• Title/Summary/Keyword: Media Contents Protection

Search Result 71, Processing Time 0.022 seconds

UCI Embedder: A Real-time Broadcast-Content-Identifier Watermarking System for Broadcast Content Distribution Services (방송콘텐츠 유통서비스를 위한 실시간 콘텐츠식별자 은닉삽입 시스템)

  • Kim, Youn-Hee;Kim, Hyun-Tae;Lee, Joo-Young;Nam, Je-Ho
    • Journal of Broadcast Engineering
    • /
    • v.16 no.3
    • /
    • pp.394-402
    • /
    • 2011
  • We introduce the standard content identifier Universal Content Identifier (UCI) and a watermarking system that embeds UCI for the broadcast content distribution services. Our proposed UCI embedder is designed in consideration of integrating with the previously established broadcast system and protecting the illegal distribution of broadcast contents. Our goal is that when broadcast content is transmitted, 28 byte UCI is embedded imperceptibly in the content itself in real-time and the embedded UCI is successfully extracted not only in the typical format used in the broadcast content distribution service but also in the illegally distributed broadcast contents. Usually the illegally distributed contents are modified from the original by changing resolutions, frame rates, or adjusting colors. In this paper, we present a watermarking scheme that embeds 28 byte UCI in broadcast content in real-time while keeping the visual quality high and the embedded watermark robust enough to survive through the various modification. The experimental results show that the embedded UCI remains in the various modified versions of content and that the visual degradation by embedding is not noticeable.

A Study on Media Security in Ubiquitous Network System (유비쿼터스 네트워크 시스템에서의 미디어 보안에 관한 연구)

  • Ju, Min-Seong;Ahn, Seong-Soo;Woo, Young-Hwan;Kim, Yong-Tae;Kim, Tai-Hoon;Park, Gil-Cheol;Kim, Seok-Soo
    • Convergence Security Journal
    • /
    • v.7 no.1
    • /
    • pp.29-34
    • /
    • 2007
  • Recently, the distribution and using of the digital multimedia contents are easy by developing the internet application program and related technology. However, the digital signal is easily duplicated and the duplicates have the same quality compare with original digital signal. To solve this problem, there is the multimedia fingerprint which is studied for the protection of copyright. Fingerprinting scheme is a technique which supports copyright protection to track redistributers of electronic information using cryptographic techniques. Only regular user can know the inserted fingerprint data in fingerprinting schemes differ from a symmetric/asymmetric scheme and the scheme guarantee an anonymous before re-contributed data. In this paper, we present a new scheme which is the detection of colluded multimedia fingerprint by neural network. This proposed scheme is consists of the anti-collusion code generation and the neural network for the error correction.

  • PDF

Reversible Watermarking For Relational Databases using DE (Difference Expansion) Algorithm (DE 알고리즘을 사용한 관계형 데이터베이스를 위한 가역 워터마킹)

  • Kim, Cheonshik
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.3
    • /
    • pp.7-13
    • /
    • 2015
  • Generally, watermarking can be used copyright for contents such as audios, videos, images, and texts. With the development of Internet, many malicious attackers illegally copy relational databases synchronized applications Therefore, it is needed for the protection of databases copyright, because databases involve various sensitive information such as personal information, information industry, and secret national intelligence. Thus, the protection of relational databases is a major research field in the databases research topics. In this paper, we will review previous researches related the protection of relational databases and propose new method for relational data. Especially, we propose watermarking scheme for databases using reversible method in this paper. As an experimental result, the proposed scheme is very strong to malicious attacks. In addition, we proved our proposed scheme is to apply real application.

A Design of Serious Game Metadata Schema for Reliability and Compatibility (신뢰도와 호환성을 위한 기능성게임 메타데이터 스키마 설계)

  • Yoon, Sun-Jung
    • Journal of Korea Game Society
    • /
    • v.10 no.3
    • /
    • pp.73-82
    • /
    • 2010
  • The Metadata are used for the reuse of core information, distribution and management, protection of copyright and prevention of overlapping investment. Serious game consists of multi-hierarchial multimedia data. And quality information is very important for selection according to the purpose of the game. In this paper, we designed the serious game metadata schema, including multi-media characteristic information and measurable quality information. This study will lay the groundwork for the development of metadata system which can provide serious game users with reliability through quality information, and with compatibility through multi-media characteristic information. Furthermore, we hope this study will be helpful to stable growth in serious game industry.

Roles and Discourse of Cryptocurrency's Online Community and YouTube : Using Focus Group Interviews (암호화폐 온라인 커뮤니티와 유튜브의 역할 및 담론분석 연구 : FGI 인터뷰를 중심으로)

  • Lim, Han Sol;Jung, Chang Won
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.10
    • /
    • pp.615-629
    • /
    • 2020
  • Conducting Focus Group Interview (FGI), this study examined the roles and discourses of cryptocurrency's online communities and media (legacy media and YouTube), and based on this, the study proposed the direction of cryptocurrency policy. By reviewing previous literature, this study analyzed the characteristics of investors, the online community, and YouTube, which is an investment environment factor. The study figured out the purpose of use and role of the community via interviews with cryptocurrency professional investors and online community members and analyzed main discussion themes of the five top-ranked YouTube channels related to cryptocurrency with the highest number of subscribers. The results suggested that cryptocurrency's investment was led by those who are in their 20s and 30s, the investors preferred and trusted information on new media than legacy media. The online community played the role of emotional homogeneity and empathy, and YouTube mainly performed the informational role. As a result of discourse analysis and interviews, this study argued that the legal stability of cryptocurrency's policy and protection of individual investors are needed. This study's significance indicates that it used various research methods such as literature research, interviews, content analysis of community/YouTube to analyze the informational role and emotional aspects of new media and suggested policy direction of the digital new deal blockchain technology and the fairness of financial industry.

