• Title/Summary/Keyword: 디지털콘텐츠 보호

Search Result 480, Processing Time 0.03 seconds

HD Video Server and Its Application for HD Video Archive (HD 비디오 서버 기술 현황과 개발 사례)

  • No, Min-Cheol;Seong, Si-Hun;Gu, Jin-Won;Kim, Seong-U
    • Broadcasting and Media Magazine
    • /
    • v.14 no.3
    • /
    • pp.36-46
    • /
    • 2009
  • 비디오 서버는 대량의 영상과 음성 데이터를 보호화해서 디지털 포맷으로 저장하고 원하는 즉시 비디오 데이터를 재생 및 전송할 수 있는 컴퓨터 기반 장비를 말한다. 기존 저장 매체인 VTR(Video Tape Recorder) 테이프(Tape)에 녹화되던 영상은 비디오 서버의 HDD(Hard Disk Drive)에 파일로 저장되고 있다. 이러한 형태로 기존 VTR 이 수행하던 녹화, 편집, 송출 등의 역할을 비디오 서버가 파일 기반 제작 시스템으로 대체하고 있다. 즉 테이프리스(Tapeless) 제작환경의 촬영 단계인 녹화부터 송출 단계의 마지막 재생까지 사용되는 장비가 HD 비디오 서버이다. 파일 기반의 IT(Information technology) 제작환경은 제작 프로세스를 효율화하여 생산성을 향상시키고 비용을 절감하며 콘텐츠 재사용을 통한 미디어가치를 높인다. 이러한 장점들 때문에 비디오 서버 사용은 날로 증가되고 있다. 이에 본 논문에서는 비디오 서버 관련 기술에 대해 알아보고 자체 개발한 경험을 바탕으로 HD 비디오 서버 구현 기술을 소개하고자 한다.

Abnormally Scanned-Comics Calibration System (비정상 스캔-만화 보정 시스템)

  • Kim, Doeyoung;Lee, Sang-Hoon;Vasant, Jadhav Sagar;Ryu, Justin Daegull;Kang, Hogab;Lee, Sanghoon
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2014.11a
    • /
    • pp.266-267
    • /
    • 2014
  • 최근 웹하드를 통하여 허가 받지 않고 불법적으로 생성된 디지털 콘텐츠에 대한 저작권 보호에 대한 문제가 대두되고 있다. 불법 만화 도서를 검색하고 식별하는 알고리즘 또한 만화 도서의 특성에 맞게 제작되어 만화 도서 이미지 간의 식별률을 높이고 있다. 특히 불법적으로 스캔된 만화 도서의 경우 식별을 위해 만화 도서 핑거프린트가 쓰이게 되는데, 스캔 과정에서 상하좌우가 정확히 맞지 않아 스캔본의 기하학적 특성이 만화의 원본과 달라지는 왜곡을 최대한 제거하여 만화 도서의 식별률을 높이고자 했다.

  • PDF

Web Image Crawler for Copyright Protection (저작권 보호를 위한 웹 이미지 크롤러)

  • Kwon, Oh-Jung;Lim, Seung-Won;Oh, Min-Seok;Yang, Bo-Won;Jung, Jin-Woo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.1527-1529
    • /
    • 2015
  • 디지털 콘텐츠가 넘쳐나는 가운데, 최근 이미지 저작권에 대한 중요성이 대두되고 있다. 블로그 및 SNS에 쉽게 게시물을 업로드가 가능한 점으로 인해, 이미지 저작권의 침해가 광범위하게 이루어지나, 저작권의 소유자는 침해된 자료를 찾기 위해 일일이 검색하고 적발하는 방식을 사용하고 있어 비용이 많이 들며 저작권 침해 속도에 크게 못 미친다. 이러한 문제를 해결하고 궁극적으로 저작권의 권리 보장과 저작권 침해 예방을 위해 본 연구에서는 키워드 검색으로 얻은 게시물에 게재된 이미지를 저작권 침해 적발 방법을 자동화하는 시스템을 제안하고 실험결과를 제시하였다.

