• Title/Summary/Keyword: Software Copyright

Search Result 104, Processing Time 0.019 seconds

Copyright Protection for Fire Video Images using an Effective Watermarking Method (효과적인 워터마킹 기법을 사용한 화재 비디오 영상의 저작권 보호)

  • Nguyen, Truc;Kim, Jong-Myon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.8
    • /
    • pp.579-588
    • /
    • 2013
  • This paper proposes an effective watermarking approach for copyright protection of fire video images. The proposed watermarking approach efficiently utilizes the inherent characteristics of fire data with respect to color and texture by using a gray level co-occurrence matrix (GLCM) and fuzzy c-means (FCM) clustering. GLCM is used to generate a texture feature dataset by computing energy and homogeneity properties for each candidate fire image block. FCM is used to segment color of the fire image and to select fire texture blocks for embedding watermarks. Each selected block is then decomposed into a one-level wavelet structure with four subbands [LL, LH, HL, HH] using a discrete wavelet transform (DWT), and LH subband coefficients with a gain factor are selected for embedding watermark, where the visibility of the image does not affect. Experimental results show that the proposed watermarking approach achieves about 48 dB of high peak-signal-to-noise ratio (PSNR) and 1.6 to 2.0 of low M-singular value decomposition (M-SVD) values. In addition, the proposed approach outperforms conventional image watermarking approach in terms of normalized correlation (NC) values against several image processing attacks including noise addition, filtering, cropping, and JPEG compression.

Portability Testing Method for Digital Right Management Software (디지털 저작권 관리 S/W의 이식성 시험 방법)

  • Yang, Hae-Sool;Kang, Bae-Keun;Lee, Ha-Yong
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.4
    • /
    • pp.103-113
    • /
    • 2009
  • The Digital Right Management from illegal copy protects the various digital contents, the use self-admiration which is lawful does to make the contents use, payment leads about use and is a system which protects a copyright voluntary right and a profit the contents free reproduction permits, illegality use the fact that closes thoroughly is goal. Portability rating will lead and as the technique will be able to induce the quality increase of Digital Right Management S/W the strategic engineering development which accommodates an international standard there is a possibility which an objectivity and an application degree will raise. In order to evaluate Portability of Digital Right Management S/W from the research which sees proposed the tentative metric. Also, measured a quality and the result according to the standard which is appropriate accomplished presented clearly presented a research about the method which decides and an evaluation instance and a evaluation method.

A Study on the Seller's Liability under Article 42(1) of the CISG (CISG 제42조 (1)항의 매도인의 책임에 관한 소고)

  • Heo, Kwang Uk
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.60
    • /
    • pp.47-77
    • /
    • 2013
  • The way for seller to procure the goods for selling is to produce the goods at his own factory and to buy the manufactured goods from the other company. In order to produce the goods for selling the seller have to obtain the resource from the domestic company or overseas. In the middle of producing the goods to sell, seller may breach the right of a third party based on intellectual property rights. That is to say, seller may use the machine that has not itself been patented and use a process which has been patented by a third party. Seller may manufacture the goods which themselves are subject to the third party industrial property rights. Nowadays it is stressed the importance of intellectual property rights such as a patent, brand, and design. These factors consist of the core elements of the competitiveness of the goods. Many embedded software have been used in the various sector. So the disputes regarding to the intellectual property rights is gradually increasing in number. Article 42 of CISG defines the seller's delivery obligations and liabilities in respect to third party intellectual property rights and claims. It contains a special rule for this similar kind of defective in title, which tries to provide an proper solution to the complex problems caused by such rights and claims in international transactions. When seller will apply this clause to the business fields, there are several points to which seller should give attention. First, Intellectual property is general terms in intangible property rights, encompassing both copyright and industrial property. Which matter fall within the scope of intellectual property? The scope of intellectual property can be inferred from the relevant international conventions, which are based on broad international consensus. Second, Article 42 of CISG governs the relationship between the seller and the buyer, that is to say, questions of who has to bear the risk of third party intellectual property rights. The existence of such intellectual property rights, the remedies available and the question of acquiring goods free of an encumbrances in good faith are outside the scope of the CISG. The governing law regarding to the abovementioned matters is needed.

