-130
    • /
    • 2007
  • In this paper, we propose a reversible watermarking scheme in the JPEG compression domain. The reversible watermarking is useful to authenticate the content without the quality loss because it preserves the original content when embed the watermark information. In the internet, for the purpose to save the storage space and improve the efficiency of communication, digital image is usually compressed by JPEG or GIF. Therefore, it is necessary to develop a reversible watermarking in the JPEG compression domain. When the watermark is embedded, the lossless compression was used and the original image is recovered during the watermark extracting process. The test results show that PSNRs are distributed from 38dB to 42dB and the payload is from 2.5Kbits to 3.4Kbits where the QF is 75. Where the QF of the Lena image is varied from 10 to 99, the PSNR is directly proportional to the QF and the payload is around $1.6{\sim}2.8Kbits$.

Digital Video Watermarking Using Frame Division And 3D Wavelet Transform (프레임 분할과 3D 웨이블릿 변환을 이용한 비디오 워터마킹)

  • Kim, Kwang-Il;Cui, Jizhe;Kim, Jong-Weon;Choi, Jong-Uk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.3
    • /
    • pp.155-162
    • /
    • 2008
  • In this paper we proposed a video watermarking algorithm based on a three dimension discrete wavelet transform (3D DWT) and direct spread spectrum (DSS). In the proposed method, the information watermark is embedded into followed frames, after sync watermark is embedded into the first frame. Input frames are divided into sub frames which are located odd row and even row. The sub frames are arranged as 3D frames, and transformed into 3D wavelet domain. In this domain the watermark is embedded using DSS. Existing video watermarking using 3D DWT is non-blind method but, proposed algorithm uses blind method. The experimental results show that the proposed algorithm is robust against frame cropping, noise addition, compression, etc. acquiring BER of 10% or below and sustains level of 40dB or above on the average.

Applied Method to Trusted Digital Content Distribution Architecture (신뢰할 수 있는 디지털 콘텐츠 유통 아키텍처 방안)

  • Kim, Hye-Ri;Hong, Seng-Phil;Lee, Chul-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.151-162
    • /
    • 2008
  • As the innovative internet technologies and multimedia are being rapidly developed, digital content is a remarkable new growth industry and supplied by various channel. For example, domestic sales volume in digital contents marked an annual increase of 14.7% since 2003. Against the merits of digital content distribution, Information reengineering aspects are getting more serious issues in these days such as infringement of copyright, flood of inappropriate content, invasion and infringement of privacy, etc. In this paper, we are making a suggestion of the TDCDA-Trusted Digital Content Distribution Architecture in order to solve above problems. TDCDA is provided to how well-define and design the trusted path in digital contents distribution in internet environments using a secure distribution mechanism, digital content integrity and copyright protection. Finally, we also proposed the TDCDA algorithm and applicable guidelines for feasible approach in real computing environment.

Appraisal method for Determining Whether to Upgrade Software for Appraisal (감정 대상 소프트웨어의 업그레이드 여부 판정을 위한 감정 방법)

  • Chun, Byung-Tae;Jeong, Younseo
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.1
    • /
    • pp.13-19
    • /
    • 2020
  • It can be seen that the infringement of copyright cases is increasing as the society becomes more complex and advanced. During the software copyright dispute, there may be a dispute over whether the software is duplicated and made into upgraded software. In this paper, we intend to propose an analysis method for determining whether to upgrade software. For the software upgrade analysis, a software similarity analysis technique was used. The analysis program covers servers, management programs, and Raspberry PC programs. The first analysis confirms the correspondence between program creation information and content. In addition, it analyzes the similarity of functions and screen composition between the submitted program and the program installed in the field. The second comparative analysis compares and analyzes similarities by operating two programs in the same environment. As a result of comparative analysis, it was confirmed that the operation and configuration screens of the two programs were identical. Thus, minor differences were found in a few files, but it was confirmed that the two programs were mostly made using the same or almost similar source code. Therefore, this program can be judged as an upgrade program.

Similarity Evaluation and Analysis of Source Code Materials for SOC System in IoT Devices (사물인터넷 디바이스의 집적회로 목적물과 소스코드의 유사성 분석 및 동일성)

  • Kim, Do-Hyeun;Lee, Kyu-Tae
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.1
    • /
    • pp.55-62
    • /
    • 2019
  • The needs for small size and low power consumption of information devices is being implemented with SOC technology that implements the program on a single chip in Internet of Thing. Copyright disputes due to piracy are increasing in semiconductor chips as well, arising from disputes in the chip implementation of the design house and chip implementation by the illegal use of the source code. However, since the final chip implementation is made in the design house, it is difficult to protect the copyright. In this paper, we deal with the analysis method for extracting similarity and the criteria for setting similarity judgment in the dispute of source code written in HDL language. Especially, the chip which is manufactured based on the same specification will be divided into the same configuration and the code type.

