• Title/Summary/Keyword: Illegal Copy Protection

Search Result 56, Processing Time 0.032 seconds

A Study on a Illegal Copy Protection model using Hidden Agent in Embedded Computing Environment (임베디드 컴퓨팅 환경에서 은닉 에이전트를 이용한 불법복사 방지 모델에 관한 연구)

  • Lee, Deok-Gyu;Kim, Tai-Hoon;Yeo, Sang-Soo;Kim, Seok-Soo;Park, Gil-Cheol;Cho, Seong-Eon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.2
    • /
    • pp.180-190
    • /
    • 2008
  • There have been researches into digital Watermarking technology or Fingerprinting vigorously to safeguard Protective rights for knowledge and poverty for digital contents. DRM(Digital Rights Management) is not only Protective rights for knowledge and poverty, but also management and systems that are necessary to put out, circulate and use for contents. This paper proposes two kinds of ideas. One is protecting contents from illegal acts such as illegal copies when the contents are in the process of circulation. The other is the protocol that can give users convenience. Hidden Agents are used so that contents are protected from illegal copies and illegal use in the contents and cuts off those illegal acts. The Agent will be installed without any special setup. In addition, it can replace roles of Watermarking as a protection. Therefore, this paper shows the solution of illegal copies that happens frequently.

  • PDF

Design of AOD System for MP3 Copyright Protection (MP3 저작권 보호를 위한 AOD 시스템의 설계)

  • Kim, Yeong-Jun;Kim, Tae-Yun
    • The KIPS Transactions:PartD
    • /
    • v.9D no.2
    • /
    • pp.323-328
    • /
    • 2002
  • In recent years, e-Commerce is very active on the Internet, especially the World Wide Web alone: with the popularization of Internet using high-speed networks. Especially, Circulation of Multimedia Contents like MP3 data if widely being focused as one of the popular researches. However, the existing models of AOD (Audio On Demand) System lack substantial illegal copy protection or copyright protection. In this paper, we propose an AOD System that guarantees substantial illegal copy protection and copyright protection based on the PKI (Public Key Infrastructure). As transmitting MP3 data using the user's public key, the proposed .method prevents the attack of dropper during transmitting data. Also, it guarantees the right of users and distributors by prohibiting illegal users from using MP3 data.

A Study on a Illegal Copy Protection Model using Hidden Agent in Embedded Computing Environment (임베디드 컴퓨팅 환경에서 은닉 에이전트를 이용한 불법복사 방지 모델에 관한 연구)

  • Lee, Deok-Gyu;Han, Jong-Wook;Chung, Kyo-Il
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.709-712
    • /
    • 2007
  • There have been researches into digital Watermarking technology or Fingerprinting vigorously to safeguard Protective rights for knowledge and poverty for digital contents. DRM(Digital Rights Management) is not only Protective rights for knowledge and poverty, but also management and systems that are necessary to put out, circulate and use for contents. This paper proposes two kinds of ideas. One is protecting contents from illegal acts such as illegal copies when the contents are in the process of circulation. The other is the protocol that can give users convenience. Hidden Agents are used so that contents are protected from illegal copies and illegal use in the contents and cuts off those illegal acts. The Agent will be installed without any special setup. In addition, it can replace roles of Watermarking as a protection. Therefore, this paper shows the solution of illegal copies that happens frequently.

  • PDF

A Study on the Watermarketing of Keyframe-Based for copyright Protection of video (동영상의 저작권 보호를 위한 키 프레임 기반의 워터마킹에 관한 연구)

  • Kim, Dan-Hwan;Oh, Moo-Song
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.1
    • /
    • pp.102-107
    • /
    • 2005
  • With the advancement which development and information communication of the computer is quick about lower with multimedia technical diffusion of network base the necessity the use of the digital image technique which is various regarding the protection of sharp increasing multimedia contents raised its head in the social whole. the copyright protection against a multimedia data hazard the authentication techniques it will be able to confirm the content authentication, ownership authentication, illegal copy of the image which stands is demanded. confronts to the water marking technique of existing and the researches the fact that against a picture is most. In this paper, It does not damage the video data which is a multimedia contents not to be, it inserts copyright information and it protects the right of ownership. It is with a copyright protection which leads the wavelet transform which is a watermark of frequency base from visual system viewpoint in the human being center with it proposes the watermarking technique against a forgery prevention.

The Implementation of Digital Broadcasting Content Copy Protection Manager in PVR (Personal Video Recording)

  • Lim Tae-Bum;Kim Yun-Sang;Lee Seok-Pil;Jung Jong-Jin
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2006.08a
    • /
    • pp.99-102
    • /
    • 2006
  • This paper describes a article how to protect from illegal indiscriminate copy of digital broadcasting content using DRM and CCI. With the start of terrestrial / satellite digital broadcast and the preparation of Digital Cable broadcast, we can view HD digital contents through the various channel. Also we can record, play, redistribute digital contents in PVR. The protection of Digital Contents Right became of the important issue to protect CopyRight. In this paper, we implement a manager that prevents indiscriminate digital contents redistribution of the digital broadcast contents. For protection of Digital contents Right, we use BF(Broadcast Flag) and CCI (Copy Control Information) which we can control viewing or copy digital contents with.

