• 제목/요약/키워드: Copyrights

검색결과 131건 처리시간 0.026초

컴퓨터 포렌식을 위한 디지털 저작권 보호시스템 개발 (Development of a Copyright Protection System for Computer Forensics)

  • 이월영;황철
    • 한국멀티미디어학회논문지
    • /
    • 제10권3호
    • /
    • pp.365-372
    • /
    • 2007
  • 세계에서 생성되는 정보의 대부분은 디지털 데이터로 만들어지고 있다. 이러한 디지털 저작물들은 불법 사용이 손쉽기 때문에 법적인 보호 장치나 기법이 꼭 필요하다. 그래서 지금까지 많은 연구가들은 다양한 기법들을 개발하고 있다. 지금까지 대부분의 기법들은 디지털 저작물 침해에 관한 법적인 증거 자료 확보를 위해 디스크 검증과 같은 물리적 또는 화학적인 방법 개발에 초점을 두고 있다. 본 논문에서는 사용자가 부적당하게 저작물을 사용할 때 이를 인지하고 법적 위배 사항을 통지해 주도록 하는 컴퓨터 포렌식 기반 디지털 저작물 보호 시스템을 개발하였다. 또한 계속적으로 침해 사실이 진행된다면 이런 일련의 위배 행위를 지적재산권법 매핑에 의하여 법적 증거 자료로 사용할 수 있도록 시스템에 저장하도록 한다. 이 기법은 디지털 증거 조작이나 증거 인멸의 문제로부터 데이터를 보호할 수 있다.

  • PDF

중국 진출 국내 패션 브랜드의 통합적 마케팅 커뮤니케이션(IMC) 전략 (The Integrated Marketing Communication(IMC) Strategy of Korean Fashion Brands Which Enter into Chinese Market)

  • 신수연;장은영
    • 복식문화연구
    • /
    • 제15권3호
    • /
    • pp.483-495
    • /
    • 2007
  • The purpose of this study is to examine the current situation of IMC strategies of Korean fashion brands which enter into Chinese market and to propose the efficient IMC strategies. Twenty Korean fashion brands which enter into Chinese market were selected and in-depth interviews with the managers were conducted. First, advertising is focused on magazines, and outdoor advertising, advertising in departments' magazines, distributing catalogs, and star marketing are performed in some cases. Brands often execute sales promotion activities such as price deduction, offering coupons, and presenting gifts. PR activities like events and sponsorship marketing which targets uncertain public or loyal customers are performed. PPL is conducted passively though it can be very effective. CRM is not operated systematically and customer management is conducted through tele-marketing and direct mail by shop managers. Web sites of brands have insufficient contents and are operated ineffectively. VMD follows brand's basic policy, but in cases of agents whose copyrights are transferred or branches which are place in areas where managing them is hard, shop managers operate their stores by themselves. Finally, because of socialistic consciousness, the perception about service of sales people is lacked.

  • PDF

디지털 저작권 관리에서 사용자의 프라이버시 보호를 제공하는 라이센스 관리 프로토콜 (A License Administration Protocol Providing User Privacy in Digital Rights Management)

  • 박복녕;김태윤
    • 한국정보과학회논문지:정보통신
    • /
    • 제30권2호
    • /
    • pp.189-198
    • /
    • 2003
  • 개인 정보 유출로 인한 피해사례가 늘어나면서 사용자 프라이버시 침해에 대한 인식이 높아지고 있다. 그러나 기존의 DRM 시스템은 사용자의 프라이버시 보호가 저작권을 보호하는데 직접적으로 필요하지 않다는 이유로 사용자의 프라이버시 보호에 대해 고려하지 않았다. 본 논문에서는 DRM에서 사용자 프라이버시 보호 측면이 강조된 라이센스 관리 프로토콜을 제안한다. 제안한 프로토콜은 사용자 식별 정보의 노출을 보호하기 위해 임시 ID와 token을 사용함으로 익명성을 보장하고 ECDH 세션키와 공개키 암호 시스템을 이용하여 메시지를 암호화함으로써 사용자 정보의 유출을 방지하여 사용자의 프라이버시를 보호한다.

