• Title/Summary/Keyword: 방송허가

Search Result 41, Processing Time 0.026 seconds

VR 규제의 현황과 개선 방향 - VR 콘텐츠 규제를 중심으로 -

  • Lee, Seung-Min
    • Broadcasting and Media Magazine
    • /
    • v.24 no.3
    • /
    • pp.100-113
    • /
    • 2019
  • VR 기술 및 활용에 대한 다양한 연구와 장밋빛 전망에도 불구하고, 현재 우리 법 제도는 VR 산업 활성화의 걸림돌이 되는 규제들을 완전히 제거하지 못한 상태이다. 특히, 의료 및 게임 분야에서 VR 콘텐츠의 특수성을 고려한 맞춤형 규제설계가 필요하다. 먼저, 현행 규제상 의료용 VR 콘텐츠 및 소프트웨어는 의료기기 수입 제조허가와 신의료기술평가를 모두 거쳐야 하는데, 특히 신의료기술평가의 경우에는 의료용 VR 콘텐츠 및 소프트웨어에 대한 대비가 충분하지 않아 이의 활용에 상당한 장애가 될 수 있다. 그러므로 정부가 가이드라인 등 적절한 해석기준을 통해 의료기기의 범위를 불필요하게 확대하지 않도록 하고, 아울러 신의료기술평가에 있어 '선 진입, 후 평가' 제도를 활용할 수 있도록 개선이 요구된다. 다음으로, 게임의 경우에는 현행 게임산업법상 게임물의 정의가 너무 광범위하여 양방향성이 있는 VR 콘텐츠들이 게임물로 분류되어 불필요한 규제를 받을 가능성이 있으며, 여기에 더하여 최근 세계보건기구에서 '게임 이용 장애'를 국제질병분류에 포함시킴으로써 추가 규제에 대한 우려까지 더해지고 있다. 이러한 문제점을 해결하기 위해서는 법제처가 최근 발표한 "적극행정 법제 가이드라인"의 취지에 맞게 정부가 게임물 규제의 범위를 적극적으로 축소 해석하거나, 이러한 규제의 예외를 정하는 고시 또는 가이드라인을 제정할 필요가 있다. 또한, 현재 시행 중인 'ICT 규제 샌드박스' 제도를 잘 활용하고, 이와 별도로 국제질병분류의 국내 수용에 대해서도 보다 신중하게 접근할 필요가 있을 것이다.

A Study on Power Saving Effect Through Introduction of AM Radio High Efficient Transmission System (AM 라디오 고효율전송의 전력 절감 효과 분석)

  • Lee, SangWoon
    • Journal of Broadcast Engineering
    • /
    • v.24 no.4
    • /
    • pp.670-675
    • /
    • 2019
  • AM radio broadcasting has the advantage that the sound quality is lower than that of FM radio but the service area is wide and at night it can be transmitted even to overseas due to ionospheric reflection. AM radio broadcasts usually transmit large amounts of several tens to several hundreds of kilowatts (KW), requiring a lot of power, which is a financial burden on broadcasters. Recently, it is required to introduce a way to reduce the power of AM radio broadcasting in Korea. Therefore, it is possible to save a certain amount of power compared to the conventional AM radio broadcasting, and it is possible to maintain the existing license service area and sound quality, and what policies are needed to introduce the technology. In this paper, we predict the reduction of transmission power when a high efficiency transmission system is applied to existing AM radio broadcasting transmission system. As a result of the research, AMC adopting the high efficiency transmission method instead of the conventional AM radio transmission method, and when the modulation ratio of AM radio is 70%, if -3 dB companding is applied, the annual transmission power charge is decreased from 5,185,838,160Won to 3,528,900,086Won with saving of 32.0%, When -6 dB companding is applied, it is expected to be reduced to 2,608,378,934Won, which is 49.7% savings.

Media Convergence, IPTV Policy and Market (미디어 융합과 IPTV 정책 및 시장 동향)

