• Title/Summary/Keyword: 워터마크

Search Result 806, Processing Time 0.021 seconds

사례를 통해 본 독점금지법 vs 지적재산권

  • Son, Seung-U
    • Digital Contents
    • /
    • no.7 s.146
    • /
    • pp.110-113
    • /
    • 2005
  • MP3, DVD, P2P 등 디지털 매체기술의 발달은 디지털콘텐츠의 창작과 유통을 급속도로 증가시켰고 일반 공중은 다양한 창작물에 쉽게 접근할 수 있게 됐다. 반면 이러한 기술의 발전은 원본과 거의 차이가 없는 복제물을 쉽고 빠르게 비용을 들이지 않고 재생성하게 하였고, 또한 디지털콘텐츠는 한 번 전송되고 나면 그 침해를 막기가 거의 불가능하기 때문에 저작권자의 이익을 저해하는 사례가 점차로 증가되고 있다. 이에 저작권자들은 자신들이 창작한 저작물을 무단복제로부터 보호하기 위해 암호화기법, 디지털워터마크 등 기술적 조치(technological measures)를 개발해 저작물에 대한 접근을 제한하기 시작했다. 이러한 움직임과 더불어 접근제한시스템에 대한 법적 보호의 필요성이 제기됐고, 저작권자의 허락없이 기술적 보호조치를 무력화하거나 침해하는 행위를 금지하는 입법이 이뤄졌다. 그러나 기술적 보호조치를 보호하게 되면 전통적으로 인정해 온 저작물에 대한 일반인의 접근을 차단하게 되므로 저작권법의 근본적인 입법취지인 과학기술의 발전과 문화증진을 저해하게 될 것이라는 비판도 강력히 맞서고 있다. 이하에서는 기술적보호조치에 관한 사례들을 소개하고 기술적 보호조치의 개념, 관련 법률조항 및 주요 법적 쟁점 등을 중점적으로 살펴보도록 하겠다.

  • PDF

Medical Image Security Algorithm Implement using Wavelet (웨이블릿을 이용한 의료영상보안 알고리즘 구현)

  • Oh, Keun-Tak;Yoon, H.S.;Lee, S.T.
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10c
    • /
    • pp.601-605
    • /
    • 2006
  • 의료영상은 디지털이라는 속성으로 인해서 일상생활에 적용되는 저작권법으로 저작권을 보호한다는 것이 어렵다. 특히 의료 영상은 복사를 하면 또 하나의 원본이 생성되므로, 의료 영상 이미지를 생산해 내는 사람의 입장에서는 똑같은 원본을 자신도 모르는 사이에 다른 사람에게 전달하게 된다. 그렇게 되면 과연 누가 이 디지털 작품을 만들었는지에 대한 의료 분쟁이 생길 수밖에 없다. 디지털시대의 의료 환경에서 필수 불가결하게 제기될 수 있는 의료영상보안은 특히 우리나라처럼 의료보험의 부당 청구가 사회적인 큰 물의를 일으키고 있는 시점에서 많은 관심과 연구가 필요하다. 따라서 이 분야의 핵심적인 문제점을 도출하고, 문제점 개선을 위해서 워터 마크를 통해 영상 보안 기법을 제안하였다. 그러나 의료영상의 대표적인 특징인 무결성을 보장 받지 못해 법적인 인증에는 한계가 있음을 알 수 있었다.

  • PDF

A Study on Video Copy Detection Methods Using Representative Color Sequence for Protecting Copyrights (저작권 보호를 위한 대표 색상 시퀀스를 이용한 동영상 복사 검출 방법)

  • Choi, Min-Seok;Choi, Sung-Wook
    • Journal of Digital Convergence
    • /
    • v.10 no.5
    • /
    • pp.185-191
    • /
    • 2012
  • This study deals with the technical approach related to the protection of digital video contents copyright, which has currently become a major issue in the digital contents market. With the production and distribution of digital video contents rapidly increasing, various policies and technical approaches are being made in relation to the protection of intellectual property rights. The technical approach from a DRM (Digital Rights Management) perspective was made from various angles, but its limitations have also been exposed in terms of convenience and quality. In this study, rather than the existing encoding certification and watermark technologies, it introduces technical approaches from a content-based copy detection method, while suggesting a copy detection method using the representative color sequence. In particular, this study takes into consideration the distribution environment of the domestic video market and deals with the technical approach in a direction that can control the illegal distribution of high quality videos.

