• Title/Summary/Keyword: Illegal Distribution

Search Result 176, Processing Time 0.025 seconds

Research on illegal copyright distributor tracking and profiling technology (불법저작물 유포자 행위분석 프로파일링 기술 연구)

  • Kim, Jin-gang;Hwang, Chan-woong;Lee, Tae-jin
    • Journal of Internet Computing and Services
    • /
    • v.22 no.3
    • /
    • pp.75-83
    • /
    • 2021
  • With the development of the IT industry and the increase of cultural activities, the demand for works increases, and they can be used easily and conveniently in an online environment. Accordingly, copyright infringement is seriously occurring due to the ease of copying and distribution of works. Some special types of Online Service Providers (OSP) use filtering-based technology to protect copyrights, but they can easily bypass them, and there are limits to blocking all illegal works, making it increasingly difficult to protect copyrights. Recently, most of the distributors of illegal works are a certain minority, and profits are obtained by distributing illegal works through many OSP and majority ID. In this paper, we propose a profiling technique for heavy uploader, which is a major analysis target based on illegal works. Creates a feature containing information on overall illegal works and identifies major heavy uploader. Among these, clustering technology is used to identify heavy uploader that are presumed to be the same person. In addition, heavy uploaders with high priority can be analyzed through illegal work Distributor tracking and behavior analysis. In the future, it is expected that copyright damage will be minimized by identifying and blocking heavy uploader that distribute a large amount of illegal works.

Study on the characteristics of Dormestic Illegal Whaling and Measures for Crackdown (국내 고래류 불법포획의 특징 및 단속방안 연구)

  • Yoon, Hyun-Kyoung;Kim, Jin-Sun;Kim, Sea-In;Kim, Jun-Soo;Choo, Min-Kyu
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.10
    • /
    • pp.554-562
    • /
    • 2022
  • Humans technological advancements have resulted in the depletion of whale resources. Accordingly, the International Whaling Commission was established to preserve whale resources and ensure the orderly development of the whaling industry. After a commercial whaling moratorium came into effect, the international trade of whale meat and related products was banned. However, There is a systematic activity through illegal remodeling ships because whales incidentally caught may be distributed in Korea and have a significant economic benefit. Although suspected illegal whaling is actively cracked down, but it is still insufficient to prevent illegal whaling and distribution. To prevent this, stereoscopic crackdowns utilizing air forces and patrol ships are effective, and it is necessary to quickly separate the captured ship and crew to prevent the destruction of evidence. For the transparent distribution of whale meat, it is necessary to advance related technologies such as whale species identification and individual identification of forensic science institutions based on whale DNA database of the National Institute of Fisheries Science. Accordingly, the Korea Coast Guard Research Center is directly conducting research on related national R&D project. To increase the efficiency of identifying whale-related evidence at crime scene, a rapid test kit that responds specifically to whale bloodstrains is developing and evidence transport packs are manufacturing and distributing, while identification technologies are also being advanced.

DRM Implementation by Multimedia Fingerprint (멀티미디어 핑거프린트에 의한 DRM 구현)

  • Rhee, Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.3
    • /
    • pp.50-56
    • /
    • 2009
  • Recently, according to the product variety of multimedia content some problems are occurred as like an illegal copying, an illegal distribution and a copyright infringement etc. So, for the solution of these problems, some methods were proposed as like watermarking which inserts the information of copyright to the content and the cipher for authentication to DRM which prevents an illegal copying using RSA. In this paper, the multimedia fingerprint based on BIBD code is inserted to the bit-plane of the image content for DRM with RSA, and while the decoding processing. The experiment is operated with the consideration of the image transmission and the transformation. As a result it confirmed that the multimedia fingerprint code inserted in image is detected 60% upper at AWGN 7dB and detected completely 100% at AWGN 10dB upper on PSNR 30, 40, 70 and 80 of Stirmark attacks.

