• Title/Summary/Keyword: 소프트웨어 저작권

Search Result 127, Processing Time 0.769 seconds

Cross-Language Clone Detection based on Common Token (공통 토큰에 기반한 서로 다른 언어의 유사성 검사)

  • Hong, Sung-Moon;Kim, Hyunha;Lee, Jaehyung;Park, Sungwoo;Mo, Ji-Hwan;Doh, Kyung-Goo
    • Journal of Software Assessment and Valuation
    • /
    • v.14 no.2
    • /
    • pp.35-44
    • /
    • 2018
  • Tools for detecting cross-language clones usually compare abstract-syntax-tree representations of source code, which lacks scalability. In order to compare large source code to a practical level, we need a similarity checking technique that works on a token level basis. In this paper, we define common tokens that represent all tokens commonly used in programming languages of different paradigms. Each source code of different language is then transformed into the list of common tokens that are compared. Experimental results using exEyes show that our proposed method using common tokens is effective in detecting cross-language clones.

Block-based Audio Authentication Algorithm using Reversible Watermarking (가역 워터마킹을 이용한 블록 단위 오디오 인증 알고리즘)

  • Yeo, Dong-Gyu;Jo, Hyun-Wu;Lee, Hae-Yeoun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.380-383
    • /
    • 2011
  • 데이터 은닉 기술은 디지털 콘텐츠에 기밀 정보를 비가시적으로 삽입하는 기술로서, 소유권 증명, 저작권 보호, 방송 모니터링, 콘텐츠 인증 등의 다양한 목적으로 활용되고 있다. 본 논문에서는 오디오 콘텐츠의 무결성을 인증하고 위조 영역을 탐지하기 위한 가역 워터마킹 기반의 블록 단위의 오디오 콘텐츠 인증 기법을 제안한다. 제안한 기법은 오디오를 작은 크기의 블록으로 나누고 각 블록 단위로 워터마크를 삽입하여 무결성 인증을 수행한다. 또한 차이값 히스토그램 기반 가역 워터마킹 알고리즘을 적용함으로써 높은 품질을 유지하면서도 완전한 원본으로의 복원을 가능케 하였다.

Development of a Korean Font Classification System for Images Based on Syllable-Level Text Recognition (글자 단위 텍스트 인식 기반의 이미지 내 한글 글꼴 분류 시스템 개발)

  • Sara Yu;Kim Yoon-Ju;Song Ji-Hyo;Ki Yong Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.718-721
    • /
    • 2023
  • 이미지 내 글꼴을 파악하는 것은 디자인 자료 제작, 저작권 확인 등 다양한 곳에서 중요한 문제이다. 하지만 이미지 내 한글 글꼴을 자동으로 식별하는 시스템은 아직 존재하지 않으며, 수동으로 한글 글꼴을 파악하는 것은 시간과 정확도 측면에서 매우 비효율적이다. 따라서 본 논문에서는 이미지 내 한글 글꼴을 자동으로 인식하는 시스템을 개발한다. 본 논문에서 개발한 시스템은 크게 두 가지 기법을 사용한다: (1) 한글의 기하학적인 특성을 활용하여 글자 단위로 텍스트를 인식하며, (2) 단어가 아닌 글자 단위로 글꼴을 분류하고 각 글자에 대한 글꼴 분류 결과를 종합하여 최종적인 글꼴 분류 결과를 얻는다. 10가지 한글 글꼴이 나타나는 직접 제작한 이미지를 사용하여 시스템의 성능을 평가한 결과 제안 방법은 비교 방법에 비해 더욱 정확히 한글 글꼴을 분류함을 확인하였다.

Realization of Package Software Inspection Service for Software Asset Management (소프트웨어 자산관리를 위한 패키지소프트웨어 점검서비스 구현)

  • Cha, Tea-Won;Ahn, Jae-Kyoung
    • The KIPS Transactions:PartD
    • /
    • v.16D no.1
    • /
    • pp.123-132
    • /
    • 2009
  • Even support-and-management efforts by government are enforced with the growing international restrictions for complying with global standard, not a few private enterprises are still suffering software management problems from lack of understanding the software asset management and carelessness of the software management. This is due to the ambiguous scope of software asset management as well as characteristics of software property such as invisibility, easiness of copy and installation. In other words, it is not easy for software managers to comply all the information throughout the software life cycle; from purchasing, procurement. distribution, preservation to disposition. Therefore, Inspector which has been developed for resolving these problems are proposed in this study. The inspection service consists of search algorithms adapted for software characteristics, standardization of software right management information, and practical use of registry information. Inspection time for a PC by using inspector make the inspection time much shorter. It is also shown that effective software management enables the enterprise to curtail software acquisition cost and to help rationalizing its business management.

Software Completeness Evaluation based on ISO/IEC9241.10 (ISO/IEC 9241.10 표준에 기초한 소프트웨어 완성도-하자 감정 기법 연구)

  • Kim, Do-Wan
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.2
    • /
    • pp.9-16
    • /
    • 2019
  • More than 25% of software copyright evaluations commissioned to the Korea Copyright Commission are software completeness-defective evaluations. Most of the existing software completeness-defective evaluation cases were made to ensure that the requirements contained in the contract or customer's desired requirements were implemented and able to run, limited to the functionality of the software. This paper proposes a more systematic and reasonable maturity-correction technique to meet software completeness definitions. The ISO / IEC 9241.10 standard is a design standard for improving software quality. The ISO / IEC 9241.10 standard specifies seven items that must be complied with and requires functional integrity for work and operational integrity for work efficiency. The software completeness-defective methodology presented in this paper complements the existing function's implementation-functioning methodology with completeness evaluation on the quality of software.

