• Title/Summary/Keyword: illegal

Search Result 1,452, Processing Time 0.032 seconds

New Revocable E-cash System Based on the Limited Power of TTP

  • Yan Xie;Fangguo Zhang;Kim, Kwangjo
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.266-269
    • /
    • 2002
  • As a simulation or replacement of analog money in cyber space, the e-cash was introduced by using cryptographic primitives. Since a perfect anonymity system causes some illegal activities, such as money laundering, blackmailing, and illegal purchase, a revocable electronic system was paid a great attention to control the anonymity. In general, Trust Third Party(TTP) is introduced to detect any dubious user and coin, namely user tracing and coin tracing. In this paper we propose a new revocable anonymity e-cash system, and verify the security requirement as well. In our scheme a user first withdraws the e-coin from bank by using blind signature, and then TTP verifies the bank's signature and records the tracing information.

  • PDF

Geometric Multiple Watermarking Scheme for Mobile 3D Content Based on Anonymous Buyer-Seller Watermarking Protocol

  • Lee, Suk-Hwan;Kwon, Seong-Geun;Kwon, Ki-Ryong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.2
    • /
    • pp.504-523
    • /
    • 2014
  • This paper presents a multiple-watermarking scheme for copyright protection and the prevention of illegal copying of mobile 3D contents with low resolution. The proposed scheme embeds a unique watermark and a watermark certification authority (WCA) watermark into the spatial and encryption domains of a mobile 3D content based on the buyer-seller watermarking protocol. The seller generates a unique watermark and embeds it into the local maximum curvedness of a 3D object. After receiving the encrypted watermark from the WCA, the seller embeds it into the encrypted vertex data using an operator that satisfies the privacy homomorphic property. The proposed method was implemented using a mobile content tool, and the experimental results verify its capability in terms of copyright protection and the prevention of illegal copying.

A DRM Framework for Distributing Digital Contents through the Internet

  • Lee, Jun-Seok;Hwang, Seong-Oun;Jeong, Sang-Won;Yoon, Ki-Song;Park, Chang-Soon;Ryou, Jae-Cheol
    • ETRI Journal
    • /
    • v.25 no.6
    • /
    • pp.423-436
    • /
    • 2003
  • This paper describes our design of a contents distribution framework that supports transparent distribution of digital contents on the Internet as well as copyright protection of participants in the contents distribution value chain. Copyright protection must ensure that participants in the distribution channel get the royalties due to them and that purchasers use the contents according to usage rules. It must also prevent illegal draining of digital contents. To design a contents distribution framework satisfying the above requirements, we first present four digital contents distribution models. On the basis of the suggested distribution models, we designed a contract system for distribution of royalties among participants in the contents distribution channel, a license mechanism for enforcement of contents usage to purchasers, and both a packaging mechanism and a secure client system for prevention of illegal draining of digital contents.

  • PDF

Planar Region Extraction for Visual Navigation using Stereo Cameras

  • Lee, Se-Na;You, Bum-Jae;Ko, Sung-Jea
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.681-686
    • /
    • 2003
  • In this paper, we propose an algorithm to extract valid planar regions from stereo images for visual navigation of mobile robots. The algorithm is based on the difference image between the stereo images obtained by applying Homography matrix between stereo cameras. Illegal planar regions are filtered out by the use of labeling of the difference images and filtering of invalid blobs using the size of each blob. Also, illegal large planar regions such as walls are removed by adopting a weighted low-pass filtering of the difference image using the past difference images. The algorithms are experimented successfully by the use of stereo camera system built in a mobile robot and a PC-based real-time vision system.

  • PDF

User Authentication System using RSA Algorithm

  • Yang, Sung-Ki;Lee, Kwang-Ok;Lee, Dae-Young;Jeong, Yu-Jeong;Bae, Sang-Hyun
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.156-159
    • /
    • 2002
  • For the effective use of information in the information society, information should be protected and outflow of information by illegal users should be prevented. This study sets up user authentication policy, user authentication regulations and procedures for information protection and builds information protection key distribution center and encryption user Authentication system which can protect information from illegal users.

