• Title/Summary/Keyword: Digital Copyrights

Search Result 68, Processing Time 0.024 seconds

Digital Content Protection and Computer Forensics Evidence Management Mechanism using MPEG-21 in Network Service Environment (네트워크 서비스 환경에서 MPEG-21을 활용한 디지털 콘텐츠 보호 및 컴퓨터 포렌식스 증거 관리 메커니즘)

  • Jang, Eun Gyeom;Lee, Bum Suk
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.2
    • /
    • pp.129-141
    • /
    • 2010
  • In network service environment, cultures from diversified fields are easily accessible thanks to the convenient digital content services. Unfortunately, unauthorized access and indiscreet misuse behaviors have deprived content owners of their copyrights. This study suggests an integrity-ensured model applicable for forensic evidence of digital content infringement in network service environment. The suggested model is based on MPEG-21 core components for digital content protection and the system is designed in connection with the components of digital content forensics. Also, the present study suggests an efficient technology to protect and manage computer forensic evidence and digital content by authorizing digital content use and catching infringing logs of authorized users without lag in network environment for the benefit of network security and reliability.

A Study on Extraction and Comparison of Digital Content Key Frame in UCC Service Environment

  • Jang, Eun-Gyeom
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.8
    • /
    • pp.1020-1028
    • /
    • 2011
  • In this paper, we proposed a mechanism that prevents indiscreet use of digital contents, verifies created content's copyrights to provide services to granted user and protects digital contents by law by authenticating the original digital content whenever an infringement of copyright occurs in UCC environments. The proposed mechanism uses specific information and features of contents as copyrights authentication information without additional information. Also, provides the fact of violation by inferring the modification of the original digital contents. That means this mechanism infers same or similar value from the contents; fraudulent use of content, modification of content color, modification of content format, modification of content resolution and illegal use of frame not principal key frame. In that point, we found that the inferred value from the content differed according to features of content modification.

Information Communication Ethical Study on the Protection of Digital Copyrights and Alternatives: Focusing on the Secondary School Students

  • Huh, Junho
    • Journal of Multimedia Information System
    • /
    • v.3 no.2
    • /
    • pp.27-34
    • /
    • 2016
  • In the past, the judicial circles in the Republic of Korea (ROK) were generous to the online copyright violations of computer software compared to other academic areas or offline violation. However, they started to reconsider such a practice since the FTA talks with some advanced countries began so that new laws had to be established, especially after the first round of negotiations with United States of America (USA) in 2006 during which they changed their views on the matter. Now it became possible to penalize digital copyright violations through lawsuits, and from March 1st, 2017, the court is expected to abolish the nonsuit system for teenagers. Thus, this paper has reviewed the ethical aspects involved in digital copyright protection and examined the possible alternatives, dividing them into three broad groups, before proposing a digital copyright protection curriculum for secondary education.

An Exploratory Study on the Antecedent Factors to the Piracy of the Digital Copyrights (디지털 저작물의 불법복제 행동에 영향을 미치는 요인에 관한 탐색적 연구)

  • Kwak, Won-Il;Choi, Won-Il
    • International Commerce and Information Review
    • /
    • v.10 no.4
    • /
    • pp.47-62
    • /
    • 2008
  • The purpose of this study is to explore the antecedent factors to the piracy of the digital copyrights in order to provide basic data for piracy prevention policy. The findings of study revealed that most respondents had experiences to copy MP3 files illegally. And many respondents answered they didn't copy pirated material by themselves but others did piracy a lot. The feeling of quilt and anxiety against piracy is shown very low level. Low copy cost and regulation level significantly impact upon the cognitive level of other's piracy. Updated contents, the higher price of authenticated materal, piracy regulation are the significant antecedent factors to the level of piracy. The level of piracy activity and anxiety against piracy are significantly different by age. The cognitive level of other's piracy, piracy activity and anxiety are significantly different by gender.

