• Title/Summary/Keyword: 퍼블릭 도메인

Search Result 4, Processing Time 0.019 seconds

A Study on the Validity of Image Block in a Public Watermarking (퍼블릭 워터마킹에서 영상 블록의 유효성에 대한 연구)

  • Kim, Hyo Cheol;Kim, Hyeon Cheol;Yu, Gi Yeong
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.38 no.4
    • /
    • pp.20-20
    • /
    • 2001
  • 본 논문에서는 퍼블릭 워터마킹(public watermarking)에서 영상 블록의 유효성에 기반을 둔 상호연관성(cross-correlation property)과 관련기법을 제안하였다. 이 과정에서 워터마크의 비인식성(imperceptibility)과 깨지기 쉬운 워터마크(fragile watermark)를 보장하기 위하여 DCT(Discrete Cosine Transformation) 도메인의 고주파 영역을 사용하였다. 여러 가지 실험을 통하여 에러가 보정된 원본 영상(original image)들과 워터마크된 이미지(watermarked image)들 사이에 유효한 블록들이 동일함을 확인하였다. 그리고 이러한 상호연관성이 추후의 퍼블릭 워터마킹을 위한 응용들에 적용될 수 있음을 입증하였다.

A Study on the Validity of Image Block in a Public Watermarking (퍼블릭 워터마킹에서 영상 블록의 유효성에 대한 연구)

  • Kim, Hyo-Cheol;Kim, Hyeon-Cheol;Yu, Gi-Yeong
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.38 no.4
    • /
    • pp.344-352
    • /
    • 2001
  • In this paper, we propose a cross-correlation property and a related technique based on the validity of image block in a public watermarking and we embed messages into the high frequency band in the DCT domain because of its imperceptibility and fragility. As a result, we were able to inspect the identity of valid block between error corrected original images and watermarked images through experiments. And we confirmed the viability of this cross-correlation as an application for future public watermarking.

  • PDF

A Study on the Service Status of Public Domain Works in Digital Library: Focusing on the Case of the National Library of Korea's Expired Works Service (디지털도서관의 퍼블릭도메인 저작물 서비스 현황에 관한 연구: 국립중앙도서관의 보호기간 만료 저작물 서비스 사례를 중심으로)

  • Hosin Lee
    • Journal of the Korean Society for information Management
    • /
    • v.40 no.3
    • /
    • pp.119-142
    • /
    • 2023
  • Copyright is a legal criterion for determining the scope and method of digital library service. Works with expired protection periods correspond to the public domain and can be freely used by anyone. For this reason, it is a priority consideration in digital library construction and services. The purpose of this study is to examine how actively libraries are using expired protected works for digital library services. To this end, the relevant provisions of the Copyright Act applied to the construction and service of digital libraries were first summarized, and the meaning of the copyright protection period was theoretically examined. The current status of online services for expired works by the National Library of Korea was examined, focusing on the works of three Japanese colonial era writers, Kim Yoo-jung, Lee Hyo-seok, and Chae Man-sik, to check the specific service status of expired works. It reveals that the National Library of Korea is not fully utilizing the scope of the law, and that this situation is linked to the rights of other authors included in the book. Based on these results, it suggests that there is a need to change the service unit to focus on copyrighted works and to use authority records to systematize the management of authors' death years.

A New Image Authentication Method through Isolation of Invalid Blocks (무효 블록의 격리를 이용한 새로운 이미지 인증 방법)

  • Kim, Hyo-Chul;Kim, Hyun-Chul;Yoo, Ki-Young
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.1
    • /
    • pp.17-24
    • /
    • 2002
  • In this paper, we propose a new watermarking method using isolation of invalid blocks for image authentication. We embed messages into the high frequency band in the DCT domain because of its imperceptibility and fragility. And we were able to inspect the identity of valid blocks between error corrected original images and watermarked images through experiments. As a result, we found that the watermarked image is enough to extract binary messages. Therefore, the extra information such as the original image or watermark was not necessary in our extracting process. Experiment results show that the proposed method can be used successfully for image authentication.