• Title/Summary/Keyword: Data Copyright

Search Result 261, Processing Time 0.028 seconds

A Study on Protection of Iris and fingerprint Data Based on Digital Watermarking in Mid-Frequency Band (중간 주파수 영역에서의 디지털 워터마킹 기법에 의한 홍채 및 지문 데이터 보호 연구)

  • Jeong, Dae-Sik;Park, Kang-Ryoung
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.9
    • /
    • pp.1227-1238
    • /
    • 2005
  • Recently, with the advance of network and internet technologies, it is appeared the Problem that the digital contents such as image, voice and video are illegally pirated and distributed. To protect the copyright of the digital contents, the digital watermarking technology of inserting the provider's information into the contents has been widely used. In this paper, we propose the method of applying the digital watermarking into biometric information such as fingerprint and iris in order to prevent the problem caused by steal and misuse. For that, we propose the method of inserting watermark in frequency domain, compare the recognition performance before and aster watermark inserting. Also, we experiment the robustness of proposed method against blurring attack, which is conventionally taken on biometrics data. Experimental results show that our proposed method can be used for protecting iris and fingerprint data, efficiently.

  • PDF

Digital Watermarking Algorithm for Copyright Protection of JPEG Image (JPEG 영상의 저작권 보호를 위한 Digital Watermarking 알고리즘)

  • Park, Eun-Suk;Woo, Jong-Won;Lee, Seok-Hee;Heo, Yoon-Seok;Cho, Ki-Hyung
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.1
    • /
    • pp.296-305
    • /
    • 2000
  • In this paper, we propose the method of embedding the encrypted digital watermark in quantization coefficient when we encode the image data in the process of JPEC. The proposed method is as following. After a DCT coefficient of each block is quantized, we arrange the quantization coefficient as on dimension with a zigzag scan and replace each block. By applying even-odd feature of frequency of the encrypted watermark to a quantization coefficient of some fixed domain of replaced each block and embedding it, we obtain the compressed image data by encoding after placing it in the order prior to replacement. The advantages of the proposed method here are as follows: We can embed many information keeping a secret as much as possible by using the algorithm of block replacement. We can control the amount of embedding of each use, as we embed the encrypted information by selecting some fixed domain of a quantization coefficient, we can fix the embedding data regardless of the image and the value of quantization. We verified the results by experiments and analyzed the efficiency of them in comparison with the former study.

  • PDF

Log-Polar Image Watermarking based on Invariant Centroid as Template (불변의 무게중심을 템플릿으로 이용한 대수-극 좌표계 영상 워터마킹 기법)

  • 김범수;유광훈;김우섭;곽동민;송영철;최재각;박길흠
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.3
    • /
    • pp.341-351
    • /
    • 2003
  • Digital image watermarking is the method that can protect the copyright of the image by embedding copyright information, which is called watermark. Watermarking must have robustness to intentional or unintentional data changing, called attack. The conventional watermarking schemes are robust to waveform attacks such as image compression, filtering etc. However, they are vulnerable to geometrical attacks such as rotation, scaling, translation, and cropping. Accordingly, this paper proposes new watermarking scheme that is robust to geometrical attacks by using invariant centroid. Invariant centroid is the gravity center of a central area in a gray scale image that remains unchanged even when the image is attacked by RST including cropping and proposed scheme uses invariant centroids of original and inverted image as the template. To make geometrically invariant domain, template and angle compensated Log -Polar Map(LPM) is used. Then Discrete Cosine Transform(DCT) is performed and the watermark is embedded into the DCT coefficients. Futhermore, to prevent a watermarked image from degrading due to interpolation during coordinate system conversion, only the image of the watermark signal is extracted and added to the original image. Experimental results show that the proposed scheme is especially robust to RST attacks including cropping.

