• Title/Summary/Keyword: video authentication

Search Result 82, Processing Time 0.027 seconds

Digital Watermarking Technique of Compressed Multi-view Video with Layered Depth Image (계층적 깊이 영상으로 압축된 다시점 비디오에 대한 디지털 워터마크 기술)

  • Lim, Joong-Hee;Shin, Jong-Hong;Jee, Inn-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.1
    • /
    • pp.1-9
    • /
    • 2009
  • In this paper, proposed digital image watermarking technique with lifting wavelet transformation. This watermark technique can be easily extended in video content fields. Therefore, we apply this watermark technique to layered depth image structure that is efficient compression method of multi-view video with depth images. This application steps are very simple, because watermark is inserted only reference image. And watermarks of the other view images borrow from reference image. Each view image of multi-view video may be guaranteed authentication and copyright.

  • PDF

Nonlinear Moving Picture Editor for Multiple Watermarking (다중 워터마킹을 지원하는 비선형 동영상 편집기)

  • 윤석민;한경섭;정순기
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.2
    • /
    • pp.124-129
    • /
    • 2002
  • Currently, image processing are used widely and have various types of characteristics with the applications of VOD(Video on demand), the web casting services, the video conference systems and virtual realities. Using the scene change, at every time of video image transitions, an editor can classify the video context and also require a function of in(Boxing insertion. Digital watermarking provides a solution to illegal copying of digital contents and has many other useful applications, including web broadcast monitoring, transaction tracking, authentication, copy control and device control. The Purpose of this thesis is to implement of nonlinear moving picture editor for the multiple watermarking. For the effective watermarking performance, this thesis considers the protection of image quality reduction and robustness for hiding information concurrently.

  • PDF

The Implementation of Face Authentication System Using Real-Time Image Processing (실시간 영상처리를 이용한 얼굴 인증 시스템 구현)

  • Baek, Young-Hyun;Shin, Seong;Moon, Sung-Ryong
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.2
    • /
    • pp.193-199
    • /
    • 2008
  • In this paper, it is proposed the implementation of face authentication system based on real-time image processing. We described the process implementing the two steps for real-time face authentication system. At first face detection steps, we describe the face detection by using feature of wavelet transform, LoG operator and hausdorff distance matching. In the second step we describe the new dual-line principal component analysis(PCA) for real-time face recognition. It is combines horizontal line to vertical line so as to accept local changes of PCA. The proposed system is affected a little by the video size and resolution. And then simulation results confirm the effectiveness of out system and demonstrate its superiority to other conventional algorithm. Finally, the possibility of performance evaluation and real-time processing was confirmed through the implementation of face authentication system.

Efficient Source Authentication Protocol for IPTV Based on Hash Tree Scheme (해쉬 트리 기반의 효율적인 IPTV 소스 인증 프로토콜)

  • Shin, Ki-Eun;Choi, Hyoung-Kee
    • The KIPS Transactions:PartC
    • /
    • v.16C no.1
    • /
    • pp.21-26
    • /
    • 2009
  • Presently, the demand for IPTV, to satisfy a variety of goals, is exploding. IPTV is coming into the spotlight as a killer application in upcoming IP convergence networks such as triple play which is the delivery of voice, internet, and video service to a subscriber. IPTV utilizes CAS, which controls the subscriber access to content for a profit. Although the current CAS scheme provides access control via subscriber authentication, there is no authentication scheme for the content transmitted from service providers. Thus, there is a vulnerability of security, through which an adversary can forge content between the service provider and subscribers and distribute malicious content to subscribers. In this paper, based on a hash tree scheme, we proposed efficient and strong source authentication protocols which remove the vulnerability of the current IPTV system. We also evaluate our protocol from a view of IPTV requirements.

The Design of Multicase Key distribution Protocol based CBT(Core Based Tree) (CBT(Core Based Tree)를 기반으로 한 멀티캐스트 키 분배 프로토콜 설계)

  • Kim, Bong-Han;Lee, Jae-Gwang
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.4
    • /
    • pp.1184-1192
    • /
    • 2000
  • Multicast has communication mechanism that is able to transfer voice, video for only the specific user group. As compared to unicast, multicast is more susceptive to attack such as masquerading, malicious replay, denial of service, repudiation and traffic observation, because of the multicast has much more communication links than unicast communication. Multicast-specific security threats can affect not only a group's receivers, but a potentially large proportion of the internet. In this paper, we proposed the multicast security model that is able to secure multi-group communication in CBT(Core Based Tree), which is multicast routing. And designed the multicast key distribution protocol that can offer authentication, user privacy using core (be does as Authentication Server) in the proposed model.

