• Title/Summary/Keyword: Digital Copying

Search Result 58, Processing Time 0.026 seconds

A Steganography for the Medical Images using Block Similarity (블록 유사도를 이용한 의료영상 스테가노그라피)

  • Moon, Il-Nam;Lee, Sin-Joo;Lee, Kwang-Man
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.5
    • /
    • pp.952-958
    • /
    • 2009
  • Recently, due to problems in terms of illegal copying of medical image and the right ownership and authentication of data, it is necessary for us to study about those problems. In this study, we propose steganography with a method of the hiding information of high-resolution in digital medical image. The proposed algorithm is one of the way that inserts secret information by protecting ROI area which is regarded as and important feature of high-resolution digital medical image. As a result, the proposed method made it possible to insert secret information of massive storage and didn't affect the imperceptibility in medical image quality based on capacity and PSNR showed the all image quality of about 33.33dB.

Nonlinear Moving Picture Editor for Multiple Watermarking (다중 워터마킹을 지원하는 비선형 동영상 편집기)

  • 윤석민;한경섭;정순기
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.2
    • /
    • pp.124-129
    • /
    • 2002
  • Currently, image processing are used widely and have various types of characteristics with the applications of VOD(Video on demand), the web casting services, the video conference systems and virtual realities. Using the scene change, at every time of video image transitions, an editor can classify the video context and also require a function of in(Boxing insertion. Digital watermarking provides a solution to illegal copying of digital contents and has many other useful applications, including web broadcast monitoring, transaction tracking, authentication, copy control and device control. The Purpose of this thesis is to implement of nonlinear moving picture editor for the multiple watermarking. For the effective watermarking performance, this thesis considers the protection of image quality reduction and robustness for hiding information concurrently.

  • PDF

Door lock remote control system using Wi-Fi (와이파이를 이용한 도어락 원격제어 시스템)

  • Kim, Gi Bum;Kim, Dong Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.86-88
    • /
    • 2017
  • The digital door lock is an electronic door lock that uses a password system and has the function of automatically locking the door when the door is closed, thus eliminating the worry about the door lock. As the technology has gradually developed, various authentication technologies such as semiconductor key system, RFID, and fingerprint recognition have been introduced. However, there is a danger of copying the door lock key, and there are password stealing and infringement. In this paper, we develop a remote control system that can unlock or open a smartphone to supplement the user's risk. The system you are going to develop can use WiFi to check if the door is locked or open on your smartphone, and you can lock or unlock the door remotely.

  • PDF

DRM Market System for Cloud-based Media Service Platform (클라우드 기반 미디어 서비스 플랫폼을 위한 DRM 마켓 시스템)

  • Cho, Dueckyoun;Hwang, Seogchan;Jeong, Gunho
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.6
    • /
    • pp.918-926
    • /
    • 2017
  • Various types of media services are emerging due to the development of Internet and digital media production and distribution technologies. Various DRM technologies are being developed to prevent illegal copying of media contents and to protect the rights of content creators. There is a problem that the DRM provider and the content service provider must provide services in a mutually dependent manner through individual contracts. In this paper, we propose a cloud-based DRM market system which can be used only by content service providers when necessary for various DRM. The DRM market system is expected to show the effect of service activation for related small and medium sized companies by providing an interface that satisfies the requirements of DRM providers and contents service providers by using multi DRM technology.

3D DCT Video Information Hiding

  • Kim, Young-Gon;Jie Yang;Lee, Hye-Joo;Hong, Jin-Woo;Lee, Moon-Ho
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2002.11a
    • /
    • pp.169-172
    • /
    • 2002
  • Embedding information into video data is a topic that recently gained increasing attention. This paper proposes a new approach for digital watermarking and secure copyright protection of video, the principal aim being to discourage illicit copying and distribution of copyrighted material. The method presented here is based on the three dimensional discrete cosine transform of video scene, in contrast with previous works on video watermarking where each video frame was marked separately, or where only intra-frame or motion compensation parameters were marked in MPEG compressed videos. The watermark sequence used is encrypted, pseudo-noise signal to the video. The performance of the presented technique is evaluated experimentally

  • PDF

Robust 3D Wavelet Watermarking for Video

  • Jie Yang;Kim, Young-Gon;Lee, Moon-Ho
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2002.11a
    • /
    • pp.173-176
    • /
    • 2002
  • This paper proposes a new approach for digital watermarking and secure copyright protection of video. the principal aim being to discourage illicit copying and distribution of copyrighted material. The method presented here is based on the three dimensional discrete wavelet transform of video scene. The watermark is a copyright information encoded in the form of a spread spectrum signal to ensure the system security and is embedded in the 3D DWT magnitude of video chunks. The performance of the presented technique is evaluated experimentally.