저작권 보호를 위한 HMM기반의 음악 식별 시스템 (HMM-based Music Identification System for Copyright Protection)

  • 김희동;김도현;김지환
    • 말소리와 음성과학
    • /
    • 제1권1호
    • /
    • pp.63-67
    • /
    • 2009
  • In this paper, in order to protect music copyrights, we propose a music identification system which is scalable to the number of pieces of registered music and robust to signal-level variations of registered music. For its implementation, we define the new concepts of 'music word' and 'music phoneme' as recognition units to construct 'music acoustic models'. Then, with these concepts, we apply the HMM-based framework used in continuous speech recognition to identify the music. Each music file is transformed to a sequence of 39-dimensional vectors. This sequence of vectors is represented as ordered states with Gaussian mixtures. These ordered states are trained using Baum-Welch re-estimation method. Music files with a suspicious copyright are also transformed to a sequence of vectors. Then, the most probable music file is identified using Viterbi algorithm through the music identification network. We implemented a music identification system for 1,000 MP3 music files and tested this system with variations in terms of MP3 bit rate and music speed rate. Our proposed music identification system demonstrates robust performance to signal variations. In addition, scalability of this system is independent of the number of registered music files, since our system is based on HMM method.

  • PDF

방송통신융합시스템의 보안위험분석 및 경제성분석 (The Security Risk Analysis and Economical Estimation for Convergence of Broadcasting and Communication)

  • 김인중;류정아
    • 융합보안논문지
    • /
    • 제8권2호
    • /
    • pp.15-25
    • /
    • 2008
  • 오늘날의 방송 및 통신시스템에서 사용되는 응용 프로그램들은 위성시스템 등 다양한 네트워크상에서 상호 연동을 하면서 복잡하게 정보를 융합해나가고 있다. 특히, 방송 및 통신시스템은 기술적으로나 규모면에서 계속 진화함에 따라, 이전에 파악하지 못한 새로운 위협 및 취약점들이 증가하고 있다. 본 논문에서는 방송통신 융합시스템에서 사용 가능한 위험분석 및 경제성 분석 방법론을 제안한다. 먼저, 위험분석에서는 기밀성(저작권), 무결성, 가용성을 기반으로 자산을 우선순위화 하는 방법과 위협 및 취약성 변화에 따른 위험도를 계산할 수 있는 모델링을 제안한다. 두 번째로는 시간에 따라 보안대책 비용에 따른 경제성을 분석할 수 있는 방법을 제시한다.

  • PDF

A Study on Cognition about Copyright of Digital Works

  • Lee, Yong-Whan
    • 한국컴퓨터정보학회논문지
    • /
    • 제22권5호
    • /
    • pp.41-49
    • /
    • 2017
  • Digital works such as computer programs, music, photographs, movies and dramas are copyrighted. Even if there were more than 1,000 violations per year for digital works, the punishment was very weak. Especially copyright infringement by teenager is increasing. This study aims to present the direction of future development through questionnaires on the perception and direction of college students about copyright. 157 college students were surveyed about copyright awareness, perception of detailed legal provisions, cost of monthly expenses, copyright violation, and direction of copyright protection. As a result of the questionnaire survey, awareness was high at 69%, but in detailed law was low at 17.2% and 22.3%. In the future direction of copyright policy, 72.6% of them answered that they should be "strengthened" and "more and more strengthened". In order to protect copyrights, enforcement of crackdowns, public relations activities, expansion of the legal market, and technical protection should be done. In order to do this, copyright-related education for elementary, middle, high school and college students are needed more and it is necessary to expand the legal market where high quality contents are traded. More research is needed on copyright protection technological methods.

모바일 환경에서 콘텐츠 유통을 위한 전자상거래 프레임워크 (Electronic Commerce Framework for Content Distribution on Mobile Environment)

  • 조광문
    • 한국산학기술학회논문지
    • /
    • 제5권4호
    • /
    • pp.298-302
    • /
    • 2004
  • 디지털 콘텐츠의 내용이 다양해지고 유통 구조가 복잡해짐으로 인하여 발생할 수 있는 문제들을 해결하기 위한 방안으로 모바일 환경에서 디지털 콘텐츠를 유통하는 전자상거래 모델을 제안하였다. 무선 환경에서의 온라인 유통 과정은 기존의 오프라인이나 유선 네트워크와는 다른 요소들이 많이 포함되어 있다. 더구나 디지털 저작물인 멀티미디어 콘텐츠는 쉽고 빠르게 불법 복제되고 전파될 수 있다. 이러한 환경 하에서 디지털 콘텐츠의 저작권과 관련된 당사자들의 권리와 이익을 보호할 수 있는 체계가 필요하다. 본 논문에서는 멀티미디어 유통 프레임워크인 MPEG-21에 기반 하여 무선 환경에서의 콘텐츠 유통 전자상거래 프레임워크를 제안하였다. 이 모델은 디지털 저작권 관리 시스템에 적용되어 전자상거래 시장에서 온라인 유통에 있어서 거래 당사자들 사이의 상호 권리 침해 방지를 위한 방법으로 활용될 수 있다.