  • Go, Sun-Ju;Park, Yeong-Jun
    • Electronics and Telecommunications Trends
    • /
    • v.23 no.2 s.110
    • /
    • pp.98-107
    • /
    • 2008
  • 2007년 12월 28일 ‘인터넷멀티미디어방송사업법(안)’이 국회 본회의를 통과함으로써 2008년 4월 18일 동법이 효력을 발휘하게 되었다. IPTV 상용화를 위한 기본 틀이 정해짐에 따라 시행령과 허가지침 등의 제정을 통해 2008년 6월경에는 본격적인 IPTV 서비스가 제공될 것으로 보인다. 미디어 규제정책이나 IPTV의 성장에 비해 시장에서 뒤늦게 출발하기는 하였지만 IPTV를 시작으로 하는 우리나라 미디어 융합 시장은 크게 발전할 것으로 전망된다. 분석결과에 따르면, 낙관적인 관점에서 볼 때 2008년부터 2012년까지 IPTV 가입자는 496만 가구, 매출액은 1조 2,876억 원, 생산유발효과는 10조 1,750억 원, 고용효과는 5만 6천 여 명이 될 것으로 보인다. 지금까지는 IPTV가 미디어 융합을 주도하였지만, 향후에는 보다 새로운 서비스가 미디어 융합을 촉진.발전시킬 것이다. 4G와 NGN 기반의 신규서비스, Web 2.0 TV 기반의 창의적인 비즈니스 모델, 임베디드 미디어 서비스 등 향후 나타나게 될 새로운 미디어 서비스의 발전을 위해 미래지향적인 미디어 정책과 규제프레임을 갖추어 나가는 것이 무엇보다 중요한 시점이 되고 있다.

Implementation of real-time encryption for forgery protection of surveillance camera (감시 카메라 영상의 보호를 위한 실시간 암호화 구현)

  • Lee, Seong-Yeon;Kim, Jong-Nam
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.793-796
    • /
    • 2009
  • 감시 카메라는 보안, 감시 등의 목적으로 자주 사용된다. 최근의 감시 카메라는 자체적으로 인코딩 작업을 통해 H.264 영상을 생성하여 보내주기도 하는데, H.264는 높은 압축률으로 폭넓게 사용되는 인코딩 방법이다. 감시카메라는 주로 보안을 위해 사용하므로 위/변조에 강해야 하고 허가받지 않은 사용자가 봐서는 안된다. 대개의 멀티미디어 콘텐츠의 경우 별도의 보안 장치를 설정하기 힘들어 보호에 취약한 면이 있다. 본 논문에서는 이러한 피해를 줄이기 위하여 감시카메라 영상을 암호화 알고리즘을 이용하여 일부 또는 전부를 암호화하는 방법을 구현하였다. 감시카메라로 녹화된 영상을 H.264로 인코딩한 뒤 콘텐츠의 특성을 이용하여 암호화를 부분적으로 혹은 전체를 적용하면 암호화된 콘텐츠를 얻을 수 있다. 본 논문에서 제안하는 내용은 최근 많이 사용되는 감시 카메라 영상의 보호 뿐 아니라 그 외 DMB, 지상파 방송 등의 보편적 서비스에도 적용이 가능하다.

  • PDF

A Longitudinal Study on the Supply & Demand-side Diversity of Digital Media : TV Channel & VOD Data of 2012-2017 (디지털미디어 콘텐츠 공급과 수요측면의 다양성 구현 종단 연구: 2012-2017년의 TV채널과 VOD 데이터를 중심으로)

  • Lee, Sang-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.8
    • /
    • pp.137-144
    • /
    • 2019
  • This paper deals with the longitudinal study on the supply & demand-side diversity of digital media service. The purpose of this study is to measure the diversity of contents supply and demand-side of digital media platform providers by longitudinal data and discuss the implication. In the approval and re-authorization of pay-TV broadcasters, there were attempts to measure diversity indicators as items to evaluate the publicness and public interest of broadcasting, but they are mainly limited to the method of measuring diversity in the short-term supply side. Thus researcher wants to confirm the evaluation of two aspects through this study. First, researcher proposes a demand-side measurement methodology that utilizes actual audience data from users, and second, a longitudinal evaluation methodology that evaluates long-term trends of diversity change. Researcher has secured the actual supply and demand data of the platform player and confirmed trends of longitudinal diversification indexing for 50 months from 2012 to 2017. Through this research, researcher expects that the supply and demand-side and the longitudinal diversity evaluation will be utilized in a balanced way of publicness and public interest evaluation of broadcasting.

Performance of Cooperative NOMA Systems with Cognitive User Relay (상황인지 사용자 릴레이를 채택한 협동 NOMA 시스템의 성능)

  • Kim, Nam-Soo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.5
    • /
    • pp.69-75
    • /
    • 2018
  • Recently, Non-orthogonal multiple access (NOMA) has been focused for the next generation multiple access, which has more spectral efficiency under the limited spectrum bandwidth. Moreover, the spectrum efficiency can be improved by cognitive radio in which the unlicensed secondary users can access the spectrum that is used by the licensed primary user under the limited interference. Hence, we consider the combination of NOMA and cognitive radio, and derive the performance of the cognitive cooperative NOMA system. For the cooperation, a relay is selected among near users, and the selection combining is assumed at a far user. The outage probability of the selected relay and the far user is derived in closed-form, respectively. The provided numerical results are matched well with the Monte Carlo simulation. Numerical results showed that the performance of the relay is affected from the power allocation coefficient, the minimum outage probability is observed at 0.86 of the power allocation coefficient for far user under the given conditions. More than 15 dB of signal-to-noise ratio is required to meet the outage probability of $1{\times}10^{-13}$ for the far user with the frequency acquisition probability of 0.5 compared to that of 1. It shows that the performance of the far user is very sensitive to the acquisition probability of the cognitive relay.

