• Title/Summary/Keyword: Digital Contents Protection

Search Result 280, Processing Time 0.025 seconds

Prospects & Issues of NFT Art Contents in Blockchain Technology (블록체인 NFT 문화예술콘텐츠의 현황과 과제)

  • Jong-Guk Kim
    • Journal of Information Technology Applications and Management
    • /
    • v.30 no.1
    • /
    • pp.115-126
    • /
    • 2023
  • In various fields such as art, design, music, film, sports, games, and fashion, NFTs (Non-Fungible Tokens) are creating new economic value through trading platforms dedicated to NFT art and content. In this article, I analyze the current state of blockchain technology and NFT art content in the context of an expanding market for blockchain-based NFT art content in the metaverse. I also propose several tasks based on the economic and industrial logic of technological innovation. The first task proposed is to integrate cultural arts on blockchain, metaverse, and NFT platforms through digital innovation, instead of separating or distinguishing between creative production and consumption. Before the COVID-19 pandemic, there was a clear separation between creators and consumers. However, with the rise of Web 3.0 platforms, any user can now create and own their own content. Therefore, it is important to promote a collaborative and integrated approach to cultural arts production and consumption in the blockchain and metaverse ecosystem. The second task proposed is to align the legal framework with blockchain-based technological innovation. The enactment and revision of relevant laws should focus on promoting the development of the NFT trading platform ecosystem, rather than merely regulating it for user protection. As blockchain-based technology continues to evolve, it is important that legal systems adapt to support and promote innovation in the space. This shift in focus can help create a more conducive environment for the growth of blockchain-based NFT platforms. The third task proposed is to integrate education on digital arts, including metaverse and NFT art contents, into the current curriculum. This education should focus on convergence and consilience, rather than merely mixing together humanities, technology, and arts. By integrating digital arts education into the curriculum, students can gain a more comprehensive understanding of the potential of blockchain-based technologies and NFT art. This article examines the digital technological innovation such as blockchain, metaverse, and NFT from an economic and industrial point of view. As a limitation of this research, the critical mind such as philosophical thinking or social criticism on technological innovation is left as a future task.

Detection of Colluded Multimedia Fingerprint by Neural Network (신경회로망에 의한 공모된 멀티미디어 핑거프린트의 검출)

  • Noh Jin-Soo;Rhee Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.4 s.310
    • /
    • pp.80-87
    • /
    • 2006
  • Recently, the distribution and using of the digital multimedia contents are easy by developing the internet application program and related technology. However, the digital signal is easily duplicated and the duplicates have the same quality compare with original digital signal. To solve this problem, there is the multimedia fingerprint which is studied for the protection of copyright. Fingerprinting scheme is a techniques which supports copyright protection to track redistributors of electronic inform on using cryptographic techniques. Only regular user can know the inserted fingerprint data in fingerprinting schemes differ from a symmetric/asymmetric scheme and the scheme guarantee an anonymous before recontributed data. In this paper, we present a new scheme which is the detection of colluded multimedia fingerprint by neural network. This proposed scheme is consists of the anti-collusion code generation and the neural network for the error correction. Anti-collusion code based on BIBD(Balanced Incomplete Block Design) was made 100% collusion code detection rate about the average linear collusion attack, and the hopfield neural network using (n,k)code designing for the error bits correction confirmed that can correct error within 2bits.

A Study on Factors Affecting the Investment Intention of Information Security (정보보호 투자의도에 영향을 미치는 요인에 대한 연구)

  • Lee, Hong-Je;Roh, Eun-Hee;Han, Kyeong-Seok
    • Journal of Digital Contents Society
    • /
    • v.19 no.8
    • /
    • pp.1515-1525
    • /
    • 2018
  • Security threats in the 4th Industrial Revolution have expanded to the issue of safety, but the environment for information security of domestic companies is still at a low level. This study aims to propose policy implications by empirically analyzing factors affecting investment intention. We investigated the state of information security and protection behavior and expanded UTAUT to investigate correlations. The results showed that information assets affect facilitating conditions, and perceived and new concerns have impacts on social influence. Social influence affect experience and habits, but the impact on security investment intentions was rejected. Facilitation conditions, previous experiences and habits have great influences on investment intention, new service security investment intention. The influence of perceived and new concern are low or rejected. There are moderating effects between types of business, size, security organization, experience of infringement, security personnel ratio, and personal information collection. This study will help to establish policies for enhancing the level of information security.

Investigating the Trends of Research for the Platform Work (플랫폼노동 연구 동향 분석)

  • Bang, Mi-Hyun;Lee, Young-Min
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.3
    • /
    • pp.430-440
    • /
    • 2021
  • We analyzed research trends of 288 Korean academic dissertations and articles regarding platform work, using topic modeling and keyword network analysis method. Research disciplines of many studies were laws, business administration, and economics fields. Thigh frequent themes were platform labor protection measures and direct or indirect effects of the sharing economy. The main keywords were digital, value, industry, and labor in terms of infrastructure and structural change. Besides, the main topics were the protection of platform workers, the values of sharing services, digital paradigm, and platform regulations. Based on the results of the analysis, we derived four implications and suggestions such as researching structural frames in macroscopic contexts, generalizing case analysis, and technology supplementation by applying average and quantitative analysis methods, researching individual competency development to realize the essential symbiotic value of sustainability, and developing customized vocational education and training programs.

