Unlock instant, AI-driven research and patent intelligence for your innovation.

Apparatus and method for preventing illegal distribution of digital contents by using a fingerprinting technique

Inactive Publication Date: 2007-08-02
ELECTRONICS & TELECOMM RES INST
View PDF1 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0019] It is, therefore, an object of the present invention to provide an apparatus and method for preventing illegitimate redistribution of digital contents by employing a non-blind and a blind fingerprinting technique.
[0021] In accordance with another aspect of the invention, there is provided a method for preventing illegitimate distribution of digital contents on Internet, including the steps of: performing a WT to an original image to obtain a first wavelet image; determining a user information embedding region in the first wavelet image and performing a WT to the user information embedding region, thereby obtaining a second wavelet image; removing high-frequency components from the second wavelet image by setting regions other than the user information embedding region of a discrete cosine (DC) as “0”, thereby obtaining a high-frequency components removed image and performing an inverse WT (IWT) to the high-frequency components removed image, thereby obtaining an IWT image; embedding user information provided from an operator to the IWT image to obtain a user information embedded image, comparing a user information embedding region of the user information embedded image with the user information embedding region and resetting the user information embedding region as a new user information embedding region LL1, which is determined by a length and an embedding intensity of a data sequence of the user information in order to minimize deterioration of image quality; and embedding the user information to a position where a difference value between the user information embedding region and the new user information embedding region is small.
[0023] In accordance with still another aspect of the invention, there is provided a method for preventing illegitimate distribution of digital contents on Internet including the steps of: performing a WT to an original image to obtain a first wavelet image; determining a user information embedding region in the first wavelet image and performing a WT to the user information embedding region, thereby obtaining a second wavelet image; removing high-frequency components from the second wavelet image by setting regions other than the user information embedding region of a discrete cosine (DC) as “0”, thereby obtaining a high-frequency components removed image and performing an inverse WT (IWT) to the high-frequency components removed image, thereby obtaining an IWT image; embedding user information and a location key provided from an operator to the IWT image to obtain a user information embedded image, thereby obtaining a user information embedded image with a new user information embedding region; and embedding the new user information to a position determined by a random sequence generated from a location key in a blind information embedding system which does not use the first wavelet image, to thereby reset the user information embedding region as the new user information.

Problems solved by technology

The encryption system and the access control system, however, are rarely utilized in recent years since they have a defect that contents can be illegally copied after being legally decoded.
Since, however, the same information, i.e., the owner information, is uniformly embedded to digital contents to be sold, all of the watermark embedded digital contents are undistinguishable from each other.
However, the conventional technologies using the encryption protocol as described above have a defect in that digital contents can be illegally copied after being legally decoded and, further, a new user key can be generated by colluding user keys which have been respectively allotted to individual purchasers.
Furthermore, since the fingerprinting technique using the encryption protocol is time-consuming in performing an embedding process due to its use of the encryption protocol, a quality of service (QOS) may be deteriorated in view of the fact that an e-purchase on the Internet should be processed on a real time basis.
Further, since multimedia data such as image and audio data is redistributed in a decoded state unlike general software, it is impossible to maintain the purchaser information as fingerprinting information.
As described above, the prior-art technologies for protecting intellectual property exhibit drawbacks in that digital contents can be illegally copied after being legally decoded by making use of an encryption technique and, further, a new user key can be generated by colluding user keys already allotted to purchasers.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Apparatus and method for preventing illegal distribution of digital contents by using a fingerprinting technique
  • Apparatus and method for preventing illegal distribution of digital contents by using a fingerprinting technique
  • Apparatus and method for preventing illegal distribution of digital contents by using a fingerprinting technique

Examples

Experimental program
Comparison scheme
Effect test

experiment 1

[0055] 16-byte (128-bit) information is embedded to Barbara and Lena's black-and-white picture having a size of 512×512 and the embedded information is extracted after a JPEG compression attack has been conducted thereto.

[0056] Conditions for the experiment 1 are as follows. [0057] User information S5: ETRI WaterMarks! 16 bytes [0058] Image quality (PSNR) after the embedding of the user information: 44.05 dB (finger_Barb)

[0059] Table 1 shows the result of extracting the embedded information after the JPEC compression attack is conducted at 46.45 dB (finger_Lena).