Loadbalancing for WDM Network using Dynamic Watermarks (WDM 네트워크에서 동적 워터마크 결정을 이용한 로드벨런싱)

  • Nahm, Jung-Joo;Kim, Sung-Chun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.2
    • /
    • pp.1-5
    • /
    • 2007
  • Wavelength-division multiplexed (WDM) networks are emerging to be the right choice for the future transport networks. In WDM networks, the optical layer provides circuit-switched lightpath services to the client layer such as IP, SONET and ATM. The set of lightpaths in the optical layer defines the virtual topology. Since the optical switches are reconfigurable, the virtual topology can be reconfigured in accordance with the changing traffic demand pattern at theclient layer in order to optimize the network performance. We present a new approach to the virtual topology reconfiguration and loadbalancing problem for wavelength-routed, optical wide-area networks under dynamic traffic demand. By utilizing the measured Internet backbone traffic characteristics, our approach follows the changes in traffic without assuming that the future traffic pattern is known. For the simulation traffic modeling, we collected the data from real backbone traffic. Experiments show that the standard deviation compared to previous technique is reduced.

A Study on Construction Plan for Character Archives (캐릭터 아카이브 구축 방안 연구)

  • Pyeon, Hyunchang;Rieh, Hae-young
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.29 no.2
    • /
    • pp.149-168
    • /
    • 2018
  • In modern society, the economic and cultural influence of characters is increasing day by day. However, there is no comprehensive records management system for characters in Korea. The purpose of this study is to identify the necessity of comprehensive character records management system and requirements for records producers and users, and suggest a construction plan for archives that reflects this idea. Related cases in domestic and overseas were identified and analyzed, survey was conducted of character designers and users participating in the '2017 Character Licensing Fair' in order to understand their needs on character archives, and it was followed by interviews of two character designers. From the implications of the related cases and the analysis results of the questionnaire survey and the interviews, plans for records collection, management, and services were suggested for constructing character archives. Specifically, preparation of collection policy, insertion of watermark to prevent pirating, online sales of characters, and one-stop service that can provide licensing for copyright protection and record utilization were suggested.

A Method of Enhancing Security of Internet Banking Service using Contents-Based CAPTCHA (콘텐츠 기반 캡차를 이용한 인터넷 뱅킹 서비스의 보안성 향상 기법)

  • Lee, Sang-Ho;Kim, Sung-Ho;Kang, Jeon-Il;Byun, Je-Sung;Nyang, Dea-Hun;Lee, Kyung-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.571-583
    • /
    • 2013
  • Internet banking service has a advantage that is unrestricted by time. If automated programs are able to attack Internet banking services, a number of accounts can be attacked at the same time and as a result, damage will be considerably increased. To cope with such attacks, two methods, VPS and MS watermark, were introduced by Arcot and MS respectively. The methods use text-based CAPTCHAs in the process of transfer approval to distinguish automated programs from legal human users. In this paper, we point out the security threats of the methods when those are applied to Internet banking services. Especially, we consider the attack that are performed by extract specific string from text-based CAPTCHAs and it's countermeasure. Also we suggest a method of enhancing security of internet banking services. Our method is based on contents-based CAPTCHAs that are consist of known transfer information between user and server.

How Protect Terrestrial Broadcast Contents? KBS' Systematic Strategy to Restrict Illegal Use (지상파 방송프로그램 어떻게 보호할 것인가? KBS의 방송프로그램 보호 전략)

