• Title/Summary/Keyword: Contents Protection

Search Result 1,058, Processing Time 0.024 seconds

인터넷 GIS 환경에서 위치정보 보호에 관한 연구

  • 오충원
    • Proceedings of the Korean Association of Geographic Inforamtion Studies Conference
    • /
    • 2003.11a
    • /
    • pp.65-69
    • /
    • 2003
  • The Location Based Services comprised GIS and Telecommunication allow users to receive various services based on their geographic location. It is need to legislation to encourage the provision and use of location information by providing privacy protection to users. But the contents of the legislation proposed by Korean government have problems conflicted between protection of a person's location information and invigoration of location-based services. The purpose of this study is to search complementary measures for privacy protection of location information from From a viewpoint of effective management strategy for geographic information.

  • PDF

S/W Program Plagiarism Inspection Techniques and Analysis of S/W Tools for Protection of Digital Properties (디지털 재산권 보호를 위한 소프트웨어 프로그램 표절 감정 기술과 툴의 분석)

  • 조동욱
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.05a
    • /
    • pp.177-184
    • /
    • 2003
  • Protection of digital properties such as computer S/W, digital contents is the most important topics. For this, this paper describes the domestic and foreign trends for protecting digital properties and S/W tools for inspecting of plagiarism is compared and analyzed. The analysis of research activities of foreign inspection institutes such as JISC and domestic institutes and communities has done. Also, S/W tools for inspecting of natural language plagiarism is analyzed.Having been speed development of The Content Technology,

  • PDF

sDBMS for Hacking Prevention on Based PMI for Contents Protection in Web Environment (Web 환경에서 컨텐츠 보호를 위한 PMI 기반의 해킹방지 sDBMS)

  • Ryoo Du-Gyu;Kim Young-Chul;Jun Moon-Seog
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.5
    • /
    • pp.679-690
    • /
    • 2005
  • Business model in Web environments is usually provided by multimedia data. Information exchange between users and service providers should be made in encrypted data. Encrypted data are secure from being hacked. Application of DB encryption is a main technology for contents protection. We have applied the access control based on RBAC and prevented the unauthorized users from using the contents. In this paper, we propose a new DB encryption scheme which uses RHAC and digital signature based on PMI.

  • PDF

Design and Implementation of Secure Distribution System for Broadcasting Contents (방송 콘텐츠를 위한 안전한 유통 시스템 설계 및 구현)

  • Lee, Jin-Heung;Lee, Hea-Ju;Shin, Sang-Uk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.19-27
    • /
    • 2007
  • Broadcasting contents protection system for HDTV has many difficult to apply file encryption technology that using the existing DRM systems. Therefore, this system has to be processed as accommodative about broadcasting contents format such as TS and PS and so on. Also, this system must support efficient encryption technology and random access mode. In addition, this system must have suitable key distribution mechanism in broadcasting environment. In this paper, we propose and implement encryption/key distribution scheme applicable to encoder/decoder without changing the existing MPEG system.

Protection Algorithm of the Multimedia Contents in the Mobile Environment (모바일 환경하에서 멀티미디어 컨텐츠 보호 알고리즘)

  • Kim Hang-Rae;Park Young;Choi Nam-Hyung
    • Journal of Digital Contents Society
    • /
    • v.5 no.1
    • /
    • pp.87-94
    • /
    • 2004
  • In this paper, the digital watermarking algorithm is proposed using CDMA technique for protection of the mobile contents in the mobile environment. The digital watermarking was designed to robust the errors in the mobile environment where pathloss, multipath fading, interference, and noise exist. In case of the multimedia content service in the mobile environment, the construction method of the watermark, the algorithm of insertion and detection are also proposed. The watermark consists of the information of the mobile user. Invisibility and robustness required in watermarking are etimated. It is observed that PSNR of the mobile content inserted the watermark is 90.31 dB, and the signal processing and noise attack are also robust. Especially, because random noise occurs in wireless transmission can overcome, the proposed watermarking algorithm is adequate for protection of the multimedia contents in the mobile environment.

