• Title/Summary/Keyword: Internet service use

Search Result 1,480, Processing Time 0.036 seconds

A digital Audio Watermarking Algorithm using 2D Barcode (2차원 바코드를 이용한 오디오 워터마킹 알고리즘)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.2
    • /
    • pp.97-107
    • /
    • 2011
  • Nowadays there are a lot of issues about copyright infringement in the Internet world because the digital content on the network can be copied and delivered easily. Indeed the copied version has same quality with the original one. So, copyright owners and content provider want a powerful solution to protect their content. The popular one of the solutions was DRM (digital rights management) that is based on encryption technology and rights control. However, DRM-free service was launched after Steve Jobs who is CEO of Apple proposed a new music service paradigm without DRM, and the DRM is disappeared at the online music market. Even though the online music service decided to not equip the DRM solution, copyright owners and content providers are still searching a solution to protect their content. A solution to replace the DRM technology is digital audio watermarking technology which can embed copyright information into the music. In this paper, the author proposed a new audio watermarking algorithm with two approaches. First, the watermark information is generated by two dimensional barcode which has error correction code. So, the information can be recovered by itself if the errors fall into the range of the error tolerance. The other one is to use chirp sequence of CDMA (code division multiple access). These make the algorithm robust to the several malicious attacks. There are many 2D barcodes. Especially, QR code which is one of the matrix barcodes can express the information and the expression is freer than that of the other matrix barcodes. QR code has the square patterns with double at the three corners and these indicate the boundary of the symbol. This feature of the QR code is proper to express the watermark information. That is, because the QR code is 2D barcodes, nonlinear code and matrix code, it can be modulated to the spread spectrum and can be used for the watermarking algorithm. The proposed algorithm assigns the different spread spectrum sequences to the individual users respectively. In the case that the assigned code sequences are orthogonal, we can identify the watermark information of the individual user from an audio content. The algorithm used the Walsh code as an orthogonal code. The watermark information is rearranged to the 1D sequence from 2D barcode and modulated by the Walsh code. The modulated watermark information is embedded into the DCT (discrete cosine transform) domain of the original audio content. For the performance evaluation, I used 3 audio samples, "Amazing Grace", "Oh! Carol" and "Take me home country roads", The attacks for the robustness test were MP3 compression, echo attack, and sub woofer boost. The MP3 compression was performed by a tool of Cool Edit Pro 2.0. The specification of MP3 was CBR(Constant Bit Rate) 128kbps, 44,100Hz, and stereo. The echo attack had the echo with initial volume 70%, decay 75%, and delay 100msec. The sub woofer boost attack was a modification attack of low frequency part in the Fourier coefficients. The test results showed the proposed algorithm is robust to the attacks. In the MP3 attack, the strength of the watermark information is not affected, and then the watermark can be detected from all of the sample audios. In the sub woofer boost attack, the watermark was detected when the strength is 0.3. Also, in the case of echo attack, the watermark can be identified if the strength is greater and equal than 0.5.

Exploring the 4th Industrial Revolution Technology from the Landscape Industry Perspective (조경산업 관점에서 4차 산업혁명 기술의 탐색)

