• Title/Summary/Keyword: Copyrights

Search Result 131, Processing Time 0.028 seconds

Development of a Copyright Protection System for Computer Forensics (컴퓨터 포렌식을 위한 디지털 저작권 보호시스템 개발)

  • Lee, Wol-Young;Hwang, Chul
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.3
    • /
    • pp.365-372
    • /
    • 2007
  • The information of world is most likely to be created as digital data. These digital productions need some legal protection mechanisms or techniques because users can illegally use them. Thus many researchers are developing various techniques. Currently most techniques are focusing on the physical and chemical methods like disk inspection for taking legal evidence about production infringement. This paper has developed a computer forensics-based copyrights protection system capable of detecting and notifying disobedience facts when user uses illegally a production. Furthermore if the user infringes continually the production the system stores the infringement facts to take the legal evidence by mapping to law for intellectual property right. The technique can protect data from digital evidence manipulation or destruction.

  • PDF

The Integrated Marketing Communication(IMC) Strategy of Korean Fashion Brands Which Enter into Chinese Market (중국 진출 국내 패션 브랜드의 통합적 마케팅 커뮤니케이션(IMC) 전략)

  • Shin, Su-Yun;Jang, Eun-Young
    • The Research Journal of the Costume Culture
    • /
    • v.15 no.3 s.68
    • /
    • pp.483-495
    • /
    • 2007
  • The purpose of this study is to examine the current situation of IMC strategies of Korean fashion brands which enter into Chinese market and to propose the efficient IMC strategies. Twenty Korean fashion brands which enter into Chinese market were selected and in-depth interviews with the managers were conducted. First, advertising is focused on magazines, and outdoor advertising, advertising in departments' magazines, distributing catalogs, and star marketing are performed in some cases. Brands often execute sales promotion activities such as price deduction, offering coupons, and presenting gifts. PR activities like events and sponsorship marketing which targets uncertain public or loyal customers are performed. PPL is conducted passively though it can be very effective. CRM is not operated systematically and customer management is conducted through tele-marketing and direct mail by shop managers. Web sites of brands have insufficient contents and are operated ineffectively. VMD follows brand's basic policy, but in cases of agents whose copyrights are transferred or branches which are place in areas where managing them is hard, shop managers operate their stores by themselves. Finally, because of socialistic consciousness, the perception about service of sales people is lacked.

  • PDF

A License Administration Protocol Providing User Privacy in Digital Rights Management (디지털 저작권 관리에서 사용자의 프라이버시 보호를 제공하는 라이센스 관리 프로토콜)

  • 박복녕;김태윤
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.2
    • /
    • pp.189-198
    • /
    • 2003
  • As people are damaged increasingly by personal information leakage, awareness about user privacy infringement is increasing. However, the existing DRM system does not support the protection of user's personal information because it is not necessary for the protection of copyrights. This paper is suggesting a license administration protocol which is more powerful to protect personal information in DRM. To protect the exposure of users identifier, this protocol uses temporary ID and token to guarantee anonymity and it uses a session key by ECDH to cryptography and Public-Key Cryptosystem for a message so that it can protect the exposure of personal information and user's privacy.

HMM-based Music Identification System for Copyright Protection (저작권 보호를 위한 HMM기반의 음악 식별 시스템)

  • Kim, Hee-Dong;Kim, Do-Hyun;Kim, Ji-Hwan
    • Phonetics and Speech Sciences
    • /
    • v.1 no.1
    • /
    • pp.63-67
    • /
    • 2009
  • In this paper, in order to protect music copyrights, we propose a music identification system which is scalable to the number of pieces of registered music and robust to signal-level variations of registered music. For its implementation, we define the new concepts of 'music word' and 'music phoneme' as recognition units to construct 'music acoustic models'. Then, with these concepts, we apply the HMM-based framework used in continuous speech recognition to identify the music. Each music file is transformed to a sequence of 39-dimensional vectors. This sequence of vectors is represented as ordered states with Gaussian mixtures. These ordered states are trained using Baum-Welch re-estimation method. Music files with a suspicious copyright are also transformed to a sequence of vectors. Then, the most probable music file is identified using Viterbi algorithm through the music identification network. We implemented a music identification system for 1,000 MP3 music files and tested this system with variations in terms of MP3 bit rate and music speed rate. Our proposed music identification system demonstrates robust performance to signal variations. In addition, scalability of this system is independent of the number of registered music files, since our system is based on HMM method.

  • PDF

The Security Risk Analysis and Economical Estimation for Convergence of Broadcasting and Communication (방송통신융합시스템의 보안위험분석 및 경제성분석)

  • Kim, In-Jung;Ryou, Jeong-A
    • Convergence Security Journal
    • /
    • v.8 no.2
    • /
    • pp.15-25
    • /
    • 2008
  • In today's broadcasting and communication systems, many applications are converged information in a complicated manner by interworking with various networks such as satellite networks. Specifically, as broadcasting and communication systems have become more advanced in terms of technology and capacity, the increase in information assets has created new types of threats and vulnerabilities that we're not previously apparent. This paper has proposed the following methodologies for analyzing the risks and estimating the economical that could arise in broadcasting and communication convergence systems. First, the assets are prioritized by grading them according to confidentiality(copyrights), integrity, and availability. Based on such an analysis, this paper presents a model that can be used for verifying the risk variables caused by changing threats and vulnerabilities. Second, this paper presents a method for quantitatively estimating the economical caused by countermeasure costs for each time period.

