• Title/Summary/Keyword: Data Copyright

Search Result 261, Processing Time 0.022 seconds

Image Watermarking using Multiwavelet Transform and Color Characteristics of Human vision (인간 시각의 칼라특성과 다중 웨이블릿 변환을 이용한 워터마킹)

  • 전형섭;김정엽;현기호
    • Proceedings of the IEEK Conference
    • /
    • 2002.06d
    • /
    • pp.239-242
    • /
    • 2002
  • The rapid expansion of the Internet in the past few years has rapidly increased the availability of digital data such as audio, images and videos to the public. Therefore, The need for copyright protect of digital data are increasing in the internet. In this paper, Color image(RGB model) is transformed into LUV model, it includes the characteristics of, human vision and then the U or V component is transformed into 3-level wavelet transform. we can insert watermark to several objects of an image separately The experimental results showed that the proposed watermarking algorithm was better than to other RGB watermarking algorithm.

  • PDF

Wavelet-Based Digital Image Watermarking by Using Lorenz Chaotic Signal Localization

  • Panyavaraporn, Jantana;Horkaew, Paramate
    • Journal of Information Processing Systems
    • /
    • v.15 no.1
    • /
    • pp.169-180
    • /
    • 2019
  • Transmitting visual information over a broadcasting network is not only prone to a copyright violation but also is a forgery. Authenticating such information and protecting its authorship rights call for more advanced data encoding. To this end, electronic watermarking is often adopted to embed inscriptive signature in imaging data. Most existing watermarking methods while focusing on robustness against degradation remain lacking of measurement against security loophole in which the encrypting scheme once discovered may be recreated by an unauthorized party. This could reveal the underlying signature which may potentially be replaced or forged. This paper therefore proposes a novel digital watermarking scheme in temporal-frequency domain. Unlike other typical wavelet based watermarking, the proposed scheme employed the Lorenz chaotic map to specify embedding positions. Effectively making this is not only a formidable method to decrypt but also a stronger will against deterministic attacks. Simulation report herein highlights its strength to withstand spatial and frequent adulterations, e.g., lossy compression, filtering, zooming and noise.

An Adaptive Watermark Detection Algorithm for Vector Geographic Data

  • Wang, Yingying;Yang, Chengsong;Ren, Na;Zhu, Changqing;Rui, Ting;Wang, Dong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.323-343
    • /
    • 2020
  • With the rapid development of computer and communication techniques, copyright protection of vector geographic data has attracted considerable research attention because of the high cost of such data. A novel adaptive watermark detection algorithm is proposed for vector geographic data that can be used to qualitatively analyze the robustness of watermarks against data addition attacks. First, a watermark was embedded into the vertex coordinates based on coordinate mapping and quantization. Second, the adaptive watermark detection model, which is capable of calculating the detection threshold, false positive error (FPE) and false negative error (FNE), was established, and the characteristics of the adaptive watermark detection algorithm were analyzed. Finally, experiments were conducted on several real-world vector maps to show the usability and robustness of the proposed algorithm.

An Embedding /Extracting Method of Audio Watermark Information for High Quality Stereo Music (고품질 스테레오 음악을 위한 오디오 워터마크 정보 삽입/추출 기술)