  • Choi, Ja-Ho;Suh, Joo-Hwan
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.47 no.2
    • /
    • pp.59-75
    • /
    • 2019
  • This study was carried out to explore the 4th Industrial Revolution technology from the perspective of the landscape industry to provide the basic data necessary to increase the virtuous circle value. The 4th Industrial Revolution, the characteristics of the landscape industry and urban regeneration were considered and the methodology was established and studied including the technical classification system suitable for systematic research, which was selected as a framework. First, the 4th Industrial Revolution technology based on digital data was selected, which could be utilized to increase the value of the virtuous circle for the landscape industry. From 'Element Technology Level', and 'Core Technology' such as the Internet of Things, Cloud Computing, Big Data, Artificial Intelligence, Robot, 'Peripheral Technology', Virtual or Augmented Reality, Drones, 3D 4D Printing, and 3D Scanning were highlighted as the 4th Industrial Revolution technology. It has been shown that it is possible to increase the value of the virtuous circle when applied at the 'Trend Level', in particular to the landscape industry. The 'System Level' was analyzed as a general-purpose technology, and based on the platform, the level of element technology(computers, and smart devices) was systematically interconnected, and illuminated with the 4th Industrial Revolution technology based on digital data. The application of the 'Trend Level' specific to the landscape industry has been shown to be an effective technology for increasing the virtuous circle values. It is possible to realize all synergistic effects and implementation of the proposed method at the trend level applying the element technology level. Smart gardens, smart parks, etc. have been analyzed to the level they should pursue. It was judged that Smart City, Smart Home, Smart Farm, and Precision Agriculture, Smart Tourism, and Smart Health Care could be highly linked through the collaboration among technologies in adjacent areas at the Trend Level. Additionally, various utilization measures of related technology applied at the Trend Level were highlighted in the process of urban regeneration, public service space creation, maintenance, and public service. In other words, with the realization of ubiquitous computing, Hyper-Connectivity, Hyper-Reality, Hyper-Intelligence, and Hyper-Convergence were proposed, reflecting the basic characteristics of digital technology in the landscape industry can be achieved. It was analyzed that the landscaping industry was effectively accommodating and coordinating with the needs of new characters, education and consulting, as well as existing tasks, even when participating in urban regeneration projects. In particular, it has been shown that the overall landscapig area is effective in increasing the virtuous circle value when it systems the related technology at the trend level by linking maintenance with strategic bridgehead. This is because the industrial structure is effective in distributing data and information produced from various channels. Subsequent research, such as demonstrating the fusion of the 4th Industrial Revolution technology based on the use of digital data in creation, maintenance, and service of actual landscape space is necessary.

Maximizing Utilization of Bandwidth using Multiple SSID in Multiple Wireless Routers Environment (다중 무선 공유기 환경에서 Multiple SSID를 이용한 대역폭 이용률 극대화)

  • Kwak, Hu-Keun;Yoon, Young-Hyo;Chung, Kyu-Sik
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.5
    • /
    • pp.384-394
    • /
    • 2008
  • A wireless router is a device which allows several wireless clients to share an internet line using NAT (Network Address Translation). In a school or a small office environment where many clients use multiple wireless routers, a client may select anyone of wireless routers so that most clients can be clustered to a small set of the wireless routers. In such a case, there exists load unbalancing problem between clients and wireless routers. One of its result is that clients using the busiest router get poor service. The other is that the resource utilization of the whole wireless routers becomes very low. In order to resolve the problems, we propose a load sharing scheme to maximize network bandwidth utilization based on multiple SSID. In a time internal, the proposed scheme keeps to show the available bandwidth information of all the possible wireless routers to clients through multiple SSID. A new client can select the most available band with router. This scheme allows to achieve a good load balancing between clients and routers in terms of bandwidth utilization. We implemented the proposed scheme with ASUS WL 500G wireless router and performed experiments. Experimental results show the bandwidth utilization improvement compared to the existing method.

A Study on The Security Vulnerability Analysis of Open an Automatic Demand Response System (개방형 자동 수요 반응 시스템 보안 취약성 분석에 관한 연구)

  • Chae, Hyeon-Ho;Lee, June-Kyoung;Lee, Kyoung-Hak
    • Journal of Digital Convergence
    • /
    • v.14 no.5
    • /
    • pp.333-339
    • /
    • 2016
  • Technology to optimize and utilize the use and supply of the electric power between consumer and supplier has been on the rise among the smart grid power market network in electric power demand management based on the Internet. Open Automated Demand Response system protocol, which can deliver Demand Response needed in electric power demand management to electricity supplier, system supplier and even the user is openADR 2.0b. This paper used the most credible, cosmopolitanly proliferated EPRI open source and analysed the variety of security vulnerability that developed VEN and VTN system may have. Using the simulator for attacking openADR protocol, the VEN/VTN system that has been implemented as EPRI open source was conducted to attack in a variety of ways. As a result of the analysis, we were able to get the results that the VEN/VTN system has security vulnerabilities to the parameter tampering attacks and service flow falsification attack. In conclusion, if you want to implement the openADR2.0b protocol system in the open or two-way communication environment smart grid network, considering a variety of security vulnerability should be sure to seek security technology and services.