  • PDF

The Secure Chip for Software Illegal Copy Protection (소프트웨어 불법복제방지를 위한 보안칩)

  • 오명신;한승조
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.4
    • /
    • pp.87-98
    • /
    • 2002
  • Software has been developed very fast as information has become important value. Illegal software copy has been the main problem of developing software business. Recently used protecting lock system for software copy has not guaranteed perfectly from easily cracked-defense system. This paper, therefore, proposes 96-bit block cipher with 112-bit length to replace a DES(Data Encryption Standard) algorithm. Security chip by ASIC(Application Specific Integrated Circuit) security module is presented for software copy protection. Then, an auto block protecting algorithm is designed for the security chip. Finally, controlling driver and library are built for the security chip.

Multisignature Suitable for Digital Contents Copyright Protect ion on CDN (디지털 콘텐츠 저작권 보호를 위한 CDN에서 다중서명)

  • Shin, Seung-Soo;Kim, Duck-Sool
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.4 s.36
    • /
    • pp.77-85
    • /
    • 2005
  • Digital copyright protection is important in the protective side of effort to have leaned to in property right and it which are intelligent of an author and is very important for development of digital contents industry. It is the misgovernment that a reproduction is easy as for the digital contents. and the original and a copy have the same characteristic, and it is so, and is experiencing what is hard for protection of copyright and large quantity illegal copy and illegal distribution prevention. CDN needs a copyright protective plan about the digital contents that digital contents providers were written jointly. The paper used a non-repudiation multi-technique for copyright protection about the digital contents which were written jointly. The Non-repudiation multi-technique proved efficiency about this.

  • PDF

Design of Electronic Software Distribution Protocol for Software Copyright Protection (소프트웨어 저작권 보호를 위한 전자 소프트웨어 유통 프로토콜의 설계)

  • Kim, Young-Jun;Lee, Sung-Min;Rhee, Yoon-Jung;Park, Nam-Sup;Lee, Byung-Rae;Kim, Tai-Yun
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.4
    • /
    • pp.641-650
    • /
    • 2001
  • In recent years, e-Commerce is very active on the Internet, especially the World Wide Web along with the popularization of Internet using high-speed networks. Especially, Electronic Software Distribution(ESD) is widely being focused as one of the popular researches. However, the existing models of ESD lack substantial illegal copy protection or copyright protection as they have the shortcomings of guaranteeing anonymity of users. This study suggests an ESD protocol that guarantees substantial copyright protection and anonymity based on the Public Key Infrastrncture(PKl). The suggested method does not give the information of a buyer who doesn't want to reveal to a seller, and protects illegal copy and distribution as well. When it happens that illegal copies are in circulation, this method provides a device to trace back its original distributor so that it helps protect the copyright. In addition, it provides more convenient environment to the user by not using the methods of serial number input and extra installation to use.

  • PDF

DWT based Digital Image Watermarking using Labview Machine Vision (DWT기반 Labview Machine Vision을 이용한 디지털 이미지 워터마킹)

  • Kim, Hyoung-Gwon;Song, Yun-Jae;Ahn, Tae-Chon
    • Proceedings of the KIEE Conference
    • /
    • 2005.10b
    • /
    • pp.198-200
    • /
    • 2005
  • Recently, intellectual property problem caused by illegal copy or circulation of digital contents with computer and advance of network. it will lose producer's desire and cause economic losses. so we need to demand ownership protection technology for prevent illegal copy without an owner consent and protect ownership with effect. in this paper, we change digital image at frequency domain and choose a factor choosing frequency area with human perceptibility. we inserted repetitive and adaptive watermark on the whole image by Labview Machine Vision. watermark inserted into the high frequency concentrated textual area with Wavelet Transform and then reduced damage of image by human visual feature after inserted watermark

  • PDF

Implementation of Play and Copy Control of DMB contents using Watermarking and Encryption on PMP (워터마킹과 암호화를 이용한 DMB 콘텐츠의 재생 및 복사 제어를 PMP에 구현)

  • Jeong, Yong-Jae;Moon, Kwang-Seok;Kim, Jong-Nam
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.2
    • /
    • pp.52-57
    • /
    • 2009
  • Recently, the regular service of a terrestrial digital multimedia broadcasting(T-DMB) made faster distribution of T-DMB receiver. The problem of an illegal distribution is increasing owing to a large distribution of T-DMB receiver. In this paper, we propose a watermarking and encryption method on T-DMB bit-stream for a copy and Play control to prevent an illegal distribution of T-DMB contents. We implement our proposed method on a portable multimedia player (PMP) which has T-DMB receiver. The proposed method insert the encrypted information for control of copy and play after finding padding area of program map table (PMT) and program association table (PAT) from analysis of transport stream (TS) of T-DMB. In implementation result, we can control use of contents according to information of copy and play control. The proposed method can be used to content Protection software for blocking of an illegal distribution of T-DMB contents on a mobile T-DMB receivers.