• Title/Summary/Keyword: Digital Rights Management(DRM)

Search Result 163, Processing Time 0.022 seconds

Design of Framework for Content Distribution in Wireless Environment (무선 환경에서의 콘텐츠 유통 프레임워크 설계)

  • 조광문;한군희
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.4 no.2
    • /
    • pp.71-75
    • /
    • 2003
  • The distribution model of multimedia content is proposed, This solves the problems which are occurred by various multimedia content and the complex distribution structure. The online distribution processes in wireless environments contain many different, companent from the of offline and wire networks. The multimedia content can be very easily propagated illegally. Under these environments the seneme to protect the copyrights of multimedia content and rights of distribution entities is needed. In this paper a distribution framework of content in wireless environment based on MPFG-21 framework if proposed. This model can be adapted to DRM(digital rights management) and utilized to protect the rights of distribution entities.

  • PDF

Example of Broadcasting Application based on MPEG-21 IPMP and Reference Model (MPEG-21 IPMP과 Reference Model의 방송환경 적용 예)

  • 채종진;김종연
    • Journal of Broadcast Engineering
    • /
    • v.8 no.4
    • /
    • pp.365-380
    • /
    • 2003
  • Since MPEG-21 IPMP has been working on International Standardization activity such as one of DRM systems from 1997, the standardization is recently re-started even though the activity was interrupted. According to the MPEG Brisbane meeting, the CfR of MPEG-21 IPMP will be determined on the next Hawaii meeting, therefore they will announce the CfP. However the CfP announced in MPEG Hawaii meeting but the CfR didn't announce because of unfinished requirement document job. Finally. the proposed techniques will be submitted till June 2004. In this paper, we explained the requirement of standardization based on a broadcasting circumstance and implemented the system of MPEG-21 including the architecture and IPMP systems, then we showed all functionality within the other MPEG-21 elements engines. In case of multimedia stream broadcasting system, it is a real-time processing system, the implemented MEPG-21 Architecture can be shown the use of Digital Item In the MPEG-21 terminal and additional MPEG-21 element engines.

MPEG-21 IPMP's Application and Implementation On Linux Server/Client Environments (Linux Server/client 구조에서 MPEG-21 IPMP의 용용 및 구현)

  • Choi Yong-Soo;Kim Ki-Seob;Kim Hyoung-Joong;Han Hyung-Seok;Song Jeong-Seok;Kim Sung-Soo
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.119-123
    • /
    • 2004
  • 이 논문의 목적은 Linux 기반의 서버/클라이언트 구조에서 IPMP 시스템을 구현하는데 있다. DRM(Digital RIghts Management)솔루션을 제공해주는 IPMP(Intellecutual Property Management and Protection)의 참조 소프트웨어인 OpenIPMP 시스템을 기반으로 하며 MPEG-21 권리표현 언어인 XML을 채용하여 새로운 미디어 서비스 환경에 적합한 웹기반 멀티미디어 컨텐츠 서비스 제공 시스템을 구현하는데 있다.

  • PDF

Implementation of IPMP System for MPEG-4 AVC(H.264) (MPEG-4 AVC(H.264) 기반의 IPMP 시스템 구현)

  • Choi, Yong-Soo;Kim, Ki-Seob;Kim, Hyoung-Joong;Han, Hyung-Seok;Park, Jong-Hyuk;Park, Heung-Soo;Koh, Byoung-Soo
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2005.08a
    • /
    • pp.323-328
    • /
    • 2005
  • 이 논문에서는 Linux 기반의 서버/클라이언트 구조에서 H.264 Content에 대한 IPMP 시스템을 구현하고자 한다. DRM(Digital RIghts Management)솔루션을 제공해주는 IPMP(Intellecutual Property Management and Protection)를 관련 참조 소프트웨어들의 변경 통합과정을 거쳐 H.264에 대한 IPMP 시스템을 구현했다.