A Semi-fragile Watermarking Algorithm of 3D Mesh Model for Rapid Prototyping System Application (쾌속조형 시스템의 무결성 인증을 위한 3차원 메쉬 모델의 Semi-fragile 워터마킹)

  • Chi, Ji-Zhe;Kim, Jong-Weon;Choi, Jong-Uk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.6
    • /
    • pp.131-142
    • /
    • 2007
  • In this paper, semi-fragile watermarking algorithm was proposed for the application to RP(Rapid Prototyping) system. In the case of the perceptual change or distortion of the original one, the prototype product will be affected from the process because the RP system requires the high precision measure. Therefore, the geometrical transformations like translation, rotation and scaling, the mesh order change and the file format change are used in the RP system because they do not change the basic shapes of the 3D models, but, the decimation and the smoothing are not used because they change the models. The proposed algorithm which is called semi-fragile watermarking is robust against to these kinds of manipulations which preserve the original shapes because it considers the limitations of the RP system, but fragile against to the other manipulations which change the original shapes. This algorithm does not change the model shapes after embedding the watermark information, that is, there is no shape difference between the original model and the watermarked model. so, it will be useful to authenticate the data integrity and hide the information in the field of mechanical engineering which requires the high precision measure.

An improved technique for hiding confidential data in the LSB of image pixels using quadruple encryption techniques (4중 암호화 기법을 사용하여 기밀 데이터를 이미지 픽셀의 LSB에 은닉하는 개선된 기법)

  • Soo-Mok Jung
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.17 no.1
    • /
    • pp.17-24
    • /
    • 2024
  • In this paper, we propose a highly secure technique to hide confidential data in image pixels using a quadruple encryption techniques. In the proposed technique, the boundary surface where the image outline exists and the flat surface with little change in pixel values are investigated. At the boundary of the image, in order to preserve the characteristics of the boundary, one bit of confidential data that has been multiply encrypted is spatially encrypted again in the LSB of the pixel located at the boundary to hide the confidential data. At the boundary of an image, in order to preserve the characteristics of the boundary, one bit of confidential data that is multiplely encrypted is hidden in the LSB of the pixel located at the boundary by spatially encrypting it. In pixels that are not on the border of the image but on a flat surface with little change in pixel value, 2-bit confidential data that is multiply encrypted is hidden in the lower 2 bits of the pixel using location-based encryption and spatial encryption techniques. When applying the proposed technique to hide confidential data, the image quality of the stego-image is up to 49.64dB, and the amount of confidential data hidden increases by up to 92.2% compared to the existing LSB method. Without an encryption key, the encrypted confidential data hidden in the stego-image cannot be extracted, and even if extracted, it cannot be decrypted, so the security of the confidential data hidden in the stego-image is maintained very strongly. The proposed technique can be effectively used to hide copyright information in general commercial images such as webtoons that do not require the use of reversible data hiding techniques.

A Digital Image Watermarking Method using Non-linear Property (비선형 특성을 이용한 디지털 영상 워터마킹 방법)

  • Koh, Sung-Shik;Chung, Yong-Duk;Kim, Chung-Hwa
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.39 no.3
    • /
    • pp.28-34
    • /
    • 2002
  • This paper describes embedding non-linearly watermark data in the components of pixel intensities in the spatial domain of an image. The principle of the proposed method is that when an image is segmented regularly to the blocks, the pixels of the block have the non-linear properties without any similarity. That is, for the block with strong non-linear property human can't feel the visual different to the modified pixel values, on the other hand for the block with weak non-linear property human can feel the visual different to the a little modified pixel values. Thus we could embed the watermark data according to the non-linear property of the blocks. As the result of the simulation, against some general image processing attacks our algorithm could keep robust and be responsible for the copyright certainly. 

Analysis on a Structural Equation Model of e-Piracy Causes (e-저작권침해 원인에 대한 구조방정식모델 분석)

  • Yoo, Sang-Mi;Kim, Mi-Ryang
    • Journal of Internet Computing and Services
    • /
    • v.12 no.4
    • /
    • pp.145-156
    • /
    • 2011
  • The purpose of the study is to analyze the factors which cause the deviations of e-piracy. For this, empirical data were collected by conducing a field survey with a total of 531 collegians, and a Structural Equation Model was used for the purpose of analyzing the data acquired by that. A Structural Equation Model was designed and constructed by such factors as Anonymous Environment, Norm-Consciousness, and Recognition on Penalty, which are considered as the direct variables. In addition, the factor of Anonymous Environment was set as a variable for the factors of both Norm-Consciouness and Recoginition on Penalty. These are the results of the analysis; it is found that Anonymous Environment is the direct cause of e-piracy, but the other two factors are not statistically significant. And it is also found that Anonymous Environment gives a direct influence on the other factors of Norm-Consciousness and Recognition on Penalty and it also gives indirect influence on the factor of Recognition on Penalty by means of the factor of Norm-Consciousness. Therefore, in order to prevent e-piracy, it is required to provide the proper opportunity to be trained to observe norms under the environment of anonymity. For this, diverse and effectual teaching methods for information ethic education should be sought.

