• Title/Summary/Keyword: 디지털 콘텐츠 보호

Search Result 480, Processing Time 0.028 seconds

The Change of Industrial Structure and Public Interest as to the Convergence of Broadcasting and Telecommunications (방송통신 융합에 따른 산업구조의 변화와 공익성)

  • Joo, Chung-Min
    • Korean journal of communication and information
    • /
    • v.36
    • /
    • pp.109-132
    • /
    • 2006
  • It is difficult to found the concept of public interest properly, being ambiguous to distinguish media and service as to the convergence of broadcasting and telecommunications. Accordingly, it is necessary to found the concept of public interest not related to the character of media and service in the age of digital convergence. Therefore this study intended to re-found the concept of public interest, as to industrial changes in the age of convergence of broadcasting and telecommunications. The convergence of broadcasting and telecommunications causes the changes of value chain, which includes contents, platform, network, terminal. It could not help avoiding modifying the industrial structure of broadcasting and telecommunications, because of the changes of value chain. The changes of industrial structure needs the changes of ideology, regulatory policy, regulatory system, and it creates the foundation of new regulatory idea. The purpose of regulatory idea in the age of digital convergence is to practice public interest, and it is an ultimate purpose to increase consumers' welfare. Consequently, for increasing comsumer' welfare, it is necessary to achieve diversity, fairness, objectivity, the preservation of social value in the aspect of contents. Also in the aspect of platform, it is necessary to achieve the protection of privacy, consumer protection, harmful information blocking, and in the aspect of network, it is necessary to achieve the maintenance of secure network, fair competition. Finally, in the aspect of terminal, it is necessary to achieve the maintenance of compatibility, the solution for digital divide. Then regulatory policy of each value chain from a legal and institutional perspective, should be promoted to provide public interest, step by step.

  • PDF

A Delphi Survey for Establishment of Standards Development Strategy in Digital Publication (전자출판 분야 표준 개발 전략 수립을 위한 델파이조사 연구)

  • Oh, Mi-Ja;Cho, Yong-Sang;Shin, Sung-Wook
    • Journal of Internet Computing and Services
    • /
    • v.14 no.3
    • /
    • pp.1-13
    • /
    • 2013
  • The recent emergence of diverse platform-based media devices such as smart phones and iPads has aroused interest of consumers all across the world. This interest has led to digitalization of paper books and a steep growth in the digital publishing industry at home and abroad. However, advent of various devices and content has caused the issue of compatibility and produced needs and demand for standardization to exchange and share content related to digital publication. Through collection of opinions of 16 stakeholders from the industrial, academic, research, and public sectors, this study aims to examine predictable future changes about content and its distribution, devices, standardization, technical protective measures, and obstacles in future digital publishing and eventually to draw out areas and elements for future standards development.

Detection of Colluded Multimedia Fingerprint using LDPC and BIBD (LDPC와 BIBD를 이용한 공모된 멀티미디어 핑거프린트의 검출)

  • Rhee Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.5 s.311
    • /
    • pp.68-75
    • /
    • 2006
  • Multimedia fingerprinting protects multimedia content from illegal redistribution by uniquely marking every copy of the content distributed to each user. Differ from a symmetric/asymmetric scheme, fingerprinting schemes, only regular user can know the inserted fingerprint data and the scheme guarantee an anonymous before recontributed data. In this paper, we present a scheme which is the algorithm using LDPC(Low Density Parity Check) for detection of colluded multimedia fingerprint and correcting errors. This proposed scheme is consists of the LDPC block, Hopfield Network and the algorithm of anti-collusion code generation. Anti-collusion code based on BIBD(Balanced Incomplete Block Design) was made 100% collusion code detection rate about the linear collusion attack(average, AND and OR) and LD% block for the error bits correction confirmed that can correct error until AWGN 0dB.