The Study on Design and Implementation of MSEC-based Group Key Management Protocol for Corporate Secret Distribution (기업비밀유통을 위한 MSEC 기반 그룹 키 관리 프로토콜 설계와 구현 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.11 no.6
    • /
    • pp.87-110
    • /
    • 2010
  • Recently competitive Korean companies are suffered from financial loss due to illegal exposure of their own proprietary know-how secrets, since it is difficult to watch hidden illegal channels to leak them due to their digitalization. Today the DRM-based system designed to protect such secrets is insufficient to prevent it, since DRM-based protection system cannot defend the intelligent robbery of secrets, in special, employee's robbery. The MSEC is much appropriate to secure secrets against employee's robbery. Our paper notes that IGMP, MSEC and SNMP can work easily together to realize secure system that satisfy strong security condition for prevention from leaking secrets. Since the previous research was on the architectural design for prevention of illegal exposure, this paper proposes the efficient protocol based on MSEC protocol. Our protocol satisfies the strong security conditions that the principles that the secret should be stored/distributed only in an encrypted shape, and should be separated physically from its encryption key, and should be carried in registered mobile storage separate from its processing device, and should be verified in terms of both user and device. Thus this paper proposes both the protocol for secret document distribution and its group key management.

Software License Management Agent System for Electronic Commerce (전자 상거래를 위한 소프트웨어 사용권 관리 에이전트 시스템)

  • Yoon, Woo-Seong;Yoon, Jung-Mo;Kim, Tai-Yun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.1
    • /
    • pp.77-86
    • /
    • 2001
  • With the growth of the EC(Electronic Commerce), Buying and selling software through the internet are expanded. Among the ESD(Electronic Software Distribution) methods, Buy-first method and TrY-before-bu1 method can not solve the illegal copy problem. Recently developed EL(Electronic License) model solve the illegal copy problem by separating the software and license. But this method also can not support various ways for payment. In this paper we propose the software license management system that is a newly form like ESD model. This system proposes NL(New License) to support various payment methods and SC(Software Charge) to insure that a seller takes the software price. Agent of the proposed system offers scalability to other systems and illegal copy protection function bv managing NL and SC.

  • PDF

Core Competency of Content Intermediary and Improvement in Content Distribution Channel: Focused on Broadcasting Content Download Market (온라인 방송콘텐츠 유통 중개업자의 핵심 역량과 유통구조 개선효과에 관한 사례 (방송콘텐츠 다운로드 시장을 중심으로))

  • Kim, Yoo-Jung;Kim, Kwan-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.9
    • /
    • pp.254-266
    • /
    • 2011
  • Wired and mobile Internet has led to increase in online broadcasting content market size. In particular, the fast-growing smart devices like smart phone and tablet PC in mobile Internet market has accelerated the growth of online broadcasting content service market. Meanwhile, the illegal distribution of online broadcasting content has been widespread in this market. There are also significant transaction costs, search costs, contracting and coordination costs in online broadcasting content market. MCP(Master content provider) which is a content distributor has been playing a critical role in preventing illegal content distribution, reducing costs and removing inefficiencies of online broadcasting content market. Thus, the purpose of this study is to investigate the competency of MCP to streamline the online broadcasting contents market from the resource- based view. And this study conducted a case study to explain the status of online broadcasting content market and define what kinds of problems and issues are there in the market in a systematic way. The case study also showed how MCP competency plays an important role in reducing administrative and transaction costs and in solving illegal content distribution and other inefficiencies of the online broadcasting contents market.