  • PDF

Application and Verification of Time-Division Watermarking Algorithm in H.264 (시간 분할 워터마킹 알고리즘의 H.264 적용 및 검증)

  • Youn, Jin-Seon;Choi, Jun-Rim
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.45 no.6
    • /
    • pp.68-73
    • /
    • 2008
  • In this paper, we propose watermark algorithm called TDWA(Time-Division Watermarking Algorithm) and we applied the proposed algorithm to H.264 video coding standard. We establish that a proposed algorithm is applied to H.264 baseline profile CODEC. The proposed algorithm inserts a watermark into the spatial domain of several frames. We can easily insert strong and invisible watermarks into original pictures using this method. For verification of the proposed algorithm we design hardware core using Verilog-HDL and Excalibur for JM 8.7 code with hardware & software co-simulation. As a result of verification, the PSNR between watermarked pictures and original pictures are more than 60dB and we found the watermark is kept more than 80% after encoding of H.264/AVC with quantization parameter of 28 in baseline profile.

A Study on the Secure Storage Device for Protecting Cryptographic Keys in Untrusted DRM Client Systems (신뢰할 수 없는 DRM 클라이언트 시스템 하에서 키 보호를 위한 Secure Storage Device의 연구)

  • 이기정;권태경;황성운;윤기송
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.2
    • /
    • pp.3-13
    • /
    • 2004
  • DRM is the ability to brand digital contents with features that ensure copy Protection and affect the way in which digital contents are played back. DRM is a technology that enables the secure distribution, promotion and sale of digital contents on the Internet. The DRM Client System that operates on the untrusted user environments has to meet the requirements of the contents owner, including copyright and contents protection. After the DRM Client System is installed on the untrusted user environments, it verifies and plays digital contents. With these procedures it cuties out user authentication, contents decryption, and license management. During these procedures, the sensitive data, including authentication information, decryption data and license data, must be secured against any illegal access from users. The goal of this thesis is to introduce the implementation of Secure Storage Device which can protect user's authentication key, cryptographic key, and license data in safe where the DRM Client System is running.

A Study of License acquisition Method Supporting Mutual Compatibility of EPUB-based eBook DRM (EPUB 기반 전자책 DRM의 상호호환성을 지원하는 라이선스 발급 방법에 관한 연구)

  • Kim, Tae-Hyun;Kang, Ho-Gap;Kim, Yoon-Ho;Cho, Seong-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.205-214
    • /
    • 2013
  • The study of the compatibility of EPUB DRM, granted by the Korea Copyright Commission, as a CT R & D project (Project Title: Development of standard reference software technology for the International Standard EPUB-based eBook DRM) developed standards such as profile standards for encryption, digital signature and authentication certificates and standards for technical terms of rights information. In 2012, these four standards have been established as the Korean Industrial Standards under the names of 'Encryption specification for EPUB DRM', 'the Digital signature specification for EPUB DRM', 'the Certificate specification for EPUB DRM', and 'Definitions of Right Terms for EPUB DRM' through the ODPF(Open Digital Standardization Forum) and the TTA(Telecommunications Technology Association). In spite of the establishment of the eBook DRM standards, however, the absence of the standard technology which supports the compatibility for issues and changes of licenses makes it unable to use eBooks served by different eBook distributors. This study tries to investigate technological approaches to methods of license issues supporting eBook DRM compatibility on the basis of the above-mentioned four EPUB DRM standards and to provide an industrially accepted technological model.

