• Title/Summary/Keyword: Forensic Marking

Search Result 10, Processing Time 0.027 seconds

Implementation of commercial digital Forensic Marking systems (디지털 추적표시(For ensic Marking) 시스템 개발)

  • Kim, Jong-An;Kim, Jin-Han;Kim, Jong-Heum
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2007.08a
    • /
    • pp.142-146
    • /
    • 2007
  • Digital Rights Management (DRM) technology has been widely used for protecting the digital contents over the recent years. But the digital contents protected by DRM are vulnerable to various video memory capture programs when DRM packaged contents are decrypted on the consumers' multimedia devices. To make up for this kind of DRM security holes the Forensic Marking (FM) technology is being deployed into the content protection area. Most leading DRM companies as well as big electronics companies like Thomson and Philips already have commercial FM solutions. Forensic Marking technology uses the digital watermarking to insert the user information such as user id, content playing time and etc. into the decrypted and decoded content at the playback time on the consumer devices. When the content containing watermarked user information (Forensic Mark) is illegally captured and distributed over the Internet, the FM detection system takes out the inserted FM from the illegal contents and informs contents service providers of the illegal hacker's information. In this paper the requirements and test conditions are discussed for the commercial Forensic Marking systems.

  • PDF

Technologies for Forensic Marking Certification (포렌식마크 기술 평가 및 인증 기술)

  • Oh, Weon-Geun
    • Journal of Broadcast Engineering
    • /
    • v.18 no.2
    • /
    • pp.196-203
    • /
    • 2013
  • The importance of Digital Rights Protection technologies, especially the forensic marking, is getting larger and larger as the demand for the digital contents is increased. But the technologies for the evaluation of forensic marking is not set up properly due to the conflicts between interested parties and technical difficulties. Therefore to evaluate the performance of forensic marking objectively, image and video modification items/levels and evaluation criteria are essential. This paper suggests the quantitative system for evaluating the performance of forensic marking objectively. By providing the opportunity to evaluate the Digital Rights Protection product in objective and quantitative manner, forensic marking industry can expedite its technology development and consumer can get objective and universally validated performance result. It is expected this technology could help revitalizing the related industries and help expediting the development of forensic mark technologies.

Audio Forensic Marking System for Copyright Protection of Streaming Music Service (스트리밍 음악 서비스의 저작권 보호를 위한 오디오 포렌식마킹 시스템)

  • Seo, Yongseok;Park, Jihyun;Yoo, Wonyoung
    • Journal of Digital Contents Society
    • /
    • v.15 no.3
    • /
    • pp.357-363
    • /
    • 2014
  • In this paper, we propose a new audio forensic marking system for protecting the copyright of the Internet-based music streaming services. In the proposed method, in order to guarantee the QoS of the streaming service, high speed, and generates a forensic mark inserted MP3 file. We make pre-marking process and generate a new forensic marked MP3 file, a combination of the pre-marked MP3 frame, the inserted user information. Experimental results show that the proposed method satisfactory results robustness and imperceptibility, and real-time properties. In addition, we were confirmed that the real-time embedding and detection from the streaming-based audio forensic marking system that has been implemented on the server/client is possible.

Audio Forensic Marking using Psychoacoustic Model II and MDCT (심리음향 모델 II와 MDCT를 이용한 오디오 포렌식 마킹)

  • Rhee, Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.4
    • /
    • pp.16-22
    • /
    • 2012
  • In this paper, the forensic marking algorithm is proposed using psychoacoustic model II and MDCT for high-quality audio. The proposed forensic marking method, that inserts the user fingerprinting code of the audio content into the selected sub-band, in which audio signal energy is lower than the spectrum masking level. In the range of the one frame which has 2,048 samples for FFT of original audio signal, the audio forensic marking is processed in 3 sub-bands. According to the average attack of the fingerprinting codes, one frame's SNR is measured on 100% trace ratio of the collusion codes. When the lower strength 0.1 of the inserted fingerprinting code, SNR is 38.44dB. And in case, the added strength 0.5 of white gaussian noise, SNR is 19.09dB. As a result, it confirms that the proposed audio forensic marking algorithm is maintained the marking robustness of the fingerprinting code and the audio high-quality.

Development of Forensic Marking technology for tracing multiple users (다중 불법콘텐츠 복제자 추적 기술 개발)

  • Kim, Jong-An;Kim, Jin-Han;Kim, Jong-Heum
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.102-106
    • /
    • 2008
  • Forensic Marking is the technology that enables the service providers (SP) to identify the illegal digital contents distributors by first inserting markings (data indicating the user information and playback time) in realtime into the digital contents at time of playback of digital contents, and then later by extracting inserted markings from the contents which are illegally captured from the multimedia device such as IPTV STBs and distributed over the Internet. Digital Rights Management (DRM), which is a very popular content protection technology, has the security hole that can be vulnerable because the encrypted digital contents are transformed into their original plaintext forms after the decrypting process on the STBs. Therefore Forensic Marking (FM) has now become a companion content protection solution to DRM. This article describes a new way of tracking up to 4 illegal content users in FM implementation using the blue-difference chroma component of YCbCr color space. This FM technology has many advantages like fast processing time and easy portability to STB devices compared to that of the traditional watermarking processing in the frequency domain.