  • PDF

A License Audit Model for Secure DRM Systems in IP-based Environments

  • Jang, Ui-Jin;Lim, Hyung-Min;Shin, Yong-Tae
    • Journal of Information Processing Systems
    • /
    • v.6 no.2
    • /
    • pp.253-260
    • /
    • 2010
  • Communication devices aim to provide a multimedia service without spatial or temporal limitations in an IP-based environment. However, it is incapable of allowing for fair use by consumers who legally buy content, and damages provider contents through the indiscriminate distribution and use of illegal contents. The DRM system that emerged to solve this problem cannot protect licenses stored on communication devices, and manage licenses by redistribution. This paper proposes a license audit model, which checks for illegal access, modification and redistribution, and reports alert logs to the server.

Detection and Recognition of Illegally Parked Vehicles Based on an Adaptive Gaussian Mixture Model and a Seed Fill Algorithm

  • Sarker, Md. Mostafa Kamal;Weihua, Cai;Song, Moon Kyou
    • Journal of information and communication convergence engineering
    • /
    • v.13 no.3
    • /
    • pp.197-204
    • /
    • 2015
  • In this paper, we present an algorithm for the detection of illegally parked vehicles based on a combination of some image processing algorithms. A digital camera is fixed in the illegal parking region to capture the video frames. An adaptive Gaussian mixture model (GMM) is used for background subtraction in a complex environment to identify the regions of moving objects in our test video. Stationary objects are detected by using the pixel-level features in time sequences. A stationary vehicle is detected by using the local features of the object, and thus, information about illegally parked vehicles is successfully obtained. An automatic alarm system can be utilized according to the different regulations of different illegal parking regions. The results of this study obtained using a test video sequence of a real-time traffic scene show that the proposed method is effective.

DWT based Digital Image Watermarking using Labview Machine Vision (DWT기반 Labview Machine Vision을 이용한 디지털 이미지 워터마킹)

  • Kim, Hyoung-Gwon;Song, Yun-Jae;Ahn, Tae-Chon
    • Proceedings of the KIEE Conference
    • /
    • 2005.10b
    • /
    • pp.198-200
    • /
    • 2005
  • Recently, intellectual property problem caused by illegal copy or circulation of digital contents with computer and advance of network. it will lose producer's desire and cause economic losses. so we need to demand ownership protection technology for prevent illegal copy without an owner consent and protect ownership with effect. in this paper, we change digital image at frequency domain and choose a factor choosing frequency area with human perceptibility. we inserted repetitive and adaptive watermark on the whole image by Labview Machine Vision. watermark inserted into the high frequency concentrated textual area with Wavelet Transform and then reduced damage of image by human visual feature after inserted watermark

  • PDF

A Study of Actual Conditions of the Health for the Foreign Workers (외국인 근로자들의 건강 실태 조사 연구)

  • Jo, Hyeon Tae
    • Korean Journal of Occupational Health Nursing
    • /
    • v.17 no.2
    • /
    • pp.224-229
    • /
    • 2008
  • Purpose: The purpose of this study was to identify foreign worker's health problem. Method: Data were collected by interview and analyzed by using the Chi-square test and Fisher's exact test. Result: The most frequent health problem was 'diarrhea' and the next, 'cold' and 'dental caries'. There were significant differences in health problem by gender. There were significant differences in health problem, regular health checkup between legal workers and illegal workers. Conclusion: Judging from this study result, health program for foreign workers should be developed according to whether they are male or female and whether they are legal or illegal immigrants.

  • PDF

국내 소프트웨어 산업 지원 방안에 대한 연구

  • 최재규;김재영;지경용
    • Proceedings of the Technology Innovation Conference
    • /
    • 2003.06a
    • /
    • pp.75-89
    • /
    • 2003
  • In recent, internal IT industries are suffering a severe pain due to stagnancy of business activities. Particularly, internal software industries are losing international competitiveness. As to solve this problems, the paper is studied about political plans for supporting internal software industries. The paper has two important topics which are enlarged plan of domestic demand and supplement of the expert personnel in internal software industries. The paper consists of three parts: one is plan which prevents for using illegal softwares, another is problems which is related to publication of expert programming books, and the other is If educations of governmental leading. The paper suggests realistic price of softwares, powerful inspection about illegal softwares as governmental leading, and continuous public relations for changing consumers'awareness.

  • PDF