Security Container CRYPTEX Model for Copyright Management of Software Source Code (소프트웨어 소스코드의 저작권 관리를 위한 보안 컨테이너 크립텍스 모델)

  • Cha, Byung-Rae
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.5
    • /
    • pp.451-463
    • /
    • 2008
  • There are management and security of software source code equivalent to 10 assembly lines of important infrastructure in the early stage of information society directly. A support technology and framework to protect software source code are so poor state In this paper, the proposed model that is support protection and access control between software source code as object and subject that is not authenticated safely was named CRYPTEX model. And we propose active business model to provide delegate, mobile, and security/access control function for passive software source code in document state using CRYPTEX.

  • PDF

A Study on Analysis of Source Code for Program Protection in ICT Environment (ICT 환경에서 프로그램보호를 위한 소스코드 분석 사례 연구)

  • Lee, Seong-Hoon;Lee, Dong-Woo
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.4
    • /
    • pp.69-74
    • /
    • 2017
  • ICT(Information Communication Technology) is a key word in our society on today. Various support programs by the government have given many quantitative and qualitative changes to the software industries. Software is instructions(Computer Program) and data structure. Software can be divided into Application program and System program. Application programs have been developed to perform special functions or provide entertainment functions. Because of this rapid growth of software industries, one of the problems is issue on copyright of program. In this paper, we described an analysis method for program similarity based on source code in program.

Classifying Windows Executables using API-based Information and Machine Learning (API 정보와 기계학습을 통한 윈도우 실행파일 분류)

  • Cho, DaeHee;Lim, Kyeonghwan;Cho, Seong-je;Han, Sangchul;Hwang, Young-sup
    • Journal of KIISE
    • /
    • v.43 no.12
    • /
    • pp.1325-1333
    • /
    • 2016
  • Software classification has several applications such as copyright infringement detection, malware classification, and software automatic categorization in software repositories. It can be also employed by software filtering systems to prevent the transmission of illegal software. If illegal software is identified by measuring software similarity in software filtering systems, the average number of comparisons can be reduced by shrinking the search space. In this study, we focused on the classification of Windows executables using API call information and machine learning. We evaluated the classification performance of machine learning-based classifier according to the refinement method for API information and machine learning algorithm. The results showed that the classification success rate of SVM (Support Vector Machine) with PolyKernel was higher than other algorithms. Since the API call information can be extracted from binary executables and machine learning-based classifier can identify tampered executables, API call information and machine learning-based software classifiers are suitable for software filtering systems.

A Study on the Identification of Open Source License Compatibility Violations (오픈 소스 라이선스 양립성 위반 식별 기법 연구)

  • Lee, Dong-Gun;Seo, Yeong-Seok
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.7 no.12
    • /
    • pp.451-460
    • /
    • 2018
  • Open source software is used in various ways when developing new softwares all around the world. It requires rights and responsibilities as a form of an open source software license. Because the license is a contract between original software developers of the open source software and users, we must follow it and extremely cautious to avoid copyright infringement. In particular, we must verify license compatibility when we develop new software using the existing open source softwares. However, license violation issues always occur and lead to lawsuits so that they are having an adverse effect on the open source software ecosystem. Thus, in this paper, we propose a method, OSLC-Vid, to identify license violations whether compatibility issues exist between open source softwares. The proposed method is verified by the experiments to detect actual license violation cases.

Study on Procedure for Escrow Account to Resolve Controversy of Intellectual Property Right of Software for Rolling Stock (철도차량 Software 지적 재산권 분쟁 해결을 위한 Escrow Account 적용 절차에 대한 연구)

  • Park, Jun-Hyung;Cho, Chi-Hwan;Kang, Chan-Yong
    • Proceedings of the KSR Conference
    • /
    • 2008.06a
    • /
    • pp.1479-1485
    • /
    • 2008
  • This paper shows the result of study on the detailed applicable procedure of software Escrow account applied for rolling stock. The customer as end-user requires software source code, related critical technical documents etc. about software based system of train for maintenance purpose through software modification and enhancement after completion of warranty period. Otherwise, it is not easy to keep up with the customer's requirement of demanding supplier's exclusive information because it is considered as intellectual property rights of supplier as software developer. Therefore, the main contractor(normally called as Car-builder) need to introduce software Escrow service in order to coordinate the different a standpoint between software developer and end-user. Software Escrow is a legal arrangement in which an software Escrow packages (software source code, software development tool, build process, proprietary information, copyright and etc.) is deposited into and Escrow account under the trust of a reliable third party (Escrow agent) depending on mutual agreement on Escrow contract condition as signing off Escrow agreement document. This paper deals with the study on the detailed procedure about the following general category of Escrow procedure and purpose to apply this specific procedure of Escrow into the future project onward.

  • PDF