• Title/Summary/Keyword: Digital Copying

Search Result 58, Processing Time 0.021 seconds

Digital Contents Application using Intelligence (지능을 이용한 디지털 콘텐츠 응용)

  • Kim, Man-Ki;Hong, You-Sik
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.2
    • /
    • pp.65-71
    • /
    • 2009
  • The end of the 1990s due to the rapid development of Internet communications and two-way communication advertising, public relations, online music, video, movies, e-Book, and distribution of digital content is actively underway. The combination of Internet and TV, as well as born of IPTV and interactive digital content industry's future has become a key industry. However, these two-way communication that illegal adult sites, illegal Bulletin, illegal Ads, PR, shopping mall, illegal music copying, video replication, such as negative due to the emergence of IPTV and is always around us and should be recognized. For example, on the Internet, which has been operating in the ocean sounds from the music copyright issue, the prosecution decided to prosecute because of the digital cultural content, copyright issues has become an important issue. Status and issues of this paper to learn the digital content, using intelligence to solve these problems, two-way communication advertising, public relations and practice of digital content, practices and courses of students vulnerable to offers for the analysis simulation.

  • PDF

Copyright Protection for Digital Image by Watermarking Technique

  • Ali, Suhad A.;Jawad, Majid Jabbar;Naser, Mohammed Abdullah
    • Journal of Information Processing Systems
    • /
    • v.13 no.3
    • /
    • pp.599-617
    • /
    • 2017
  • Due to the rapid growth and expansion of the Internet, the digital multimedia such as image, audio and video are available for everyone. Anyone can make unauthorized copying for any digital product. Accordingly, the owner of these products cannot protect his ownership. Unfortunately, this situation will restrict any improvement which can be done on the digital media production in the future. Some procedures have been proposed to protect these products such as cryptography and watermarking techniques. Watermarking means embedding a message such as text, the image is called watermark, yet, in a host such as a text, an image, an audio, or a video, it is called a cover. Watermarking can provide and ensure security, data authentication and copyright protection for the digital media. In this paper, a new watermarking method of still image is proposed for the purpose of copyright protection. The procedure of embedding watermark is done in a transform domain. The discrete cosine transform (DCT) is exploited in the proposed method, where the watermark is embedded in the selected coefficients according to several criteria. With this procedure, the deterioration on the image is minimized to achieve high invisibility. Unlike the traditional techniques, in this paper, a new method is suggested for selecting the best blocks of DCT coefficients. After selecting the best DCT coefficients blocks, the best coefficients in the selected blocks are selected as a host in which the watermark bit is embedded. The coefficients selection is done depending on a weighting function method, where this function exploits the values and locations of the selected coefficients for choosing them. The experimental results proved that the proposed method has produced good imperceptibility and robustness for different types of attacks.

The Characteristics of Directing in Digital Animation : Combination of Reality and Exaggeration (디지털 애니메이션의 연출 특성 -사실적 표현과 과장성의 융합-)

  • Kim, Yumi
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.12
    • /
    • pp.27-34
    • /
    • 2016
  • The application of computer graphics, which is characterized by reality, has even reinforced reality of image and motion expression in digital animation. But reality of digital animation succeeds to traditional aesthetic characteristics of animation for overcoming physical limitations of the real world and realizing imagination through transformation, rather than copying actuality as it is. But it does not succeed to drawing animation wholly. Digital animation adds cartoonish transformation, based on three-dimensional realistic expression and those animation situations look as if they get over realistic restrictions, while drawing animation constantly reminds of mediality in drawing motion, based on two-dimensional plane and handwork. n other words, cartoonish exaggeration that is intermittently inserted between these reinforced realities, expresses digital animation's own aesthetic characteristics as a dialectical sum by crashing into contrast coming from a cross between reality and imagination.

Geometric Multiple Watermarking Scheme for Mobile 3D Content Based on Anonymous Buyer-Seller Watermarking Protocol (익명 Buyer-Seller 워터마킹 프로토콜 기반 모바일 3D 콘텐츠의 기하학적 다중 워터마킹 기법)

  • Lee, Suk-Hwan;Kwon, Seong-Geun;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.2
    • /
    • pp.244-256
    • /
    • 2009
  • This paper presents multiple watermarking method for the copyright protection and the prevention of illegal copying of mobile 3D contents. The proposed method embeds an unique watermark and a WCA watermark into the spatial and encryption domains of mobile 3D content based on anonymous Buyer-Seller watermarking protocol. The seller generates an unique watermark and embeds it into the distribution of vertex data of 3D content object. After receiving the encrypted watermark from WCA, the seller embeds it into the encrypted vertex data by using operator that satisfies the privacy homo morphic property. The proposed method was implemented using a mobile content tool, Power VR MBX and experimental results verified that the proposed method was capable of copyright protection and preventing illegal copying, as the watermarks were also accurately extracted in the case of geometrical attacks, such as noise addition, data accuracy variation, and data up/down scaling.

  • PDF

A Study on Digital Image Watermarking for Embedding Audio Logo (음성로고 삽입을 위한 디지털 영상 워터마킹에 관한 연구)

  • Cho, Gang-Seok;Koh, Sung-Shik
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.39 no.3
    • /
    • pp.21-27
    • /
    • 2002
  • The digital watermarking methods have been proposed as a solution for solving the illegal copying and proof of ownership problems in the context of multimedia data. But it is still difficult to have been overcame the problem of the protection of property to multimedia data, such as digital images, digital video, and digital audio. This paper describes a watermarking algorithm that embeds non-linearly audio logo watermark data which is converted from audio signal of the ownership in the components of pixel intensities in an original image and that insists of ownership by hearing the audio signal transformed from the extracted audio logo through the speaker. Experimental results show that our algorithm using audio logo proposed in this paper is robust against attacks such as particularly lossy JPEG image compression. 

