• Title/Summary/Keyword: Copyrights

Search Result 131, Processing Time 0.02 seconds

An Exploratory Study on the Antecedent Factors to the Piracy of the Digital Copyrights (디지털 저작물의 불법복제 행동에 영향을 미치는 요인에 관한 탐색적 연구)

  • Kwak, Won-Il;Choi, Won-Il
    • International Commerce and Information Review
    • /
    • v.10 no.4
    • /
    • pp.47-62
    • /
    • 2008
  • The purpose of this study is to explore the antecedent factors to the piracy of the digital copyrights in order to provide basic data for piracy prevention policy. The findings of study revealed that most respondents had experiences to copy MP3 files illegally. And many respondents answered they didn't copy pirated material by themselves but others did piracy a lot. The feeling of quilt and anxiety against piracy is shown very low level. Low copy cost and regulation level significantly impact upon the cognitive level of other's piracy. Updated contents, the higher price of authenticated materal, piracy regulation are the significant antecedent factors to the level of piracy. The level of piracy activity and anxiety against piracy are significantly different by age. The cognitive level of other's piracy, piracy activity and anxiety are significantly different by gender.

  • PDF

A Study on Extraction and Comparison of Digital Content Key Frame in UCC Service Environment

  • Jang, Eun-Gyeom
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.8
    • /
    • pp.1020-1028
    • /
    • 2011
  • In this paper, we proposed a mechanism that prevents indiscreet use of digital contents, verifies created content's copyrights to provide services to granted user and protects digital contents by law by authenticating the original digital content whenever an infringement of copyright occurs in UCC environments. The proposed mechanism uses specific information and features of contents as copyrights authentication information without additional information. Also, provides the fact of violation by inferring the modification of the original digital contents. That means this mechanism infers same or similar value from the contents; fraudulent use of content, modification of content color, modification of content format, modification of content resolution and illegal use of frame not principal key frame. In that point, we found that the inferred value from the content differed according to features of content modification.

Information Communication Ethical Study on the Protection of Digital Copyrights and Alternatives: Focusing on the Secondary School Students

  • Huh, Junho
    • Journal of Multimedia Information System
    • /
    • v.3 no.2
    • /
    • pp.27-34
    • /
    • 2016
  • In the past, the judicial circles in the Republic of Korea (ROK) were generous to the online copyright violations of computer software compared to other academic areas or offline violation. However, they started to reconsider such a practice since the FTA talks with some advanced countries began so that new laws had to be established, especially after the first round of negotiations with United States of America (USA) in 2006 during which they changed their views on the matter. Now it became possible to penalize digital copyright violations through lawsuits, and from March 1st, 2017, the court is expected to abolish the nonsuit system for teenagers. Thus, this paper has reviewed the ethical aspects involved in digital copyright protection and examined the possible alternatives, dividing them into three broad groups, before proposing a digital copyright protection curriculum for secondary education.

Digital Content Protection and Computer Forensics Evidence Management Mechanism using MPEG-21 in Network Service Environment (네트워크 서비스 환경에서 MPEG-21을 활용한 디지털 콘텐츠 보호 및 컴퓨터 포렌식스 증거 관리 메커니즘)

  • Jang, Eun Gyeom;Lee, Bum Suk
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.2
    • /
    • pp.129-141
    • /
    • 2010
  • In network service environment, cultures from diversified fields are easily accessible thanks to the convenient digital content services. Unfortunately, unauthorized access and indiscreet misuse behaviors have deprived content owners of their copyrights. This study suggests an integrity-ensured model applicable for forensic evidence of digital content infringement in network service environment. The suggested model is based on MPEG-21 core components for digital content protection and the system is designed in connection with the components of digital content forensics. Also, the present study suggests an efficient technology to protect and manage computer forensic evidence and digital content by authorizing digital content use and catching infringing logs of authorized users without lag in network environment for the benefit of network security and reliability.

A Study on MMS DRM System (MMS DRM 시스템에 대한 연구)

  • Yang, Dong-Hyuk;Doh, Yang-Hoi;Jwa, Jeong-Woo;Kim, Ho-Chan;Boo, Chang-Jin;Ko, Sung-Taek
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.729-733
    • /
    • 2006
  • Short message service (SMS) is a Popular mobile data service in cellular networks. One SMS message can carry 50 Korean alphabets. Cellular operators standard and develop multimedia message service (MMS) based on P2P as color phones having multimedia solutions such as MIDI, MP3, JPG, PNG, and MPEG have been developed. MMS can be a key cash flow in the non-voice mobile revenue together with SMS. Copyrights protection of contents in a MMS message can be issued as MMS can be the popular P2P service such as MMS. In this paper, we propose MMS DRM system to protect copyrights of contents in MMS with the minimum change of MMS system. The proposed MMS DRM system protect copyrights of contents using DRM Packager, DRM Server, and DRM Agent and support various use cases to activates MMS in mobile networks.

  • PDF

A Study on Development to Be Protection Profile for Interoperability of Heterogeneous DRM Systems (상이한 DRM 시스템의 호환성을 위한 보호프로파일 개발에 관한 연구)

  • Jo, Hea-Suk;Lee, Kwang-Woo;Jeon, Woong-Ryul;Lee, Yun-Ho;Kim, Seung-Joo;Won, Dong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.16C no.1
    • /
    • pp.1-12
    • /
    • 2009
  • Today, Digital Right Management (DRM) is used to protect copyrights of digital contents from illegal reproduction and redistribution. Unfortunately, current DRM systems are causing user's discomfort because of lack of mutual compatibility. In order to overcome this drawback, technologies for interoperability of heterogeneous DRM systems are developing. In this paper, we study the protection profile for conversion technologies of heterogeneous DRM systems, using the Common Criteria. Especially, this paper is written by reuse of the existing protection profile. Therefore, performance analysis reveals that efficiency of time and cost is significantly improved. This protection profile can be used by contents provider and administrator who manage user's copyrights to reference data for copyright protection.

