Apparatus and method for preventing illegal distribution of digital contents by using a fingerprinting technique
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Benefits of technology
Problems solved by technology
Method used
Image
Examples
experiment 1
[0055] 16-byte (128-bit) information is embedded to Barbara and Lena's black-and-white picture having a size of 512×512 and the embedded information is extracted after a JPEG compression attack has been conducted thereto.
[0056] Conditions for the experiment 1 are as follows. [0057] User information S5: ETRI WaterMarks! 16 bytes [0058] Image quality (PSNR) after the embedding of the user information: 44.05 dB (finger_Barb)
[0059] Table 1 shows the result of extracting the embedded information after the JPEC compression attack is conducted at 46.45 dB (finger_Lena).
TABLE 1Image attackObjectsfinger_Barbfinger_LenaJPEG QF 10%U >□□□;□ MSeq □□□u□JPEG QF 20%dRTGeMrE(13)iY□ rB□!tm O□ + C□JPEG QF 30%]DRli□terMk!□Rl Vat □□r□JPEG QF 40%ETRI W!termarks%□RI GAtermarks!JPEG QF 50%ETRI Watermarks!ETRI Watermarks!JPEG QF 60%ETRI Watermarks!ETRI Watermarks!JPEG QF 70%ETRI Watermarks!ETRI Watermarks!JPEG QF 80%ETRI Watermarks!ETRI Watermarks!JPEG QF 90%ETRI Watermarks!ETRI Watermarks!
experiment 2
[0060] Different sets of user information are respectively embedded to the black-and-white picture of 512×512 and an averaging attack is conducted thereto. The result is shown in Table 2.
TABLE 2Image qualityKey values forafter thedetermining anEmbedded Userembedding of UIResultembedding positionInformation (UI)(PSNR)Image3000joo sanghyun163246.14 dBimg13001kim jinho860657846.00 dBimg23002jang howook669445.55 dBimg33003moon kyungae534046.73 dBimg43004suh youngho684146.45 dBimg5
experiment 3
[0061] A conspiracy trace is conducted based on correlativity with other images for the averaging attack. The results are provided in Tables 3 and 4.
TABLE 3avg1 = (img1 + img2) / 2decisionimg10.7938Involved inconspiracy traceimg20.7584Involved inconspiracy traceimg30.0417img4−0.0161img5−0.0236
[0062]
TABLE 4Avg2 = (img1 + img2 +img3 + img4 + img5) / 5decisionimg10.4298Involved inconspiracy traceimg20.3665Involved inconspiracy traceimg3−0.0068img4−0.0208img50.4465Involved inconspiracy trace
[0063] As described above, purchaser information is embedded to digital contents sold through electronic commercial activities by employing a non-blind fingerprinting and a blind fingerprinting technique and is extracted depending on allowance or disallowance of the use of an original image. Therefore, illegitimate copying and distribution of the digital contents can be prevented, so that property of the digital contents is effectively protected and safe and legitimate distribution thereof is secured. ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