REL License Edit tool development for right integration use of multimedia resources (멀티미디어 자원의 저작권 통합 운용을 위한 REL 라이선스 저작 툴 개발)

  • 송병규;임산송;최종근;정회경
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.221-224
    • /
    • 2004
  • By effect of infinity internet market copyright connection skills for extent extension of digital contents and profit rescue through this impoliticly research and develop. Contents protection techniques, management techniques, circulation techniques etc. are becoming development by contents circulation company and developers but that there is no standard as problem advances soul between copyright managerial system by development competition and in reciprocity compatibility tell. ISO MPEG commission arrived that develop MPEG-21 framework to solve problem that do that is to copyright management's opacity province that non efficiency and standard of contents distribution structure that do that is by redundancy investment are not. Data structure in Framework interior is doing and propose copyright expression language of XML base of REL to establish copyright connection data standard and normalized based on no XML. But, a tool that can be easy as must understand whole framework and can have problem in to edit REL and create copyright document fast was required. In this paper, research about method that edit REL document and develop and spend a edit tool that tan be that expressing intuitionally.

  • PDF

The Exploration of the New Model of the Committee for Viewers in PBS (방송사 시청자위원회의 새로운 모델 탐색)

  • Hong, Kyung Soo
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.11
    • /
    • pp.213-221
    • /
    • 2018
  • As the mobilization of audience' media consumption getting escalating, terrestrial broadcasting, especially public broadcasting is severely affected in Korea. After 9 years' downfall, public broadcasting is trying to aim for citizen platform. Even though the Korean broadcasting law already has the articles of protecting viewer's right and profit, it has some contradictory limits also. Implied by Japanese magazine Taberutsushin, which was originated from CSA model, I suggest the new model of committee for viewers. The new committee for viewers has various planning committees and evaluation committees to ensure citizen's participation on planning, programming, and production. The new committee for viewers would function as minimum system to prompt the public broadcasting to play it's role in rapidly changing digital era.

Digital License Prototype for Copyright Management of Software Source Code (소프트웨어 소스 코드의 저작권 관리를 위한 디지털 라이센스 프로토타입)

  • Cha, Byung-Rae;Jeong, Jong-Geun;Oh, Soo-Lyul
    • Journal of Internet Computing and Services
    • /
    • v.7 no.5
    • /
    • pp.95-108
    • /
    • 2006
  • The digital contents expand into software source code and maintenance of technology and IPR about source code have a very important meaning to international competition, The recognition about software security is very low specially among these Intellectual Property Rights. On occurring disputation property, we have to prove the fact, there is a problem to discriminate the original source code, Also, it is hard to accurate decision that is correct to complexity and the lack of read and understand ability even if software is reproduced. In this paper, we don't enforce distinction about software reproduction by one individual code unit. And we developed digital license prototype of XML that can distinguish reproduction based on structural conformability of whole source codes. Software has Context Free Grammar in structure and presents BNF notation type, it is apt to present hierarchical structure. Then, we can express architecture of software source code by hierarchical structure to discriminate structural conformability. In this paper, we make a study of the digital licence prototype for discriminate the original source code. Reserved words of software source code by parsing express to XML file that have hierarchical structure. Then, we can express architecture of software source code by tree structure form instead of complex source code.

  • PDF

Research on the Detection of Image Tampering

  • Kim, Hye-jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.12
    • /
    • pp.111-121
    • /
    • 2021
  • As the main carrier of information, digital image is becoming more and more important. However, with the popularity of image acquisition equipment and the rapid development of image editing software, in recent years, digital image counterfeiting incidents have emerged one after another, which not only reduces the credibility of images, but also brings great negative impacts to society and individuals. Image copy-paste tampering is one of the most common types of image tampering, which is easy to operate and effective, and is often used to change the semantic information of digital images. In this paper, a method to protect the authenticity and integrity of image content by studying the tamper detection method of image copy and paste was proposed. In view of the excellent learning and analysis ability of deep learning, two tamper detection methods based on deep learning were proposed, which use the traces left by image processing operations to distinguish the tampered area from the original area in the image. A series of experimental results verified the rationality of the theoretical basis, the accuracy of tampering detection, location and classification.

