• Title/Summary/Keyword: 불법 다운로드

Search Result 41, Processing Time 0.029 seconds

An Automated Technique for Illegal Site Detection using the Sequence of HTML Tags (HTML 태그 순서를 이용한 불법 사이트 탐지 자동화 기술)

  • Lee, Kiryong;Lee, Heejo
    • Journal of KIISE
    • /
    • v.43 no.10
    • /
    • pp.1173-1178
    • /
    • 2016
  • Since the introduction of BitTorrent protocol in 2001, everything can be downloaded through file sharing, including music, movies and software. As a result, the copyright holder suffers from illegal sharing of copyright content. In order to solve this problem, countries have enacted illegal share related law; and internet service providers block pirate sites. However, illegal sites such as pirate bay easily reopen the site by changing the domain name. Thus, we propose a technique to easily detect pirate sites that are reopened. This automated technique collects the domain names using the google search engine, and measures similarity using Longest Common Subsequence (LCS) algorithm by comparing the tag structure of the source web page and reopened web page. For evaluation, we colledted 2,383 domains from google search. Experimental results indicated detection of a total of 44 pirate sites for collected domains when applying LCS algorithm. In addition, this technique detected 23 pirate sites for 805 domains when applied to foreign pirate sites. This experiment facilitated easy detection of the reopened pirate sites using an automated detection system.

Design and Implementation of Secure DRM System for Contents Streaming (컨텐츠 스트리밍을 위한 안전한 DRM 시스템 설계 및 구현)

  • 이진흥;김태정;박지환
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.177-186
    • /
    • 2003
  • DRM(Digital Rights Management) is a technology that manages secure distributions and copyrights of digital contents on the Internet. It is general giving the rights to use the encrypted contents that are downloaded by a simple authorization process in the existing DRM system. Once this is done you are allowed to access. In this paper, we use RTP(Real-time Transport Protocol) for end-to-end real-time data transmission. And the system is designed to make it Possible to Protect copyrights and to distribute contents with safety through periodic authentication. We implemented DRM system to stand this basis. The proposed system vests only authorized users with authority to access the license. Hence it prevents contents to be distributed and copied illegally on networks.

A Study an Effective Copyright Protection Method for Webtoons (효과적인 웹툰 저작권 보호 방법에 관한 연구)

  • Yoon, Hee-Don;Cho, Seong-Hwan
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.1
    • /
    • pp.106-112
    • /
    • 2019
  • The Korea Copyright Commission has pursued copyright technology R&D projects to prevent illegal copying of comics and Webtoons. We developed a feature-based scanned comic filtering technology in order to apply technical measures to specific types of online service providers. We also developed technologies in order to monitor and identify illegally distributed comics on webhard sites and to monitor and identify illegally distributed webtoons. Even though all comic books posted on webhard sites are illegal, it is no trouble to download and access popular comics by accessing websites in foreign countries. Even under these circumstances, the comic and webtoon copyright protection technologies developed over the past six years have been used at all. In this paper, we examine what the problems are and find solutions to propose a copyright protection method for webtoons.

Smartcard Authentication for IPTV Contents Protection (IPTV의 콘텐츠 보호를 위한 스마트카드 인증시스템)

  • Hwang, Jin-Wook;Kim, Sun-Jae;Oh, Hae-Seok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.699-700
    • /
    • 2009
  • IPTV(Internet protocol TV)가 상용화되고 가입자 수가 증가하면서 제공하는 콘텐츠의 양이 많아지고 많은 정보를 얻게 되었다. 이러한 많은 콘텐츠의 저작권을 보호하기 위해 수신제한시스템(Conditinal Access System, CAS)과 DRM(Digital Right Management) 기술이 사용되고 있다. 하지만 나날이 발전하는 개인정보의 유출과 해킹을 통한 불법 다운로드, 복제에서 저작권이 위협을 받고 있다. 따라서 현재 서비스 제공자들은 콘텐츠의 저작권을 보호하기 위한 많은 연구들이 진행되고 있다. 본 논문에서는 IPTV에서의 스마트카드를 이용한 인증체계 시스템을 제시하여 기존의 보안시스템보다 더 강화된 보안을 구축 할 수 있다.

Automatic Contents Tracking on Closed-type OSP for Copyright Protection (저작권 보호를 위한 폐쇄형 OSP 콘텐츠 자동 검색 방법)

  • Park, Kyoung-Soo;Kim, Won-Gyum;Kim, Sang-Jin;Yu, Won-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.1449-1452
    • /
    • 2011
  • 본 논문에서는 디지털 콘텐츠의 저작권 보호를 위해 인터넷상의 웹하드나 P2P와 같은 폐쇄형 OSP(Online Service Provider)에서 불법으로 유통되고 있는 콘텐츠를 자동으로 검색하고 다운로드 하는 방법을 제안한다. OSP의 웹 페이지를 파싱(Parsing)하여 태그(Tag)와 유일한(Unique)한 속성 정보를 이용하여 필요로 하는 콘텐츠의 게시 정보를 얻거나 액션을 취해 웹 페이지를 제어한다. 또한, IE(Internet Explorer) 이벤트(Event) 함수에 포함되는 URL 정보를 이용하여 각 제어 단계의 성공 여부를 판단한다. 윈도우 기반 어플리케이션은 해당 윈도우의 컨트롤ID 및 기타 윈도우 속성 정보를 이용하여 제어한다.