  • Bae, Kyungyul
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.2
    • /
    • pp.21-35
    • /
    • 2018
  • Since the introduction of MP3 players, CD recordings have gradually been vanishing, and the music consuming environment of music users is shifting to mobile devices. The introduction of smart devices has increased the utilization of music through music playback, mass storage, and search functions that are integrated into smartphones and tablets. At the time of initial MP3 player supply, the bitrate of the compressed music contents generally was 128 Kbps. However, as increasing of the demand for high quality music, sound quality of 384 Kbps appeared. Recently, music content of FLAC (Free License Audio Codec) format using lossless compression method is becoming popular. The download service of many music sites in Korea has classified by unlimited download with technical protection and limited download without technical protection. Digital Rights Management (DRM) technology is used as a technical protection measure for unlimited download, but it can only be used with authenticated devices that have DRM installed. Even if music purchased by the user, it cannot be used by other devices. On the contrary, in the case of music that is limited in quantity but not technically protected, there is no way to enforce anyone who distributes it, and in the case of high quality music such as FLAC, the loss is greater. In this paper, the author proposes an audio watermarking technology for copyright protection of high quality stereo music. Two kinds of information, "Copyright" and "Copy_free", are generated by using the turbo code. The two watermarks are composed of 9 bytes (72 bits). If turbo code is applied for error correction, the amount of information to be inserted as 222 bits increases. The 222-bit watermark was expanded to 1024 bits to be robust against additional errors and finally used as a watermark to insert into stereo music. Turbo code is a way to recover raw data if the damaged amount is less than 15% even if part of the code is damaged due to attack of watermarked content. It can be extended to 1024 bits or it can find 222 bits from some damaged contents by increasing the probability, the watermark itself has made it more resistant to attack. The proposed algorithm uses quantization in DCT so that watermark can be detected efficiently and SNR can be improved when stereo music is converted into mono. As a result, on average SNR exceeded 40dB, resulting in sound quality improvements of over 10dB over traditional quantization methods. This is a very significant result because it means relatively 10 times improvement in sound quality. In addition, the sample length required for extracting the watermark can be extracted sufficiently if the length is shorter than 1 second, and the watermark can be completely extracted from music samples of less than one second in all of the MP3 compression having a bit rate of 128 Kbps. The conventional quantization method can extract the watermark with a length of only 1/10 compared to the case where the sampling of the 10-second length largely fails to extract the watermark. In this study, since the length of the watermark embedded into music is 72 bits, it provides sufficient capacity to embed necessary information for music. It is enough bits to identify the music distributed all over the world. 272 can identify $4*10^{21}$, so it can be used as an identifier and it can be used for copyright protection of high quality music service. The proposed algorithm can be used not only for high quality audio but also for development of watermarking algorithm in multimedia such as UHD (Ultra High Definition) TV and high-resolution image. In addition, with the development of digital devices, users are demanding high quality music in the music industry, and artificial intelligence assistant is coming along with high quality music and streaming service. The results of this study can be used to protect the rights of copyright holders in these industries.

Some Legal Arguments on the Google Book Search and Library Information Digitization (구글 북서치와 도서관 자료 디지털화의 법률문제)

  • Kim, Yun-Myung
    • Journal of Information Management
    • /
    • v.41 no.2
    • /
    • pp.133-159
    • /
    • 2010
  • Books in libraries can be highly refined information. Google invests digitization of books in libraries. But the digitization of books that has a variety of interests, coupled with several problems, including class action, in addition the many critical discussions are underway. Korea pushed the national digitization projects, what are libraries' digitizing their collection of many books. Of course, in publishing and digitization of the target is limited to books published ahead of Google. However, the Library Act was amended for the reposition of online materials, but only in the ways that Google's case is different. Library Act permits collection of online resources through the library to allow, the legislation can be considered as leading act. However, online data is publicly not available through the Internet, so this service hae limited means and range unlike Google. This paper, the digitization of books in the library due to copyright, examines the legal issues looking for the desirable solution. Physical library's main role had been kept the book, but we use the book in terms of policies needed to consider. To overcome these limitations of Copyright Act, this paper researches the relation of Google Book Search in our Copyright Act, and considers introduction as the fair use doctrine and the digital repository system.

A framework of management for preventing illegal distribution of pdf bookscan file (PDF 형식 북스캔 파일 불법 유통 방지를 위한 관리 프레임워크)

  • Lee, Kuk-Heon;Chung, Hyun-Ji;Ryu, Dae-Gull;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.897-907
    • /
    • 2013
  • Since various smart devices are being developed, a growing number of people are reading eBooks instead of paper books. However, people started making eBooks on their own by scanning paper books because there are not enough eBooks provided from market. The term "Bookscan" was made with this reason. The number of bookscan company is increasing because the equipment is too expensive. However, the commercial activity of bookscan company is against copyright law. Also bookscan files are in danger of being illegally distributed on web, because bookscan companies are not protecting copyright. Publication market follows the same procedure with sound market which was collapsed due to copyright problem. Therefore, the technical methods should be prepared for law system against bookscan. The previous ICOP(Illegal Copyrights Obstruction Program) system has been applied to sound and movie files, but not applied to publication. This paper suggests the framework for bookscan file management based on practical mechanism.

