• Title/Summary/Keyword: 디지털콘텐츠 유통기술

Search Result 188, Processing Time 0.023 seconds

이용자 측면에서의 DB문제점

  • U, Dong-Jin
    • Digital Contents
    • /
    • no.11 s.6
    • /
    • pp.8-21
    • /
    • 1993
  • "지난 9월 22일에서 25일까지 KOEX에서 개최된 '제1회 서울국제데이터베이스 전시회'는 국내에서 처음 개최된 데이터베이스관련 국제전시회였다는 점에서도 여러가지 의미가 있는 행사였다. 그중에서도 행사기간중인 9월 24일 같은 장소에서 열린 '서울 국제데이터베이스 세미나'는 그간 매년 여러번에 걸쳐 준비되어온 'DB산업 육성을 위한 세미나'를 총정리하면서 고도정보화와 국제화를 맞이하는 국내 DB산업이 안고있는 문제점을 정책 및 공공적인 측면, 이용마인드 확산이라는 홍보 혹은 마케팅적인 측면, 개발과 유통의 표준화라는 기술적인 측면, 해외정보 이용과 기술이전이라는 측면 등에서 다각적으로 점검해 보는 귀중한 기회였다. 세미나에서 발표된 4편의 논문을 분야별로 살펴보면, DB산업의 현좌표에 대해서 최동휘 상무(한국PC통신)가 '국내외 DB산업현황'을, 해외정보이용 마인드 고취와 기술이전에 대해 Jeen Videau 부사장(KSD)이 'DB를 활용한 기술이전 방안'을 DB이용마인드 확산을 위한 마케팅 방법에 대해 우동진 실장(한국전자통신연구소)이 '이용자측면에서 본 DB문제점과 해결방안'을, 마지막으로 DB의 표준화에 대해 오해석 교수(숭실대)가 'DB구축과 유통 표준화'를 발표하는 등 각 분야에서 골고루 핵심적인 논문이 제시되었고 아울러 200여명의 참석자들이 이에 대한 열띤 토론을 벌였다. 이에 'DB월드'에서는 세미나에서 발표된 논문들을 지난호(DB구축과 유통표준화)에 이어 차례로 게재합니다.

  • PDF

Design and implementation of smart card-based multi-authentication mechanism for digital contents delivery (디지털콘텐츠 유통을 위한 스마트카드기반의 다중인증처리방법설계 및 구현)

  • Kim, Yong;Lee, Tae-Young
    • Journal of the Korean Society for information Management
    • /
    • v.19 no.1
    • /
    • pp.23-46
    • /
    • 2002
  • With explosively increasing digital contents, library and Information center should have a new role between knowledge providers and knowledge users as information brokering organization. Electronic transaction system should be required for performing this brokering service since economic value is added to information and knowledge in information society. The developments and changes around library are keeping up with increasing building digital library and digitalizing printed sources. With the rapidly changing circumstances, the Internet is currently witnessing an explosive growth. By serving as a virtual information resource. the Internet can dramatically change the way business is conducted and Information is provided. However because of features o( the Internet like openness and information sharing, it has fundamental vulnerabilities in security issues. For Instance, disclosure of private information and line eavesdropping such as password, banking account, transaction data on network and so on are primary obstruction factors to activation of digital contents delivery on network. For high network security and authentication, this paper looks at smart card technologies and proposes multi-authentication protocol based on smart card on open network, implements and analyzes it.

Real-time Audio Watermarking System Considering Audio Source and User (음원 및 사용자를 고려한 실시간 오디오 워터마킹 시스템)

  • Cho, Jung-Won;Jeong, Seung-Do
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.11
    • /
    • pp.3213-3217
    • /
    • 2009
  • Distribution, duplication and manipulation of the digital contents are very easy due to the characteristics of the digital contents. Thus, damages of invasion of property right rapidly increase due to infringement of copyright for the digital contents. To prevent illegal use and to settle conflict about ownership of the digital contents, continuous efforts with enormous expense are devoted. In this paper, we design and implement real-time audio watermarking system to protect ownership and copyright for the digital contents. The proposed system also clarifies where the responsibility about the illegal distribution lies. The system has convenient user interface so that general administrator without an expert knowledge of the protection of copyright can use easily. In addition, unlike the traditional watermarking system, our system has merit to offer information about the illegal distribution for clear post-management.