  • Kim, Byung-Sun;Cho, In-Joon;Hahm, Sang-Jin;Lee, Keun-Sik
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2010.07a
    • /
    • pp.208-211
    • /
    • 2010
  • 2012년 지상파 방송은 아날로그 송출을 종료하고 디지털 방송으로 전환된다. 이렇게 전환되는 지상파 디지털 방송은 무료로 누구나 시청할 수 있는 보편적 서비스를 지향하기 때문에, 케이블TV, 위성TV, IPTV 등의 다른 매체와는 달리 기술적 보호조치 없이 방송되고 있다. 또한 DTV 방송프로그램은 원본과 똑같은 화질로 개인이 쉽게 저장할 수 있고 인터넷을 통하여 누구나 쉽게 접근이 가능하기 때문에, DTV 방송프로그램의 무단복제와 인터넷을 통한 불법재배포는 큰 문제점으로 대두되고 있다. 이러한 불법 대량배포는 방송프로그램의 저작권을 심각히 침해할 뿐만 아니라, 방송사의 고품질의 방송프로그램을 제작환경을 더욱 열악하게 만들고 있다. 또한 일반 사용자는 인식하지 못하는 사이에 인터넷을 통해 불법 콘텐츠를 사용하게 되는 악순환에 빠지게 된다. 이에 본 논문은 KBS에서 추진하고 있는 여러 콘텐츠 보호 기술들을 하나의 보호 고리로 연결하는 KBS 보호기술 체계를 소개하고자 한다. 이를 위하여 KBS는 아래의 3가지 보호 기술을 개발하여 체계적으로 연결하여 적용하고 있다. 첫째, 프로그램의 저작권과 배포 정보를 나타내는 프로그램 보호신호(PPI, Program Protection Information)와 워터마크를 방송 신호에 삽입하여 수신기에서의 프로그램 보호를 추진한다, 둘째, 인터넷 OSP(Online Service Provider)와의 제휴를 통하여 콘텐츠 필터링 기술을 도입하여 프로그램 불법 업로드, 다운로드를 방지한다. 셋째, KBS 저작물 인터넷 모니터링 시스템을 개발하여 인터넷 상의 불법 프로그램 배포정보를 획득하여 불법배포가 진행되는 사이트에 보호를 요청한다.

  • PDF

A Novel Copyright Protection for Digital Images Using Magnitude and Orientation of Edge (영상의 에지 크기와 각도를 이용한 정지영상 보호 기법)

  • Shin, Jin-Wook;Min, Byung-Jun;Yoon, Sook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.3C
    • /
    • pp.262-270
    • /
    • 2008
  • We propose a technique to protect digital images using the magnitude and orientation of their edges. The proposed technique uses the content-associated copyright message generated by combining the original copyright message with the magnitude and orientation of some edges of a digital image. It enables the distribution of the original copyright message without any distortion of original digital images by avoiding embedment of the original copyright message into images. In addition to the advantage in the image quality, it also has a relatively low computational complexity by using simple operations to generate the content-associated copyright message. To verify the proposed technique, we performed experiments on its robustness to the external attacks such as histogram equalization, median filtering, rotation, and cropping. Experimental results on restoring the copyright message from images distorted by attacks show that more than 90%, on the average, can be recovered.

A Verification of Intruder Trace-back Algorithm using Network Simulator (NS-2) (네트워크 시뮬레이터 도구를 이용한 침입자 역추적 알고리즘 검증)

  • Seo Dong-il;Kim Hwan-kuk;Lee Sang-ho
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.1
    • /
    • pp.1-11
    • /
    • 2005
  • Internet has become an essential part of our daily lives. Many of the day to day activities can already be carried out over Internet, and its convenience has greatly increased the number of Internet users. Hut as Internet gains its popularity, the illicit incidents over Internet has also proliferated. The intruder trace-back technology is the one that enables real time tracking the position of the hacker who attempts to invade the system through the various bypass routes. In this paper, the RTS algorithm which is the TCP connection trace-back system using the watermarking technology on Internet is proposed. Furthermore, the trace-bark elements are modeled by analyzing the Proposed trace-back algorithm, and the results of the simulation under the virtual topology network using ns-2, the network simulation tool are presented.

A Camera Image Authentication Using Image Information Copyright Signature for Mobile Device without Distortion (무왜곡 휴대용 단말기 영상정보 권한서명을 이용한 카메라 영상 인증)

  • Han, Chan-Ho;Moon, Kwang-Seok
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.15 no.2
    • /
    • pp.30-36
    • /
    • 2014
  • Quality and resolution of camera in mobile device is improved significantly. In this paper, we propose block-based information hide techniques without image distortion for mobile device to solve image degradation in conventional watermarking methods. Information of image is composed with text such as camera maker, model, date, time, etc. Each text is converted to $8{\times}8$ pixel blocks and is added to the bottom of image. Generally image including block based information for image authentication are compressed using JPEG in mobile device. The vertical line value in JPEG header is modified by original size of image sensor. This technique can hide the block based authentication information using general decoder. In the experimental results, JPEG file size is slightly increased within 0.1% for the proposed block based authentication information encoding. Finally proposed methods can be adopted for various embedded systems using medical image, smart phone and DSLR camera.