  • PDF

A Study on the Copyright Survey for Design Protection in Metaverse Period

  • Kim, Gokmi;Jeon, Ju Hyun
    • International journal of advanced smart convergence
    • /
    • 제10권3호
    • /
    • pp.181-186
    • /
    • 2021
  • Among human intellectual creations, the right granted by law to what is worth protecting is defined as intellectual property rights. Copyright is a legal right to creative finished products made by individuals, and in recent years, this legal right has been recognized as very important. In other words, copyright is a system created to protect the rights of individuals who created creations and to recognize their efforts. Works subject to copyright vary from poetry, thesis, novels to designs, paintings, music, and architecture, and the scope of the subject is gradually expanding. Recently, research has begun on how far the Metaverse design area absorbed into the real world among works. Computer-generated video productions and software program works are also subject to digital copyright protection, but it is also true that the interpretation of the author protection law for works, designs, and trademarks in the virtual world is unclear. This study aims to analyze copyrights based on case studies and theoretical backgrounds on copyright protection and to discuss the protection limitations of Metaverse design in the virtual world. In other words, the direction for the protection of Metaverse design is presented through clear distinction and definition of copyright protection in the tertiary virtual world. This study aims to present methods for design copyright protection in the era of Metaverse, respect copyright holders' creative activities, and develop our culture through protection of creations.

Real 3D Property Integral Imaging NFT Using Optical Encryption

  • Lee, Jaehoon;Cho, Myungjin;Lee, Min-Chul
    • Current Optics and Photonics
    • /
    • 제6권6호
    • /
    • pp.565-575
    • /
    • 2022
  • In this paper, we propose a non-fungible token (NFT) transaction method that can commercialize the real 3D property and make property sharing possible using the 3D reconstruction technique. In addition, our proposed method enhances the security of NFT copyright and metadata by using optical encryption. In general, a conventional NFT is used for 2D image proprietorial rights. To expand the scope of the use of tokens, many cryptocurrency industries are currently trying to apply tokens to real three-dimensional (3D) property. However, many token markets have an art copyright problem. Many tokens have been minted without considering copyrights. Therefore, tokenizing real property can cause significant social issues. In addition, there are not enough methods to mint 3D real property for NFT commercialization and sharing property tokens. Therefore, we propose a new token management technique to solve these problems using integral imaging and double random phase encryption. To show our system, we conduct a private NFT market using a test blockchain network that can demonstrate the whole NFT transaction process.

Efficient Illegal Contents Detection and Attacker Profiling in Real Environments

  • Kim, Jin-gang;Lim, Sueng-bum;Lee, Tae-jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권6호
    • /
    • pp.2115-2130
    • /
    • 2022
  • With the development of over-the-top (OTT) services, the demand for content is increasing, and you can easily and conveniently acquire various content in the online environment. As a result, copyrighted content can be easily copied and distributed, resulting in serious copyright infringement. Some special forms of online service providers (OSP) use filtering-based technologies to protect copyrights, but illegal uploaders use methods that bypass traditional filters. Uploading with a title that bypasses the filter cannot use a similar search method to detect illegal content. In this paper, we propose a technique for profiling the Heavy Uploader by normalizing the bypassed content title and efficiently detecting illegal content. First, the word is extracted from the normalized title and converted into a bit-array to detect illegal works. This Bloom Filter method has a characteristic that there are false positives but no false negatives. The false positive rate has a trade-off relationship with processing performance. As the false positive rate increases, the processing performance increases, and when the false positive rate decreases, the processing performance increases. We increased the detection rate by directly comparing the word to the result of increasing the false positive rate of the Bloom Filter. The processing time was also as fast as when the false positive rate was increased. Afterwards, we create a function that includes information about overall piracy and identify clustering-based heavy uploaders. Analyze the behavior of heavy uploaders to find the first uploader and detect the source site.