  • PDF

A Study on Cognition about Copyright of Digital Works

  • Lee, Yong-Whan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.5
    • /
    • pp.41-49
    • /
    • 2017
  • Digital works such as computer programs, music, photographs, movies and dramas are copyrighted. Even if there were more than 1,000 violations per year for digital works, the punishment was very weak. Especially copyright infringement by teenager is increasing. This study aims to present the direction of future development through questionnaires on the perception and direction of college students about copyright. 157 college students were surveyed about copyright awareness, perception of detailed legal provisions, cost of monthly expenses, copyright violation, and direction of copyright protection. As a result of the questionnaire survey, awareness was high at 69%, but in detailed law was low at 17.2% and 22.3%. In the future direction of copyright policy, 72.6% of them answered that they should be "strengthened" and "more and more strengthened". In order to protect copyrights, enforcement of crackdowns, public relations activities, expansion of the legal market, and technical protection should be done. In order to do this, copyright-related education for elementary, middle, high school and college students are needed more and it is necessary to expand the legal market where high quality contents are traded. More research is needed on copyright protection technological methods.

Electronic Commerce Framework for Content Distribution on Mobile Environment (모바일 환경에서 콘텐츠 유통을 위한 전자상거래 프레임워크)

  • 조광문
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.5 no.4
    • /
    • pp.298-302
    • /
    • 2004
  • An electronic commerce model is proposed which distributes digital content in mobile environment. This model resolves the problems caused by various digital content and complex distribution structure. The online distribution systems under the wireless environment include many different factors from the conventional offline and wired networks. Furthermore, the multimedia content may be propagated more easily and illegally. The scheme to protect the rights and profits of people related to the copyrights of digital content is needed. In this paper a framework for electronic commerce of content distribution under the wireless environment based on MPEG-21 is proposed. This model can be applied to the digital rights management system and utilized to protect the rights of trading entities in online distribution of electronic commerce.

  • PDF

A Study on the Copyright Survey for Design Protection in Metaverse Period

  • Kim, Gokmi;Jeon, Ju Hyun
    • International journal of advanced smart convergence
    • /
    • v.10 no.3
    • /
    • pp.181-186
    • /
    • 2021
  • Among human intellectual creations, the right granted by law to what is worth protecting is defined as intellectual property rights. Copyright is a legal right to creative finished products made by individuals, and in recent years, this legal right has been recognized as very important. In other words, copyright is a system created to protect the rights of individuals who created creations and to recognize their efforts. Works subject to copyright vary from poetry, thesis, novels to designs, paintings, music, and architecture, and the scope of the subject is gradually expanding. Recently, research has begun on how far the Metaverse design area absorbed into the real world among works. Computer-generated video productions and software program works are also subject to digital copyright protection, but it is also true that the interpretation of the author protection law for works, designs, and trademarks in the virtual world is unclear. This study aims to analyze copyrights based on case studies and theoretical backgrounds on copyright protection and to discuss the protection limitations of Metaverse design in the virtual world. In other words, the direction for the protection of Metaverse design is presented through clear distinction and definition of copyright protection in the tertiary virtual world. This study aims to present methods for design copyright protection in the era of Metaverse, respect copyright holders' creative activities, and develop our culture through protection of creations.

Real 3D Property Integral Imaging NFT Using Optical Encryption

  • Lee, Jaehoon;Cho, Myungjin;Lee, Min-Chul
    • Current Optics and Photonics
    • /
    • v.6 no.6
    • /
    • pp.565-575
    • /
    • 2022
  • In this paper, we propose a non-fungible token (NFT) transaction method that can commercialize the real 3D property and make property sharing possible using the 3D reconstruction technique. In addition, our proposed method enhances the security of NFT copyright and metadata by using optical encryption. In general, a conventional NFT is used for 2D image proprietorial rights. To expand the scope of the use of tokens, many cryptocurrency industries are currently trying to apply tokens to real three-dimensional (3D) property. However, many token markets have an art copyright problem. Many tokens have been minted without considering copyrights. Therefore, tokenizing real property can cause significant social issues. In addition, there are not enough methods to mint 3D real property for NFT commercialization and sharing property tokens. Therefore, we propose a new token management technique to solve these problems using integral imaging and double random phase encryption. To show our system, we conduct a private NFT market using a test blockchain network that can demonstrate the whole NFT transaction process.

Efficient Illegal Contents Detection and Attacker Profiling in Real Environments

  • Kim, Jin-gang;Lim, Sueng-bum;Lee, Tae-jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.6
    • /
    • pp.2115-2130
    • /
    • 2022
  • With the development of over-the-top (OTT) services, the demand for content is increasing, and you can easily and conveniently acquire various content in the online environment. As a result, copyrighted content can be easily copied and distributed, resulting in serious copyright infringement. Some special forms of online service providers (OSP) use filtering-based technologies to protect copyrights, but illegal uploaders use methods that bypass traditional filters. Uploading with a title that bypasses the filter cannot use a similar search method to detect illegal content. In this paper, we propose a technique for profiling the Heavy Uploader by normalizing the bypassed content title and efficiently detecting illegal content. First, the word is extracted from the normalized title and converted into a bit-array to detect illegal works. This Bloom Filter method has a characteristic that there are false positives but no false negatives. The false positive rate has a trade-off relationship with processing performance. As the false positive rate increases, the processing performance increases, and when the false positive rate decreases, the processing performance increases. We increased the detection rate by directly comparing the word to the result of increasing the false positive rate of the Bloom Filter. The processing time was also as fast as when the false positive rate was increased. Afterwards, we create a function that includes information about overall piracy and identify clustering-based heavy uploaders. Analyze the behavior of heavy uploaders to find the first uploader and detect the source site.