摘要:
A computing system including a memory that is shared by a plurality of components of the computing system in order to exchange data between the plurality of components; and a controller configured to control the plurality of components to encrypt the data and to record the encrypted data in the memory.
摘要:
Watermarking method and apparatus for tracking hacking and method and apparatus for blocking hacking of content are provided. The watermarking method includes: obtaining device information from a reception device, with which content is shared, through a determined network channel; generating watermark data based on the obtained device information; and generating watermarked multimedia content by inserting the generated watermark data into content. The method of blocking hacking of content includes: if hacked content is found, detecting watermark data from the hacked content; detecting transmission and reception device information from the detected watermark data; and extracting a progress route of the content based on the detected transmission and reception device information and performing revocation on a hacked device.
摘要:
Watermarking method and apparatus for tracking hacking and method and apparatus for blocking hacking of content are provided. The watermarking method includes: obtaining device information from a reception device, with which content is shared, through a determined network channel; generating watermark data based on the obtained device information; and generating watermarked multimedia content by inserting the generated watermark data into content. The method of blocking hacking of content includes: if hacked content is found, detecting watermark data from the hacked content; detecting transmission and reception device information from the detected watermark data; and extracting a progress route of the content based on the detected transmission and reception device information and performing revocation on a hacked device.
摘要:
A computing system including a memory that is shared by a plurality of components of the computing system in order to exchange data between the plurality of components; and a controller configured to control the plurality of components to encrypt the data and to record the encrypted data in the memory.
摘要:
A first video characteristic value is determined from a video/audio signal. The first video characteristic value is embedded in an audio portion of the video/audio signal and the video/audio signal is transmitted from a transmission source to a transmission destination. At the destination, the first video characteristic value is recovered and the received video/audio signal is used to determine a second video characteristic value. The recovered first video characteristic value is used to verify or check the second video characteristic value. By comparing the first and second video characteristic values, a determination is made about degradation of the received video/audio signal. In one example, a determination is made as to whether a lip-sync error has likely occurred. In another example, the audio-transmitted first video characteristic is used for copyright protection purposes.