  • PDF

A Robust Multiple Set-Top Box Authentication Scheme for IPTV Against Smart Card Cloning Attack (IPTV 환경에서 스마트카드 복제에 강건한 다중 셋톱박스 인증기법)

  • Lim, Ji-Hwan;Oh, Hee-Kuck;Kim, Sang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.17C no.1
    • /
    • pp.37-46
    • /
    • 2010
  • In an IPTV system, the rights of the content and service provider can be protected by using Conditional Access System (CAS) and Digital Right Management (DRM). In case of the CAS, only the authorized user who has structured authentication keys can decrypt the encrypted content. However, since the CAS establishes a secure channel only between content provider and Smart Card (SC), it cannot protect the system against McCormac Hack attack which eavesdrops on unsecure channel between SC and Set-Top Box (STB) and SC cloning attack. In this paper, we propose a robust multi-STB assisted SC / STB authentication protocol which can protect the IPTV system against not only McCormac Hack attack, but also SC cloning attack. The previous works which bind a STB and a SC during the SC registration phase against the SC cloning attack does not support multi-STB environments. The proposed system which dynamically updates the STB information in subscriber management system using the bi-directional channel characteristic of IPTV system can support the user's multi-STB device effectively.

A Study on Copyright Protection Platform for Cloud-Based Media Service (클라우드 기반 미디어 서비스를 위한 저작권 보호 플랫폼 연구)

  • Park, Byeong-Chan;Won, Yu-Hyeon;Kim, Young-Mo;Kim, Byung-Gi;Kim, Seok-Yoon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.01a
    • /
    • pp.193-194
    • /
    • 2018
  • 미디어 서비스는 사용자들의 다양한 미디어 소비 패턴 변화와 상호작용 서비스, 고화질 고용량의 다양한 소비자들 요구로 인해 새로운 미디어 서비스 패러다임을 맞이하고 있다. 이에 따라, IT 자원의 효율적인 사용 및 유지 관리비용의 절감을 목적으로 클라우드 컴퓨팅을 기반으로 한 클라우드 미디어 서비스의 연구가 활발히 이루어지고 있다. 하지만, 기존 클라우드 기반 미디어 서비스의 경우 저작권 보호 기술이 제한적이며, 사용자 및 서비스 제공자에게 유연한 저작권 보호 기술이 필요하게 되었다. 본 논문에서는 클라우드 기반 미디어 서비스를 위한 저작권 보호 플랫폼에 대한 참조 모델을 제시하여 멀티 DRM을 지원하는 클라우드 기반 미디어 서비스를 구축할 때 실제 시스템 구현에 참조할 수 있는 모델을 제시한다.

  • PDF

A Case Study on the Construction of Cyber Textbook Museum Database (사이버교과서박물관 데이터베이스 구축에 관한 사례 연구)

  • Kim, Eun-Ju;Lee, Myeong-Hee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.20 no.4
    • /
    • pp.67-84
    • /
    • 2009
  • Cyber Textbook Museum is created by the Korean Educational Development Institute in part of the project to manage the knowledge and information of Korea to promote understanding of Korean education and its history. The original and full text of textbooks dating from the 1890s to the present have been digitized and arranged for easy access over internet. An exclusive portal site dealing with Korean textbooks and curriculum materials was made to provide not only the directory service of textbooks and curriculums in diverse data classifications, school levels, years/periods and subjects but also the keyword search by searching engine. Users can search the necessary materials easily and systematically over the screen and use all the functions except save, capture and print. The management system for textbook image(DjVu format), search system and DRM(Digital Rights Management) system were developed. Finally, four suggestions are proposed which are related in the aspects of policy, technical, systematic aspects for active and tremendous use of the site.

