• Title/Summary/Keyword: Copy protection

Search Result 125, Processing Time 0.032 seconds

Multisignature Suitable for Digital Contents Copyright Protect ion on CDN (디지털 콘텐츠 저작권 보호를 위한 CDN에서 다중서명)

  • Shin, Seung-Soo;Kim, Duck-Sool
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.4 s.36
    • /
    • pp.77-85
    • /
    • 2005
  • Digital copyright protection is important in the protective side of effort to have leaned to in property right and it which are intelligent of an author and is very important for development of digital contents industry. It is the misgovernment that a reproduction is easy as for the digital contents. and the original and a copy have the same characteristic, and it is so, and is experiencing what is hard for protection of copyright and large quantity illegal copy and illegal distribution prevention. CDN needs a copyright protective plan about the digital contents that digital contents providers were written jointly. The paper used a non-repudiation multi-technique for copyright protection about the digital contents which were written jointly. The Non-repudiation multi-technique proved efficiency about this.

  • PDF

A Study on Copyright Protection Method of Web Image Contents (웹 이미지 콘텐츠 저작권보호 방법에 관한 연구)

  • Yi, Yeong-Hun;Cho, Man-Gi;Cho, Seong-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.37-43
    • /
    • 2015
  • Technical treatments of image contents on the web include the copy protection method such as the image capture protection technology and the traitor tracing method to detect unauthorized duplications through watermarking insertion or feature information technology. However, these two methods have their own weaknesses. The image capture protection method is unable to protect illegal captures when the URLs of image sources are exposed. The traitor tracing method is fundamentally unable to protect illegal captures due to its post-treatment method. Besides, the weakness of using the copyright information display technology involves easy removal of copyright information from copyrighted contents. This paper suggests a model of the web image contents protection system which makes it hard to separate copyright information from web image contents and allows image contents to be shown only in the authorized websites.

Video Copyright Protection through Watermarking of Wavelet Transform based on the Frequency (주파수기반 웨이브릿 변환의 워터마킹을 통한 동영상 저작권 보호에 관한 연구)

  • Han, Mi-Ja;Kim, Dan-Hwan;Jung, Chang-Ryul;Jeong, Byeong-Yeol;Lee, Sung-Keun;Koh, Jin-Kwang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.535-539
    • /
    • 2008
  • With the advancement which development and information communication of the computer is quick about lower with multimedia technical diffusion of network base the necessity the use of the digital image technique which is various regarding the protection of sharp increasing multimedia contents raised its head in the social whole. The copyright protection against a multimedia data hazard the authentication techniques it will be able to confirm the content authentication, ownership authentication, illegal copy of the image which stands is demanded. confronts to the water marking technique of existing and the researches the fact that against a picture is most. In this paper, It does not damage the video data. As inserts copyright information and it protects the copyright. It is with a copyright protection which leads the wavelet transform which is a watermark of frequency base from visual system viewpoint in the human being center with it proposes the watermarking technique against a forgery prevention.

  • PDF

Design of Security Module using Key Exchange Protocol in Digital Contents (키 교환 프로토콜을 이용한 디지털콘텐츠 보호 모듈 설계)

  • 권도윤;이경원;김정호
    • The Journal of the Korea Contents Association
    • /
    • v.3 no.3
    • /
    • pp.40-46
    • /
    • 2003
  • In the paper, designed digital contents security module to check unlawfulness reproduction and distribution of digital contents. This paper applied Diffie-Hellman algorithm that use discrete logarithm and random number as primary for public key application to create encryption key that agree each other through communication channel between DCPS and HOST, and applied Triple DES repeat DES 3 times through 2 different encryption key that is selecting ANSI X9.17 that is key management standard, ISO 8732 and PEM(Privacy-Enhanced Mail) etc. by secondary protection for safe transmission of digital contents in transmission line. Designed security module consist of key exchange module, key derivation module and copy protection processing module. Digital contents security module that design in this thesis checks reproduction and distribution of digital contents by unauthenticated user through user certification function and digital contents encryption function, and protect digital contents transmission line.

  • PDF

Ethical considerations in publication of medical papers (의학논문 출판윤리)

  • Bae, Chong-Woo
    • Clinical and Experimental Pediatrics
    • /
    • v.51 no.5
    • /
    • pp.447-451
    • /
    • 2008
  • It is fair to say that there are many ethical issues concerning the publication of medical papers. To define the best practice in the ethics of scientific publishing and a proper understanding of appropriate reporting in medical papers, this review should be useful for authors dealing with ethical issues which involve the protection of human and animal rights, the protection of confidentiality and informed consent, fabrication, falsification, plagiarism, author and authorship, copy right transfer, duplicate publication, conflict of interest, and dealing with misconduct cases.

Design of A Generic and Scalable DRM Scheme using HC-256 Stream Cipher (HC-256 스트림 암호화를 이용한 범용성 및 확장성을 가진 DRM 기법 설계)

  • Park, Jun-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.9B
    • /
    • pp.923-930
    • /
    • 2009
  • Digital Rights Management(DRM) is a term that refers technologies for imposing limitations on the use of digital content for protecting media copyright holders. This paper proposes a generic scheme for digital media copy protection that can be applied to any digital media such as audio, video, etc. The scheme will make it very hard to play a copied content on a foreign platform and to guess secret content encryption keys. Unlike other DRM techniques, the scheme uses the stream cipher HC-256 only for encrypting media content and it allows a client to start content playback immediately following its streamed decryption. As to the encryption, it requires to generate several secret keys for each new client(player copy), rather than for each media content, which makes it scalable in terms of managed keys. Also, for simplicity, the scheme supports the popular unlimited-play-after-download policy only, which would eliminate the necessity for deploying separate server or process for licensing.

