• Title/Summary/Keyword: 콘텐츠보호

Search Result 1,169, Processing Time 0.024 seconds

A Watermarking Scheme Based on k-means++ for Design Drawings (k-means++ 기반의 설계도면 워터마킹 기법)

  • Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.5
    • /
    • pp.57-70
    • /
    • 2009
  • A CAD design drawing based on vector data that is very important art work in industrial fields has been considered to content that the copyright protection is urgently needed. This paper presents a watermarking scheme based on k-means++ for CAD design drawing. One CAD design drawing consists of several layers and each layer consists of various geometric objects such as LINE, POLYLINE, CIRCLE, ARC, 3DFACE and POLYGON. POLYLINE with LINE, 3DFACE and ARC that are fundamental objects make up the majority in CAD design drawing. Therefore, the proposed scheme selects the target object with high distribution among POLYLINE, 3DFACE and ARC objects in CAD design drawing and then selects layers that include the most target object. Then we cluster the target objects in the selected layers by using k-means++ and embed the watermark into the geometric distribution of each group. The geometric distribution is the normalized length distribution in POLYLINE object, the normalized area distribution in 3DFACE object and the angle distribution in ARC object. Experimental results verified that the proposed scheme has the robustness against file format converting, layer attack as well as various geometric editing provided in CAD editing tools.

A Study for Hybrid Honeypot Systems (하이브리드 허니팟 시스템에 대한 연구)

  • Lee, Moon-Goo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.11
    • /
    • pp.127-133
    • /
    • 2014
  • In order to protect information asset from various malicious code, Honeypot system is implemented. Honeypot system is designed to elicit attacks so that internal system is not attacked or it is designed to collect malicious code information. However, existing honeypot system is designed for the purpose of collecting information, so it is designed to induce inflows of attackers positively by establishing disguised server or disguised client server and by providing disguised contents. In case of establishing disguised server, it should reinstall hardware in a cycle of one year because of frequent disk input and output. In case of establishing disguised client server, it has operating problem such as procuring professional labor force because it has a limit to automize the analysis of acquired information. To solve and supplement operating problem and previous problem of honeypot's hardware, this thesis suggested hybrid honeypot. Suggested hybrid honeypot has honeywall, analyzed server and combined console and it processes by categorizing attacking types into two types. It is designed that disguise (inducement) and false response (emulation) are connected to common switch area to operate high level interaction server, which is type 1 and low level interaction server, which is type 2. This hybrid honeypot operates low level honeypot and high level honeypot. Analysis server converts hacking types into hash value and separates it into correlation analysis algorithm and sends it to honeywall. Integrated monitoring console implements continuous monitoring, so it is expected that not only analyzing information about recent hacking method and attacking tool but also it provides effects of anticipative security response.

A Basic Study on the Establishment of the Viewing Environment and Interpretation·Presentation System According to the Cultural Heritage Type (문화유산 유형별 관람환경 및 해석·전달체계 조성에 관한 기초 연구)

  • Kim, Jong-Seung;Kim, Chang-Kyu;Hwang, Kyu-Man;Choi, Yong-Won;Kim, Kyu-Yeon
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.39 no.2
    • /
    • pp.39-49
    • /
    • 2021
  • This study was conducted to establish practical goals for the viewing environment and interpretation and delivery system of cultural heritage and to create an viewing environment according to the classification of cultural heritage types, and the conclusions reached are as follows. First, five goals were set based on the international basic principles of the cultural heritage viewing environment and interpretation and delivery system. Second, based on the set goals, cultural heritage was classified into the first type 'disappeared and hidden heritage', the second type 'stuffed memory heritage', and the third type 'living memory heritage'. Third, the directions for creating the viewing environment for each type of cultural heritage were suggested. The first type has to be able to properly convey cultural heritage to visitors through excavation and digital technology. The second type needs a plan to deliver tangible and intangible values by combining various digital technologies with actual cultural heritage. The third type should emphasize the role of local residents in effectively enjoying the tangible and intangible values ??that already exist. Fourth, it proposed comprehensive considerations in the establishment of the cultural heritage viewing environment and interpretation and delivery system. Based on dynamic and sustainable heritage management, cultural heritage viewing should be valuable, satisfying and enjoyable. In addition, local communities should be actively involved, and tourism and conservation activities should be able to benefit the community. Establishment of a viewing environment should protect and strengthen the authenticity of cultural heritage.