The Streaming DRM system Using USIM on a Smart Phone (USIM을 활용한 Smart Phone 상의 Streaming DRM system)

  • Park, Beum-Su;Kim, Tae-Yong;Lee, Hoon-Jae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.793-796
    • /
    • 2011
  • 최근 IT 기술의 발달로 많은 디지털 컨텐츠 서비스 사업이 사용자에게 제공되고 있으며, 유로 컨텐츠의 경우 사용자 개인 정보를 통한 사용자 인증을 요구되고 있다. 이에 저작권 보호, 관리, 유통을 위한 DRM 기술의 확보가 콘텐츠 사업의 성장에 필수 항목으로 요구되고 있으며 기반 기술 및 국제 표준화를 위한 노력중에 있다. 본 논문은 최근 보급률이 급증하고 있는 SmartPhone 상에서 음원 컨텐츠 서비스 이용에 적용 가능한 DRM 시스템을 제안하였다. 제안된 DRM 시스템은 사용자의 USIM 카드를 이용하여 암복호화에 사용되며, 불법적인 복제 방지를 위한 방안도 제시하고 있다.

Digital License Prototype for Copyright Management of Software Source Code (소프트웨어 소스 코드의 저작권 관리를 위한 디지털 라이센스 프로토타입)

  • Cha, Byung-Rae;Jeong, Jong-Geun;Oh, Soo-Lyul
    • Journal of Internet Computing and Services
    • /
    • v.7 no.5
    • /
    • pp.95-108
    • /
    • 2006
  • The digital contents expand into software source code and maintenance of technology and IPR about source code have a very important meaning to international competition, The recognition about software security is very low specially among these Intellectual Property Rights. On occurring disputation property, we have to prove the fact, there is a problem to discriminate the original source code, Also, it is hard to accurate decision that is correct to complexity and the lack of read and understand ability even if software is reproduced. In this paper, we don't enforce distinction about software reproduction by one individual code unit. And we developed digital license prototype of XML that can distinguish reproduction based on structural conformability of whole source codes. Software has Context Free Grammar in structure and presents BNF notation type, it is apt to present hierarchical structure. Then, we can express architecture of software source code by hierarchical structure to discriminate structural conformability. In this paper, we make a study of the digital licence prototype for discriminate the original source code. Reserved words of software source code by parsing express to XML file that have hierarchical structure. Then, we can express architecture of software source code by tree structure form instead of complex source code.

  • PDF

Efficiency Analysis of Government Budget to HRD Program in the field of Information Technology : IT Research Center Case (정보통신분야 HRD사업에 대한 정부예산 지원의 효율성 분석 : 대학의 IT연구센터를 중심으로)

  • Lee, Jung-Mann;Cheon, Won-Suk
    • Journal of Digital Convergence
    • /
    • v.10 no.4
    • /
    • pp.55-62
    • /
    • 2012
  • This paper analyze the DEA(Data Envelopment Analysis) efficiency of government budget to HRD program(ITRC) and correlation and regression between its inputs and outputs in the field of information technology. First, empirical results show that the relationship between the supporting period of government budget and scientific research & HRD outputs is respectively irrelevant. Second, another finding is that the relationship between government budget and HRD output is positive. Finally, DEA efficiency analysis implicates that SW/digital contents, digital TV, information security, intelligence robot, next generation PC, next generation mobile telecommunication, home network, mathematics, IT SoC are more efficient than any other technology fields.

POCS Based Digital Watermarking in Buyer-Seller Watermarking Protocal (Buyer-Seller 워터마킹 프로토콜 상에서 POCS 기반의 디지털 워터마킹)

  • Kwon, Seong-Geun;Lee, Ji-Hye;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.5
    • /
    • pp.569-582
    • /
    • 2007
  • Digital watermarking technique for copyright protection and prevention of illegal copy and distribution can provide the reliable transaction to both buyer and seller in e-commerce through the cryptographic protocol such as 'Buyer-seller watermarking protocol'. Recently there has been researched about some cryptographic protocols for watermarking system but there has no yet mentioned about the implementation of practical watermarking technique in protocol. This paper presents the watermark embedding technique based on POCS in buyer-seller watermarking protocol. The proposed method designs the robust convex set based on EZW and the invisible convex set using PSNR and then projects into two sets until the convergence condition is satisfied. Experimental results verified that BER of watermark that is embedded by the proposed method has lower 0.02-0.10 than BER of the conventional method.