Cargo Accident with Car Sharing in South Korea

  • Kwak, Young-Arm;Cho, Young-Sang
    • Journal of Distribution Science
    • /
    • v.15 no.8
    • /
    • pp.29-36
    • /
    • 2017
  • Purpose - This paper proposes some ideas with a view to reducing any possible accidents caused by unlicensed drivers and an illegal use of other's name, particularly by teenagers in consideration of easy and simple instruction on smartphone with very weak and mere consciousness on auto life. Research design, data, and methodology - This study analyzes some accident cases between cargo trucks and rental cars in South Korea, and unlicensed vehicle with unlicensed drivers who use rental cars collided with cargo trucks which were loaded a lot of goods to be delivered to buyer designated. In order to fulfill this research, a case study accompanied with literature survey was conducted. Ideal suggestion for the right growth on rental car industry will be realized by legislation of the law. Results - This paper classified bodily injury of the victim, property damage and damaged cargo arising out of the unlicensed who is driving on car sharing service in South Korea. Conclusions - For the purpose of reducing cargo accidents caused by unlicensed drivers and an illegal use of other's name particularly by teenagers, this paper proposes some ideas of Amendment of the law, Paradigm shift of car sharing company, Preparation by association side and Technical Complementary Measures in South Korea.

Development of a 3D Printing Open-market System for Copyright Protection and Remote 3D Printing (3D프린터용 설계데이터의 저작권보호와 원격출력을 지원하는 오픈 마켓 시스템 개발)

  • Kim, Sung Gyun;Yoo, Woosik
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.41 no.3
    • /
    • pp.253-258
    • /
    • 2015
  • The 3D printing is any of various processes for making a three dimensional object of almost any shape from a 3D model. Recently, a rapidly expanding hobbyist and home-use market has become established with the inauguration of the open-source RepRap and Fab@Home projects. However, this causes problems regarding copyright protection and usage of illegal 3D data. In this paper, we developed a 3D printing open-market system, which guarantees copyright protection using the remote 3D printing without direct distribution of 3D design data. Because most of the home-use 3D printers are FFF (Fused Filament Fabrication) based on NC code system, open-market system uses FFF 3D printers. Also, open-market system inspects the uploaded 3D model data, so the system can prevent distribution of illegal model data such as weapons, etc.

A Study on the Improvement of Digital Content Distribution System - The Focus of Digital Content Transaction Authentication System - (디지털콘텐츠 유통 활성화를 위한 제도개선방안 연구 - 디지털콘텐츠 거래인증제도를 중심으로 -)

  • O, Sang-Hun;Ham, Jeong-Hun;Park, Yeo-Won;Lee, Yong-Gyu
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2003.12a
    • /
    • pp.45-57
    • /
    • 2003
  • In recent years, the number of digital content transaction has increased dramatically, in main, owing to the innovation of IT technology. At the same time, it creates new problems which have never been found in traditional transactions. Especially, due to the easy-copy characteristics of digital content, the illegal usage of digital content proliferates. Also the conflicts between seller an d buyer in digital content transactions on cyberspace market take place frequently because contracts were made without face-to-face discussion. The increase of illegal usage and conflict in digital content market would diminish motivation of creators for their work, furthermore break down digital content market on cyberspace. Digital content transaction authentication system would play an important role in creating sound digital content market. Especially, it would make big contribution to reducing the number of conflict between seller and buyer. In this context, the main objective of this study is to suggest operational model of digital content transaction authentication and to explain critical success factors in organizing digital content transaction authentication system.

  • PDF

Design & Implementation of DRM System for End-to-end Content Protection (End-to-end 콘텐츠 보호를 위한 DRM 시스템 설계 및 구현)

  • Jeong Yeon-Jeong;Yoon Ki-Song
    • The KIPS Transactions:PartC
    • /
    • v.13C no.1 s.104
    • /
    • pp.35-44
    • /
    • 2006
  • Current technologies on digital rights management (DRM) have focused on security and encryption as a means of solving the issue of unauthorized copying, that is, locking the content and limiting its distribution to only purchasers. But, illegal content copy should be protected not only from purchasers but also from other principals such as media distributors and content providers. In this paper, we designed and implemented end-to-end digital lights management system that can cover a content protection on the overall value-chains of content distribution. Proposed system provides content protection and secure management of digital rights in creator, provider, and distributor like in purchaser. Accordingly it can provide an environment protecting each principal's digital rights and prohibiting illegal usage of content.