DRM Implementation by Multimedia Fingerprint

멀티미디어 핑거프린트에 의한 DRM 구현

  • Rhee, Kang-Hyeon (Chosun University, Electronics & Information Engineering College, Dept. of Electronics Eng.)
  • 이강현 (조선대학교 전자정보공과대학 전자공학과)
  • Published : 2009.05.25

Abstract

Recently, according to the product variety of multimedia content some problems are occurred as like an illegal copying, an illegal distribution and a copyright infringement etc. So, for the solution of these problems, some methods were proposed as like watermarking which inserts the information of copyright to the content and the cipher for authentication to DRM which prevents an illegal copying using RSA. In this paper, the multimedia fingerprint based on BIBD code is inserted to the bit-plane of the image content for DRM with RSA, and while the decoding processing. The experiment is operated with the consideration of the image transmission and the transformation. As a result it confirmed that the multimedia fingerprint code inserted in image is detected 60% upper at AWGN 7dB and detected completely 100% at AWGN 10dB upper on PSNR 30, 40, 70 and 80 of Stirmark attacks.

최근에, 다양한 멀티미디어 콘텐츠 제작에 따라, 불법복제, 불법배포 및 저작권 침해 등과 같은 문제들이 야기되고 있다. 이러한 문제를 해결하기 위하여, 콘텐츠에 저적권 정보를 삽입하는 워터마킹과 RSA를 이용하여 불법복제를 방지하는 DRM에 인증을 위한 암호화하는 방법들이 제안되었다. 본 논문에서는, BIBD코드 기반의 멀티미디어 핑거프린트를 RSA의 DRM을 위하여 영상콘텐츠의 비트플랜에 삽입하고, 디코딩 처리에서 영상전송과 변환을 고려하여 실험을 하였다. 실험결과, Stirmark 공격의 PSNR 30, 40, 70 그리고 80에서, 영상에 삽입된 멀티미디어 핑거프린트 코드가 AWGN 7dB에서 60% 이상 검출되었으며, AWGN 10dB 이상에서는 100%의 완전함을 확인하였다.

Keywords

References

  1. S H Seo 'Implementation on FPGA of DRM using Multimedia Fingerprint,' M.Eng. Degree Thesis, Chosun Univ., Graduate School, 2008.8
  2. J S Noh and K H Rhee 'Detection of colluded multimedia fingerprint by neural network,' 대한전자공학회 논문지, 2006-43CI-4-10, pp.80~87, July 2006
  3. K H Rhee 'Detection of colluded multimedia fingerprint using LDPC and BIBD,' 대한전자공학회 논문지, 2006-43CI-5-8, pp.68~75, Sep. 2006
  4. B L Cho, I Y Chung, C G Park, K H Rhee 'A Study on the Digital Audio Watermarking for a High Quality Audio,' 대한전자공학회 논문지, Vol. 39-CI, NO. 3, pp. 62-70, May 2002
  5. 최동현, 이병희, 김승주, 원동호, 'DRM(Digital Rights Management) 기술,' 정보과학회지 제25권 제5호, 5. 2007
  6. Federal Information Processing Standards Publication 197 November 26, 2001
  7. V. Miller, 'Use of elliptic curves in cryptography', CRYPTO 85, 1985
  8. DRM포럼, 'http://drm.or.kr/spb3/index.php'
  9. Ju-Young Moon, 'Design of DRM System for Contents Redistribution in Home Domain', 한국컴퓨터 정보학회 논문지, 7. 2007
  10. K.J.Ray Liu, Wade Trappe, Z.Jane Wang, Min Wu, and Hong Zhao 'Multimedia Fingerprinting Forensics for Traitor Tracing,' EURASIP Book Series on Signal Processign and Communications, Volume4
  11. Shashanka, D.; Bora, P.K. 'Collusion Secure Scalable Video Fingerprinting Scheme,' ADCOM 2007. International Conference, 18-21 Page(s):641 - 647, Dec. 2007 https://doi.org/10.1109/ADCOM.2007.120
  12. R. Rivest, A. Shamir, L. Adleman, 'A Method for Obtaining Digital Signatures and Public-Key Cryptosystems,' Communications of the ACM, Vol. 21 (2), pp. 120-126, 1978 https://doi.org/10.1145/359340.359342
  13. http://www.petitcolas.net/fabien/watermarking/stirmark/