• Title/Summary/Keyword: 디지털콘텐츠 보호

Search Result 481, Processing Time 0.028 seconds

Intrusion Detection System based on Cluster (클러스터를 기반으로 한 침입탐지시스템)

  • Yang, Hwan-Seok
    • Journal of Digital Contents Society
    • /
    • v.10 no.3
    • /
    • pp.479-484
    • /
    • 2009
  • Security system of wireless network take on importance as use of wireless network increases. Detection and opposition about that is difficult even if attack happens because MANET is composed of only moving node. And it is difficult that existing security system is applied as it is because of migratory nodes. Therefore, system is protected from malicious attack of intruder in this environment and it has to correspond to attack immediately. In this paper, we propose intrusion detection system using cluster head in order to detect malicious attack and use resources efficiently. we used method that gathering of rules is defined and it judges whether it corresponds or not to detect intrusion more exactly. In order to evaluate performance of proposed method, we used blackhole, message negligence, jamming attack.

  • PDF

Image Watermarking using Wavelet Transform and Human Visual System (웨이블릿 변환 및 인간 시각 시스템을 이용한 원문 워터마킹)

  • 김상국;김태중;황재호;이재광
    • The Journal of the Korea Contents Association
    • /
    • v.4 no.3
    • /
    • pp.61-70
    • /
    • 2004
  • As multimedia data and their applications are rapidly distributed on the Web, the research on watermark insertion and integrity assurance vigorously increases. In this paper, Discrete Wavelet Transformation dissolves an original image into the three level of low, middle, and high bandwidths. Human Visual System with the significant coefficients extracted from the middle obtains enhanced image quality and robustness using watermark insertion. Experimental results show that various attacks cannot destroy pre-inserted watermark and recovered image is of good quality by measuring PSNR.

  • PDF

Performance Comparison of On-demand Routing Protocol to Supply Secure Service for Mobile Ad Hoc Networks (MANET에서 안전한 서비스 제공을 위한 On-demand 라우팅 프로토콜의 성능 비교)

  • Heo, Jin-Kyoung;Yang, Hwan-Seok
    • Journal of Digital Contents Society
    • /
    • v.10 no.2
    • /
    • pp.349-355
    • /
    • 2009
  • MANET is network that attach importance to not only service of large network as internet but also support of communication among each nodes because infrastructure constitution is disadvantage economically or difficult physically. The most important part in protection of systems constitute MANET is that authenticate each nodes securely and offer reliable service. Well defined routing technique is necessity to this. In this paper, in order to offer safe service, we compare capacity of present security routing protocol, analyze to solve weakness of existing on-demand routing protocol and existing routing protocol and argue with study course of hereafter security routing protocol.

  • PDF

Investigation of Research Trends in Information Systems Domain Using Topic Modeling and Time Series Regression Analysis (토픽모델링과 시계열회귀분석을 활용한 정보시스템분야 연구동향 분석)

  • Kim, Chang-Sik;Choi, Su-Jung;Kwahk, Kee-Young
    • Journal of Digital Contents Society
    • /
    • v.18 no.6
    • /
    • pp.1143-1150
    • /
    • 2017
  • The objective of this study is to examine the trends in information systems research. The abstracts of 1,245 articles were extracted from three leading Korean journals published between 2002 and 2016: Asia Pacific Journal of Information Systems, Information Systems Review, and The Journal of Information Systems. Time series analysis and topic modeling methods were implemented. The topic modeling results showed that the research topics were mainly "systems implementation", "communication innovation", and "customer loyalty". The time series regression results indicated that "customer satisfaction", "communication innovation", "information security", and "personal privacy" were hot topics, and on the other hand, "system implementation" and "web site" were the least popular. This study also provided suggestions for future research.

A Study on Possibility of RO as a Local Media (지역매체로서의 중계유선방송(RO)의 가능성에 대한 연구)

  • Nam, Chong-Hoon
    • Journal of Digital Contents Society
    • /
    • v.9 no.2
    • /
    • pp.213-223
    • /
    • 2008
  • This study attempted to analyze background and industrial difference of RO and SO. RO was launched for solving a problem of terrestrial broadcasting. After solving a problem of terrestrial broadcasting system, RO has played a roll as a local media. On the other hand, SO was launched by government's policy so SO has been protected and brought up by government. Because market of RO and SO is overlap and competitive, RO has been restricted by government for issuing new license and renewal of permission. Presently, environment of media has been changed very dramatically, so various niche media are needed for various customer's needs. In addition, local media are in trouble of playing a role as a public broadcasting service in Korea. Therefore, RO might be a good solution. In this study for the analysis of the user's needs a survey was conducted. This study shows possibility of RO's roll and function as a local media.

