• Title/Summary/Keyword: watermark

Search Result 785, Processing Time 0.077 seconds

Metadata production system based on MPEG-21 IPMP for protection and management of The Digital contents (디지털 콘텐츠 보호 관리를 위한 MPEG-21 IPMP 기반의 메타데이터 저작 시스템)

  • Ryu Kwang-Hee;Hong Hyen-Woo;Kim Kwang-Yong;Kim Jae-Gon;Jung Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • /
    • pp.577-580
    • /
    • 2006
  • The rapidly growth of Internet is main factor that activates the Digital Contents market. However imprudent Digital Contents market could be shrunk by imprudent illegal copy and delivery. MPEG(Moving Picture Experts Group) proposed MPEG-21 Multimedia frameworks in order to solve these problem. IPMP is parts of MPEG-21 Multimedia Frameworks, when Digital Contents goes through production delivery consumption, which defines standard to keep the Digital Contents in safety. Currently IPMP defined by FCD(Final Committee Draft) level. Therefore development of system which applied to latest standard to protect and manage the Digital Contents is required. and the system consists of fourth organizations which means Metadata Production server, Tool server, License server, Consumption server. In this Paper, we made production server to parse REL(Rights Expression Language) document that has right information for content from license server, and create metadata based on MPEG-21 IPMP about the content that applied to watermark. then, after it do remuxing, transmit the protected data to consumption server.

  • PDF

UCI Embedder: A Real-time Broadcast-Content-Identifier Watermarking System for Broadcast Content Distribution Services (방송콘텐츠 유통서비스를 위한 실시간 콘텐츠식별자 은닉삽입 시스템)

  • Kim, Youn-Hee;Kim, Hyun-Tae;Lee, Joo-Young;Nam, Je-Ho
    • Journal of Broadcast Engineering
    • /
    • v.16 no.3
    • /
    • pp.394-402
    • /
    • 2011
  • We introduce the standard content identifier Universal Content Identifier (UCI) and a watermarking system that embeds UCI for the broadcast content distribution services. Our proposed UCI embedder is designed in consideration of integrating with the previously established broadcast system and protecting the illegal distribution of broadcast contents. Our goal is that when broadcast content is transmitted, 28 byte UCI is embedded imperceptibly in the content itself in real-time and the embedded UCI is successfully extracted not only in the typical format used in the broadcast content distribution service but also in the illegally distributed broadcast contents. Usually the illegally distributed contents are modified from the original by changing resolutions, frame rates, or adjusting colors. In this paper, we present a watermarking scheme that embeds 28 byte UCI in broadcast content in real-time while keeping the visual quality high and the embedded watermark robust enough to survive through the various modification. The experimental results show that the embedded UCI remains in the various modified versions of content and that the visual degradation by embedding is not noticeable.

Security Analysis and Improvement of an Anonymous Asymmetric Fingerprinting Scheme with Trusted Third Party (익명적 비대칭 핑거프린팅 기법의 보안 취약성 분석 및 개선 방안)

  • Kwon, Sae-Ran
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.5
    • /
    • pp.396-403
    • /
    • 2009
  • An anonymous asymmetric fingerprinting protocol combined with watermarking techniques, is one of the copyright protection technologies keeping both right of a seller and that of a buyer, where a seller and an anonymous buyer perform such a protocol that employs various cryptographic tools in order that the seller does not know the exact watermarked copy that the buyer receives, while inserting an invisible non-removable fingerprint i.e., each different unique watermark, into each copy of the digital content to be sold. In such a protocol innocent buyers are kept anonymous during transactions, however, the unlawful reseller is unambiguously identified with a real identity as a copyright violator. In 2007, Yong and Lee proposed an anonymous asymmetric fingerprinting scheme with trusted third party. In this paper we point out the weakness of their scheme such as: the buyer with intention can remove the fingerprint in the watermarked content, because he/she can decrypt the encrypted fingerprint with a symmetric key using man-in-the-middle-attack; a real identity of a buyer can be revealed to the seller through the identification process even though he/she is honest. Furthermore, we propose an improved secure and efficient anonymous asymmetric fingerprinting scheme which enables to reduce the number of communication between the participants.

Numerical Analysis of Riverbed Changes at the Downstream of the Ji-Cheon (수치모형을 이용한 지천하류부의 하상변동 분석)

  • Choi, Ho;Rim, Chang-Soo;Jung, Jae-Wook
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.11 no.3
    • /
    • pp.117-125
    • /
    • 2011
  • River bed variation drops storage capacity of dams and reservoirs, and furthermore deteriorates safety of banks and peers. Therefore, understanding of bed variation is important to use and manage river water. Study section is downstream part of Ji- Cheon nearby Ji-Cheon Bridge which is located in Gum river basin. The river surveying at fourteen places with the length of 1,320m were undertaken on November 7, 2003 and September 24, 2004, and the results of river surveying were analyzed for the study. Real bed variation was compared with the simulation results of HEC-6 and GSTARS 3.0. Cross section data for the simulation of HEC-6 and GSTARS3.0 were composed of the basis of river surveying data on November 7, 2003. Hydrological data were acquired from Gu-Ryong watermark located at Ji-Chun Bridge. The research results revealed that when using Toffaleti equation, simulation results of two models were similar to the real bed variation. The bed variation simulated by using GSRARS 3.0 with only one stream tube was similar to the real bed variation. The bed variation simulated by using two models(HEC-6 and GSTRARS 3.0) with Toffaleti equation was also similar to the real bed variation. Therefore, it is expected that HEC-6 and GSTARS 3.0 models have applicability to predict the bed variation at the downstream of Ji-Cheon.

Study of Rainfall-Runoff Variation by Grid Size and Critical Area (격자크기와 임계면적에 따른 홍수유출특성 변화)

  • Ahn, Seung-Seop;Lee, Jeung-Seok;Jung, Do-Joon;Han, Ho-Chul
    • Journal of Environmental Science International
    • /
    • v.16 no.4
    • /
    • pp.523-532
    • /
    • 2007
  • This study utilized the 1/25,000 topographic map of the upper area from the Geum-ho watermark located at the middle of Geum-ho river from the National Geographic Information Institute. For the analysis, first, the influence of the size of critical area to the hydro topographic factors was examined changing grid size to $10m{\times}10m,\;30m{\times}30m\;and\;50m{\times}50m$, and the critical area for the formation of a river to $0.01km^2{\sim}0.50km^2$. It is known from the examination result of watershed morphology according to the grid size that the smaller grid size, the better resolution and accuracy. And it is found, from the analysis result of the degree of the river according to the minimum critical area for each grid size, that the grid size does not affect on the degree of the river, and the number of rivers with 2nd and higher degree does not show remarkable difference while there is big difference in the number of 1st degree rivers. From the results above, it is thought that the critical area of $0.15km^2{\sim}0.20km^2$ is appropriate for formation of a river being irrelevant to the grid size in extraction of hydro topographic parameters that are used in the runoff analysis model using topographic maps. Therefore, the GIUH model applied analysis results by use of the river level difference law proposed in this study for the explanation on the outflow response-changing characters according to the decision of a critical value of a minimum level difference river, showed that, since an ogival occurrence time and an ogival flow volume are very significant in a flood occurrence in case of not undertow facilities, the researcher could obtain a good result for the forecast of river outflow when considering a convenient application of the model and an easy acquisition of data, so it's judged that this model is proper as an algorism for the decision of a critical value of a river basin.