• Title/Summary/Keyword: 디지털 콘텐츠 보호

Search Result 480, Processing Time 0.024 seconds

Development of nature friendly characters for infants and toddlers (영유아를 대상으로 한 자연친화적 캐릭터 개발 연구)

  • Joo, Eun-Ryeong;Chung, Jean-Hun
    • Journal of Digital Convergence
    • /
    • v.16 no.3
    • /
    • pp.415-422
    • /
    • 2018
  • The purpose of this paper is to show development examples of nature-friendly characters and to play a guide role for various nature-friendly characters to appear by presenting nature-friendly characters setting in Korea. Three famous examples of nature-friendly characters in foreign countries and the influence of nature on infants and young children will be examined with reference to previously published papers and published books. I have confirmed that nature harmony positively affects emotions and life respect of infants and young children, the characteristics of nature-friendly characters are 1. The characters are drawn based on nature environment as background. 2. They have been beloved for story of nature conservation and love for nature, and playing in nature environment. As story setting, I suggested 1. A story of forest experience with friends 2. A story of nature observation and exploration such as playing, exploration, and explanation 3. A drawing of Korea nature environment, including grass, flower, tree, insect, etc. 4. An educational and philosophical story of life respect, nature conservation, and love for nature.

Roles and Discourse of Cryptocurrency's Online Community and YouTube : Using Focus Group Interviews (암호화폐 온라인 커뮤니티와 유튜브의 역할 및 담론분석 연구 : FGI 인터뷰를 중심으로)

  • Lim, Han Sol;Jung, Chang Won
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.10
    • /
    • pp.615-629
    • /
    • 2020
  • Conducting Focus Group Interview (FGI), this study examined the roles and discourses of cryptocurrency's online communities and media (legacy media and YouTube), and based on this, the study proposed the direction of cryptocurrency policy. By reviewing previous literature, this study analyzed the characteristics of investors, the online community, and YouTube, which is an investment environment factor. The study figured out the purpose of use and role of the community via interviews with cryptocurrency professional investors and online community members and analyzed main discussion themes of the five top-ranked YouTube channels related to cryptocurrency with the highest number of subscribers. The results suggested that cryptocurrency's investment was led by those who are in their 20s and 30s, the investors preferred and trusted information on new media than legacy media. The online community played the role of emotional homogeneity and empathy, and YouTube mainly performed the informational role. As a result of discourse analysis and interviews, this study argued that the legal stability of cryptocurrency's policy and protection of individual investors are needed. This study's significance indicates that it used various research methods such as literature research, interviews, content analysis of community/YouTube to analyze the informational role and emotional aspects of new media and suggested policy direction of the digital new deal blockchain technology and the fairness of financial industry.

Encryption Method Based on Chaos Map for Protection of Digital Video (디지털 비디오 보호를 위한 카오스 사상 기반의 암호화 방법)

  • Yun, Byung-Choon;Kim, Deok-Hwan
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.1
    • /
    • pp.29-38
    • /
    • 2012
  • Due to the rapid development of network environment and wireless communication technology, the distribution of digital video has made easily and the importance of the protection for digital video has been increased. This paper proposes the digital video encryption system based on multiple chaos maps for MPEG-2 video encoding process. The proposed method generates secret hash key of having 128-bit characteristics from hash chain using Tent map as a basic block and generates $8{\times}8$ lattice cipher by applying this hash key to Logistic map and Henon map. The method can reduce the encryption overhead by doing selective XOR operations between $8{\times}8$ lattice cipher and some coefficient of low frequency in DCT block and it provides simple and randomness characteristic because it uses the architecture of combining chaos maps. Experimental results show that PSNR of the proposed method is less than or equal to 12 dB with respect to encrypted video, the time change ratio, compression ratio of the proposed method are 2%, 0.4%, respectively so that it provides good performance in visual security and can be applied in real time.

Real-time Natural Disaster Failure Analysis Information System Development using GIS Environment (GIS환경의 실시간 자연재해정보를 연계한 재해고장분석시스템 개발)

  • Ahn, Yeon-S.
    • Journal of Digital Contents Society
    • /
    • v.10 no.4
    • /
    • pp.639-648
    • /
    • 2009
  • Earth's environment issues are introduced recently and every year the social loss have been occurred by the impact of various disaster. This kind of disaster and weather problems are the increasing reason of electricity transmission network equipment's failures because of exposing by the natural environment. The emergency and abnormal status of electricity equipment make the power outage of manufacturing plant and discomfort of people's lives. So, to protect the electricity equipment from the natural disasters and to supply the power to customer as stable, the supporting systems are required. In this paper, the research results are described the development process and the outcomes of the real-time natural disaster failure analysis information system including the describing about the impact of disaster and weather change, making the natural weather information, and linking the realtime monitoring system. As of development process, according to application development methodology, techniques are enumerated including the real time interface with related systems, the analysing the geographic information on the digital map using GIS application technology to extract the malfunction equipment potentially and to manage the equipments efficiently. Through this system makes remarkable performance it minimize the failures of the equipments, the increasing the efficiency of the equipment operation, the support of scientific information related on the mid-term enhancement plan, the savings on equipment investment, the quality upgrading of electricity supply, and the various supports in the field.