Design of Electronic Software Distribution Protocol for Software Copyright Protection (소프트웨어 저작권 보호를 위한 전자 소프트웨어 유통 프로토콜의 설계)

  • Kim, Young-Jun;Lee, Sung-Min;Rhee, Yoon-Jung;Park, Nam-Sup;Lee, Byung-Rae;Kim, Tai-Yun
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.4
    • /
    • pp.641-650
    • /
    • 2001
  • In recent years, e-Commerce is very active on the Internet, especially the World Wide Web along with the popularization of Internet using high-speed networks. Especially, Electronic Software Distribution(ESD) is widely being focused as one of the popular researches. However, the existing models of ESD lack substantial illegal copy protection or copyright protection as they have the shortcomings of guaranteeing anonymity of users. This study suggests an ESD protocol that guarantees substantial copyright protection and anonymity based on the Public Key Infrastrncture(PKl). The suggested method does not give the information of a buyer who doesn't want to reveal to a seller, and protects illegal copy and distribution as well. When it happens that illegal copies are in circulation, this method provides a device to trace back its original distributor so that it helps protect the copyright. In addition, it provides more convenient environment to the user by not using the methods of serial number input and extra installation to use.

  • PDF

A Study on a Illegal Copy Protection model using Hidden Agent in Embedded Computing Environment (임베디드 컴퓨팅 환경에서 은닉 에이전트를 이용한 불법복사 방지 모델에 관한 연구)

  • Lee, Deok-Gyu;Kim, Tai-Hoon;Yeo, Sang-Soo;Kim, Seok-Soo;Park, Gil-Cheol;Cho, Seong-Eon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.2
    • /
    • pp.180-190
    • /
    • 2008
  • There have been researches into digital Watermarking technology or Fingerprinting vigorously to safeguard Protective rights for knowledge and poverty for digital contents. DRM(Digital Rights Management) is not only Protective rights for knowledge and poverty, but also management and systems that are necessary to put out, circulate and use for contents. This paper proposes two kinds of ideas. One is protecting contents from illegal acts such as illegal copies when the contents are in the process of circulation. The other is the protocol that can give users convenience. Hidden Agents are used so that contents are protected from illegal copies and illegal use in the contents and cuts off those illegal acts. The Agent will be installed without any special setup. In addition, it can replace roles of Watermarking as a protection. Therefore, this paper shows the solution of illegal copies that happens frequently.

  • PDF

A Study on Integrated Identification System of Scanned Cartoons and Copyrighted Books (북스캔 만화 및 도서 저작물 통합 식별 시스템에 관한 연구)

  • Kim, Tae-Hyun;Yoon, Hee-Don;Kang, Ho-Gap;Cho, Seong-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.2
    • /
    • pp.19-25
    • /
    • 2016
  • This study aims to develop sound ecosystem of scanned cartoons and books through the effective identification technology developed as a part of the project granted from the Korea Copyright Commission (Project title: Identification and Copy Protection Technology of Scanned Text/Comic Books). This study shows a model integrating the scanned book identification system with the existing system that identifies scanned cartoons. The model suggested in this study is expected to give a help in reducing the author's damages due to the indiscriminate illegal reproduction, which tends to expand with high quality scanners and editing softwares.

A Design Of Physical Layer For OpenCable Copy Protection Module Using SystemC (SystemC를 이용한 OpenCableTM Copy Protection Module의 Physical Layer 설계)

  • Lee, Jung-Ho;Lee, Suk-Yun;Cho, Jun-Dong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.157-160
    • /
    • 2004
  • 본 논문은 미국 차세대 디지털 케이블 방송 표준 규격인 오픈케이블($OpenCable^{TM}$)의 수신제한 모듈인 CableCard의 Physical Layer를 SystemC의 TLM(Transaction Level Modeling)과 RTL(Register-Transfer Level) 모델링 기법으로 설계하였다. 본 논문에서 설계한 CableCard의 Physical Layer는 PCMCIA Interface, Command Inteface 그리고 MPEG-2 TS Interface 로 구성된다. CableCard가 전원이 인가될 때, 카드 초기화를 위하여 동작하는 PCMCIA 인터페이스는 16 비트 PC 카드 SRAM 타입으로 2MByte Memory와 100ns access time으로 동작할 수 있게 설계하였다. PCMCIA 카드 초기화 동작이 완료된 후, CableCard의 기능을 수행하기 위하여 두 개의 논리적 인터페이스가 정의되는데 하나는 MPEG-2 TS 인터페이스이고, 다른 하나는 호스트(셋톱박스)와 모듈 사이의 명령어들을 전달하는 명령어 인터페이스(Command Interface)이다. 명령어 인터페이스(Command Interface)는 셋톱박스의 CPU와 통신하기 위한 1KByte의 Data Channel과 OOB(Out-Of-Band) 통신을 위한 4KByte의 Extended Channel 로 구성되고, 최대 20Mbits/s까지 동작한다. 그리고 MPEG-2 TS는 100Mbits/s까지 동작을 수행할 수 있게 설계하였다. 설계한 코드를 실행한 후, Cadence사의 SimVision을 통해서 타이밍 시뮬레이션을 검증하였다.

  • PDF