• Title/Summary/Keyword: Digital Rights

Search Result 460, Processing Time 0.024 seconds

The Fourth Industrial Revolution and Labor Relations : Labor-management Conflict Issues and Union Strategies in Western Advanced Countries (4차 산업혁명과 노사관계 : 노사갈등 이슈와 서구 노조들의 대응전략을 중심으로)

  • Lee, Byoung-Hoon
    • 한국사회정책
    • /
    • v.25 no.2
    • /
    • pp.429-446
    • /
    • 2018
  • The $4^{th}$ Industrial Revolution, symbolizing the explosive innovation of digital technologies, is expected to have a great impact on labor relations and produce a lot of contested issues. The labor-management issues, created by the $4^{th}$ Industrial Revolution, are as follows: (1) employment restructuring, job re-allocation, and skill-reformation, driven by the technological displacement, resetting of worker-machine relationship, and negotiation on labor intensity and autonomy, (2) the legislation of institutional protection for the digital dependent self-employed, derived from the proliferation of platform-mediated labor, and the statutory recognition of their 'workerness', (3) unemployment safety net, income guarantee, and skill formation assistance for precarious workeforce, (4) the protection of worker privacy from workplace surveillance, (5) protecting labor rights of the digital dependent self-employed and prcarious workers and guaranteeing their unionization and collective bargaining. In comparing how labor unions in Western countries have responded to the $4^{th}$ Industrial Revolution, German unions have showed a strategic approach of policy formation toward digital technological innovations by effectively building and utilizing diverse channel of social dialogue and collective bargaining, while those in the US and UK have adopted the traditional approach of organizing and protesting in attempting to protect the interest of platform-mediated workers (i.e. Uber drivers). In light of the best practice demonstrated by German unions, it is necessary to build the process of productive policy consultation among three parties- the government, employers, and labor unions - at multi levels (i.e. workplace, sectoral and national levels), in order to prevent the destructive damage as well as labor-management confrotation, caused by digital technological innovations. In such policy consultation procesess, moreover, the inclusive and integrated approach is required to tackle with diverse problems, derived from the $4^{th}$ Industrial Revolution, in a holistic manner.

The Design of Key Management Module for IPTV Service (IPTV 서비스를 위한 수신 제한 키 관리 시스템 설계)

  • Hwang, Kyung-Min;Kim, Chang-Soo;Kim, Seo-Kyun;Kim, Chul-Won;Park, Ki-Chul;Kim, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.544-547
    • /
    • 2008
  • The Growth of Multimedia Digital Content market is extending to IP network environment. this is realized via IPTV service which provide Triple-Service that is broadcasting, communication, telephone service. Recently on IPTV Settop box has fixed key for control access permission. and this is cause of Wasting resource to operation and management. it can be resolved to apply DRM System which mixed MPEG-21 REL(Rights Expression Language) and XML Signature. In this paper, we designed Permission Management Module for IPTV Service which can control permission to access via MPEG-21 and XML Signature.

  • PDF

System Design and Implementation for New Move Picture Solution EZ-MOV Using FLV (FLV를 이용한 새로운 동명상 솔루션 EZ-MOV 대한 시스템 설계 및 구현)

  • Kwon, O-Byoung;Shin, Hyun-Cheul
    • Convergence Security Journal
    • /
    • v.9 no.2
    • /
    • pp.79-84
    • /
    • 2009
  • Recently, Move Picture Files have the same file format and a compression technique as Window Media Video form. but Moving Pictures using file format and a compression technique have question about Motion blur and compressibility. In this paper, we design and Implement for new Move Picture Solution EZ-MOV using FLV different from developed FLV(Flash Video) in the Macromedia company. EZ-MOV have advantages as follow. first, FLV player is able to compact disk access time and DRM (Digital Rights Management) with a built-in self and unable to an illegal video recording, second, whenever WMV formal file encoded FLV are able to lossless compression to fifty percent, third, FLV is able to Moving Picture streaming no buffering. fourth, FLV file is able streaming service no streaming server. fifth, FLV file is able to streaming service keep pace with download and streaming. sixth, FLV file is able to full duplex service.