  • PDF

Digital Video Source Identification Using Sensor Pattern Noise with Morphology Filtering (모폴로지 필터링 기반 센서 패턴 노이즈를 이용한 디지털 동영상 획득 장치 판별 기술)

  • Lee, Sang-Hyeong;Kim, Dong-Hyun;Oh, Tae-Woo;Kim, Ki-Bom;Lee, Hae-Yeoun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.1
    • /
    • pp.15-22
    • /
    • 2017
  • With the advance of Internet Technology, various social network services are created and used by users. Especially, the use of smart devices makes that multimedia contents can be used and distributed on social network services. However, since the crime rate also is increased by users with illegal purposes, there are needs to protect contents and block illegal usage of contents with multimedia forensics. In this paper, we propose a multimedia forensic technique which is identifying the video source. First, the scheme to acquire the sensor pattern noise (SPN) using morphology filtering is presented, which comes from the imperfection of photon detector. Using this scheme, the SPN of reference videos from the reference device is estimated and the SPN of an unknown video is estimated. Then, the similarity between two SPNs is measured to identify whether the unknown video is acquired using the reference device. For the performance analysis of the proposed technique, 30 devices including DSLR camera, compact camera, camcorder, action cam and smart phone are tested and quantitatively analyzed. Based on the results, the proposed technique can achieve the 96% accuracy in identification.

Watermarking for Digital Hologram by a Deep Neural Network and its Training Considering the Hologram Data Characteristics (딥 뉴럴 네트워크에 의한 디지털 홀로그램의 워터마킹 및 홀로그램 데이터 특성을 고려한 학습)

  • Lee, Juwon;Lee, Jae-Eun;Seo, Young-Ho;Kim, Dong-Wook
    • Journal of Broadcast Engineering
    • /
    • v.26 no.3
    • /
    • pp.296-307
    • /
    • 2021
  • A digital hologram (DH) is an ultra-high value-added video content that includes 3D information in 2D data. Therefore, its intellectual property rights must be protected for its distribution. For this, this paper proposes a watermarking method of DH using a deep neural network. This method is a watermark (WM) invisibility, attack robustness, and blind watermarking method that does not use host information in WM extraction. The proposed network consists of four sub-networks: pre-processing for each of the host and WM, WM embedding watermark, and WM extracting watermark. This network expand the WM data to the host instead of shrinking host data to WM and concatenate it to the host to insert the WM by considering the characteristics of a DH having a strong high frequency component. In addition, in the training of this network, the difference in performance according to the data distribution property of DH is identified, and a method of selecting a training data set with the best performance in all types of DH is presented. The proposed method is tested for various types and strengths of attacks to show its performance. It also shows that this method has high practicality as it operates independently of the resolution of the host DH and WM data.

A Study on the Recognition and Acceptance of Metaverse in the Entertainment Industry : Focusing on the Case of K-pop Idol 'aespa' Fandom (엔터테인먼트 영역에서의 메타버스 인식과 수용방식 연구 : 에스파(aespa) 팬덤 사례를 중심으로)

  • Kim, Soo-Hyun;Yoo, Ji-Yun
    • Journal of Korea Entertainment Industry Association
    • /
    • v.15 no.7
    • /
    • pp.1-15
    • /
    • 2021
  • With the prolonged COVID-19 pandemic situation, the attention on Metaverse has been soared throughout media and publications. Recently the entertainment industry is also changing to actively utilize the virtual world with artists working through Metaverse platforms. With the recent high interests on Metaverse, this study attempts to illuminate how the public perceives and accepts Metaverse experiences. While research on Metaverse has been mainly focused on specific technologies or technical objects, this study focuses on exploring how fans recognize and understand the concept of Metaverse through newly debuted idol group 'aespa', composing of 4 human members and 4 AI avatar members that integrate real and virtual world. For this, this study seeks to analyze the reaction and recognition of fans by exploring online community 'DC Inside'. As a result of analyzing the reactions of fans in the early days of aespa's debut, the perspectives of understanding AI members of aespa are categorized into three groups: first, the type of equating and accepting the real and the virtual world; second, the type of recognizing the real world and the virtual world separately and recognizing the virtual member as an avatar or concept, not a genuine member; and finally, a type of recognizing virtual worlds separately from reality. Based on these results, the implications that Metaverse contents may have in the entertainment industry are suggested.

