• Title/Summary/Keyword: Data Copyright

Search Result 263, Processing Time 0.03 seconds

A Study on Watermark Technique for Copyright Protection of Digital Images (디지털 영상물의 저작권 보호를 위한 워터마크 기술에 관한 연구)

  • Hong, Min-Suk;Park, Kang-Seo;Chung, Tae-Yun;Shin, Joon-In;Park, Sang-Hui
    • Proceedings of the KIEE Conference
    • /
    • 1998.11b
    • /
    • pp.606-608
    • /
    • 1998
  • Digital watermarking is the technique which embeds the invisible signal into multimedia data such as audio, video, images, for copyright protection, including owner identification and copy control information. In this paper, a new watermark detection algorithm by local masking cross covariance between watermarked signal and pseudo noise signal is proposed. The proposed algorithm enhances the detection probability for embedding information. Since reducing detection errors for the weak embedding signals, the algorithm improves the image quality and robusts against illegal attack to delete the embedding information and data compression applications such as JPEG and MPEGs.

  • PDF

Storage Feature-Based Watermarking Algorithm with Coordinate Values Preservation for Vector Line Data

  • Zhou, Qifei;Ren, Na;Zhu, Changqing;Tong, Deyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.7
    • /
    • pp.3475-3496
    • /
    • 2018
  • Most of current watermarking algorithms for GIS vector data embed copyright information by means of modifying the coordinate values, which will do harm to its quality and accuracy. To preserve the fidelity of vector line data and protect its copyright at the same time, a lossless watermarking algorithm is proposed based on storage feature in this paper. Firstly, the superiority of embedding watermark based on storage feature is demonstrated theoretically and technically. Then, the basic concepts and operations on storage feature have been defined including length and angle of the polyline feature. In the process of embedding watermark, the watermark information is embedded into directions of polyline feature by the quantitative mechanism, while the positions of embedding watermark are determined by the feature length. Hence, the watermark can be extracted by the same geometric features without original data or watermark. Finally, experiments have been conducted to show that coordinate values remain unchanged after embedding watermark. Moreover, experimental results are presented to illustrate the effectiveness of the method.

Support Vector Machines-based classification of video file fragments (서포트 벡터 머신 기반 비디오 조각파일 분류)

  • Kang, Hyun-Suk;Lee, Young-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.1
    • /
    • pp.652-657
    • /
    • 2015
  • BitTorrent is an innovative protocol related to file-sharing and file-transferring, which allows users to receive pieces of files from multiple sharer on the Internet to make the pieces into complete files. In reality, however, free distribution of illegal or copyright related video data is counted for crime. Difficulty of regulation on the copyright of data on BitTorrent is caused by the fact that data is transferred with the pieces of files instead of the complete file formats. Therefore, the classification process of file formats of the digital contents should take precedence in order to restore digital contents from the pieces of files received from BitTorrent, and to check the violation of copyright. This study has suggested SVM classifier for the classification of digital files, which has the feature vector of histogram differential on the pieces of files. The suggested classifier has evaluated the performance with the division factor by applying the classifier to three different formats of video files.

Mobile 3D Contents Watermarking Technique Based on Buyer-Seller Watermarking Protocol (Buyer-Seller 워터마킹 프로토콜 기반의 모바일 3D 콘텐츠 워터마킹 기법)

  • Kwon, Seong-Geun;Lee, Suk-Hwan;Bae, Sung-Ho;Park, Jae-Bum;Kwon, Ki-Ryong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.8C
    • /
    • pp.788-799
    • /
    • 2007
  • This paper presents a watermarking method for copyright protection and illegal copy prevention of mobile 3D contents. The proposed method embeds copyright information and user's phone number into spatial domain and encryption domain of mobile animation data based on Buyer-Seller watermarking protocol. Furthermore, we insert user's operation key so that only authorized user can play 3D animation game in mobile device. We implemented the proposed method by using mobile animation tool, G3-SDK. From experimental results, we verified that the proposed method is capable of copyright protection and illegal copy prevention since the watermark can be well extracted against geometrical attacks, such as noise addition, data accuracy variableness and data up/down scaling.

Digital Watermarking for Copyright Protection of 3-D CAD Design Drawing Based on Vector Data Using Digital Watermarking

  • Kwon, Ki-Ryong;Lee, Suk-Hwan;Park, Seung-Seob;Jeong, Tai-Il
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.12
    • /
    • pp.1596-1606
    • /
    • 2006
  • There has been more increased the development of 3D technique since many 3D contents of 3D graphic model, 3D mobile/computer game, and 3D CAD have been serviced in Web or industry fields. Therefore, the watermarking system is more required to protect the copyright for 3D contents. Currently there has been researched about the watermarking for 3D graphic model of mesh or NURBS. However, watermarking technique based on CAD design drawing leaves something to be desired yet. This paper proposed the watermarking technique for 3D CAD design drawing using Line and Arc components. After drawing out Line and Arc components from designed drawing, we embed the watermark into both the length of Line component and the radius of Arc component. Experimental results verified that the proposed algorithm satisfies the transparency about watermarked drawing and also has the robustness against several attacks by using public CAD tool.

  • PDF

Improved CRT-based Image Watermarking in DCT Domain for Copyright Protection (저작권 보호를 위한 DCT 영역에서의 향상된 CRT 기반 영상 워터마킹)

  • Bae, Sung-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.10
    • /
    • pp.1163-1170
    • /
    • 2013
  • Digital watermarking techniques have been used as one of the means for copyright protection and authentication of multimedia data. Conventional Chinese Remainder Theorem(CRT)-based spatial domain watermarking techniques do not perform well under JPEG compression. However, it is seen that the CRT-based watermarking technique in Discrete Cosine Transform(DCT) domain performs well for JPEG compression. In this paper, an improved CRT-based image watermarking method in the DCT domain is proposed. The proposed method provides better robustness which decreases changes of absolute difference of residues against rounding errors due to DCT conversion and various attacks. Experimental results show that the proposed method has a good robustness against various attacks compared with the conventional CRT-based watermarking in DCT domain.