  • PDF

Design of Invisible Watermarking for H.264/AVC Video Protection (H.264/AVC 비디오 보호를 위한 비가시적 워터마킹의 설계 및 검증)

  • Park, Hye-Jeong;Choi, Jun-Rim
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.45 no.6
    • /
    • pp.74-79
    • /
    • 2008
  • In this paper, we propose and design a new 0.264/AVC watermarking algorithm for protection of copyright by inserting a watermark after quantization. This invisible watermarking algorithm insets a watermark into chrominance components of I frame such that we can avoid degradation of original images. According to test results we could limit image degradation by 1dB, avoid bit rate increment within 2% and increase processing time by only 2%. The IP is designed by Hynix 0.25 micron technology and the maximum operating frequency of 115MHz is achieved. The PSNR of the embedded watermark is about 35dB according to the test result.

Correlation between Taste and Fashion in Contemporary Consumer Society and Popular Culture (현대소비사회에서의 취향과 유행의 상관성과 대중문화의 역할)

  • Park, Ki-Ung;Jo, Jung-Yeon
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.2
    • /
    • pp.165-175
    • /
    • 2010
  • This paper claims the argument that the taste of own is not the intrinsic value but is determined by the environment or habitus, based on Bourdieu's theory. This concept of taste leads up to a natural stream of imitation and alignment. We conclude that the stream is the fashion which be justified by the major agreement. But the nature of fashion exists in hegemony and determines a sense of kinship or a point of difference. In this regard, popular cultures as a window circulated fashion have a negative consequence that can be method of discriminating the minority and justifying vested rights. Accordingly, we have to become wary of the strategy of control using fashion and popular cultures, and need to recognize the prior paradigm about fashion. In the process, we can expect that fandom or counter cultures based on digital high technology constitute subjectivity and dynamics of popular by interaction between the objects.

Audio Forensic Marking using Psychoacoustic Model II and MDCT (심리음향 모델 II와 MDCT를 이용한 오디오 포렌식 마킹)

  • Rhee, Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.4
    • /
    • pp.16-22
    • /
    • 2012
  • In this paper, the forensic marking algorithm is proposed using psychoacoustic model II and MDCT for high-quality audio. The proposed forensic marking method, that inserts the user fingerprinting code of the audio content into the selected sub-band, in which audio signal energy is lower than the spectrum masking level. In the range of the one frame which has 2,048 samples for FFT of original audio signal, the audio forensic marking is processed in 3 sub-bands. According to the average attack of the fingerprinting codes, one frame's SNR is measured on 100% trace ratio of the collusion codes. When the lower strength 0.1 of the inserted fingerprinting code, SNR is 38.44dB. And in case, the added strength 0.5 of white gaussian noise, SNR is 19.09dB. As a result, it confirms that the proposed audio forensic marking algorithm is maintained the marking robustness of the fingerprinting code and the audio high-quality.

REL Rights document editing and client system based on MPEG-21 Framework (MPEG-21 프레임워크에 기반의 REL 저작권 문서편집 및 클라이언트 시스템)

  • 조휘경;송병규;김태희;홍진우;정회경
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.520-524
    • /
    • 2003
  • Problem of compatibility, content protection, contents circulation ok. was caused between contents offerer and consumers by indiscreet right technical development about digital contents. The MPEG committee proposed MPEG-21 framework for these problem solution and for right managing in MPEG-21 inside XML(eXtensible Markup Language)'s structure REL(Right Expression Language) that is a right expression language propose. Contents protection, circulation, standard right information representation for administration that is reasonable and is the transposition enemy mutually by REL's use doing based on this MPEG-21 were available. Fast correspondence about new technology is necessary circumstance because present MPEG-21 is in study step and REL edit solution as infra technology is required. Also, development of REL document edit system is required mere because this REL document edit has difficulty in edit except expert with MPEG-21 Framework. In this paper, designed and embody about REL document mastication system that right creation and edit are available efficiently about contents easily without comprehension of MPEG-21 framework and client system that present consumption method of REL right document.