TABLE 1Image attackObjectsfinger_Barbfinger_LenaJPEG QF 10%U >□□□;□ MSeq □□□u□JPEG QF 20%dRTGeMrE(13)iY□ rB□!tm O□ + C□JPEG QF 30%]DRli□terMk!□Rl Vat □□r□JPEG QF 40%ETRI W!termarks%□RI GAtermarks!JPEG QF 50%ETRI Watermarks!ETRI Watermarks!JPEG QF 60%ETRI Watermarks!ETRI Watermarks!JPEG QF 70%ETRI Watermarks!ETRI Watermarks!JPEG QF 80%ETRI Watermarks!ETRI Watermarks!JPEG QF 90%ETRI Watermarks!ETRI Watermarks!

experiment 2

[0060] Different sets of user information are respectively embedded to the black-and-white picture of 512×512 and an averaging attack is conducted thereto. The result is shown in Table 2.

TABLE 2Image qualityKey values forafter thedetermining anEmbedded Userembedding of UIResultembedding positionInformation (UI)(PSNR)Image3000joo sanghyun163246.14 dBimg13001kim jinho860657846.00 dBimg23002jang howook669445.55 dBimg33003moon kyungae534046.73 dBimg43004suh youngho684146.45 dBimg5

experiment 3

[0061] A conspiracy trace is conducted based on correlativity with other images for the averaging attack. The results are provided in Tables 3 and 4.

TABLE 3avg1 = (img1 + img2) / 2decisionimg10.7938Involved inconspiracy traceimg20.7584Involved inconspiracy traceimg30.0417img4−0.0161img5−0.0236

[0062]

TABLE 4Avg2 = (img1 + img2 +img3 + img4 + img5) / 5decisionimg10.4298Involved inconspiracy traceimg20.3665Involved inconspiracy traceimg3−0.0068img4−0.0208img50.4465Involved inconspiracy trace

[0063] As described above, purchaser information is embedded to digital contents sold through electronic commercial activities by employing a non-blind fingerprinting and a blind fingerprinting technique and is extracted depending on allowance or disallowance of the use of an original image. Therefore, illegitimate copying and distribution of the digital contents can be prevented, so that property of the digital contents is effectively protected and safe and legitimate distribution thereof is secured. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An apparatus and method for preventing illegitimate distribution of digital contents on Internet obtains a first wavelet image having a user information-embedding region by performing a wavelet transformation (WT). The user information embedding region of the first wavelet image is wavelet-transformed to obtain a second wavelet image composed of a discrete cosine (DC) region and high-frequency regions second wavelet image. A high-frequency components removed image is obtained by removing high-frequency components in the high-frequency regions of the second wavelet image, and subjected to an inverse WT (IWT) to be outputted as an IWT image. A user information embedding unit embeds user information to the IWT image, wherein data of the user information are sequentially embedded to positions where a difference value between the user information embedding region and the new user information embedding region is small, to thereby reset the user information embedding region as the user information.

Description

CROSS REFERENCE TO RELATED APPLICATION [0001] This application is a divisional of U.S. Ser. No. 10 / 648,517, filed on Aug. 27, 2003. This application, in its entirety, is incorporated herein by reference.FIELD OF THE INVENTION [0002] The present invention relates to an apparatus and method for preventing illegal distribution of digital contents by using a fingerprinting technique; and, more particularly, to an apparatus and method for preventing illegitimate distribution of digital contents by using a fingerprinting technique which allows to embed purchaser information to the digital contents, sold through an electronic commercial activity, in the form of a watermark. BACKGROUND OF THE INVENTION [0003] In general, recent increase of illegitimate copying and purchase of digital contents through the use of Internet has intensified a demand for a technology capable of protecting intellectual property. [0004] Unlike off-line contents, digital contents on the web can be easily copied and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K9/00G06K9/36H04N7/167G06T1/00
CPCG06T1/005G06T2201/0052G06T2201/0083G06T2201/0081G06T2201/0063H04N21/4415H04N21/8352
Inventor JOO, SANGHYUNKIM, WON GYUMSEO, YONG-SEOKPARK, CHANG SOON
Owner ELECTRONICS & TELECOMM RES INST