A Multimedia Data Security System Based on MPEG Using The Specific of Wireless Device (무선 이동 단말기의 특성을 이용한 MPEG 기반의 멀티미디어 데이터 보안 시스템)

  • Lee, Jong-Kap;Seong, Hong-Seok;Won, Young-Jin;Lee, Jong-Sung;Lim, Seung-Ha;Lim, Young-Hwan
    • 전자공학회논문지 IE
    • /
    • v.46 no.2
    • /
    • pp.22-32
    • /
    • 2009
  • In this article, the protection system on wireless mobile communication circumstance for the information providers and the users is recommended. Because of its usefulness and convenience, the users of the wireless mobile communication are growing explosively. However, the function of protecting data systems is not secured enough so, personal information may disclose to the outside, regardless of one's intention. Therefore, the contents protection system, which can provide information to the user or hide it depending on user's identity, is suggested. If so, the providers and the users can trust each other for interchanging information, also the users may safely use contents menu whatever they want by doing simple certification process.

MPEG-21 IPMP's Application and Implementation On Linux Server/Client Environments (Linux Server/client 구조에서 MPEG-21 IPMP의 용용 및 구현)

  • Choi, Yong-Soo;Kim, Ki-Seob;Kim, Hyoung-Joong;Han, Hyung-Seok
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.3 no.2
    • /
    • pp.72-80
    • /
    • 2004
  • This Paper is implementing IPMP system based on Server/client Structured Linux. We referenced OpenIPMP System, which is a reference software of IPMP (Intellectual Property Management and Protection) solution. Using this system, we developed multimedia contents service providing system using MPEG-21's REL(XML), which is applicable to new media service environment.

  • PDF

Design and Implementation of Multi-Media Contents Services for Rights Protection (저작권 보호를 위한 멀티미디어 콘텐츠 서비스 설계 및 구현)

  • Park, Mi-Young;Seung, Hyon-Woo;Lee, Yong-Hoon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10b
    • /
    • pp.399-403
    • /
    • 2007
  • 멀티미디어 콘텐츠는 개인 사용자에 의해서 콘텐츠 변형이 쉽게 이루어지고 있으며, 변형되거나 복제된 콘텐츠들은 초고속 인터넷 보급의 확산으로 콘텐츠 시장에 부정적인 파급 효과를 증가시키고 있다. 이에 본 논문은 다양한 멀티미디어 콘텐츠의 서비스 구현 시 발생할 수 있는 저작권 및 암호화 기술에 대한 방안을 제시한다. 특히 CD/DVD 기반의 다양한 소프트웨어 및 솔루션에 대한 서비스를 저작권 문제나 불법적인 해킹에 대비할 수 있도록 하는 방안을 제시하고 디지털 콘텐츠 이용 시 자료 유출에 대해 시스템 적으로 대응하기 위해 제안하였다.

  • PDF

Design and Evaluation of DRM Model with Strong Security Based on Smart Card (스마트카드 기반의 강한 보안을 갖는 DRM 모델의 설계 및 평가)

  • Park, Jong-Yong;Kim, Young-Hak;Choe, Tae-Young
    • Journal of Digital Contents Society
    • /
    • v.12 no.2
    • /
    • pp.165-176
    • /
    • 2011
  • Recently, digital rights management (DRM) related researches are widely spreading with prosperity of IT industries. The DRM technology protects proprietor of copyright by preventing mischanneling and illegal copy. In this paper, we propose a new DRM model that has an enhanced and efficient protocol based on certificate using smart card. The proposed model overcomes weaknesses of WCDRM model and has following additional advantages: first, copy protection is enhanced by hiding user's specific information from attacker by storing the information within smart card; second, server load for contents encryption is reduced by making clear protocols among author, distributer, certificate authority, and users; third, offline user authentication is guaranteed by combining partial secret values in media players and smart card. Exposure of core information also is minimized by storing them in smart card. In addition, we show that the proposed system is more secure than WCDRM model by comparing various factors of anonymous attackers.

The Change of Industrial Structure and Public Interest as to the Convergence of Broadcasting and Telecommunications (방송통신 융합에 따른 산업구조의 변화와 공익성)

  • Joo, Chung-Min
    • Korean journal of communication and information
    • /
    • v.36
    • /
    • pp.109-132
    • /
    • 2006
  • It is difficult to found the concept of public interest properly, being ambiguous to distinguish media and service as to the convergence of broadcasting and telecommunications. Accordingly, it is necessary to found the concept of public interest not related to the character of media and service in the age of digital convergence. Therefore this study intended to re-found the concept of public interest, as to industrial changes in the age of convergence of broadcasting and telecommunications. The convergence of broadcasting and telecommunications causes the changes of value chain, which includes contents, platform, network, terminal. It could not help avoiding modifying the industrial structure of broadcasting and telecommunications, because of the changes of value chain. The changes of industrial structure needs the changes of ideology, regulatory policy, regulatory system, and it creates the foundation of new regulatory idea. The purpose of regulatory idea in the age of digital convergence is to practice public interest, and it is an ultimate purpose to increase consumers' welfare. Consequently, for increasing comsumer' welfare, it is necessary to achieve diversity, fairness, objectivity, the preservation of social value in the aspect of contents. Also in the aspect of platform, it is necessary to achieve the protection of privacy, consumer protection, harmful information blocking, and in the aspect of network, it is necessary to achieve the maintenance of secure network, fair competition. Finally, in the aspect of terminal, it is necessary to achieve the maintenance of compatibility, the solution for digital divide. Then regulatory policy of each value chain from a legal and institutional perspective, should be promoted to provide public interest, step by step.

  • PDF