Development of Education Programs Academia-Industry Collaboration for Undergraduate Students Majoring in Digital Contents Design (디지털 콘텐츠 디자인 전공 학부생을 대상으로 한 산학협력 수업에 관한 사례 연구)

  • Yi, Sang-Sun
    • Archives of design research
    • /
    • v.19 no.1 s.63
    • /
    • pp.151-162
    • /
    • 2006
  • Nowadays most business organizations wish to hire competent people who can do their own jobs efficiently right after their employment. The primary goal of this study is to focus on how we can train undergraduate students in academia-industry collaboration to satisfy this requirement. By making use of the funding from the Ministry of Education & Human Resources Development to support academia-industry collaboration program, we established an intramural company, Hankyong Design Company, and set up several studio courses for junior and senior students. To develop these courses efficiently for the first semester of 2005, studied both intramural and extramural environments of academia-industry collaboration and searched for good examples of them. Based on this investigation, I made some assumptions that how we can perform the academia-industry collaboration program for undergraduate students successfully. I chose several design tasks related to digital communications, and appointed WisePost Inc., an Internet communication service company for MSN Messenger, to be a collaborator. We made the 'Interactive Design' studio courses together and applied the courses to 20 juniors. At the end of the semester, we evaluated the works of the students, and selected and commercialized some excellent items among them. During the course work, I realized the fact that education programs in academia-industry collaboration is feasible for undergraduate students majoring in design. I understanded the overall merits and demerits of conventional studio and academia-industry collaboration courses. In addition, the results from the present study suggest that the role of professor in academia-industry collaboration program would be quite different from conventional studio courses.

  • PDF

Film Line Scratch Detection using a Neural Network based Texture Classifier (신경망 기반의 텍스처 분류기를 이용한 스크래치 검출)

  • Kim, Kyung-Tai;Kim, Eun-Yi
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.6 s.312
    • /
    • pp.26-33
    • /
    • 2006
  • Film restoration is to detect the location and extent of defected regions from a given movie film, and if present, to reconstruct the lost information of each region. It has gained increasing attention by many researchers, to support multimedia service of high quality. In general, an old film is degraded by dust, scratch, flick, and so on. Among these, the most frequent degradation is the scratch. So far techniques for the scratch restoration have been developed, but they have limited applicability when dealing with all kinds of scratches. To fully support the automatic scratch restoration, the system should be developed that can detect all kinds of scratches from a given frame of old films. This paper presents a neurual network (NN)-based texture classifier that automatically detect all kinds of scratches from frames in old films. To facilitate the detection of various scratch sizes, we use a pyramid of images generated from original frames by having the resolution at three levels. The image at each level is scanned by the NN-based classifier, which divides the input image into scratch regions and non-scratch regions. Then, to reduce the computational cost, the NN-based classifier is only applied to the edge pixels. To assess the validity of the proposed method, the experiments have been performed on old films and animations with all kinds of scratches, then the results show the effectiveness of the proposed method.

A Study on Implementation and Design of Scheme to Securely Circulate Digital Contents (디지털콘텐츠의 안전한 유통을 위한 구조 설계 및 구현에 관한 연구)

  • Kim, Yong;Kim, Eun-Jeong
    • Journal of the Korean Society for information Management
    • /
    • v.26 no.2
    • /
    • pp.27-41
    • /
    • 2009
  • With explosive growth in the area of the Internet and IT services, various types of digital contents are generated and circulated, for instance, as converted into digital-typed, secure electronic records or reports, which have high commercial value, e-tickets and so on. However, because those digital contents have commercial value, high-level security should be required for delivery between a consumer and a provider with non face-to-face method in online environment. As a digital contents, an e-ticket is a sort of electronic certificate to assure ticket-holder's proprietary rights of a real ticket. This paper focuses on e-ticket as a typical digital contents which has real commercial value. For secure delivery and use of digital contents in on/off environment, this paper proposes that 1) how to generate e-tickets in a remote e-ticket server, 2) how to authenticate a user and a smart card holding e-tickets for delivery in online environment, 3) how to save an e-ticket transferred through network into a smart card, 4) how to issue and authenticate e-tickets in offline, and 5) how to collect and discard outdated or used e-tickets.