A Watermarking Scheme to Extract the Seal Image without the Original Image (원본정보 없이 씰영상의 추출이 가능한 이미지 워터마킹 기법)

  • Kim, Won-Gyum;Lee, Jong-Chan;Lee, Won-Don
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.12
    • /
    • pp.3885-3895
    • /
    • 2000
  • The emergence of digital imaging and digital networks has made duplication of original artwork easier. In order to protect these creations, new methods for signing and copyrighting visual data are needed. In the last few years, a large number of schemes have heen proposed for hiding copyright marks and other information in digital image, video, audio and other multimedia objects. In this paper, we propose a technique for embedding the watermark of visually recognizable patterns into the frequency domain of images. The embedded watermark can be retrieved from the decoded sequence witbout knowledge of the original. Because the source image is not required to extract the watermark, one cannot make the fake original that is invertible to watermarking scheme from the waternlarked image. In order to recover the embedded signature data without knowledge of the original, a prediction of the original value of the pixel containing the information is needed. The prediction is based on a averaging of amplitude values in a neighborhood around the pixel itself. Additionally the projxJsed technique could survive several kinds of image processings including JPEG lossy compression.

  • PDF

Instagram Users Behavior Analysis in a Digital Forensic Perspective (디지털 포렌식 관점에서의 인스타그램 사용자 행위 분석)

  • Seo, Seunghee;Kim, Yeog;Lee, Changhoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.407-416
    • /
    • 2018
  • Instagram is a Social Network Service(SNS) that has recently become popular among people of all ages and it makes people to construct social relations and share hobbies, daily routines, and useful information. However, since the uploaded information can be accessed by arbitrary users and it is easily shared with others, frauds, stalking, misrepresentation, impersonation, an infringement of copyright and malware distribution are reported. For this reason, it is necessary to analyze Instagram from a view of digital forensics but the research involved is very insufficient. So in this paper, We performed reverse engineering and dynamic analysis of Instagram from a view of digital forensics in the Android environment. As a result, we checked three database files that contain user behavior analysis data such as chat content, chat targets, posted photos, and cookie information. And we found the path to save 4 files and the xml file to save various data. Also we propose ways to use the above results in digital forensics.

Court's Criteria for Judging Research Misconduct and JRPE Goals

  • HWANG, Hee-Joong
    • Journal of Research and Publication Ethics
    • /
    • v.1 no.1
    • /
    • pp.23-28
    • /
    • 2020
  • Purpose: Focusing on Supreme Court precedents, we intend to establish criteria for judging research misconduct. Research design, data and methodology: In addition, I would like to propose the criteria for judging research misconduct by the KODISA, which applies the court's standards well in practice, and guidelines for preventing research misconduct. Research design, data and methodology: After classifying the case of research misconduct into six cases, the court's judgment and practical application will be reviewed. Results: First, research misconduct that has passed the disciplinary prescription can be punished. This is because the state of illegality continues to this day. Second, even if there were no punishment regulations at the time of research misconduct, it can be retroactively punished with the current punishment regulations. This is because research ethics is a universal and common standard and does not change. Third, if there is a fact that infringes on intellectual property rights, it is presumed unwritten intentions. Therefore, the act of taking and using the work of another person without permission or proper citation procedure, even if it is unintentional and for the public interest, is a research misconduct. Fourth, if there is an inappropriate citation notation, the intention of research misconduct is presumed. It is the judgment of the court that even if a quotation is marked, if it is incomplete, it is recognized as plagiarism. Fifth, if the author uses the work of another person without proper source indication, it is plagiarism even if the other person who owns the copyright agrees to it. The understanding or consent of some parties does not justify research misconduct in violation of public trust. Sixth, it is a research misconduct to create a new work without citations for one's previous work. In addition, even if there is a citation, if the subsequent writing is not original, it is a research misconduct. Conclusions: Academia should clarify the scope of research misconduct by referring to the Research Ethics Regulations of KODISA, and deal with research results that lack the value as creative works similar to those of research misconduct.