• Title/Summary/Keyword: 디지털콘텐츠 보호

Search Result 480, Processing Time 0.023 seconds

A Study on Media Security in Ubiquitous Network System (유비쿼터스 네트워크 시스템에서의 미디어 보안에 관한 연구)

  • Ju, Min-Seong;Ahn, Seong-Soo;Woo, Young-Hwan;Kim, Yong-Tae;Kim, Tai-Hoon;Park, Gil-Cheol;Kim, Seok-Soo
    • Convergence Security Journal
    • /
    • v.7 no.1
    • /
    • pp.29-34
    • /
    • 2007
  • Recently, the distribution and using of the digital multimedia contents are easy by developing the internet application program and related technology. However, the digital signal is easily duplicated and the duplicates have the same quality compare with original digital signal. To solve this problem, there is the multimedia fingerprint which is studied for the protection of copyright. Fingerprinting scheme is a technique which supports copyright protection to track redistributers of electronic information using cryptographic techniques. Only regular user can know the inserted fingerprint data in fingerprinting schemes differ from a symmetric/asymmetric scheme and the scheme guarantee an anonymous before re-contributed data. In this paper, we present a new scheme which is the detection of colluded multimedia fingerprint by neural network. This proposed scheme is consists of the anti-collusion code generation and the neural network for the error correction.

  • PDF

Implementation of multi-channel IPCC platform for RBAC based CRM service (RBAC기반의 CRM 서비스를 위한 멀티 채널 IPCC 플랫폼 구현)

  • Ha, Eunsil
    • Journal of Digital Contents Society
    • /
    • v.19 no.9
    • /
    • pp.1751-1758
    • /
    • 2018
  • An integrated medical information system that integrates systems consisting of different environments centered on hospital information systems should be provided as a system that prioritizes the improvement of the quality of medical services, customer satisfaction, and patient safety. The RBAC-based medical information system is granted the access right according to task type, role, and rules. Through this, it is possible to use SMS channel, medical reservation and cancellation, customized statistics, and CRM / EMR interworking service using multi-channel to enable communication service without help of counselor and reduce the default rate of reservation patient, Operational improvement services can be extended to medical staff, patients and their families, as well as expanding to important decisions for patients.

AIS application program implementation and test based on IMO Maritime Cloud analysis (IMO 마리타임 클라우드 분석을 통한 AIS응용 프로그램 구현 및 테스트)

  • Lee, Jea-Wook;Mun, ChangHo;Lee, Seojeong
    • Journal of Digital Contents Society
    • /
    • v.16 no.6
    • /
    • pp.927-934
    • /
    • 2015
  • IMO e-Navigation is ongoing project for safety navigation and protection of maritime environment. Maritime Cloud is a part of e-Navigation Strategy Implementation Plan. It is IT framework technology for exchanging information among maritime stakeholders. We found configuration and operation process by analysis on Maritime Cloud architecture and EPD which is a client program. Through the result, we actually implemented client program. Client program targets Berthing data serviced on AIS-ASM. And we used MMS which is function of message exchanging of Maritime Cloud. The test result show data exchanging succeeded. And it will be helpful to develop Maritime Cloud service, to advance Korean Maritime Cloud.

Analysis and Experiment of Portrayal Process based on S-100 Standard of Marine Safety Information (해양안전정보의 S-100 표준 기반 표출 프로세스 분석 및 실험)

  • Kim, Hyoseung;Mun, Changho;Lee, Seojeong
    • Journal of Digital Contents Society
    • /
    • v.19 no.7
    • /
    • pp.1289-1296
    • /
    • 2018
  • The e-Navigation promoted by the International Maritime Organization is a technology that provides marine-related information necessary for ship and shore side by electronic means for marine safety, security and protecting marine environment. The IHO S-100 standard is a geospatial standard that can express various hydrographic information. Various specifications including S-101 for electronic charts are being developed. In this paper, to help developers who are interested in implementing the technology of S-100, we not only analyze the process to portray the S-100 based data but also implement a case study on S-129 under keel clearance management. The portrayal process consists of data encoding and portrayal engine. Data encoding includes generation of application schema and data set. Portrayal engine is performed by the reform of the generated data set, the XSLT processing, and then the generation of drawing instructions.

Monitoring System for the Elderly Living Alone Using the RaspberryPi Sensor (라즈베리파이 센서를 활용한 독거노인 모니터링 시스템)

  • Lee, Sung-Hoon;Lee, June-Yeop;Kim, Jung-Sook
    • Journal of Digital Contents Society
    • /
    • v.18 no.8
    • /
    • pp.1661-1669
    • /
    • 2017
  • In 2017, Korea has reached 1.3 million elderly people living alone. The government is promoting the basic care service for the elderly by using care workers to check the security of the elderly living alone. However, due to lack of service personnel and service usage rate of elderly care workers, it is difficult to manage. To improve these environmental constraints, this study attempted to construct a monitoring system for elderly people living alone by using sensors such as temperature, humidity, motion detection, and gas leak detection. The sensor periodically collects the current status data of the elderly and sends them to the server, creates a real time graph based on the data, and monitors it through the web. In the monitoring process, when the sensor is out of the range of the specified value, it sends a warning text message to the guardian to inform the current situation, and is designed and implemented so as to support the safety life of the elderly living alone.

