• Title/Summary/Keyword: Digital Contents Protection

Search Result 280, Processing Time 0.026 seconds

Effective Way of Providing Digital Contents Under Ubiquitous and Changing Media Environment (유비쿼터스와 미디어 환경의 변화에 따른 콘텐츠 수급방안)

  • Lee, Jei-Young;Ryu, Seung-Kwan
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.4
    • /
    • pp.123-132
    • /
    • 2007
  • This study explored the characteristics of media contents in the past, present and future. Also, it investigated the problems in terms of production of contents and circulation in order to find an effective way of providing contents that can keep pace with ubiquitous environment as well as one source multi use in various platforms and channels. In conclusion, it is viewed easy to expect that content would be the most valuable assets in ubiquitous media environments and the importance of contents will be more growing. Rather than game and enjoyment-related contents, more informative and cultural programs will be more valuable so policy-makers as well as industry need to more cultivate this area. In addition, this study presented the method for copyright protection and suggested that governmental policy fostering independent production should also be followed.

Color Image Encryption Technique Using Quad-tree Decomposition Method (쿼드트리 분할 기술을 이용한 컬러 영상 암호화 기술)

  • Choi, Hyunjun
    • Journal of Advanced Navigation Technology
    • /
    • v.20 no.6
    • /
    • pp.625-630
    • /
    • 2016
  • Recently, various types of image contents are being produced, and interest in copyright protection technology is increasing. In this paper, we propose an image encryption technology for color images. This technique divides the image into RGB color components and then performs quad-tree decomposition based on the edge of image. After the quad-tree partitioning, encryption is performed on the selected blocks. Encryption is performed on color components to measure encryption efficiency, and encryption efficiency is measured even after reconstitution into a color image. The encryption efficiency uses a visual measurement method and an objective image quality evaluation method. The PSNR values were measured as 7~10 dB for color difference components and 16~19 dB for color images. The proposed image encryption technology will be used to protect copyright of various digital image contents in the future.

Design of DID-based Verification Protocol for Strengthening Copyright Holders' Sovereignty (저작권자의 주권 강화를 위한 DID 기반 검증 프로토콜 설계)

  • Kim, Ho-Yoon;Shin, Seung-Soo
    • Journal of Industrial Convergence
    • /
    • v.20 no.9
    • /
    • pp.47-58
    • /
    • 2022
  • Digital content is difficult to distinguish between the original and the replica due to its nature. For this reason, NFT technology using blockchain technology is attracting attention because it can guarantee the proof and scarcity of the original digital content. However, the NFT buyer does not own the copyright to the digital content, but the ownership. In particular, since the minting process of issuing NFTs is possible for anyone, there is a copyright threat to the copyright holder. In this study, we propose a verification protocol based on DID for the process of issuing and transacting NFTs for copyright protection of copyright holders' digital contents. As a research method, the problems of research cases related to digital contents were analyzed and the safety was comparatively analyzed. NFT issuance can only be issued by copyright holders whose identity has been verified through DID, and only users who have completed authentication can participate in the transaction to prevent indiscriminate theft and use of digital content and form a safe and transparent transaction market.

DWT based Digital Image Watermarking using Labview Machine Vision (DWT기반 Labview Machine Vision을 이용한 디지털 이미지 워터마킹)

  • Kim, Hyoung-Gwon;Song, Yun-Jae;Ahn, Tae-Chon
    • Proceedings of the KIEE Conference
    • /
    • 2005.10b
    • /
    • pp.198-200
    • /
    • 2005
  • Recently, intellectual property problem caused by illegal copy or circulation of digital contents with computer and advance of network. it will lose producer's desire and cause economic losses. so we need to demand ownership protection technology for prevent illegal copy without an owner consent and protect ownership with effect. in this paper, we change digital image at frequency domain and choose a factor choosing frequency area with human perceptibility. we inserted repetitive and adaptive watermark on the whole image by Labview Machine Vision. watermark inserted into the high frequency concentrated textual area with Wavelet Transform and then reduced damage of image by human visual feature after inserted watermark

  • PDF

A Study on Digital Fingerprinting Technology for the Copyright Protection of the Image Contents Printout (이미지 콘텐츠 출력물의 저작권보호를 위한 디지털 핑거프린팅 기술에 관한 연구)

  • Seo, Yong-Seok;Kim, Won-Gyum;Lee, Seon-Hwa;Suh, Young-Ho;Hwang, Chi-Jung
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.242-245
    • /
    • 2006
  • This paper addresses an image fingerprinting scheme for the print-to-capture model performed by a photo printer and digital camera. When capturing an image by a digital camera, various kinds of distortions such as noise, geometrical distortions, and lens distortions are applied slightly and simultaneously. In this paper, we consider several steps to extract fingerprints from the distorted image in print-and capture scenario. To embed ID into an image as a fingerprint, multi-bits embedding is applied. We embed 64 bits ID information as a fingerprint into spatial domain of color images. In order to restore a captured image from distortions a noise reduction filter is performed and a rectilinear tiling pattern is used as a template. To make the template a multi-bits fingerprint is embedded repeatedly like a tiling pattern into the spatial domain of the image. We show that the extracting is successful from the image captured by a digital camera through the experiment.