Robust Audio Watermarking Algorithm with Less Deteriorated Sound (음질 열화를 줄이고 공격에 강인한 오디오 워터마킹 알고리듬)

  • Kang, Myeong-Su;Cho, Sang-Jin;Chong, Ui-Pil
    • The Journal of the Acoustical Society of Korea
    • /
    • v.28 no.7
    • /
    • pp.653-660
    • /
    • 2009
  • This paper proposes a robust audio watermarking algorithm for copyright protection and improvement of sound quality after embedding a watermark into an original sound. The proposed method computes the FFT (fast Fourier transform) of the original sound signal and divides the spectrum into a subbands. Then, it is necessary to calculate the energy of each subband and sort n subbands in descending order corresponding to its power. After calculating the energy we choose k subbands in sorted order and find p peaks in each selected subbands, and then embed a length m watermark around the p peaks. When the listeners hear the watermarked sound, they do not recognize any distortions. Furthermore, the proposed method is robust as much as Cox's method to MP3 compression, cropping, FFT echo attacks. In addition to this, the experimental results show that the proposed method is generally 10 dB higher than Cox's method in SNR (signal-to-noise ratio) aspect.

East Asian Journal of Business Economics and Development Strategy

  • KIM, Byoung-Goo;YOUN, Myoung-Kil
    • Journal of Research and Publication Ethics
    • /
    • v.2 no.2
    • /
    • pp.17-20
    • /
    • 2021
  • Purpose: This paper is to review and analyze development strategy of the East Asian Journal of Business Economics and to look at the previous and current changed publication system and process in order to step up the article quality of EAJBE. Research design, data and methodology: This study grasped the current status and strategy of this journal through literature review. In addition, through the case of EAJBE, the internationalization strategy and research ethics policy of this journal were analyzed. Results: EAJBE clarifies the copyright delegation procedure of the final publication paper. Regarding compliance with research ethics, Editor-in-Chief and Management Editor are completing research ethics training. From 2017 to the present, Editor-in-Chief and Management Editor have completed online ethics training and hold certificates of completion. Conclusions: EAJBE specifies the rules for exclusion of examination by the contributor and the examiner belonging to the same institution and actually operates in this way. Currently, by using the Jams system, the plagiarism verification procedure is operated using the thesis plagiarism prevention system. Finally, in order to strengthen research ethics standards, EAJBE is trying to establish and strengthen a verification system for each paper using the system of the Korea Research Foundation, not the previous foreign paid plagiarism system.

Audio Watermarking through Modification of Tonal Maskers

  • Lee, Hee-Suk;Lee, Woo-Sun
    • ETRI Journal
    • /
    • v.27 no.5
    • /
    • pp.608-616
    • /
    • 2005
  • Watermarking has become a technology of choice for a broad range of multimedia copyright protection applications. This paper proposes an audio watermarking scheme that uses the modified tonal masker as an embedding carrier for imperceptible and robust audio watermarking. The method of embedding is to select one of the tonal maskers using a secret key, and to then modify the frequency signals that consist of the tonal masker without changing the sound pressure level. The modified tonal masker can be found using the same secret key without the original sound, and the embedded information can be extracted. The results show that the frequency signals are stable enough to keep embedded watermarks against various common signal processing types, while at the same time the proposed scheme has a robust performance.

  • PDF

A Study on Contents Security Method Based on a Content Delivery Network (CDN 환경에서 콘텐츠 보안 방법 연구)

  • Kim, Jeom-Goo;Kim, Tae-Eun
    • Convergence Security Journal
    • /
    • v.8 no.3
    • /
    • pp.51-56
    • /
    • 2008
  • Is caused by with growth etc. of the digital contents circulation market which leads suddenly accommodates in order to control the network traffic which increases and the researches which are various are being advanced the explosive evidence and a electronic transaction of the Internet user. The present paper protects a digital contents and a copyright from CDN system environments which will appear the center of new network service with the plan for the dispersive DRM system of CDN bases plans. Respect this dispersion DRM package formats which provide a stronger security characteristic in the contents which is stored the operational process of the dispersive DRM system for to be defined, CDN system and of existing interoperability they present.

  • PDF