A Novel Method for Effective Protection of IPTV Contents with One-Time Password and Conditional Access System (IPTV 시스템에서의 효과적인 콘텐츠 보호를 위한 일회성 암호와 수신제한시스템을 사용한 보안 모델)

  • Seo, Ki-Taek;Kim, Tae-Hun;Kim, Jung-Je;Lim, Jong-In;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.31-40
    • /
    • 2010
  • The evolution of internet have opened the world of IPTV. With internet protocol, IPTV broadcasts contents stream. The IP protocol doesn't provide secure service due to IP characteristics. So, it is important to provide both connect and secure service. Conditional Access System and/or Digital Right Management are being used to protect IPTV contents. However, there exist restrictions in the view of security. In this paper, we analyse existing security technologies for IPTV and propose a novel method to enforce security efficiently. In the proposed method, OTP is used for encryption/decryption contents and CAS controls key for encryption/decryption and the right of user. With this scheme, it reduces the load of the system and provides more security.

Design and Implementation of Serial Key Certification System Using Smartcard (스마트카드를 이용한 시리얼 키 인증 시스템 구현 및 설계)

  • Kim, Yu-Doo;Moon, Il-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.4
    • /
    • pp.473-478
    • /
    • 2007
  • Current certification system use serial key for protect copyright of software and digital contents. But It is not efficient system, because It is not protect copyright through create virtual key or use public key. So we research on various cryptology for prevent illegal copy of serial key, but It is not enough protection of copyright that use software technology only. In this paper, we propose certification system using smart card for protect copyright of software and digital contents.

  • PDF

The Architectural Simulation for Kenjeongjun of Kyungbok Palace Using Computer Graphics (컴퓨터 그래픽을 이용한 경복궁 근정전 건축 시뮬레이션)

  • Lee, Kang-Hoon;Lee, Hang-Chan
    • Journal of Digital Contents Society
    • /
    • v.9 no.2
    • /
    • pp.269-276
    • /
    • 2008
  • Recently, the concerning about cultural heritages has been increased. As a result, the protection, repairing and restoration of cultural assets have been actively in progress. The biggest project of cultural asset reconstructions is the restoration of Kyungbok Palace and it has been in proceed step by step since in 1989. The actual sizes of these traditional buildings have been measured and recorded for future maintenance. In this paper, the 3D computer graphic technique is used to help understanding the inner structures of the traditional buildings as well as their construction processes. In other word, the construction simulation of Keunjeongjun which is the center building of Kyungbok Palace have been produced using 3D computer graphic techniques. The purpose of this project is aiding people in understanding the process of traditional palace architecture in Korea.

  • PDF

A Direction-Adaptive Watermarking Technique Based on 2DCT in the Buyer-Seller Watermarking Protocol (구매자-판매자 워터마킹 프로토콜상에서 DCT 기반의 방향성 적응 워터마킹)

  • Seong, Teak-Young;Kwon, Ki-Chang;Lee, Suk-Hwan;Kwon, Ki-Ryong;Woo, Chong-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.7
    • /
    • pp.778-786
    • /
    • 2014
  • Buyer-seller watermarking protocol is one of the copyright protection techniques which combine a cryptographic protocol used in electronic commerce with a digital wetermarking scheme aiming at proving the ownership of multimedia contents and preventing the illegal reproduction and redistribution of digital contents. In this paper, it is proposed a new watermarking scheme in an encrypted domain in an image that is based on the block-DCT framework. In order to implement watermarking scheme in a public-key cryptosystem, it is divided that frequency coefficients exist as real number into integer and decimal layer. And the decimal layer is modified integer type through integral-processing. Also, for robustness and invisibility required in watermarking scheme, it is designed a direction-adaptive watermarking scheme based on locally edge-properties of each block in an image through analyzing distribution property of the frequency coefficients in a block using JND threshold.

Performance Comparison of On-demand Routing Protocol to Supply Secure Service for Mobile Ad Hoc Networks (MANET에서 안전한 서비스 제공을 위한 On-demand 라우팅 프로토콜의 성능 비교)

  • Heo, Jin-Kyoung;Yang, Hwan-Seok
    • Journal of Digital Contents Society
    • /
    • v.10 no.2
    • /
    • pp.349-355
    • /
    • 2009
  • MANET is network that attach importance to not only service of large network as internet but also support of communication among each nodes because infrastructure constitution is disadvantage economically or difficult physically. The most important part in protection of systems constitute MANET is that authenticate each nodes securely and offer reliable service. Well defined routing technique is necessity to this. In this paper, in order to offer safe service, we compare capacity of present security routing protocol, analyze to solve weakness of existing on-demand routing protocol and existing routing protocol and argue with study course of hereafter security routing protocol.

  • PDF

Design and Implementation of the REL Document Processing System Based on MPEG-21 Framework for Rights Management (저작권 관리를 위한 MPEG-21 프레임워크 기반의 REL 문서 처리 시스템 설계 및 구현)

  • Ko Kwang-San;Song Jong-Chul;Jung Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.3
    • /
    • pp.555-560
    • /
    • 2005
  • Problem of compatibility, contents protection, contents circulation etc. was caused between contents offerer and consumers by indiscreet rights technical development about digital contents. Therefore, MPEG-21 framework proposed the REL(Right Expression Language) based on XML(extensible Markup Language) by rights expression language for rights management. We designed and implemented of the REL document editing system that rights creation and edit are available efficiently about contents easily without comprehension of MPEG-21 framework and client system that present consumption method of REL document.