Music Source and Signature Storage Method using Blockchain and Distributed Storage System (블록체인 및 분산저장시스템을 활용한 음원 및 시그니쳐 저장 방법)

  • Lee, Kyoung-Sik;Kim, Sang-Kyun
    • Journal of Broadcast Engineering
    • /
    • v.24 no.6
    • /
    • pp.956-964
    • /
    • 2019
  • In the age of personal media such as YouTube and Twitch, individual media content creation and consumption have become simpler. A huge amount of media content is created and consumed through platform services. In this regard, interest in copyright of media contents is increasing. In particular, the sound source is an indispensable element in almost all media contents production. In this paper, we propose a method to store the sound source and its signature using blockchain and distributed storage system to verify the copyright of music contents. We Identify the possibility of including the audio signature extraction result of the sound source as blockchain transaction data. Through experiments, we compare the input and output speed when the sound source and its signature are stored in the distributed storage system.

Copyright Protection of Digital Image Information based on Multiresolution and Adaptive Spectral Watermark (다중 해상도와 적응성 스펙트럼 워터마크를 기반으로 한 디지털 영상 정보의 소유권 보호)

  • 서정희
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.4
    • /
    • pp.13-19
    • /
    • 2000
  • With the rapid development of the information communication technology, more and more distribution multimedia data and electronic publishing in the web, has created a need for the copyright protection with authentication of digital information. In this paper, we propose a multi-watermarking adding and adaptive spectral watermark algorithm well adaptive frequency domain of each hierarchical using orthogonal forward wavelet transform(FWT. Numerical test results, created watermarking image robustness not only image transform such as low-pass filtering, bluring, sharpen filtering, wavelet compression but also brightness, contrast gamma correction, histogram equalization, cropping.

A Study on User's Acceptance of Blockchain-based Copyright Distribution Platforms and Its Usage (소비자의 블록체인 기반 저작권 유통 플랫폼 수용의도와 이용행위에 관한 연구)

  • Yoo, Young-Hwan;Park, Hyeon-Suk
    • The Journal of Industrial Distribution & Business
    • /
    • v.10 no.3
    • /
    • pp.59-72
    • /
    • 2019
  • Purpose - Blockchain technology, which has the characteristics of credibility, security, integrity and decentralization, has brought innovation to internet platforms that mediate peer to peer transactions, as well as changes to the contents distribution services. Blockchain-based copyright distribution platforms can solve problems which have been articulated on prior internet social networks: increased market dominance of platform business because of centralization with no reward to creators who upload on platforms, and lack of fairness, such as unfair profit distribution between the copyright holder and businesses. With this background, the current research confirmed the factors that affect the intention of usage and behaviors, targeting potential users of blockchain-based copyright distribution platforms. Research design, data, and methodology - Centered around the UTAUT2 Model, the research model was designed with 'Perceived Security' added as Construct, and 'Age' and 'Knowledge Level' added as moderating variables. For data, 607 responses were collected by an online survey, and 601 responses were included in the final analysis. We analyzed the research model and sample by using SPSS 23.0 and AMOS 23.0 on the collected responses. Results - First, results of research on whether Constructs make positive effects on Intention of use is: social influence, facilitating conditions, habit, and perceived security had positive effects on intention of use, and performance expectancy, effort expectancy, hedonic motivation, and economic value did not. Second, results of the research on whether facilitating condition, habit, and intention of use made an impact on using behaviors, it was shown that only habit and intention of use made positive effects. Third, in two groups divided by age above or under 40, group effort expectancy, intention of use, habit, and intention of use had controlling effects, and facilitating condition, intention of use, perceived security, and intention of use had effects in both groups. Conclusions - The research shows that no matter how great a blockchain-based platform is, if advantages of blockchain are not proved in various industries and utilized in real life like the internet, blockchain-based distribution systems will develop slowly. Rather than a short-term inducement emphasizing technology, there is a need for a strategic approach that can foster the environment.

Asymmetric Watermarking Using Public Key Infrastructure (공개키 기반 구조를 이용한 비대칭 워터마킹)

  • Jun Young-Min;Yang Sun-Ouk;Kim Gye-Young
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.9
    • /
    • pp.1282-1293
    • /
    • 2004
  • This paper proposes an asymmetric watermarking system using Public Key Infrastructure. The distinguishing characteristic of the proposed method connects between the two different techniques, cryptography technique and watermarking technique, by using the authentication technique. The connection between the two techniques are established based on the special qualities of each technique. Watermarks that are inserted into the digital contents consist of a digital signature described as an encrypted copyright information with the private key of a distributor or a copyright holder, and an authentication code. In the situation where the ownership of the digital contents has to be decided, authentication technique examines the data integrity of the digital contents based on an authentication and decides the ownership of the digital contents by examining whether it satisfies or not satisfies the integrity test. The formal case uses decryption method which compares the user defined copyright information, and the decrypted copyright information extracted from the watermark in the digital contents that are decrypted by distributors' public key The latter case determines the ownership by comparing the similarity between encrypted copyright information separated from the watermark that are extracted from the digital contents, and the user defined encrypted copyright information that are separated from the watermark The proposed method provides protection from the assault which attempts to identify or erase the encoding key.

  • PDF