Efficient video matching method for illegal video detection (불법 동영상 검출을 위한 효율적인 동영상 정합 방법)

  • Choi, Minseok
    • Journal of Digital Convergence
    • /
    • v.20 no.1
    • /
    • pp.179-184
    • /
    • 2022
  • With the development of information and communication technology, the production and distribution of digital contents is rapidly increasing, and the distribution of illegally copied contents also increases, causing various problems. In order to prevent illegal distribution of contents, a DRM (Digital Rights Management)-based approach can be used, but in a situation where the contents are already copied and distributed, a method of searching and detecting the duplicated contents is required. In this paper, a duplication detection method based on the contents of video content is proposed. The proposed method divides the video into scene units using the visual rhythm extracted from the video, and hierarchically applies the playback time and color feature values of each divided scene to quickly and efficiently detect duplicate videos in a large database. Through experiments, it was shown that the proposed method can reliably detect various replication modifications.

A Design and Implementation of Interoperable DRM System Based on DMP (DMP 기반의 상호운용 가능한 DRM 시스템 설계 및 구현)

  • Cho, Tae-Beom;Lee, Sang-Jo;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.5
    • /
    • pp.860-867
    • /
    • 2007
  • Digital Contents are increasing the modification of the contents by individual user and the modified or copied contents are simply distributed though the ultrahigh speed internet and the negative pervasive effect on the contents market is increasing. The solutions for copyright protection from illegally distributing contents are developing by various standardization groups and contents manufacturers and its commercia use is partly practiced. The MPEG was developing the IPMP technique to apply existed MPEG standards as a way of digital contents protection. However, as these IPMP techniques did not provide a satisfactory function for contents protection, the DMP standard was suggested as an alternative plan. In this paper, the system is designed and materialized to apply the TooIPack concept of DMP which ensure the interoperability of DRM system. With this paper, it is expected that the practical use and the possibility of the DMP standard in the DRM market would be verified and DMP standard may presents as a reference model for more systematic standardization operations.

Conceptual Design on the Marketing Platform for E-Books - The Business Model on the Notion of Social Cooperative - (디지털 출판물 유통 플랫폼 개념설계에 관한 연구 - 사회적 협동조합형 비즈니스 모델 -)

  • Chung, Jun Min
    • Journal of Korean Library and Information Science Society
    • /
    • v.50 no.4
    • /
    • pp.33-55
    • /
    • 2019
  • A marketing platform based on the legal deposit system was designed. It is an e-book distribution platform that systematically binds library networks nationwide by linking with the National Library's deposit system to complete the existing paper that the library should become a publishing platform. The purpose is to bundle e-books into a distribution space and naturally assemble readers to serve as virtual platforms for domestic publishers, authors, bookstores, and platforms running various publishing / subscribing services. The premise is not a sale of e-books, but a rental concept, but the platform is valid regardless. In addition, the platform takes the form of social cooperatives to represent the interests of all members involved in publishing services. The lead-based distribution platform is the most ideal business model to compromise with reality. Conceptually, the service of the publishing content-related industry is a model in which all content is supplied from the lead-bone system, which is a collaborative space, and technically, the central e-book database controls the flow of all content, but the publishing content-related industry takes the form of controlling its flow through virtual.

Design and Evaluation of DRM Model with Strong Security Based on Smart Card (스마트카드 기반의 강한 보안을 갖는 DRM 모델의 설계 및 평가)

  • Park, Jong-Yong;Kim, Young-Hak;Choe, Tae-Young
    • Journal of Digital Contents Society
    • /
    • v.12 no.2
    • /
    • pp.165-176
    • /
    • 2011
  • Recently, digital rights management (DRM) related researches are widely spreading with prosperity of IT industries. The DRM technology protects proprietor of copyright by preventing mischanneling and illegal copy. In this paper, we propose a new DRM model that has an enhanced and efficient protocol based on certificate using smart card. The proposed model overcomes weaknesses of WCDRM model and has following additional advantages: first, copy protection is enhanced by hiding user's specific information from attacker by storing the information within smart card; second, server load for contents encryption is reduced by making clear protocols among author, distributer, certificate authority, and users; third, offline user authentication is guaranteed by combining partial secret values in media players and smart card. Exposure of core information also is minimized by storing them in smart card. In addition, we show that the proposed system is more secure than WCDRM model by comparing various factors of anonymous attackers.

