Abstract:
Provided are methods of generating and verifying an electronic signature of software data, wherein software data is split into a plurality of blocks, electronic signatures corresponding to each of the blocks are generated, and some of the electronic signatures are randomly selected for verification. Accordingly, a time required for verifying an electronic signature can be reduced while maintaining the advantages of an electronic signature system.
Abstract:
A method and apparatus of sharing a bus key is provided, the method including receiving at a first device a device key, encrypted using an encryption key, from a storage device; decrypting the encrypted device key using a decryption key corresponding to the encryption key; creating a random number, and generating a bus key using the created random number and the decrypted device key, by which data to be transmitted through a bus can be encrypted using the bus key; and transmitting the generated bus key to a predetermined device connected to the first device via the bus.
Abstract:
A method and apparatus of sharing a bus key is provided, the method including receiving at a first device a device key, encrypted using an encryption key, from a storage device; decrypting the encrypted device key using a decryption key corresponding to the encryption key; creating a random number, and generating a bus key using the created random number and the decrypted device key, by which data to be transmitted through a bus can be encrypted using the bus key; and transmitting the generated bus key to a predetermined device connected to the first device via the bus.
Abstract:
A method of creating a domain based on public key cryptography includes providing, by a content-providing server, a list of devices requesting content, and selecting, by a user, a device from the list; transmitting, by the server, discrimination information on revoked devices to the device; extracting, by the device having received the discrimination information, a secret value from the discrimination information, preparing a certificate using the extracted secret value, and transmitting device information and the certificate of the device to the server; verifying, by the server, the certificate and creating a domain ID and a domain key using the device information; encrypting, by the server, the domain ID and the domain key using a unique public key of the device and transmitting the encrypted domain ID and domain key to the device; and restoring, by the device, the domain key using a unique secret key of the device.
Abstract:
An image encoding method and an image decoding method, the image encoding method including: degrading a quality of a first image which is obtained through a sensor of an imaging device to generate a second image having a target resolution; generating additional information which represents a transform relationship between the first and second images; and transmitting the additional information and the second image.
Abstract:
Provided is a method of copying data stored in a first storage medium to a second storage medium. The method includes recording the encrypted data stored in the first storage medium on the second storage medium; reproducing a first content key, which is used to encrypt the encrypted data, using a first drive into which the first storage medium is loaded; encrypting the first content key; sending the encrypted first content key to a second drive into which the second storage medium is loaded; and recording the encrypted first content key on the second storage medium. In this method, encrypted data stored in a first storage medium is sent to a second storage medium via a host without decrypting the encrypted data, thereby preventing the data from being hacked or being accessed by unauthorized users and increasing a speed of copying the encrypted data.
Abstract:
A digital video processing method and an apparatus thereof are provided. The method for processing digital images received in the form of compressed video streams comprising the step of determining a region intensity histogram (RIH) based on information on motion compensation of inter frames. The RIH information is obtained based on the motion compensation values of inter frames, and the RIH information is a good indicator of motion information of a video scene. Also, since the RIH information is quite a good indicator of intensity of the video scene, video streams having similar intensities can be effectively searched by searching for similar video scenes based on the RIH information obtained by the digital video processing method.
Abstract:
An apparatus and method to encrypt data having hierarchical information are provided. The apparatus includes an N-th layer key generator, which generates an N-th layer key, an (N+1)-th layer key generator, which generates an (N+1)-th layer key by applying the N-th layer key to a predetermined function, an N-th layer data encryptor, which encrypts N-th layer data using the N-th layer key, and an (N+1)-th layer data encryptor, which encrypts (N+1)-th layer data using the (N+1)-th layer key.
Abstract:
A color image processing method is provided. The color image processing method includes the step of: (a) indexing a color image by assigning representative colors of an image to a color space divided into a plurality of regions. The color image processing method may be applied to object-based image processing such as MPEG-7, and fast search and retrieval of multimedia content can be made.
Abstract:
A method for extracting from an image a shape descriptor which describes shape features of the image is provided. The shape descriptor extracting method includes: (a) extracting a skeleton from an input image, (b) obtaining a list of straight lines by connecting pixels based on the extracted skeleton, and (c) determining the regularized list of straight lines obtained by normalizing a list of straight lines as the shape descriptor. A shape descriptor extracted according to the shape descriptor extracting method possesses information of a schematic feature of a shape included in an image. Therefore, the shape descriptor extracting method effectively extracts a local motion in the data collection of the same category, and the number of extracted shapes is not limited to the number of objects.