  • PDF

A Study of User Recognition of the Copyright in Academic Libraries (대학도서관 이용자의 저작권인식에 관한 연구)

  • You, Yang-Keun
    • Journal of Korean Library and Information Science Society
    • /
    • v.39 no.1
    • /
    • pp.355-375
    • /
    • 2008
  • Copyrights have threatened by some people even though information transfer methods are various and users can change information with others rapidly through the improvement of digital technology. The purpose of this study is to identify illegal actions against academic library users and to propose a solution to the copyright problem. Through understanding general concepts of copyrights and illegal cases against copyrights, collected essential cases were analysed. The results show that library users have copied and transferred illegally some materials with knowing unlawful actions.

  • PDF

A study of Copyright Infringement Countermeasures for designers (디자이너를 위한 저작권 침해 대응 방안 연구)

  • Lee, Je;Ryu, Seuc-Ho
    • Journal of Digital Convergence
    • /
    • v.14 no.9
    • /
    • pp.447-452
    • /
    • 2016
  • Designers need to manage their copyrights. Designers be placed in both situations. The two situations is sometimes the case that infringes their copyrights and infringes the copyrights of others. But most designers do not know what to do to deal with this situation. Designers have to judge a lot of things for themselves. Designers should inform the user that you have infringed my copyright. And they will have to think about the legal proceedings. This paper was written based on the legal process, conducted from 2012 to 2014. Copyright infringement countermeasures for designers through this case were investigated. And to organize a correspondence course was organized personal correspondence, legal action, ruling process. The study of the processes for copyright holders themselves to respond to the piracy situation is needed.

A Study on Development to Be Protection Profile for Interoperability of Heterogeneous DRM Systems (상이한 DRM 시스템의 호환성을 위한 보호프로파일 개발에 관한 연구)

  • Jo, Hea-Suk;Lee, Kwang-Woo;Jeon, Woong-Ryul;Lee, Yun-Ho;Kim, Seung-Joo;Won, Dong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.16C no.1
    • /
    • pp.1-12
    • /
    • 2009
  • Today, Digital Right Management (DRM) is used to protect copyrights of digital contents from illegal reproduction and redistribution. Unfortunately, current DRM systems are causing user's discomfort because of lack of mutual compatibility. In order to overcome this drawback, technologies for interoperability of heterogeneous DRM systems are developing. In this paper, we study the protection profile for conversion technologies of heterogeneous DRM systems, using the Common Criteria. Especially, this paper is written by reuse of the existing protection profile. Therefore, performance analysis reveals that efficiency of time and cost is significantly improved. This protection profile can be used by contents provider and administrator who manage user's copyrights to reference data for copyright protection.

Design of CEK Distributed Management System for Secure DRM Key Management. (안전한 DRM 키 관리를 위한 비밀 분산 관리 시스템 설계)

  • Sung Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.2
    • /
    • pp.390-396
    • /
    • 2005
  • With the spread of computer and development of internet service, the varied contents and digital data has been produced, then provided. The digital contents are more efficiently able to be created, produced, provided as well as distributed, on the other hand, its own copyrights seem to be more easily broken than analogue contents due to the convenience to make copies of original contents. Therefore, protecting copyrights recently become the key issue. DRM(Digital Rights Management) is the current technology to protect digital contents from duplication but it sometimes causes problems in the key-management. In this thesis, we would first like to analyze DRM and find out some trouble in the key-management of it. Finally, we will show CDMS(CEK Distributed Management System) to improve DRM out of the key-management problem and continue to study for better key-management system with it.

Design and Implementation of Secure DRM System for Contents Streaming (컨텐츠 스트리밍을 위한 안전한 DRM 시스템 설계 및 구현)

  • 이진흥;김태정;박지환
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.177-186
    • /
    • 2003
  • DRM(Digital Rights Management) is a technology that manages secure distributions and copyrights of digital contents on the Internet. It is general giving the rights to use the encrypted contents that are downloaded by a simple authorization process in the existing DRM system. Once this is done you are allowed to access. In this paper, we use RTP(Real-time Transport Protocol) for end-to-end real-time data transmission. And the system is designed to make it Possible to Protect copyrights and to distribute contents with safety through periodic authentication. We implemented DRM system to stand this basis. The proposed system vests only authorized users with authority to access the license. Hence it prevents contents to be distributed and copied illegally on networks.