A Study on the Costumes for the Crown Prince Based on the Picture for School Entrance Ceremony in 1817 (1817년 효명세자 입학례의 왕세자 복식 고증)

  • Son, Yun Hye;Lee, Eun Joo
    • Korean Journal of Heritage: History & Science
    • /
    • v.46 no.1
    • /
    • pp.188-207
    • /
    • 2013
  • This study looks at the costumes for the crown prince based on the Hyomyeong of 1817, a collection of the National Research Institute of Cultural Heritage. The picture of School Entrance Ceremony of the Crown Prince (王世子入學圖) does not have the crown prince in the scene. However, it can be verified through literature that there are three different costumes for the ceremony. Chulgungui(出宮儀), the ceremony's first procedure, describes the departure of the prince crown from his residence toward Sungkyunkwan (成均館) with his escorting officials. The Crown Prince wears Seoyeonbok (書筵服) during this event. When the Crown Prince arrives at Sungkyunkwan, he participates in a series of ceremonies that consist of Jackhunui (酌獻儀), Wangbokui (往復儀), Supeiui (脩弊儀), and Ipackui (入學儀). At that time, he wears a confucian scholar's uniform. After returning from Sungkyunkwan, he attends Suhaui (受賀儀), the final procedure of the Crown Prince's School Entrance, at Simindang (詩敏堂) of Changgyong Palace(昌慶宮), At this time, the price crown wears Wonyukwanbok (遠遊冠服) as he is congratulated by royal family members and high ranking officials for his entrance to Sungkyunkwan in this ceremony. This point hereby concludes this study on the historical costumes for the prince crown based on the Hyomyeong Crown Prince's School Entrance in 1817.

Formulating Strategies from Consumer Opinion Analysis on AI Kids Phone using Text Mining (AI 키즈폰의 소비자리뷰 분석을 통한 제품개선 전략에 대한 연구)

  • Kim, Dohun;Cha, Kyungjin
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.2
    • /
    • pp.71-89
    • /
    • 2019
  • In order to come up with satisfying product and improvement, firms use traditional marketing research methods to obtain consumers' opinions and further try to reflect them. Recently, gathering data from consumer communication platforms like internet and SNS has become popular methods. Meanwhile, with the development of information technology, mobile companies are launching new digital products for children to protect them from harmful content and provide them with necessary functions and information. Among these digital products, Kids Phone, which is a wearable device with safe functions that enable parents to learn childern's location. Kids phone is relatively cheaper and simpler than smartphone but it is noted that there are several problems such as some useless functions and frequent breakdowns. This study analyzes the reviews of Kids phones from domestic mobile companies, identifies the characteristics, strengths and weaknesses of the products, proposes improvement methods strategies for devices and services through SNS consumer analysis. In order to do that customer review data from online shopping malls was gathered and was further analyzed through text mining methods such as TF/IDF, Sentiment Analysis, and network analysis. Customer review data was gathered through crawling Online shopping Mall and Naver Blog/$Caf\acute{e}$. Data analysis and visualization was done using 'R', 'Textom', and 'Python'. Such analysis allowed us to figure out main issues and recent trends regarding kids phones and to suggest possible service improvement strategies based on sentiment analysis.

A Study on Methods of Collecting Records for COVID-19 Archives (COVID-19 아카이브를 위한 기록 수집 방안 연구)

  • Sim, Jiyeon;Kim, Jihyun
    • The Korean Journal of Archival Studies
    • /
    • no.70
    • /
    • pp.189-243
    • /
    • 2021
  • COVID-19 Archives are some of the Disaster Archives. It is necessary to collect disaster records produced in real-time at the disaster scene rather than start collecting records after the disaster recovery. Therefore, this study summarized the definition and purpose of disaster archives to understand the current status of domestic and foreign COVID-19 archives and examined overseas disaster archive collection policies that can be referenced in establishing a COVID-19 archive collection policy. In addition, surveys and interviews were conducted on institutions that establish and operate related archives at home and abroad. As a result, record collection Improvement plans for the COVID-19 archive were proposed: Firstly, in terms of collection policy improvements, the essential elements identified in the survey were selected as additional collection policy elements. Secondly, diversification of participants' groups requires the introduction of clear definitions of collection targets, diversification of promotional methods such as recording record contents through collaboration with related departments, and improving copyright issues that limit record donation. Thirdly, participatory record collection methods with efficient questionnaires in participatory forms and privacy issues are proposed as improvement plans.

A study on the structural relationship between resource attraction, entertainment experience, love mark and attachment in tourist destination (관광목적지의 자원매력, 오락적 체험, 러브마크, 애착 간의 구조적 관계)

  • Seo, Gyeong-Do;Lee, Jung-Eun
    • Journal of Digital Convergence
    • /
    • v.20 no.5
    • /
    • pp.261-268
    • /
    • 2022
  • This study tried to understand the meaning of resource attraction, entertainment experience, love mark, and attachment of tourist destinations. A theoretical study was conducted on each research concept to achieve the proposed research purpose. Based on this, an empirical study was conducted after deriving a questionnaire based on this, and a non-face-to-face survey was conducted nationwide using population-proportional sampling. The empirical study was confirmed through the statistical programs SPSS25.0 and AMOS25.0. The resource attractiveness of the tourist destination had a positive (+) relationship with the influence on the tourists' experience. The relationship between the experience and the love mark had a positive (+) relationship. A positive (+) relationship was also formed in the relationship between experience and attachment. However, the relationship between love mark and attachment did not form a significant relationship.Because it reflects regional characteristics, it is a useful material for local culture and history, so protection, preservation, and active program development are required. is needed.

