• Title/Summary/Keyword: Digital Contents Protection

Search Result 280, Processing Time 0.026 seconds

A Privacy Negotiation Algorithm for Digital Rights Management

  • Phuttharak, Jurairat;Sathitwiriyawong, Chanboon
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.788-793
    • /
    • 2004
  • Internet-based distribution of digital contents provides great opportunities for producers, distributors and consumers, but it may seriously threaten users' privacy. The Digital Rights Management (DRM) systems which one of the major issues, concern the protection of the ownership/copyright of digital content. However, the most recent DRM systems do not support the protection of the user's personal information. This paper examines the lack of privacy in DRM systems. We describe a privacy policy and user's privacy preferences model that protect each user's personal information from privacy violation by DRM systems. We allow DRM privacy agent to automatically negotiate between the DRM system policy and user's privacy preferences to be disclosed on behalf of the user. We propose an effective negotiation algorithm for the DRM system. Privacy rules are created following the negotiation process to control access of the user's personal information in the DRM system. The proposed privacy negotiation algorithm can be adapted appropriately to the existing DRM systems to solve the privacy problem effectively.

  • PDF

A DRM Scheme for Multi-CMSs Interoperability Based on Integrated Metadata (다중 CMS 상호운영을 위한 통합메타데이터기반의 DRM기법)

  • Li, Yong-Zhen;Cho, Young-Bok;Sun, Ning;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.9C
    • /
    • pp.676-682
    • /
    • 2008
  • With the coming of information times, digital contents are widely applied in various fields of the society. Along with this, scholars provided many techniques and research approaches related to digital contents management and copyright protection. But till now, most proposed techniques and approaches are based on single system. The independency and separation among management systems causes the problems such as application across systems are limited, and resources sharing can't be available, etc. In this paper, for the application cross systems and contents sharing, we propose the cross-systems DRM approach based on unified metadata. This approach can be applied for the incorporation of multiple congeneric or heterogeneous CMSs, in the same time, solve the copyright problem cross digital content systems.

A Study on Problems of Digital Certification System (전자인증제도(電子認證制度)의 문제점(問題點)에 관한 연구(硏究))

  • Hwang, Sang-Kyu
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.20
    • /
    • pp.495-522
    • /
    • 2003
  • As a rapid development of electronic commerce transactions in these days, the security and private protection problems became more important matters under the electronic transaction base. Because electronic transaction using electronic documents be carried without direct person to person meeting, there can be the possibility to use other's identity illegally without notice, and very hard to verify authenticity of transaction as well. In addition, it is very hard to find out that the electronic documents on the process of submitting is forged documents or not, and also have much difficulty in maintaining transmitting secret. Therefore, to solve such problems on electronic commerce transactions and electronic documents, the digital signature and certification system with cryptography skill is inevitably necessary. As the wide use of digital signature together with beginning of digital government and financial transaction, not only the issuance of electronic certification, but certification market came to gradually expand. In Korea, after enacting digital signature act in 1999, the act contents were expanded to the wide range of contents complying with global standards from the end of 2001 to April, 2002, including the new clause of certification problems. And the act was put into operation now. Therefore, in this paper, we'd like to suggest development scheme through the investigation on electronic certification related problems, such as, concepts, procedures, service conditions here and abroad.

  • PDF

A Study on Digital Certification Based on the Electronic Commerce (전자상거래기반하의 전자인증에 관한 연구)

  • 황상규;이재달
    • Journal of Korea Port Economic Association
    • /
    • v.19 no.1
    • /
    • pp.223-245
    • /
    • 2003
  • As a rapid development of electronic commerce transactions in these days, the security and private protection problems became more important matters under the electronic transaction base. Because electronic transaction using electronic documents be carried without direct person to person meeting, there can be the possibility to use other's identity illegally without notice, and very hard to verify authenticity of transaction as well. In addition, it is very hard to find out that the electronic documents on the process of submitting is forged documents or not, and also have much difficulty in maintaining transmitting secret. Therefore, to solve such problems on electronic commerce transactions and electronic documents, the digital signature and certification system with cryptography skill is inevitably necessary. As the wide use of digital signature together with beginning of digital government and financial transaction, not only the issuance of electronic certification, but certification market came to gradually expand. In Korea, after enacting digital signature act in 1999, the act contents were expanded to the wide range of contents complying with global standards from the end of 2001 to April, 2002, including the new clause of certification problems. And the act was put into operation now. Therefore, in this paper, we'd like to suggest development scheme through the investigation on electronic certification related problems, such as, concepts, procedures, service conditions here and abroad.

  • PDF

A Study on the Evaluation Consulting Methodology of Important Information Communication Base Facility (주요 정보통신기반시설의 평가컨설팅 방법론에 대한 연구)

  • Lee, Young-Ro;Cho, Jae-Wan
    • Journal of Digital Convergence
    • /
    • v.5 no.1
    • /
    • pp.55-68
    • /
    • 2007
  • It soaks but 2001 July information communication base step law enforcement and the Enforcement Ordinance are published to follow, in order to support the establishment of evaluation and protective measure in order the vulnerability analysis against the facility of the agency which manages an important information communication base hour opinion to designate information protection specialty enterprise. As information protection specialty enterprise being revealed evacuation laboratory back 12 enterprises from information communication department become designation as the consulting enterprise and they do an enterprise activity actively. It follows in diffusion of the IT and information reconciliation level the other side where our country belongs in the world-wide first group, the research against the disfunction plan of preparation comparison the fact that law it is come negligently all actuality. The network as it will give management coat fatal effect even at obstacle occurrence hour of instant for of case and IT facility of the cyber transactions which leads, in the future there to be to corporate management, there is a possibility the stable civil official of information Facilities for communications very seeing in the portion which is important. Present condition and important propulsion contents of information communication base step law enforcement after, against a vulnerability analysis of information protection relation field and evaluation consulting methodological application situation to sleep it researches from the dissertation which it sees consequently and it does.