  • PDF

Metadata production system based on MPEG-21 IPMP for protection of broadcasting contents (방송 콘텐츠 보호를 위한 MPEG-21 IPMP 기반의 메타데이터 저작 시스템)

  • Ryu, Kwang-Hee;Kim, Kwang-Yong;Kim, Jae-Gon;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.619-622
    • /
    • 2005
  • When Digital Contents goes through production${\cdot}$delivery${\cdot}$consumption, MPEG(Moving Picture Expers Group)-21 IPMP(Intellectual Property Management and Protection) defines standard which have defined by FCD(Final Committee Draft) level to keep the Digital Contents in safety. And development of system which applied to latest standard to protect and manage the broadcasting contents is required. Currently, the system to protect and manage the broadcast contents consists of fourth organizations which means production server, tool server, license server, consumption server. In this paper, we made production server to parse REL(Right Expression Language) document that has right information for content from license server, and create metadata based on MPEG-21 IPMP about the content that applied to watermark. then, after it do remuxing, transmit the protected data to consumption server.

  • PDF

Design and implementation of protection and management system of digital contents based on MPEG-21 IPMP (MPEG-21 IPMP 기반의 디지털 콘텐츠 보호 관리 시스템 설계 및 구현)

  • Jung Hoe-Kyung;Ryu Kwang-Hee;Kim Kwang-Yong;Kim Jae-Gon;Hong Jin-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.6
    • /
    • pp.1003-1010
    • /
    • 2006
  • The usage increase of digital contents required solution for protection technology and interoperability of system. MPEG(Moving Picture Experts Group) proposed MPEG-21 Multimedia Frameworks. MPEG-21 IPMP is standard that provides the means to enable digital item and rights information to be persistently managed and protected across networks and devices. In this paper, MPEG-21 IPMP based system to protect digital contents designed by four structures of license server, production server, consumption server, tool server. License server create rights information document using the XML-based REL about multimedia contents of users. Production server makes a digital item by packaging multimedia resource and metadata, which is combined by REL information and IPMP information of multimedia resource. Consumption server takes care of the functions of players that use digital item, and tool server was implement to transmit for missing tool that might occur in all procedures.

Comparison of the Breast Dose based on the Existence of the Bismuth Breast Protection Shield for Automatic Exposure Control and Manual Exposure Control with the Coronary Artery CT Angiography

  • Kim, Sang-Tae;Kang, Sang-Koo;Kim, Chong-Yeal
    • International Journal of Contents
    • /
    • v.7 no.4
    • /
    • pp.103-107
    • /
    • 2011
  • The effective dose and the organ absorbed dose, which are given to a breast in the cases of using and not using the bismuth breast protection shield for the protection of a breast with the coronary artery CT angiography, have been measured and compared for the manual exposure control (MEC)and the automatic exposure control (AEC). In the cases of using and not using the bismuth breast protection shield, it has been found that the measured dose shows the reduction of about 23 to 26% for the MEC and about 22 to 25% for the AEC when the shield is used compared to the case of not using it. By comparing the shield and non-shield cases for the AEC and the MEC, it can be said that the value measured by carrying out the scanning process with the AEC mode has decreased by about 24 to 30% compared to the case of applying the MEC mode. Such a result shows that it is recommended to use the AEC mode for the reduction of the patient's exposure dose during the CT examination.

Compliance and Implications for Public Officials in Charge of Personal Information Protection by Policy Trends (개인정보보호 정책 동향에 따른 공공기관 담당자를 위한 업무 수행 준수사항 및 시사점)

  • Ju, Gwang-il;Choi, Seon-Hui;Park, Hark-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.4
    • /
    • pp.461-467
    • /
    • 2017
  • Privacy laws are widely enforced throughout the general public and private sector, and the Ministry of Government Administration and Home Affairs is stepping up its annual level of protection and management levels annually. However, in actual field, it has limits to follow the laws that are amended to comply with the privacy laws of the public sector. Therefore, this study should examine the trends of privacy protection and examine items that require adherence to privacy practices in public institutions. In addition, it is hoped to draw implications for the problems arising from the task itself, as well as providing implications for the issues that are closely related to the public in the privacy of the privacy policies.

An Efficient Phantom Protection Method for Concurrency Control in Multi-dimensional Index Structures (다차원 색인구조에서 동시성제어를 위한 효율적인 유령 방지 기법)

  • Yun Jong-Hyun;Song Seok-Il;Yoo Jae-Soo;Lee Seok-Jae
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.1
    • /
    • pp.157-167
    • /
    • 2005
  • In this paper, we propose a new phantom protection method for multi-dimensional index structures. The proposed method uses a hybrid approach of predicate locking and granular locking mechanisms. The proposed mechanism is independent of the types of multi-dimensional index structures, i.e., it can be applied to all types of index structures such as tree-based, file-based and hash-based index structures. Also, it achieves low development cost and high concurrency with low lock overhead. It is shown through various experiments that the proposed method outperforms existing phantom protection methods for multi-dimensional index structures.

  • PDF