Exploring the Nature of Cybercrime and Countermeasures: Focusing on Copyright Infringement, Gambling, and Pornography Crimes (사이버 범죄의 특성과 대응방안 연구: 저작권 침해, 도박, 음란물 범죄를 중심으로)

  • Ilwoong Kang;Jaehui Kim;So-Hyun Lee;Hee-Woong Kim
    • Knowledge Management Research
    • /
    • v.25 no.2
    • /
    • pp.69-94
    • /
    • 2024
  • With the development of cyberspace and its increasing interaction with our daily lives, cybercrime has been steadily increasing in recent years and has become more prominent as a serious social problem. Notably, the "four major malicious cybercrimes" - cyber fraud, cyber financial crime, cyber sexual violence, and cyber gambling - have drawn significant attention. In order to minimize the damage of cybercrime, it's crucial to delve into the specifics of each crime and develop targeted prevention and intervention strategies. Yet, most existing research relies on indirect data sources like statistics, victim testimonials, and public opinion. This study seeks to uncover the characteristics and factors of cybercrime by directly interviewing suspects involved in 'copyright infringement', 'gambling' related to illicit online content, and 'pornography crime'. Through coding analysis and text mining, the study aims to offer a more in-depth understanding of cybercrime dynamics. Furthermore, by suggesting preventative and remedial measures, the research aims to equip policymakers with vital information to reduce the repercussions of this escalating digital threat.

A Code Concealment Method using Java Reflection and Dynamic Loading in Android (안드로이드 환경에서 자바 리플렉션과 동적 로딩을 이용한 코드 은닉법)

  • Kim, Jiyun;Go, Namhyeon;Park, Yongsu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.17-30
    • /
    • 2015
  • Unlike existing widely used bytecode-centric Android application code obfuscation methodology, our scheme in this paper makes encrypted file i.e. DEX file self-extracted arbitrary Android application. And then suggests a method regarding making the loader app to execute encrypted file's code after saving the file in arbitrary folder. Encrypted DEX file in the loader app includes original code and some of Manifest information to conceal event treatment information. Loader app's Manifest has original app's Manifest information except included information at encrypted DEX. Using our scheme, an attacker can make malicious code including obfuscated code to avoid anti-virus software at first. Secondly, Software developer can make an application with hidden main algorithm to protect copyright using suggestion technology. We implement prototype in Android 4.4.2(Kitkat) and check obfuscation capacity of malicious code at VirusTotal to show effectiveness.

An Image Watermarking Scheme by Image Fusion in the Frequency Domain (주파수 영역에서 영상융합에 의한 영상 워터마킹 기법)

  • Ahn Chi-Hhyun;Shin Phil-Sun;Hwang Jae-Ho;Hong Choong-Seon;Lee Dae-Young;Kim Dong-Hyun
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.10
    • /
    • pp.1411-1420
    • /
    • 2005
  • This paper presents a robust watermarking approach that the frequency coefficients of the binary logo image are inserted in the DC and each frequency area of the host image for copyright protection of image data. We use the 1 level discrete wavelet transform(DWT) coefficients of 64*64 binary logo image as watermark because the presentation of a recognizable mark is much more convincing than numerical values and allows the opportunity to exploit the human visual system's ability to recognize a pattern. The proposed method makes use of 1-level DWT of the logo image, the DWT coefficients of the logo image are inserted by human visual system(HVS) and region of interest(ROI) in the frequency domain of the host image. Thereby, the detected logo image confirms copyright. Because small size watermark is inserted by HVS and ROI, the results confirm the superiority of the Proposed method on invisibility and robustness.

  • PDF

A Study on the Operation of the Public Lending Right System (공공대출보상권 제도의 운영에 관한 연구)

  • Lee, Heung Yong;Kim, Young-Seok
    • Journal of Korean Library and Information Science Society
    • /
    • v.46 no.4
    • /
    • pp.355-377
    • /
    • 2015
  • This study aims to analyze in depth the operation of the Public Lending Right(PLR) system that is implemented in 34 countries in the world in order to propose the ideal operation of PLR system. The PLR system is that authors receive payment because they lose the sales opportunities due to the loan of their books by libraries. Among 34 countries implementing the PLR system, 31 are European countries and 20 countries enforce the copyright law for the operation of the PLR system. Fund for the PLR is financed by the budget of the central government in 25 countries and payments are made on the basis of loans data in 20 countries. Writers, illustrators, translators are eligible to receive payments in many countries. 17 countries provide payments to the authors who have contributed to books lent out by libraries.