  • PDF

RCBAC(Relationship-Content based Access Control) Model for User Privacy Protection of Digital Contents in Web 2.0 Environment (웹 2.0 환경에서 사용되는 디지털 컨텐츠의 사용자 프라이버시 보호를 위한 RCBAC 모델)

  • Cho, Eun-Ae;Moon, Chang-Joo;Park, Dae-Ha;Kim, Jeong-Dong;Kang, Dong-Su;Baik, Doo-Kwon
    • Journal of Digital Contents Society
    • /
    • v.9 no.4
    • /
    • pp.697-705
    • /
    • 2008
  • The recent web technology has been developed by three mainsprings which include integration, virtualization, and socialization. The web technology provides the increment of the social networking ability. However it deepens the exposure of privacy about personal information as more complicating and difficult problems. Representatively, it is impossible to define and manage the specific relation, so the personal information and interest can be inferred from collecting and summarizing the contents. Also, there are some problems that it is hard to construct the information owner's own social network. Thus this paper proposes the RCBAC(Relationship-Content based Access Control) Model which applies both the concepts of Relationship and Content Semantic to the existing access control methods to protect the user's own digital contents in web 2.0 environment. This method prevents privacy such as personal inclination from being exposed and enables to define and manage the specific relation. By doing this the information owners can construct their social network. This social network can be applied and extended to web contents.

  • PDF

Technology Analysis for Digital Contents Protection (저작권 보호를 위한 기술 동향 분석)

  • 황진옥;김태윤
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10c
    • /
    • pp.658-660
    • /
    • 2002
  • 초고속 통신망이 보편화되면서 다양한 인터넷의 정보 이용이 점차 활성화되고 있다. 따라서, 시스템의 기술동향 분석과 투명한 전자상거래 띤 지적 재산권을 보호하기 위한 수단으로 개발된 여러 가지 기술과 특징들을 살펴보고, 저작권 보호를 위한 현재 진행되고 있는 관련업체들의 동향을 살펴본다.

  • PDF

Watermarking Algorithm for Copyright Protection of Haegeum Sound Contents (해금 사운드 콘텐츠의 저작권 보호를 위한 워터마킹 알고리듬)

  • Hong, Yeon-Woo;Kang, Myeong-Su;Cho, Sang-Jin;Chong, Ui-Pil
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.10 no.4
    • /
    • pp.214-219
    • /
    • 2009
  • This paper proposes a watermarking algorithm considering the frequency characteristics of Haegeum sounds for copyright protection of digital Haegeum sound contents. The harmonics of Haegeum sounds commonly have large magnitude values in 1500Hz~2000Hz and 2800Hz~3500Hz so that those bands are selected to embed a watermark. The proposed method computes the FFT (fast Fourier transform) of the original sound signal and embeds the watermark bits generated by PN (pseudo noise) sequence into the harmonics in the selected bands. Furthermore, the proposed method is robust to lowpass filter, bandpass filter, cropping, noise addition, MP3 compression attacks and the maximum BER (bit error rate) is 1.41% after lowpass filter attack. To measure the quality of the watermarked sound, subjective listening test, MUSHRA (multiple stimuli with hidden reference and anchor), was conducted. The mean value of MUSHRA listening test is bigger than 98 and 96.67 for every Haegeum sounds and Korean classical music with Haeguem, respectively.

  • PDF

A Study on the Digital Forensic Investigator Model using Privacy Protection Technology (개인정보보호 기술을 활용한 디지털 포렌식 수사 모델 연구)

  • Jang, hee-young;Park, koo-rack;Kim, jea-woong
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2016.05a
    • /
    • pp.317-318
    • /
    • 2016
  • 급속한 현대사회의 정보화로 인하여 개인 정보에 대한 정보 유출 및 위협의 빈도가 높아지고 있는 상황에서 기존의 디지털 포렌식 수사 모델에서 사용하고 있는 해시 검색 프로세스는 개인정보 노출에 취약한 파일이 존재하고 있다. 이에 본 논문에서는 개인정보 노출 취약점 진단을 추가한 해시 검색 프로세스를 제안한다. 이를 통하여 정밀 조사와 일반 조사 대상을 정확하게 파악할 수 있을 것으로 기대된다.

  • PDF

An Improved Detection Performance for the Intrusion Detection System based on Windows Kernel (윈도우즈 커널 기반 침입탐지시스템의 탐지 성능 개선)

  • Kim, Eui-Tak;Ryu, Keun Ho
    • Journal of Digital Contents Society
    • /
    • v.19 no.4
    • /
    • pp.711-717
    • /
    • 2018
  • The breakthrough in computer and network has facilitated a variety of information exchange. However, at the same time, malicious users and groups are attacking vulnerable systems. Intrusion Detection System(IDS) detects malicious behaviors through network packet analysis. However, it has a burden of processing a large amount of packets in a short time. Therefore, in order to solve these problem, we propose a network intrusion detection system that operates at kernel level to improve detection performance at user level. In fact, we confirmed that the network intrusion detection system implemented at kernel level improves packet analysis and detection performance.