The Purpose of Hospital Information Usage by Medical Consumers and the Practicability of the Acquired Information (의료소비자들의 병원정보 이용목적과 획득한 정보의 실용성)

  • Ha, Oh-Hyun;Jung, Yong-Mo
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.7
    • /
    • pp.376-385
    • /
    • 2014
  • This study is aimed to ascertain the hospital information inquired by medical consumers and to propose the consumer-oriented marketing direction of the medical institutions. In the pursuit of this purpose, we examined about the purpose of the hospital information usage by medical consumers, the contents of the inquired information, the method of the information acquisition and the practicability of the acquired information. As the result of this study, more than 90% out of the purposes of hospital information usage is for the practical use of the medical institution, especially, 58.7% is for the effective selection of the medical institutions when consumer's family or relatives are sick. Regardless of the purpose of hospital information usage, for the contents of the inquired information, more than 50% responded with the medical institution facility, the specific contents about the professional field and the special field. The most favorite method to acquire the information according to the purpose of hospital information usage is through 'Acquaintance' which are the highest rate, more than 50% and the level of 24~28% are through 'Internet'. And the practicability of the acquired information was fairly low like the result as 4.8% for the selection of the medical institutions when consumer's family or relatives are sick and 0.5% for the health counseling or the medical check-up.

Implementation of a Library Function of Scanning RSSI and Indoor Positioning Modules (RSSI 판독 라이브러리 함수 및 옥내 측위 모듈 구현)

  • Yim, Jae-Geol;Jeong, Seung-Hwan;Shim, Kyu-Bark
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.11
    • /
    • pp.1483-1495
    • /
    • 2007
  • Thanks to IEEE 802.11 technique, accessing Internet through a wireless LAN(Local Area Network) is possible in the most of the places including university campuses, shopping malls, offices, hospitals, stations, and so on. Most of the APs(access points) for wireless LAN are supporting 2.4 GHz band 802.11b and 802.11g protocols. This paper is introducing a C# library function which can be used to read RSSIs(Received Signal Strength Indicator) from APs. An LBS(Location Based Service) estimates the current location of the user and provides useful user's location-based services such as navigation, points of interest, and so on. Therefore, indoor, LBS is very desirable. However, an indoor LBS cannot be realized unless indoor position ing is possible. For indoor positioning, techniques of using infrared, ultrasound, signal strength of UDP packet have been proposed. One of the disadvantages of these techniques is that they require special equipments dedicated for positioning. On the other hand, wireless LAN-based indoor positioning does not require any special equipments and more economical. A wireless LAN-based positioning cannot be realized without reading RSSIs from APs. Therefore, our C# library function will be widely used in the field of indoor positioning. In addition to providing a C# library function of reading RSSI, this paper introduces implementation of indoor positioning modules making use of the library function. The methods used in the implementation are K-NN(K Nearest Neighbors), Bayesian and trilateration. K-NN and Bayesian are kind of fingerprinting method. A fingerprint method consists of off-line phase and realtime phase. The process time of realtime phase must be fast. This paper proposes a decision tree method in order to improve the process time of realtime phase. Experimental results of comparing performances of these methods are also discussed.

  • PDF

Examination of the Physical Environmental Readiness for Smart Learning in Special Schools and Classes and the Actual Utilization of Smart Devices by Special Education Teachers (특수학교 및 특수학급의 스마트교육 환경 조성 및 특수교사의 스마트기기 활용 실태)

  • Kim, Jung-Soo;Kim, Suk-Jin
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.10
    • /
    • pp.415-424
    • /
    • 2018
  • The purpose of this study was to examine the physical environmental readiness for smart learning and the actual utilization of smart devices by special education teachers, and to suggest ways to vitalize smart education. For this, a 14-item survey questionnaire was developed, which touched upon issues regarding the availability of wireless internet service and teachers' utilization of smart devices. An online survey was conducted among a randomly chosen sample of 991 special education teachers across the nation, including teachers who work at special schools for developmentally disabled students and in special classes at all three levels of regular schools.The collected data was analyzed with the method of a cross-time-frequency analysis using a SPSS 21.0 statistics program. The research findings indicated that both special schools and classes had a poor smart education environment and that special education teachers were having a harding time because of the lack of the infrastructure and additional expenses. In addition, special education teachers were found to use smart device mostly for the purpose of motivating students. These research findings propose that it is urgent to set up a proper smart education environment for special needs students and to provide a systematic training program for special education teachers.