Potential Crisis and Opportunity in the K-pop Choreography Copyright

  • Kim, Joy
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.253-258
    • /
    • 2021
  • This study aims to expose the potential dangers of K-pop through the past and present of K-pop choreography copyrights and to suggest the need to secure digital choreography copyrights for the sustainability of K-pop considering national responsibility. As the content industry quickly sought countermeasures to digital transformation, such as the launch of K-pop platforms and the evolution of OMO (Online Merges with Offline) media commerce in response to changes in the industrial environment due to COVID-19, the annual export of the domestic content industry increased by 6.3% compared to the previous year. Accordingly, our copyright does not require that works be fixed in tangibles, as in Japan and Germany, on the basis of entrusting each country's legislation to determine whether to require fixation on choreographed works. On the other hand, the United States, France and the United Kingdom are demanding that it be fixed. Although choreography is at the center of K-pop and the value and influence of K-pop videos including cover dance through new media are discussed from various perspectives, copyright on choreography that needs to be resolved in business platforms for K-pop scalability The fact that there is such a big difference in problem perception is an area where we must not lose our vigilance. As the development of today's technology, the method of fixing a choreography looks very easy as an image, but at the same time can be stolen very quickly. Therefore, compared to overseas cases, it is urgent to improve the difference in perception of copyright registration for K-pop choreography and to supplement the system include the NFT.

A study of Chinese fashion design copyright protection cases - Highlighting infringement cases involving the intellectual property rights of Bai Yi Bei in 2023 - (중국 패션디자인 저작권 보호 판례 고찰 - 2023년 백일배(百一杯) 지식재산권 판례를 중심으로 -)

  • Yueding Zhou;Hyunzin Ko
    • The Research Journal of the Costume Culture
    • /
    • v.32 no.2
    • /
    • pp.287-298
    • /
    • 2024
  • Clothing is intimately intertwined with daily lives as every individual relies on it. The pervasive issue of plagiarism in the fashion industry has led to an increased demand to protect intellectual property rights. Currently, studies on the protection of fashion design intellectual property rights in China remain in the exploratory stage and warrant further investigation. This paper addresses the issue in two parts. The first part contains an analysis of the theoretical foundation for the protection of fashion design copyrights. It is further divided into three subsections. The first subsection primarily examines the concept of copyrights and laws. The second subsection focuses on the concept of fashion design copyrights and laws. The third subsection analyzes copyright laws concerning fashion designs in China. The second section offers an analysis of infringement cases involving fashion designs published during the Baiyi Cup Intellectual Property Case Summary Writing Competition held in China in 2023. It outlines the shortcomings of the current Chinese copyright laws regarding the protection of fashion designs, and proposes measures for improvement. This study argues that the institutional framework for intellectual property rights in the Chinese fashion industry should align with practical considerations and explores suitable legal regulations and how they relate to specific circumstances in China. Besides refining the legal framework, fashion designers and enterprises must take measures to entablish the intellectual property rights of their clothing brands.

New Watermarking Technique Using Data Matrix and Encryption Keys

  • Kim, Il-Hwan;Kwon, Chang-Hee;Lee, Wang-Heon
    • Journal of Electrical Engineering and Technology
    • /
    • v.7 no.4
    • /
    • pp.646-651
    • /
    • 2012
  • Meaningful logos or random sequences have been used in the current digital watermarking techniques of 2D bar code. The meaningful logos can not only be created by copyright holders based on their unique information, but are also very effective when representing their copyrights. The random sequences enhance the security of the watermark for verifying one's copyrights against intentional or unintentional attacks. In this paper, we propose a new watermarking technique taking advantage of Data Matrix as well as encryption keys. The Data Matrix not only recovers the original data by an error checking and correction algorithm, even when its high-density data storage and barcode are damaged, but also encrypts the copyright verification information by randomization of the barcode, including ownership keys. Furthermore, the encryption keys and the patterns are used to localize the watermark, and make the watermark robust against attacks, respectively. Through the comparison experiments of the copyright information extracted from the watermark, we can verify that the proposed method has good quality and is robust to various attacks, such as JPEG compression, filtering and resizing.

Adaptive Watermarking for MP3 Copyright Protections Using Psychological Acoustics (심리음향 분석을 이용한 MP3 저작권 보안을 위한 적응적 워터마킹)

  • Lee, Kyeong-Hwan
    • The Journal of the Acoustical Society of Korea
    • /
    • v.32 no.1
    • /
    • pp.64-70
    • /
    • 2013
  • In this paper, we suggest a new audio watermarking method for audio contents copyrights that can efficiently provide protection from MP3 compression attacks. Watermarks were inserted at the coefficients repeatedly from low frequencies to high frequencies after DCT transform in commonly used Cox's spread spectrum method. Because the methods using arbitrary coefficients are not effective, we use the new weight functions that make small losses for the watermark coefficients during attacks, using psychological acoustics. In the results of various sound clips, the suggested method had overall better outcomes than the Cox's method by preserving watermarks and reducing distortions of the original sounds.