  • PDF

Robust Audio Watermarking in Frequency Domain for Copyright Protection (저작권 보호를 위한 주파수 영역에서의 강인한 오디오 워터마킹)

  • Dhar, Pranab Kumar;Kim, Jong-Myon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.2
    • /
    • pp.109-117
    • /
    • 2010
  • Digital watermarking has drawn extensive attention for protecting digital contents from unauthorized copying. This paper proposes a new watermarking scheme in frequency domain for copyright protection of digital audio. In our proposed watermarking system, the original audio is segmented into non-overlapping frames. Watermarks are then embedded into the selected prominent peaks in the magnitude spectrum of each frame. Watermarks are extracted by performing the inverse operation of watermark embedding process. Simulation results indicate that the proposed scheme is robust against various kinds of attacks such as noise addition, cropping, resampling, re-quantization, MP3 compression, and low pass filtering. Our proposed watermarking system outperforms Cox's method in terms of imperceptibility, while keeping comparable robustness with the Cox's method. Our proposed system achieves SNR (signal-to-noise ratio) values ranging from 20 dB to 28 dB. This is in contrast to Cox's method which achieves SNR values ranging from only 14 dB to 23 dB.

The Study of Online Piracy Protection -Focusing on Punishment and Moral Obligation- (인터넷 저작권 침해 보호에 관한 연구 -저작권 침해에 대한 처벌 및 윤리의식을 중심으로-)

  • Park, Joo Yeon
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.145-151
    • /
    • 2013
  • As the Internet is widely used worldwide, digital asset on the internet becomes to be critical to protect from illegal copying and piracy which is an unlawful action that download or upload copyrighted materials from the Internet without having a right to use them from the copyright owners. Such an illegal and unethical behavior are pervading and becoming a big concern in many industries and business sectors over the world. This study examines the effect of the user's perception for piracy regulation and moral obligation on online piracy intention. Therefore, the purpose of this study is to see the different effect of regulation and moral obligation on piracy attitude and intention so as to suggest an effective method of piracy protection and to bring an attention on moral and ethical education for online piracy. The result of this study showed both punishment and moral obligation toward online piracy are significantly associated with users' attitude on piracy, indicating that higher level of punishment severity as well as moral obligation lead to decrease piracy attitude. This research also revealed that the level of users' moral obligation has a stronger relationship with piracy attitude than punishment.

Software Development Process for Project Complexity and Size (프로젝트 난이도와 규모에 따른 소프트웨어 개발 프로세스)

  • Yoon, Seok-Min;Kim, In-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.6
    • /
    • pp.33-40
    • /
    • 2009
  • In this thesis, for the assessment of software development process for project complexity and project size : one of digital watermarking algorithm is selected and examined. Digital watermarking provides a solution to illegal copying of digital contents and has many other useful applications, including web broadcast monitoring, transaction tracking, authentication, copy control and device control. This thesis focused on the method for customizing software development path, considering the project environments and characteristics. The selection standard of software development path is composed of process items, based on the ISO/IEC 15721 Information Technology Guide for ISO/IEC 12207 (Software Life Cycle Process) and ISO/IEC 15504 Information technology - Process assessment. To evaluate the algorithm, a system for selecting development path, which reflected algorithm, was examined.

Development Testing/Evaluating Methods about Security Functions based on Digital Printer (디지털 프린터의 보안기능 시험/평가방법론 개발)

  • Cho, Young-Jun;Lee, Kwang-Woo;Cho, Sung-Kyu;Park, Hyun-Sang;Lee, Hyoung-Seob;Lee, Hyun-Seung;Kim, Song-Yi;Cha, Wook-Jae;Jeon, Woong-Ryul;Won, Dong-Ho;Kim, Seung-Joo
    • The KIPS Transactions:PartC
    • /
    • v.16C no.4
    • /
    • pp.461-476
    • /
    • 2009
  • Digital Printers that are mainly used in enterprises and public institutions are compound machinery and tools which are combined into various functions such as printing, copying, scanning, and fax so on. Digital Printers has security functionality for protecting the important data related with confidential industry technology from leaking. According to the trends, CC(Common Criteria) evaluation and assurance about digital printer is on progress in Japan and USA. Domestically CC evaluation and assurance is started recently. However, the know-how about the digital printer evaluation is not enough and the developers and the evaluators have difficulty in CC evaluation of digital printer products in the country. Therefore, the testing method of digital printer security functionality and evaluation technology is essentially needed for increasing demand for the evaluation afterwards. In this study, we analyze the security functionality and developing trends of digital printer products from internal and external major digital printer companies. Moreover, we research the characters of each security functions and propose guideline for digital printer security functionality evaluation and vulnerability testing methods.