  • PDF

Accuracy Assessment of Fishery Map Conversion to World Geodetic System (어장기본도 세계측지계 변환에 따른 정확도 분석)

  • Lee, Seung-Yeol;Lee, Byoung-Kil
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.29 no.6
    • /
    • pp.631-639
    • /
    • 2011
  • There are problems in using existing fisheries maps, because of deterioration of paper maps, as well as various coordinate systems. In this study, accuracy of fishery maps in World Geodetic System are evaluated. Materials on fishery rights in the Jeollanam-do Province, a study area, used many kind of coordinate systems. During digitization, these coordinate systems have been converted and unified in one World Geodetic System, and one projection origin. In this research, the accuracy of the products of digitization is verified using DGPS surveying. The RMSEs are minimum of 4.62m(at the Younggwang Seas) to maximum of 17.47m(at the Jangheung Seas), and average of 11.97m. The results shows that the digitized fishery maps meet the accuracy standard of 1/25,000 digital topographic maps.

Encryption Scheme for MPEG-4 Media Transmission Exploiting Frame Dropping

  • Shin, Dong-Kyoo;Shin, Dong-Il;Shin, Jae-Wan;Kim, Soo-Han;Kim, Seung-Dong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.5
    • /
    • pp.925-938
    • /
    • 2010
  • Depending on network conditions, a communication network could be overloaded when media are transmitted. Research has been carried out to lessen network overloading, such as by filtering, load distribution, frame dropping, and other methods. Among these methods, one of the most effective is frame dropping, which reduces specified video frames for bandwidth diminution. In frame dropping, B-frames are dropped and then I- and P-frames are dropped, based on the dependency among the frames. This paper proposes a scheme for protecting copyrights by encryption, when frame dropping is applied to reduce the bandwidth of media based on the MPEG-4 file format. We designed two kinds of frame dropping: the first stores and then sends the dropped files and the other drops frames in real time when transmitting. We designed three kinds of encryption methods using the DES algorithm to encrypt MPEG-4 data: macro block encryption in I-VOP, macro block and motion vector encryption in P-VOP, and macro block and motion vector encryption in I-, P-VOP. Based on these three methods, we implemented a digital rights management solution for MPEG-4 data streaming. We compared the results of dropping, encryption, decryption, and the quality of the video sequences to select an optimal method, and found that there was no noticeable difference between the video sequences recovered after frame dropping and the ones recovered without frame dropping. The best performance in the encryption and decryption of frames was obtained when we applied the macro block and motion vector encryption in I-, P-VOP.

Web Services-Adaptable Privacy-Aware Digital Rights Management Architecture (웹서비스 환경에서의 프라이버시를 보호하는 디지털 저작권 관리 아키텍쳐)

  • Song, You-Jin;Lee, Dong-Hyeok
    • The Journal of Society for e-Business Studies
    • /
    • v.10 no.4
    • /
    • pp.53-81
    • /
    • 2005
  • Current DRM system has limitation in protection of user's privacy Therefore, many troubles are expected in service providing if it comes into the ubiquitous times of context-aware environment. HKUST Proposed a watermark-based web service DRM system. However, the relevant study does not consider ubiquitous environment and cannot provide service that considered a context. And privacy protection of a user is impossible. On the other hand, Netherlands Phillips laboratory indicated a privacy problem of a DRM system and they proposed an alternative method about this. However, in relevant study, a Sniffing/Replay attack is possible if communicated authentication information are exposed between a user and device. We designed web services adaptable privacy-aware DRM architecture which supplements these disadvantages. Our architecture can secure user authentication mechanism for sniffing/Replay attack and keep anonymity and protect privacy Therefore , we can implement the privacy-aware considered web service DRM system in Context-Aware environment.

  • PDF