Analysis on Security Vulnerabilities of a Password-based User Authentication Scheme for Hierarchical Wireless Sensor Networks (계층적 무선 센서 네트워크를 위한 패스워드 기반 사용자 인증 스킴의 보안 취약점 분석)

  • Joo, Young-Do
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.63-70
    • /
    • 2015
  • The numerous improved schemes of user authentication based on password have been proposed in order to prevent the data access from the unauthorized person. The importance of user authentication has been remarkably growing in the expanding application areas of wireless sensor networks. Recently, emerging wireless sensor networks possesses a hierarchy among the nodes which are divided into cluster heads and sensor nodes. Such hierarchical wireless sensor networks have more operational advantages by reducing the energy consumption and traffic load. In 2012, Das et al. proposed a user authentication scheme to be applicable for the hierarchical wireless sensor networks. Das et al. claimed that their scheme is effectively secure against the various security flaws. In this paper, author will prove that Das et al.'s scheme is still vulnerable to man-in-the-middle attack, password guessing/change attack and does not support mutual authentication between the user and the cluster heads.

A Study on Copyright Protection Method of Web Image Contents (웹 이미지 콘텐츠 저작권보호 방법에 관한 연구)

  • Yi, Yeong-Hun;Cho, Man-Gi;Cho, Seong-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.37-43
    • /
    • 2015
  • Technical treatments of image contents on the web include the copy protection method such as the image capture protection technology and the traitor tracing method to detect unauthorized duplications through watermarking insertion or feature information technology. However, these two methods have their own weaknesses. The image capture protection method is unable to protect illegal captures when the URLs of image sources are exposed. The traitor tracing method is fundamentally unable to protect illegal captures due to its post-treatment method. Besides, the weakness of using the copyright information display technology involves easy removal of copyright information from copyrighted contents. This paper suggests a model of the web image contents protection system which makes it hard to separate copyright information from web image contents and allows image contents to be shown only in the authorized websites.

Performance Analysis of Multiple Access for Secondary Users in The Spectrum Sensing Cognitive Radio (스펙트럼 감지 무선 인지 네트워크에서 이차 사용자들의 다중 접속 성능 분석)

  • Hong, Seung Geun;Lee, Jae Hong
    • Journal of Broadcast Engineering
    • /
    • v.21 no.1
    • /
    • pp.113-116
    • /
    • 2016
  • Cognitive radio network technology is that secondary (unlicensed) users use the spectrum of primary (licensed) users without interfering primary communication. In this paper, we propose multiple access scheme for a cognitive radio network, where multiple secondary users access spectrum of one primary user. We consider two types of multiple access scheme, one is p-persistent and one is non-persistent, and apply these two schemes in the secondary network. For each multiple access scheme, total throughput of secondary network is derived and verified by Monte Carlo simulation. Simulation results show that maximum total throughput of the secondary network is achieved when channel access probability or the number of maximum waiting frames is chosen appropriately.

On a Suitable Frequency consideration of 700MHz Band for the disaster radiocommunication followed with DTV frequency reallocation (700MHz대역 DTV용전환에 따른 재난무선통신용 주파수 분배의 정책적 접근방안에 관한 연구)

  • Moon, Hun-Il;Yu, Seung-Duk;Hong, Wan-Pyo
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.1
    • /
    • pp.54-61
    • /
    • 2009
  • In this paper, Switching to digital TV broadcasting and mobile operators license expiration period of the frequency, time and 700MHz, 800MHz and 900MHz frequency band plan for the redistribution is actively being discussed. Redistribution policy direction of these frequency 800MHz (bandwidth 10MHz) integrated command frequency for wireless networks(i.e TETRA) is expected to be considered a redistribution. These Integrated Wireless Network Infrastructure configurations at the time and data communication capabilities of the system unwilling TETRA Release 2 standard for the system is presented. This system is analyzed that Release 1 of the existing system takes up more than 6 times the increase of frequency bands. Therefore, integration of the frequency band assigned to the command of a wireless network with the introduction of advanced systems will not be able to do. In this paper to the digital TV transition, and the policy based on analysis of trends in the 700MHz band for the integration of wireless networks, provides policy direction for the allocation plan.

  • PDF