Design and implementation of improved authentication mechanism base on mobile DRM using blockchain (블록체인을 이용한 모바일 DRM 기반 개선된 인증 메커니즘 설계 및 구현)

  • Jeon, Jinl-Oh;Seo, Byeong-Min
    • Journal of Digital Convergence
    • /
    • v.19 no.4
    • /
    • pp.133-139
    • /
    • 2021
  • Due to the rapid progress in network technology, many research on content security technologies is also being conducted in the mobile digital content sector. In the meantime, content protection has been immersed in preventing illegal copying, certifying, and issuance/management certificates, but still have many vulnerabilities in managing or authenticating confidential information. This study aims to strengthen confidential information about content based on dual management of content download rights through mobile phone numbers or device numbers. It also protect replay-attack by building a secure mobile DRM system where digital content is safely distributed based on a three-stage user authentication process. In addition, blockchain-based content security enhancements were studied during the primary/secondary process for user authentication for the prevention of piracy and copyright protection. In addition, the client authentication process was further improved through three final stages of authorization in the use of illegal content, considering that legitimate users redistributed their content to third-party.

An Analysis on the Distribution Structure of Internet Knowledge Exchange Markets (인터넷 지식거래소의 지식정보유통 실태분석)

  • Noh, Young-Hee
    • Journal of Korean Library and Information Science Society
    • /
    • v.38 no.1
    • /
    • pp.135-156
    • /
    • 2007
  • This paper aims to analyze distribution structure of commercial Internet knowledge exchange markets. To that end, it has four specific study goals. First, define the type and volume of information available at the Internet knowledge exchange market as well as that of market users. Second, analyze distribution structure of the Internet knowledge exchange market. Third, identify current issues regarding infringement of intellectual property rights and conduct a survey to understand current standing of Internet knowledge exchange markets' IPR violation. Forth, assess application of Digital Rights Management(DRM) to Internet knowledge exchange markets and DRM's role in controlling unauthorized copying and illegal uses.

  • PDF

For the development of software industry, extensive software certification scheme (소프트웨어 산업의 발전을 위한 확장된 소프트웨어 인증체계)

  • Seo, Hee Suk;Kim, Sang Ho;Lee, Seung Jae
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.3
    • /
    • pp.121-129
    • /
    • 2010
  • For the development of software industry, offers an expanded software authentication scheme caused by the unauthorized copying of software is to reduce the damage to software developers, retail sales and to promote the development of the software industry was studied. Serial Number of the current software registration is conducted in such a simple verification procedure if the Serial Number only illegal and can be installed on multiple computers, such as program code to allow third parties to enter the Serial Number, or the extract can be used without is a reality. The proposed extension to the software authentication system when you install the software, my phone authentication and MAC Address Authentication Service introduced to distinguish normal user, the user of the MAC Address of the server and software development company that was sent to the registered MAC Address of the computer to be run only by the use of genuine software and to make unauthorized copies of software generated by the software developer can reduce the damage of the proposed plan.

The Study of Models for Multimeia Digital rights Managements in Home Network (홈네트워크 환경에서의 멀티미디어 디지털 컨텐트 권한 관리 모델에 관한 연구)

  • Jung, Jong-Jin;Kim, Yun-Sang;Lim, Tae-Bum;Lee, Suk-Pil
    • Proceedings of the KIEE Conference
    • /
    • 2006.10c
    • /
    • pp.518-520
    • /
    • 2006
  • Due to the rapid popularization of mobile multimedia devices and the Internet as well as the realization of high-speed data transmission and large-volume data recording media, high quality content distribution and ubiquitous information services are making progress and a new type of information distribution and network sharing service has gradually emerged into the market. It is capable of utilizing terabyte sized home servers also in private homes. Under these circumstances, in distribution of content over shared networks, it is crucial to establish DRM (Digital Rights Management) technologies to protect the content from illegal copying and usage. A truly successful DRM system must be built on open worldwide specifications and provide maximum interoperability and user acceptance. An open interoperability of DRM is able to construct highly expandable PKI based DRM, targeting usage between systems, considering the expansion of recent content distribution services and clients This document gives protocol specifications for the exchange of rights information between the DRM module, description of specifications for rights information and encrypted content formats.

  • PDF

Design of SD Memory Card for Read-Time Data Storing (실시간 데이터 저장을 위한 SD 메모리 카드 설계)

  • Moon, Ji-Hoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.436-439
    • /
    • 2011
  • As mobile digital devices have come into more widespread use, the demand for mobile storage devices have been increasing rapidly and most of digital cameras and camcorders are using SD memory cards. The SD memory card are generally employing a form of copying data into a personal computer after storing user data based on flash memory. The current paper proposes the SD memory card of being capable of storing photograph and image data through network rather than using a method of storing data in flash memory. By delivering data and memory address values obtained through SD Slave IP to network server without sending them to flash memory, one can store data necessary to be stored in a computer's SD memory in real time in a safe and convenient way.

  • PDF