  • PDF

Network Forensic Evidence Generation and Verification Scheme (효율적인 인터넷 범죄수사를 위한 범행호스트 탐지 및 범죄행위 입증기술)

  • Kim, Hyung-Seok;Kim, Eun-Jin;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.719-731
    • /
    • 2012
  • One of the most important point in the Internet crime investigation is tracing back and pointing out a criminal host. However, criminals can forge a crime record stored in the crime host, or can utilize malicious applications in order not to leave a crime record. In addition, criminals can change the source IP address of a crime host and deny their involvement. In this study, we suggests the Network Forensic Evidence Generation and Verification Scheme (NFEGVS) to rectify the current limitation of Network Forensic technologies. This scheme can prove who and when the crime has occurred. In addition, this prevents leaking of symmetric key for guaranteeing certification and integrity of Forensic Evidence by proposing the Timestamp Secret Key Distribution Scheme, and minimizes performance degradation of router when generating forensic evidence with the Flow-Based Selection Scheme. In this paper, we implement the proposed scheme and evaluate overall performance of the proposed system.

Development of the filtering technology of illegal IPTV contents (IPTV 불법복제콘텐츠 필터링 기술 개발)

  • Kim, Jong-An;Kim, Jong-Heum;Kim, Jin-Han;Chin, Young-Min
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2009.08a
    • /
    • pp.108-111
    • /
    • 2009
  • In this paper, both various content filtering methods and technological trends are briefly reviewed. A novel method is provided for preventing the illegal copies of copyright IPTV contents from being propagated through the P2P sites and web harddisk services.

  • PDF

A study on the implementation of Digital Cinema platform and its security system (디지털 시네마 플랫폼 구축과 보안에 관한 연구)

  • Kim Jong-An;Kim Jin-Han;Kim Jong-Heum
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2006.08a
    • /
    • pp.82-86
    • /
    • 2006
  • Film has been used widely since Auguste and Louis Lumiere hold the first private screening in 1895. Star Wars Episode II: Attack of the Clones directed by George Lucas released on May 16, was the first motion picture both to be shot completely on a high definition digital 24-frame system and to be projected by digital projectors. Its success showed us that the digital cinema era is imminent. Digital Cinema will enable the studios and movie distributors to low the expenses of making and delivering film prints and dissemination of it can put the entire digital cinema ecosystem in great jeopardy. Therefore DRM and other security policies are used for digital cinema content protection. In this paper it will be discussed how the digital cinema platform can package (encooe & encrypt), transport, and project the digital cinema contents safely.

  • PDF

Guideline for Forensic Marking Certification (포렌식마크 기술 평가 및 인증 지침)

  • Oh, Weon-Geun
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2012.07a
    • /
    • pp.111-114
    • /
    • 2012
  • 본 논문에서는 국내 디지털 저작권 보호 업체 혹은 대학 및 연구소에서 개발하고 생산하는 포렌식마크 기술의 품질을 객관적으로 평가할 수 있는 평가절차와 평가지표를 정량적으로 제시하였다. 포렌식마크 기술을 객관적으로 평가하기 위해서 본 논문에서는 우선, 구매자 정보(포렌식마크라)가 삽입된 테스트 영상의 공격 항목과 수준을 정하고, 포렌식마크 정보의 추출 성능을 평가하기 위한 평가절차로서 평가항목, 평가기준, 평가절차를, 그리고 인증을 위해서는 포렌식마크 기술의 신뢰성에 대한 통계정보를 포함하는 인증서를 생성하기 위한 인증절차를 포함하였다. 이러한 포렌식마크 기술의 평가 및 인증 지침은 기술 개발자에게는 자신들이 개발한 포렌식마크 기술에 대한 객관적인 평가결과를 미리 알아볼 수 있어서 기술의 상품성을 점검할 수 있고 소비자 입장에서는 객관적이고 보편타당성 있는 평가 결과에 대한 신뢰를 가질 수 있다. 평가자 입장에서는 표준 평가를 통해 객관적이고 정량적인 평가 결과를 얻을 수 있어서 상대적인 우열을 가리기가 용이해지는 편리성을 얻을 수 있다. 이를 통하여 포렌식마크 기술의 발전과 디지털 저작권 보호 시장의 활성화에 일조를 할 수 있을 것으로 사료된다.

  • PDF

A Design on the Multimedia Fingerprinting code based on Feature Point for Forensic Marking (포렌식 마킹을 위한 특징점 기반의 동적 멀티미디어 핑거프린팅 코드 설계)

  • Rhee, Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.4
    • /
    • pp.27-34
    • /
    • 2011
  • In this paper, it was presented a design on the dynamic multimedia fingerprinting code for anti-collusion code(ACC) in the protection of multimedia content. Multimedia fingerprinting code for the conventional ACC, is designed with a mathematical method to increase k to k+1 by transform from BIBD's an incidence matrix to a complement matrix. A codevector of the complement matrix is allowanced fingerprinting code to a user' authority and embedded into a content. In the proposed algorithm, the feature points were drawing from a content which user bought, with based on these to design the dynamical multimedia fingerprinting code. The candidate codes of ACC which satisfied BIBD's v and k+1 condition is registered in the codebook, and then a matrix is generated(Below that it calls "Rhee matrix") with ${\lambda}+1$ condition. In the experimental results, the codevector of Rhee matrix based on a feature point of the content is generated to exist k in the confidence interval at the significance level ($1-{\alpha}$). Euclidean distances between row and row and column and column each other of Rhee matrix is working out same k value as like the compliment matrices based on BIBD and Graph. Moreover, first row and column of Rhee matrix are an initial firing vector and to be a forensic mark of content protection. Because of the connection of the rest codevectors is reported in the codebook, when trace a colluded code, it isn't necessity to solve a correlation coefficient between original fingerprinting code and the colluded code but only search the codebook then a trace of the colluder is easy. Thus, the generated Rhee matrix in this paper has an excellent robustness and fidelity more than the mathematically generated matrix based on BIBD as ACC.