A digital Audio Watermarking Algorithm using 2D Barcode (2차원 바코드를 이용한 오디오 워터마킹 알고리즘)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.2
    • /
    • pp.97-107
    • /
    • 2011
  • Nowadays there are a lot of issues about copyright infringement in the Internet world because the digital content on the network can be copied and delivered easily. Indeed the copied version has same quality with the original one. So, copyright owners and content provider want a powerful solution to protect their content. The popular one of the solutions was DRM (digital rights management) that is based on encryption technology and rights control. However, DRM-free service was launched after Steve Jobs who is CEO of Apple proposed a new music service paradigm without DRM, and the DRM is disappeared at the online music market. Even though the online music service decided to not equip the DRM solution, copyright owners and content providers are still searching a solution to protect their content. A solution to replace the DRM technology is digital audio watermarking technology which can embed copyright information into the music. In this paper, the author proposed a new audio watermarking algorithm with two approaches. First, the watermark information is generated by two dimensional barcode which has error correction code. So, the information can be recovered by itself if the errors fall into the range of the error tolerance. The other one is to use chirp sequence of CDMA (code division multiple access). These make the algorithm robust to the several malicious attacks. There are many 2D barcodes. Especially, QR code which is one of the matrix barcodes can express the information and the expression is freer than that of the other matrix barcodes. QR code has the square patterns with double at the three corners and these indicate the boundary of the symbol. This feature of the QR code is proper to express the watermark information. That is, because the QR code is 2D barcodes, nonlinear code and matrix code, it can be modulated to the spread spectrum and can be used for the watermarking algorithm. The proposed algorithm assigns the different spread spectrum sequences to the individual users respectively. In the case that the assigned code sequences are orthogonal, we can identify the watermark information of the individual user from an audio content. The algorithm used the Walsh code as an orthogonal code. The watermark information is rearranged to the 1D sequence from 2D barcode and modulated by the Walsh code. The modulated watermark information is embedded into the DCT (discrete cosine transform) domain of the original audio content. For the performance evaluation, I used 3 audio samples, "Amazing Grace", "Oh! Carol" and "Take me home country roads", The attacks for the robustness test were MP3 compression, echo attack, and sub woofer boost. The MP3 compression was performed by a tool of Cool Edit Pro 2.0. The specification of MP3 was CBR(Constant Bit Rate) 128kbps, 44,100Hz, and stereo. The echo attack had the echo with initial volume 70%, decay 75%, and delay 100msec. The sub woofer boost attack was a modification attack of low frequency part in the Fourier coefficients. The test results showed the proposed algorithm is robust to the attacks. In the MP3 attack, the strength of the watermark information is not affected, and then the watermark can be detected from all of the sample audios. In the sub woofer boost attack, the watermark was detected when the strength is 0.3. Also, in the case of echo attack, the watermark can be identified if the strength is greater and equal than 0.5.

Design and implementation of protection and management system of digital contents based on MPEG-21 IPMP (MPEG-21 IPMP 기반 디지털 콘텐츠 보호 관리 시스템 설계 및 구현)

  • Ryu Kwang-Hee;Kim Yun-Ki;Kim Kwang-Yong;Kim Jae-Gon;Hong Jin-Woo;Jung Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.149-152
    • /
    • 2006
  • The usage increase of digital contents required solution for protection technology and interoperability of system. MPEG proposed MPEG-21 Multimedia Frameworks. MPEG-21 IPMP is standard that provides the means to enable digital item and rights information to be persistently managed and protected across networks and devices. In this paper, MPEG-21 IPMP based system to protect digital contents designed by four structures of license server, production server, consumption server, tool sewer. License sewer create rights information document using the XML-based REL about multimedia contents of users. Production server makes a digital item by packaging multimedia resource and metadata, which is combined by REL information and IPMP information of multimedia resource. Consumption server takes care of the functions of players that use digital item, and tool server was implement to transmit for missing tool that night occur in all procedures.

  • PDF

A Study on Efficient Encryption of MPEG-4 Video File (효율적인 MPEG-4 비디오 파일의 암호화에 관한 연구)

  • 김건희;신동규;신동일
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10b
    • /
    • pp.631-633
    • /
    • 2004
  • 본 논문에서는 MPEG-4 비디오 포맷으로 인코딩(encoding)된 미디어 데이터에 적용할 수 있는 효과적인 암호화 방법에 대해서 제안하고 실험 결과에 대하여 기술한다 MPEG-4 파일로부터 추출한 I(Intra-coded)-VOP(Video Object Plane)의 매크로 블록(Macroblock)들 중의 최소부분 암호화, P(Predictive-coded)-VOP의 움직임 벡터(Motion Vector)들과 매크로블록들의 최소부분 암호화, 그리고 마지막으로 모든 VOP들의 최소 부분 암호화와 같은 3가지 암호화 방법을 구현하고 실험하였다. 이러한 방법은 모바일 또는 유비쿼터스 환경 하에서의 상용 서비스의 디지털 저작권 관리(Digital Rights Management)를 구축하는 데에 매우 용이하고 적합하게 적용되며, 주문형 비디오 서비스(Video On Demand)와 같은 비디오 스트리밍을 위한 DRM 시스템에 최소한의 부하만을 지우도록 설계되었다 미디어 데이터의 각 VOP들의 암호화에 소요되는 시간을 측정한 결과, 이러한 방법은 상용 멀티미디어 서비스에도 충분히 적용 가능한 성능을 나타내었다.

  • PDF