The present and prospect of Online Video, Music service and Media Usage (온라인 동영상, 음악서비스 및 미디어 이용 현황과 전망 - 20대 대학생을 중심으로)

  • Kim, Sun-Jin
    • Journal of Digital Contents Society
    • /
    • v.16 no.1
    • /
    • pp.137-144
    • /
    • 2015
  • This study tried to anticipate the near future changes of domestic online video, music service and media usage through the status quo. The research group was focused on the twenties, University students because they are the active media contents users. It surveyed the students in Busan, and used the method of descriptive statistics analysis for the understanding of the present state and near future prospect. This study shows that almost half of them use both services, and three people out of ten are the heavy users who use the services for over 3 hours a week. The streaming method is higher proportion than download method in using type. They are getting accustomed to pay contents cost, but it couldn't be said the paying content cost has been established. Preferred contents genre appears to be the RMC(Ready Made Contents) such as existing broadcaster contents and movies. Notable result on media usage was the proportion of the so-called 'Zero-TV'. It was 32%, significantly higher than the proportion of the total population(4.4%). Integrating the analysis results, we can expect that the usage pattern will be changed gradually, thus the advent of various revenue models will emerge.

Design on Protection and Authentication System of IPTV Contents using HSI Watermark (HSI 워터마크를 이용한 IPTV 콘텐츠 보호 및 인증 시스템 설계)

  • Kim, Dae-Jin;Choi, Hong-Sub
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.7
    • /
    • pp.55-62
    • /
    • 2010
  • While the broadband network and multimedia technologies have been developing, the commercial market of digital contents also has been widely spreading with recently starting IPTV. As the IPTV services are getting to be generalized and popularized, the contents illicit copying and distribution of copyright meterials tends to draw more attentions. So we need a right service system that can protect contents and copyright using watermark inserting. Until now, the conventional protection and authentication system is taking advantages of merits both in CAS and DRM. But this system can not protect the contents when acquiring them from TV output using A/D convertor. So we apply watermark method using HSI color space against contents illicit copying. And for distribution of copyright materials. we compound unique settop ID and copyrighter's ID to make new ID that is watermark. When inserting watermark, we use the watermark for copyright protection and authentication. So we can protect copyright and identify last settop's user in illicit distribution. we design download based IPTV contents protection and authentication system using HSI watermark method.

Design of Efficient Adult Authentication Model for prevent of illegal Service of Child in IPTV Service Environment (IPTV 서비스를 이용하는 사용자의 효율적인 성인인증 모델 설계)

  • Jeong, Yoon-Su;Kim, Yong-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.1
    • /
    • pp.68-75
    • /
    • 2013
  • Recently IPTV that transmits multimedia contents in real time through internet, cable TV net and satelite net gets the limelight. But IPTV service that gives service to users by various media has a problem of not supporting user certification fully. This paper suggests a certification model which prevents getting access permission of IPTV service by sending illegal certification information by adolescent through integrating mobile communication technique with RFID(Radio Frequency IDentification) technique which is a key technique of Ubiquitous environment. This model performs the process of adult certification by keeping synchronization with user's certificaiton information that is saved in data-base of certification server and contents server after getting the system of class categorization in contents server to overcome disadvantage of simple adult certification system that is popular in the existing internet. Also, it adapts double hash chain technique not to down load illegally contents without the permission of manager even if an adolescent gets manager's approval key.

A Study on Multi-Media Contents Security Using Android Phone for Safety Distribution (멀티미디어 콘텐츠의 안전한 유통을 위한 안드로이드 폰에 기반을 둔 보안에 관한 연구)

  • Shin, Seung-Soo;Kim, Yong-Young
    • Journal of Digital Convergence
    • /
    • v.10 no.6
    • /
    • pp.231-239
    • /
    • 2012
  • This paper tries to solve the problems which previous methods have such as the WCDRM(Watermark and Cryptography DRM) and the model using smart card for protecting digital contents. This study provides a contents distribution model to protect the rights of author, distributor, and user as well as user's information by using technologies such as cryptography, DRM(Digital Right Management), access control, etc. The proposed system is evaluated as the most safety model compared with previous methods because it not only solves the problems which the previous methods have, but also protects four type of risks such as use of contents which other mobile devices download, the attack on the key to decode the message, the attack on leaking the contents, and the internal attack such as an illegal reproduction.

Design and Implementation of Relay File for Superdistribution of the Streaming Contents (스트리밍 콘텐츠의 초유통을 위한 중계파일 설계 및 구현)

  • Kim, Tae-Min;Yang, Young-Kyu
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.7
    • /
    • pp.979-988
    • /
    • 2009
  • Illegal reproductions and subsequent copyright infringement have curtailed development of digital content industry. Many DRM systems have been developed and utilized for this purpose. However, current DRM system allow only authorized user to access the contents, and as such, redistribution to other user without getting license again entails cumbersome process. Currently, super-distribution system which can be used for redistribution of downloaded contents in more streamlined fashion is being widely conducted. But for streaming type content, it is still very difficult to redistribute with super-distribution system because the client must directly connect to streaming server to access the content. Accordingly, a new DRM streaming service structure is required to allow streamed contents to be redistributed as easily as the downloaded contents. In this paper, we proposed the relay file structure that can connect the streaming server and the user for super-distribution of the streaming contents.

  • PDF