A Study on the Introduction of Library Services Based on Blockchain (블록체인 기반의 도서관 서비스 도입 및 활용방안에 관한 연구)

  • Ro, Ji-Yoon;Noh, Younghee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.33 no.1
    • /
    • pp.371-401
    • /
    • 2022
  • If the blockchain means storing information in a distributed environment that cannot be forged or altered, it is mentioned that this is similar to what librarians collect, preserve, and share authoritative information. In this way, this study examined blockchain technology as a way to collect and provide reliable information, increase work efficiency inside and outside the library, and strengthen cooperative networks. This study attempted to propose various ways to utilize blockchain technology in book relations based on literature surveys and case studies in other fields. To this end, this study first analyzed the field and cases of blockchain application to confirm the possibility and value of blockchain application in the library field, and proposed 12 ways to utilize it based on this. The utilization model was proposed by dividing it into operation and service sectors. In the operation sector, it is a digital identity-based user record storage and authentication function, transparent management and traceable monitoring function, voting-based personnel and recruitment system, blockchain governance-based network efficiency function, and blockchain-based next-generation device management and information integration function. The service sector includes improved book purchase and sharing efficiency due to simplification of intermediaries, digital content copyright protection and management functions, customized service provision based on customer behavior analysis, blockchain-based online learning platforms, sharing platforms, and P2P-based reliable information sharing platforms.

A Study on Improving Operating System of an Intangible Cultural Heritage by an Ecological Perspective (생태계적 방식에 의한 무형문화유산 체계 연구 - 자생력 강화방안을 중심으로 -)

  • Oh, Jung-Shim
    • Korean Journal of Heritage: History & Science
    • /
    • v.48 no.3
    • /
    • pp.30-45
    • /
    • 2015
  • The purpose of this study is to demonstrate that transmissions of an intangible cultural heritage in Korea may be cut off because it is separated from human and social environment and protected and managed under the national system. In addition, another purpose is to criticize concept and method dichotomy in the current institution from an ecological perspective and consider the problem that the intangible cultural heritages are transmitted mainly by holders having skills and accomplishments by distinguishing them from others. Furthermore, the last purpose is to suggest a direction of policy emphasizing an importance of establishment of environment which allows nurture, change and development of local people, which may ensure continuous transmission in order to solve the problem and a transmission system of the intangible cultural heritage by using a principle in which the system is operated by self-recovery and natural rule of the ecology. The findings of this study show that seven problems can be analyzed by reviewing concept establishment and protection and transmission measure of intangible cultural heritages according to the Cultural Properties Protection Law, based on the ecological perspective. The protection and transmission methods of the intangible cultural heritage through the cultural heritage ecology are suggested by applying ecological theory to it. The intangible cultural heritage ecology defined in this paper means 'a sustainable community consisting of intangible cultural heritage, subject of activity and physical environment.' Since it is operated according to the principle reflecting the rules and features of natural ecology, it can keep system through self-recovery without an external intervention, as the case of natural ecology.

A Study on Survey of Improvement of Non Face to Face Education focused on Professor of Disaster Management Field in COVID-19 (코로나19 상황에서 재난분야 교수자를 대상으로 한 비대면 교육의 개선에 관한 조사연구)

  • Park, Jin Chan;Beck, Min Ho
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.3
    • /
    • pp.640-654
    • /
    • 2021
  • Purpose: Normal education operation was difficult in the national disaster situation of Coronavirus Infection-19. Non-face-to-face education can be an alternative to face to face education, but it is not easy to provide the same level of education. In this study, the professor of disaster management field will identify problems that can occur in the overall operation and progress of non-face-to-face education and seek ways to improve non-face-to-face education. Method: Non-face-to-face real-time education was largely categorized into pre-class, in-class, post-class, and evaluation, and case studies were conducted through the professor's case studies. Result&Conclusion: The results of the survey are as follows: First, pre-class, it was worth considering providing a non-face-to-face educational place for professors, and the need for prior education on non-face-to-face educational equipment and systems was required. In addition, it seems necessary to make sure that education is operated smoothly by giving enough notice on classes and to make efforts to develop non-face-to-face education programs for practical class. Second, communication between professor and learner, and among learners can be an important factor in non-face-to-face mid classes. To this end, it is necessary to actively utilize debate-type classes to lead learners to participate in education and enhance the educational effect through constant interaction. Third, non-face-to-face post classes, policies on the protection of privacy due to video records should be prepared to protect the privacy of professors in advance, and copyright infringement on educational materials should also be considered. In addition, it is necessary to devise various methods for fair and objective evaluation. According to the results of the interview, in the contents, which are components of non-face-to-face education, non-face-to-face education requires detailed plans on the number of students, contents, and curriculum suitable for non-face-to-face education from the design of the education. In the system, it is necessary to give the professor enough time to fully learn and familiarize with the function of the program through pre-education on the program before the professor gives non-face-to-face classes, and to operate the helpdesk, which can thoroughly check the pre-examination before non-face-to-face education and quickly resolve the problem in case of a problem.