Design and Verification of the Integrated Log Analysis System for Enterprise Information Security (기업정보 유출 방지를 위한 통합 로그분석 시스템 설계 및 검증)

  • Lee, Jae-Yong;Kang, Soo-Yong
    • Journal of Digital Contents Society
    • /
    • v.9 no.3
    • /
    • pp.491-498
    • /
    • 2008
  • The leakage of sensitive information by an insider within the organization becomes a serious threat nowadays. Sometimes, these insider threats are more harmful to an organization than external attack. Companies cannot afford to continue ignoring the potential of insider attacks. The purpose of this study is to design an integrated log analysis system that can detect various types of information leakages. The system uses threat rules generated through risk analysis, and monitors every aspect of the online activities of authorized insider. Not only should system have the ability to identify abnormal behavior, they should also be able to predict and even help to prevent potential risk. The system is composed of three modules, which are log collector, log analyzer and report generator.

  • PDF

Design of Digital Media Protection System using Elliptic Curve Encryption (타원 곡선 암호화를 이용한 영상 저작권 보호 시스템 설계)

  • Lee, Chan-Ho
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.46 no.1
    • /
    • pp.39-44
    • /
    • 2009
  • The advance of communication and networking technology enables high bandwidth multimedia data transmission. The development of high performance compression technology such as H.264 also encourages high quality video and audio data transmission. The trend requires efficient protection system for digital media rights. We propose an efficient digital media protection system using elliptic curve cryptography. Only key parameters are encrypted to reduce the burden of complex encryption and decryption in the proposed system, and the digital media are not played back or the quality is degraded if the encrypted information is missing. We need a playback system with an ECC processor to implement the proposed system. We implement an H.264 decoding system with a configurable ECC processor to verify the proposed protection system We verify that the H.264 movie is not decoded without the decrypted information.

Digital watermarking algorithm for authentication and detection of manipulated positions in MPEG-2 bit-stream (MPEG-2비트열에서의 인증 및 조작위치 검출을 위한 디지털 워터마킹 기법)

  • 박재연;임재혁;원치선
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.40 no.5
    • /
    • pp.378-387
    • /
    • 2003
  • Digital watermarking is the technique that embeds invisible signalsincluding owner identification information, specific code, or pattern into multimedia data such as image, video and audio. Watermarking techniques can be classified into two groups; robust watermarking and fragile(semi-fragile) watermarking. The main purpose of the robust watermarking is the protection of copyright, whereas fragile(semi-fragile) watermarking prevents image or video data from illegal modifications. To achieve this goal watermark should survive from unintentional modifications such as random noise or compression, but it should be fragile for malicious manipulations. In this paper, an invertible semi-fragile watermarkingalgorithm for authentication and detection of manipulated location in MPEG-2 bit-stream is proposed. The proposed algorithm embeds two kinds of watermarks, which are embedded into quantized DCT coefficients. So it can be applied directly to the compressed bit-stream. The first watermark is used for authentication of video data. The second one is used for detection of malicious manipulations. It can distinguish transcodingin bit-stream domain from malicious manipulation and detect the block-wise locations of manipulations in video data. Also, since the proposed algorithm has an invertible property, recovering original video data is possible if the watermarked video is authentic.

Comparative Analysis on Digital Currency Models and Electronic Payments (중앙은행의 디지털화폐 발행방식 및 전자지급수단의 비교분석)

  • Yoon, Jae-Ho;Kim, Yong-Min
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.7
    • /
    • pp.63-72
    • /
    • 2022
  • With the advent of cryptocurrencies such as Bitcoin in 2009, the paradigm of money, a means of payment, has been changing significantly. And it has a great impact on our daily lives. Thus central banks have attempted various analyzes on the issuance and impact of digital currencies including electronic payments but a study on which issuance method is suitable is insufficient. In this study, the issuance of digital currency was analyzed compared to the electronic payments which are currently used. As a result, the account-based model did not show any significant differences from the current RTGS(real-time gross settlement systems) and retail payment systems. But the token-based model is expected that it can improve the efficiency of finance and induce technological innovation in the financial field. However, it was analyzed that this model would weaken the intermediary function of financial institutions such as loans due to the characteristics of digital signature technology. In addition, in order to protect consumers against security attacks such as hacking and phishing of CBDCs, legal and institutional supports similar to the current electronic payment method are required, and continuous technology development efforts are also required for the CBDC issuance model to maintain convenience and anonymity equivalent to cash.

A Prototype of System Development for Digital Rights Management in Electronic Commerce (디지털 콘텐츠 정보보호를 위한 저작권 관리시스템 설계 및 구현)

  • Lee, Ki-Dong;Kim, Jun-Woo
    • Asia pacific journal of information systems
    • /
    • v.13 no.4
    • /
    • pp.97-118
    • /
    • 2003
  • The Internet provides a new way of doing business, but ease of copying and of sharing valuable digital information illegally across the Internet undermine many viable business models. This paper investigates the Digital Rights Management(DRM) as a means to provide safe protection and proper delivery of digital contents through the Information highway. First, we briefly summarize the current endeavor of DRM technical development and standardization process held in key technical working groups. Then, the paper provides a generic architecture for a DRM framework and shows the implementation of a prototype of DRM system incorporating key conceptual and technical standardization development. This study emphasizes the importance of developing the DRM architecture that provides the proper protection and safe transformation of digital contents in electronic commerce.