  • PDF

Implementation of SIP based Video Conference System with Authentication Module (인증기능을 갖춘 SIP기반의 화상회의 시스템 구현)

  • Jo, Hyun-Gyu;Kim, Young-Hak;Jang, Choon-Seo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11b
    • /
    • pp.1419-1422
    • /
    • 2002
  • SIP(Session Initiation Protocol)는 기존의 VoIP(Voice over IP)를 위한 시스템에서 뿐만 아니라 호설정의 처리와 제어가 필요한 여러 인터넷 응용분야에 적용이 가능한 확장성이 뛰어난 프로토콜이다. 또한 HTTP(Hyper Text Transfer Protocol)와 유사한 텍스트 기반의 응용계층의 프로토콜로서 호처리시 절차가 비교적 간결하다. 본 논문에서는 이러한 SIP의 장점을 이용하여 화상회의를 위한 시스템을 구현하였다. 이때. 인증 기능을 부여하여 화상회의시 세션 연결을 위한 호설정을 이루는 과정에서 상대방을 인증할 수 있도록 하였고 인증방법으로는 메시지 인증기능과 함께 리플레이 공격(replay attack)의 방지기능을 가진 SIP 다이제스트 인증(Digest Authentication) 방법을 사용하였다. 본 화상회의 시스템에 사용된 SIP 사양은 최근에 발표된 RFC 3261을 기준으로 하였다.

  • PDF

Digital Video Watermarking Using Block Reordering Algorithm Based on DCT (DCT 기반의 블록 재정렬 알고리즘을 이용한 디지털 비디오 워터마킹)

  • Kim Kyoung-Sik;Park Kyung-Jun;Ko Hyung Hwa
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.7C
    • /
    • pp.696-705
    • /
    • 2005
  • The rapid progress of the software has enabled individuals to copy and remake digital contents, which was only done by professionals. However, this rapid growth of software has brought many other defects. As a solution to the problems, contents producer needs to have certification and inspection of its contents text and hold the proprietary rights. In this paper, the new video watermarking scheme is proposed which is appropriate for the requirements mentioned for digital video contents and it is applied to MPEG-2 video encoder and decoder. In order to insert watermark sequence for digital video data, watermarking used blocks reordering algorithm and SCL(secret code list). It is satisfied two properties of cryptography that confidentiality and integrity. We test the proposed algorithm to see its performance in terms of watermark capacity, compression robustness and visual quality impact. According to the experiment of proposed watermarking algorithm, we obtained satisfactory results that watermark can still be extracted after MPEG-2 re-encoding at lower bit rates. It is important property for data hiding and user authentication in video data.

Security Exposure of RTP packet in VoIP

  • Lee, Dong-Geon;Choi, WoongChul
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.3
    • /
    • pp.59-63
    • /
    • 2019
  • VoIP technology is a technology for exchanging voice or video data through IP network. Various protocols are used for this technique, in particular, RTP(Real-time Transport Protocol) protocol is used to exchange voice data. In recent years, with the development of communication technology, there has been an increasing tendency of services such as "Kakao Voice Talk" to exchange voice and video data through IP network. Most of these services provide a service with security guarantee by a user authentication process and an encryption process. However, RTP protocol does not require encryption when transmitting data. Therefore, there is an exposition risk in the voice data using RTP protocol. We will present the risk of the situation where packets are sniffed in VoIP(Voice over IP) communication using RTP protocol. To this end, we configured a VoIP telephone network, applied our own sniffing tool, and analyzed the sniffed packets to show the risk that users' data could be exposed unprotected.

H/W Implementation of JPEG compatible fragile watermarking algorithm (JPEG 호환 프래절 워터마킹 알고리즘의 하드웨어 구현)

  • 김진헌;김승원
    • Proceedings of the IEEK Conference
    • /
    • 2003.07e
    • /
    • pp.1803-1806
    • /
    • 2003
  • This paper presents a H/W module that executes a fragile watermarking algorithm. The module inputs sequentially quantized DCT values, encodes watermark and then outputs watermarked DCT coefficients. A fragile and invisible watermarking algorithm is adopted, modified and enhanced here to reduce H/W size and image degradation. The module can be directly inserted between DCT quantizer and VLC encoder in wide spread JPEG/MPEG encoder. The module is expected to be used for real-time authentication purpose in DVR(Digital Video Recorder) or digital cameras.

  • PDF

Proposed CCPS model for comprehensive security management of CCTV (영상정보처리기기(CCTV)의 포괄적 보안관리를 위한 암호·인증·보호·체계(CCPS) 모델 제안)

  • Song, Won-Seok;Cho, Jun-Ha;Kang, Seong-Moon;Lee, MinWoo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.657-660
    • /
    • 2021
  • A video information processing system (CCTV) requires comprehensive administrative, physical, and technical security management to collect, transmit and store sensitive information. However, there are no regulations related to video information processing, certification methods for the technology used, and application standards suitable for security technology. In this paper, we propose a cryptography, certification, protection, system (CCPS) model that can protect the system by including encryption technology for application to the video information processing system and authentication measures for the technology used in the system configuration.

  • PDF