Market condition of Digital contents through interviewing Experts in Business and Research Analysis about License of Individual Contents (전문가 인터뷰를 통한 디지털 콘텐츠 시장의 현황 및 개인 저작물 라이선스 보호에 관한 조사 분석)

  • Sohn, Bang Yong;Suh, Hye Sun
    • Journal of Digital Convergence
    • /
    • v.12 no.12
    • /
    • pp.357-364
    • /
    • 2014
  • There are lots of limits on preventing illegal transaction of digital contents by existing DRM(Digital Right Management) methods because of illegal download and share of contents, which is resulted from advanced information technologies, development of cloud services, and smart instruments. In the other hand, the number of creators based on one person, in the area of music, webtoon, digital magazine and video, is increasing. As a result, it is needed that the necessities of digital contents transaction under the condition of convenience and efficiency through licence and management of contents to protect copyright of contents and to increase the transaction of digital contents. Therefore how to promote the transaction of digital contents should be studied by way of research analysis of contents market through interviewing experts in business.

2018 블록체인 기술과 미디어 산업

  • Jeong, Sang-Seop
    • Broadcasting and Media Magazine
    • /
    • v.23 no.3
    • /
    • pp.43-55
    • /
    • 2018
  • 블록체인 기술은 '새로운 산업을 만드는 구조'는 아니다. 오히려 과거 인터넷이 도입되면서 사회, 경제 모델 전반이 바뀐 것에 비하면 작은 변화에 가깝다고 할 수 있다. 하지만 블록체인은 높은 보안성과 투명성을 기반으로 기존 산업의 기대 효용을 높여 주고, 다양한 시도를 가능하게 만들어 줄 것이라는 점에서 매우 기대되는 분야이기도 하다. 블록체인은 인터넷 이후의 다른 기술과는 확연히 다르다는 주장을 유심히 살펴볼 필요가 있다. 왜냐하면 블록체인이 인터넷과 우리 사회구조를 어떻게 혁신 시킬 수 있는지, 인터넷 이후의 마케팅 세계가 어떻게 변해왔는지, 소비자는 또 어떻게 변해 왔는지 우리는 쉽게 알 수 있기 때문이다. 이처럼 현재 우리 사회는 "새로운 것을 만들기보다는 효율성과 사회의 신뢰성, 콘텐츠 가치의 투명성을 높여 주는 것이 블록체인의 기술이다"라고 정의할 수 있다. 그렇다면 블록체인 기술의 혁신이 미디어 산업 분야에도 접목되어 새로운 동력으로 작용 할 수 있을 것인가? 이같은 질문과 함께 본 고에서는 블록체인과 콘텐츠 산업, 블록체인과 미디어 서비스 구조, 새로운 서비스 사례 및 기존 스트리밍 서비스, 콘텐츠 제작 및 유통 분야 변화, 그리고 유료 콘텐츠 거래, 디지털 콘텐츠의 효율적인 저작권 관리 분야에서 그 역할과 비중이 어떻게 적용되어 효과가 나타나게 될 것인지에 대해 방송 현업 종사자의 시각에서 살펴보았다. 결국 이러한 신기술을 적극 활용하기 위해서는 블록체인 기술이 갖는 신뢰와 가치라는 근본적인 사항과 미디어업계 종사자들의 긍정적인 인식 변화와 함께 블록체인 미디어 비즈니스 생태계 조성을 위한 연구와 파일럿 적용 등 실험적 여정들이 뒤따라야 할 것이다.

A Study on Multi-Media Contents Security Using Android Phone (안드로이드 폰을 이용한 멀티미디어 콘텐츠 보안에 관한 연구)

  • Shin, Seung-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.3 no.1
    • /
    • pp.19-25
    • /
    • 2012
  • This paper tries to solve the problems which previous methods have such as the WCDRM(Watermark and Cryptography DRM) and the model using smart card for protecting digital contents. This study provides a contents distribution model to protect the rights of author, distributor, and user as well as user's information by using technologies such as cryptography, DRM(Digital Right Management), access control, etc. The proposed system is evaluated as the most safety model compared with previous methods because it not only solves the problems which the previous methods have, but also protects four type of risks such as use of contents which other mobile devices download, the attack on the key to decode the message, the attack on leaking the contents, and the internal attack such as an illegal reproduction.