  • PDF

The Effect of the Punishment for Internet Piracy on Attitude and Intention: Focusing on the Moderating Effect of Piracy Education (인터넷 저작권 침해에 대한 처벌이 태도와 침해 의도에 미치는 영향에 관한 연구: 저작권 교육의 조절변수 효과를 중심으로)

  • Park, Joo-Yeon
    • Journal of Information Management
    • /
    • v.43 no.3
    • /
    • pp.61-78
    • /
    • 2012
  • Internet is widely spreading in everyday life and it makes easy to find and share information on the Internet. Many of Internet users are copying and distributing copyrighted materials freely on the Internet without recognizing that it is unethical and illegal behavior. The rate of Internet piracy is constantly increasing even though the regulation and punishment for piracy behavior are to be strict. However, there is a lack of study about the relationship between the punishment and education for intenet piracy on users' attitude and intention toward piracy on the Internet. The purpose of this study is therefore to find out the effect of the level of punishment for internet piracy on users' attitude and intention. This study also examines the moderating effect of piracy education on the relationship between punishment and piracy intention. The study shows that the punishment is directly associated with the attitude but not associated with the piracy intention. The piracy education has a significant effect on the relationship between punishment and intention. The result of this study could bring up the issue of intellectual property protection on the Intenet and suggest an importance of piracy education to educators, managers and internet users.

Key Determinants of Dissatisfaction on COVID-19 Contact Tracing and Exposure Notification Apps (COVID-19 접촉추적과 노출알림 앱사용자의 항의 및 불만요인 탐색)

  • Leem, Byung-hak;Hong, Han-Kook
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.9
    • /
    • pp.176-183
    • /
    • 2021
  • Digital medical technology is very effective and at the same time faces the challenge of protecting privacy. However, for contact tracking and exposure notification apps in COVID-19 environment, there is always a trade-off between privacy measures and the effectiveness of the app's use. Today, many countries have developed and used contact tracking and exposure notification apps in various forms to prevent the spread of COVID-19, but the suspicion of digital surveillance (digital panopticon) is unavoidable. Therefore, this study aims to identify the factors of personal information infringement and dissatisfaction through text mining analysis by extracting user reviews of "Self-Quarantine Safety Protection" in Korea. As a result of the text mining analysis, we derived four groups, 'Address recognition error', 'Exit warning error', 'Access error', and 'App. program error'. Since 'Address recognition error' and 'Exit warning error' can give the app users a strong perception that they are keeping under surveillanc by the app, transparent management of personal information protection and consent procedures related to personal information collection are required. In addition, if the other two groups are not corrected immediately due to an error in an app function or a program bug, the complaints of users can be maximized and a protest against the monitor can be raised.

An Embedded Watermark into Multiple Lower Bitplanes of Digital Image (디지털 영상의 다중 하위 비트플랜에 삽입되는 워터마크)

  • Rhee, Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.6 s.312
    • /
    • pp.101-109
    • /
    • 2006
  • Recently, according to the number of internet in widely use and the development of the related application program, the distribution and use of multimedia content(text, images, video, audio etc.) is very easy. Digital signal may be easily duplicated and the duplicated data can have same quality of original data so that it is difficult to warrant original owner. For the solution of this problem, the protection method of copyright which is encipher and watermarking. Digital watermarking is used to protect IP(Intellectual Property) and authenticate the owner of multimedia content. In this paper, the proposed watermarking algerian embeds watermark into multiple lower bitplanes of digital image. In the proposed algorithm, original and watermark images are decomposed to bitplanes each other and the watermarking operation is executed in the corresponded bitplane. The position of watermark image embedded in each bitplane is used to the watermarking key and executed in multiple lower bitplane which has no an influence on human visual recognition. Thus this algorithm can present watermark image to the multiple inherent patterns and needs small watermarking quantity. In the experiment, the author confirmed that it has high robustness against attacks of JPEG, MEDIAN and PSNR but it is weakness against attacks of NOISE, RNDDIST, ROT, SCALE, SS on spatial domain when a criterion PSNR of watermarked image is 40dB.