Comparative Analysis of Performance and Practical Training Needs for Elderly Care Service on Convergence Study -Focusing on Senior Caregivers, Social Workers and Nursing Assistants- (노인케어 직무에 대한 수행도 및 실습교육요구도 비교에 관한 융합연구 -요양보호사, 사회복지사, 간호조무사 중심으로-)

  • So, Kwon-Seob;Kim, Yong-Duck;Hwang, Jeong-Hye
    • Journal of Digital Convergence
    • /
    • v.18 no.2
    • /
    • pp.351-360
    • /
    • 2020
  • This study was designed to develop an online education program of elderly care service for the senior caregivers. Online survey was conducted senior caregivers who attended K cyber university from November 28, to December 15, 2019. Data were analyzed using chi-square, ANOVA and post test by scheffe method. The results showed that needs of the online education program for senior caregivers were significantly higher than nursing assistants. Social workers were significantly higher than the nursing assistants in the elderly care service online education demand. In terms of performance, 'understanding and counseling for the elderly' and 'practice of the elderly play program' were social workers, senior caregivers and nursing assistants. In conclusion, it is necessary to develop a specialized online education contents for each group according to the necessity of elderly professional care and the demand of online education for elderly care service.

A Case Study of eSports' NFT utilization and Discussion of Activation Plan (e스포츠의 NFT 활용 사례와 활성화 방안 논의)

  • JaeHun Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.2
    • /
    • pp.493-502
    • /
    • 2023
  • The development of online content is changing the value of society very diversely and rapidly. In particular, the non-face-to-face e-sports industry is growing significantly in the current situation where the COVID-19 Pandemic has not been completely overcome. The use of NFT in the eSports industry is receiving positive reviews as a field with high potential for future growth that protects digital assets of eSports users, but at the same time, it is raising concerns that cash transactions of digital items could encourage gambling. In this study, the characteristics of the recent eSports industry and NFT were identified and classified through case studies using literature, official sites, and online news articles. Through various cases of eSports and NFT, we discussed the potential for future growth and activation plan of the NFT industry of eSports. The result is as follows. First, it is necessary to use NFT using IP of eSports event itself. Second, it is necessary to combine the functional role of the item with NFT to provide features that users can utilize. Third, it is necessary to provide users with opportunities to engage in economic activities using eSports and NFT. Finally, it is necessary to use NFT to strengthen the digital asset protection of eSports users. Through this study, it is expected to be used as a basis for further discussions on the NFT industry of e-sports and as a material for securing competitiveness.

Deep Learning Framework for Watermark-Adaptive and Resolution-Adaptive Image Watermarking (워터마크 및 해상도 적응적인 영상 워터마킹을 위한 딥 러닝 프레임워크)

  • Lee, Jae-Eun;Seo, Young-Ho;Kim, Dong-Wook
    • Journal of Broadcast Engineering
    • /
    • v.25 no.2
    • /
    • pp.166-175
    • /
    • 2020
  • Recently, application fields for processing and using digital image contents in various forms and types are rapidly increasing. Since image content is high value-added content, the intellectual property rights of this content must be protected in order to activate the production and use of the digital image content. In this paper, we propose a deep learning based watermark embedding and extraction network. The proposed method is to maximize the robustness of the watermark against malicious/non-malicious attacks while preserving the invisibility of the host image. This network consists of a preprocessing network that changes the watermark to have the same resolution as the host image, a watermark embedding network that embeds watermark data while maintaining the resolution of the host image by three-dimensionally concatenating the changed host image and the watermark information, and a watermark extraction network that reduces the resolution and extracts watermarks. This network verifies the invisibility and robustness of the proposed method by experimenting with various pixel value change attacks and geometric attacks against various watermark data and host images with various resolutions, and shows that this method is universal and practical.