  • PDF

Investigating the Trends of Research for the Platform Work (플랫폼노동 연구 동향 분석)

  • Bang, Mi-Hyun;Lee, Young-Min
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.3
    • /
    • pp.430-440
    • /
    • 2021
  • We analyzed research trends of 288 Korean academic dissertations and articles regarding platform work, using topic modeling and keyword network analysis method. Research disciplines of many studies were laws, business administration, and economics fields. Thigh frequent themes were platform labor protection measures and direct or indirect effects of the sharing economy. The main keywords were digital, value, industry, and labor in terms of infrastructure and structural change. Besides, the main topics were the protection of platform workers, the values of sharing services, digital paradigm, and platform regulations. Based on the results of the analysis, we derived four implications and suggestions such as researching structural frames in macroscopic contexts, generalizing case analysis, and technology supplementation by applying average and quantitative analysis methods, researching individual competency development to realize the essential symbiotic value of sustainability, and developing customized vocational education and training programs.

A License Audit Model for Secure DRM System in Home Network Environment (홈네트워크 환경에서의 안전한 DRM 시스템을 위한 라이센스 감사 모델)

  • Jang, Ui-Jin;Jung, Byung-Ok;Yeo, Sang-Soo;Shin, Yong-Tae
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.3
    • /
    • pp.438-447
    • /
    • 2009
  • Digital home devices aims at providing the multimedia service which is not limited at time and space in home network environment. However, it is incapable of the fair use of consumers who legally buys contents, and causes damage to the contents providers owing to the indiscriminate distribution and use of illegal contents. DRM system appeared to solve this problem cannot protect the license stored on digital home devices and manage license by redistribution. This paper proposes a license audit model which makes an inspection of illegal access, modification and redistribution and reports alert logs to server.

  • PDF

The Mobile ID based Digital Signature Scheme Suitable for Mobile Contents Distribution (모바일 콘텐츠 유통에 적합한 ID 기반 디지털 서명 기법)

  • Yun, Sung-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.2 no.1
    • /
    • pp.1-6
    • /
    • 2011
  • The wide use of mobile devices such as smart phones makes the mobile commerce industry be growing-up rapidly. In mobile commerce security, how to secure a copyright of mobile contents and how to distribute it are of major concerns. The user can carry the smart phone regardless of the places. Thus the utilization of it is very high than that of personal computers. The USIM(Universal Subscriber Information Module) inserted in the smart phone binds the user with the device. This means that the smart phone can be used to represent the owner's identity. In this paper, we develop the mobile ID based digital signature scheme. We create the mobile ID by combining USIM with the user's random secret value. In addition, undeniable property of our signature scheme can make ID based applications such as mobile voting and mobile content distribution be possible with the smart phone.

A Study on the System for the Computer Remote Control by Mobile (모바일 기반의 컴퓨터 원격제어 시스템에 관한 연구)

  • Song Eun-Jee;Bang Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.6 no.1
    • /
    • pp.49-54
    • /
    • 2005
  • The development of various contents has been accelerated with the explosive increase of the number of internet users, the rapid expansion of wireless internet service and the pervasion of mobile terminal. Mobile service is able to offer the elastic service to anyone regardless of the place and the time. With this characteristics, this service could be extended even to the pace which the access was limited with the existing line service. The purpose of this study is to propose a system which is able to make a remote control of computer by means of mobile as an example of the production of contents for such mobile service. With this system it could be identified what kind of job a user of PC is making by mobile phone regardless of the time and place. The functions such as termination reboot, messenger, macro execution, and timer are included. The greatest advantage of the system proposed in this paper is to protect the youth, who are making an access recklessly to the harmful site, by use of mobile at my time and any place.

  • PDF

Deep learning-based watermarking technique for holographic intellectual property rights (홀로그램 지적재산권을 위한 딥러닝 기반 워터마킹 기법)

  • Kang, Ji-Won;Seo, Young-Ho;Kim, Dong-Wook
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2021.06a
    • /
    • pp.91-92
    • /
    • 2021
  • 디지털 홀로그램(digital hologram, DH)은 2차원 데이터에 3차원의 정보를 포함하는 차세대 영상 콘텐츠이다. 따라서 이 콘텐츠의 유통을 위해서는 그 지적재산권이 반드시 보호되어야 한다. 본 논문에서는 이를 위한 딥러닝 기반 DH의 워터마킹 방법을 제안한다. 이 방법은 워터마크의 비가시성, 공격에 대한 강인성, 워터마크 추출 시 호스트 정보를 사용하지 않는 blind 워터마킹 방법이다. 이 네트워크는 고주파 성분이 강한 DH의 특성을 감안하여 호스트 데이터를 축소하지 않고 워터마크 데이터를 확장하여 워터마크를 삽입한다. 또한 홀로그램의 복원성능을 위한 학습을 제안한다. 제안한 방법을 다양한 종류와 강도의 공격에 대해 실험을 수행하여 그 성능을 보인다.

  • PDF