A Study on the Research Trends in the Fourth Industrial Revolution in Korea Using Topic Modeling (토픽모델링을 활용한 4차 산업혁명 분야의 국내 연구 동향 분석)

  • Gi Young Kim;Dong-Jo Noh
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.34 no.4
    • /
    • pp.207-234
    • /
    • 2023
  • Since the advent of the Fourth Industrial Revolution, related studies have been conducted in various fields including industrial fields. In this study, to analyze domestic research trends on the Fourth Industrial Revolution, a keyword analysis and topic modeling analysis based on the LDA algorithm were conducted on 2,115 papers included in the KCI from January 2016 to August 2023. As a result of this study, first, the journals in which more than 30 academic papers related to the Fourth Industrial Revolution were published were digital convergence research, humanities society 21, e-business research, and learner-centered subject education research. Second, as a result of the topic modeling analysis, seven topics were selected: "human and artificial intelligence," "data and personal information management," "curriculum change and innovation," "corporate change and innovation," "education change and jobs," "culture and arts and content," and "information and corporate policies and responses." Third, common research topics related to the Fourth Industrial Revolution are "change in the curriculum," "human and artificial intelligence," and "culture arts and content," and common keywords include "company," "information," "protection," "smart," and "system." Fourth, in the first half of the research period (2016-2019), topics in the field of education appeared at the top, but in the second half (2020-2023), topics related to corporate, smart, digital, and service innovation appeared at the top. Fifth, research topics tended to become more specific or subdivided in the second half of the study. This trend is interpreted as a result of socioeconomic changes that occur as core technologies in the fourth industrial revolution are applied and utilized in various industrial fields after the corona pandemic. The results of this study are expected to provide useful information for identifying research trends in the field of the Fourth Industrial Revolution, establishing strategies, and subsequent research.

Analyzing the Factors Affecting the Successful Deployment of the Open Source Based Institutional Repositories (오픈액세스기반 기관리포지터리 성공에 미치는 요인 분석)

  • Hwang, Hye-Kyong;Lee, Jee-Yeon
    • Journal of the Korean Society for information Management
    • /
    • v.26 no.4
    • /
    • pp.35-58
    • /
    • 2009
  • One of the main goals of providing open access is to vitalize the exchange of academic information by allowing access to the scholarly research outputs for everyone without the legal, financial, and technical barriers. We regard the use of the institutional repository as an open access enabler. In this study, we tried to make the factors, which enable the successful deployment of the institutional repository, explicit. We utilized literature review and case studies to generate the potential success factors for the institutional repository deployment. We verified the factors by having in-depth interviews with the subject matter experts. The resulting factors were organized as organizational, political, and technical ones. The organizational factors included the strong open access support by the organization heads. Under the policy factors, a number of issues such as selection of the core contents, minimum quality control, protection of the copyrights, forming supporting groups through active advertising, long-term preservation, incentive, and mandate, were included. The technical factors included easy submission, support for interoperability, and support for the publication activities.

High-Capacity Reversible Watermarking through Predicted Error Expansion and Error Estimation Compensation (추정 오차 확장 및 오류 예측 보정을 통한 고용량 가역 워터마킹)

  • Lee, Hae-Yeoun;Kim, Kyung-Su
    • The KIPS Transactions:PartB
    • /
    • v.17B no.4
    • /
    • pp.275-286
    • /
    • 2010
  • Reversible watermarking which can preserve the original quality of the digital contents and protect the copyright has been studied actively. Especially, in medical, military, and art fields, the need for reversible watermarking is increasing. This paper proposes a high-capacity reversible watermarking through predicted error expansion and error estimation compensation. Watermark is embedded by expanding the difference histogram between the original value and the predicted value. Differently from previous methods calculating the difference between adjacent pixels, the presented method calculates the difference between the original value and the predicted value, and that increases the number of the histogram value, where the watermark is embedded. As a result, the high capacity is achieved. The inserted watermark is extracted by restoring the histogram between the original value and the predicted value. To prove the performance, the presented algorithm is compared with other previous methods on various test images. The result supports that the presented algorithm has a perfect reversibility, a high image quality, and a high capacity.