  • PDF

Video Fingerprinting System through Zero-based Code Modulation Technique (제로기반 코드 변조 기법을 통한 비디오 핑거프린팅 시스템)

  • Choi Sun Young;Lee Hae-Yeoun;Kang In Koo;Lee Heung-Kyu
    • The KIPS Transactions:PartB
    • /
    • v.12B no.4 s.100
    • /
    • pp.443-450
    • /
    • 2005
  • Digital fingerprinting is a contents-protection technique, where customer information is inserted into digital contents. Fingerprinted contents undergo various attacks. Especially, attackers can remove easily the inserted fingerprint by collusion attacks, because digital fingerprinting inserts slightly different codes according to the customers. Among collusion attacks, averaging attack is a simple, fast, and efficient attack. In this paper, we propose a video fingerprinting system that is robust to the averaging attack. In order to achieve code efficiency and robustness against the averaging attack, we adopt anti-collusion code (fingerprint code) from GD-PBIBD theory. When the number of users is increased, the size of fingerprint code also grows. Thus, this paper addresses a zero-based code modulation technique to embed and detect this fingerprint code efficiently. We implemented a blind video fingerprinting system based on our proposed technique and performed experiments on various colluding cases. Based on the results, we could detect most of colluders. In the worst case, our scheme could trace at least one colluder successfully.

A Study on the Information Protection Intention of Digital Healthcare Service Providers (디지털 헬스케어 서비스 제공자의 정보보호의도에 관한 연구)

  • Yang, Chang-Gyu
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.17 no.4
    • /
    • pp.163-172
    • /
    • 2022
  • This study investigates the IPI (Information Protection Intention) of DHS (Digital Healthcare Service) providers by introducing PMT (Protection Motivation Theory). This study examines the effects of protection motivation, such as threat appraisal and coping appraisal, on IPI, such as ICI(Induction Control Intention) and SDI(Self Defense Intention). The research model, based on the PMT, adopted severity, vulnerability, reaction efficacy and self-efficacy as independent variables. The research model was validated through quantitative research, a survey of 222 DHS providers in South Korea, using structural equation modeling. The results show that (1) a clear awareness of the consequences of security threats increases the understanding of DHS providers on the severity of closure of healthcare information, and thus may decreases abuse of DHS by providers; (2) user confidence and satisfaction on the security system may make them be confident that they can handle the closure of healthcare information by themselves; and (3) although DHS providers are realizing the consequences of closure of healthcare information, they think that they are unlikely to encounter such situations. As a result of this study, venture companies that provide DHS need to provide contents that can continuously increase providers' security level in order to increase providers' information protection intention. It suggests that IPI is important through trust of healthcare service providers.

DRM Enabled P2P Model for Contents Protection (콘텐츠 보호를 위한 DRM이 적용된 P2P 모델)

  • Sung Jae-Youn;Jeong Yeon-Jeong;Yoon Ki-Song
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.389-396
    • /
    • 2006
  • P2P(Peer To Peer) system, a most attractive file sharing system, is the largest channel of contents distribution and it takes 50% of network traffic. But P2P systems are infamous for used to illegal contents distribution channel not only in music industry, but also in movie industry. But, DRM(Digital Right Management) enabled P2P models are not suggested until now that interrupting illegal contents distribution and keeping advantage of P2P. So in this paper, we suggest a DRM enabled P2P model that can support distributed processing ability and high scalability with no modification in exist P2P model or architecture.

Intellectual Property Rights For Strengthening Digital Contents Protection (디지털 콘텐츠의 보호강화를 위한 지적재산권적 고찰)

  • Park Dong-Eun;Joe June-Ha;Lim Jong-In
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.681-690
    • /
    • 2006
  • 초고속 인터넷망의 보급과 디지털 기술의 발전에 힘입어 디지털 콘텐츠의 대량 유통에 따른 지적재산권의 침해보호에 대한 필요성이 강조되는 시점에서 디지털 콘텐츠 유통 및 산업을 분석하고 각국의 디지털 콘텐츠 관련 법제도 동향을 조사 비교하여 지적재산의 침해를 줄일 수 있는 우리나라 현 법제의 보안 점을 찾아 제시 한다.

  • PDF

A Study on Plagiarism Detection System for Documents (문서를 위한 표절 탐지 시스템에 관한 연구)

  • An Byeong-Ryeol;Kim Mun-Hyeon
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2006.05a
    • /
    • pp.413-415
    • /
    • 2006
  • 디지털 시대에는 누구나 쉽게 정보에 접근 할 수가 있어 아주 간단하게 다른 사람의 정보를 불법 복제해서 무단으로 사용하는 경우가 증가하게 되었다. 이는 많은 투자와 노력으로 지식을 생성하는 일도 중요하지만 이를 관리하고 보호하는 일이 중요한 과제로 부상하고 있다는 것을 의미한다. 본 논문에서는 다른 사람의 지적 재산권을 침해하고 표절을 하여 사용했을 경우 이를 효과적으로 탐지하는 새로운 방법과 이론을 제시하고자 한다.

  • PDF