A Study on the Development of Supporting System for Distribution of S-63 ENCs (S-63 암호화된 전자해도 공급을 위한 지원시스템 개발연구)

  • Oh, Se-Woong;Jang, Won-Seok;Park, Jong-Min;Park, Han-San;Suh, Sang-Hyun
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2007.12a
    • /
    • pp.181-183
    • /
    • 2007
  • Copyright infringement and data piracy are pervasive problems of digital era and Electronic Navigational Charts(ENC) are not free from these issues. Aside from the economic impact, the unofficial distribution of nautical information has sign띠cant safeη concerns. Therefore, official distributors of nautical information have sought appropriate methods to protect their data and to provide the mariner with a certificate of authenticity through the adoption of security schema. However, a plethora of different security schema provided by independent distributors markedly complicates the software development of Electronic Chart Display and Information Systems (ECDIS) manufacturers and makes it more difficult to achieve the goal of seamless world-wide electronic navigational database easily accessible to the mariner. A fundamental concern of IHO is that adoption of a single, centrally administered security scheme for all ENCs could improve the ease of use of ENCs and enhance safety of navigation. IHO have driven protection scheme as S-63, S-63x. NORI(National Oceanographic Research Institute) necessarily need protection scheme and supporting system for nautical information. This paper presents protection scheme for NORI and proposes support system for ENC protection.

  • PDF

A Study on the Automated Compatibility Standard Test System for eBook DRM (전자책 DRM을 위한 자동화된 표준정합성 검사 시스템에 관한 연구)

  • Kim, Tae-Hyun;Kang, Ho-Gap;Ahn, Chang-Ju;Cho, Seong-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.127-136
    • /
    • 2013
  • The study of the compatibility of EPUB DRM, granted by the Korea Copyright Commission, as a CT R & D project (Project Title: The Development of the standard reference software technology for International Standard EPUB-based eBook DRM) developed standards such as profile standards for encryption digital signature and authentication certificates and standards for technical terms of rights information. In 2012, these four standards have been established as the Korean Industrial Standards under the names of 'Encryption specification for EPUB DRM,' 'the Digital signature specification for EPUB DRM,' 'the Certificate specification for EPUB DRM,' and 'Definitions of Right Terms for EPUB DRM' through the ODPF(Open Digital Standardization Forum) and the TTA(Telecommunications Technology Association). The research project also proposed standards of ebook DRM license protocols in order for the four standards to practically apply to ebook DRM compatibility. It is necessary for technology standards to require a compatibility standard test process for testing whether implementations which were developed on the basis of the standard specification, comply with standards. This study suggests an automated compatible standard test method and a test model under the ebook DRM standard technical specification.

Framework for Technology Valuation of Early Stage Technologies (초기단계 기술의 가치평가 방법론 적용 프레임워크)

  • Park, Hyun-Woo;Lee, Jong-Taik
    • Journal of Korea Technology Innovation Society
    • /
    • v.15 no.2
    • /
    • pp.242-261
    • /
    • 2012
  • Early stages of technology valuation have been often overlooked or under-represented. The early stage technologies are even riskier due to their inadequacy of commercial development and market applicability. More than 95% of patents fail to earn any revenues so that the majority of patents were valueless. Technology transfers from laboratories at universities and research institutes to industrial firms have increased to acquire value from invented technologies. Technology transfer, a process of transferring discoveries and innovations resulted from research to commercial sectors, typically comprises several steps: disclosing the discoveries and innovations, i.e., intellectual property (IP), evaluating the IP's economic prospects, securing a patent, copyright or trademark for the IP, commercializing the technology through licensing, forming a joint venture, or selling. At each of those stages in the research and development of technology, the value of technology would play a very important role of making decision on the movement toward the next step, however, the financial value of technology is not easy to determine due to a great amount of uncertainty in the course of research and development, and commercialization. This paper refers to technology embodied as devices, equipment, software or processes primarily developed at public research institutions such as universities. Sometimes it is also as the result of externally financed projects contracted with industry. Nearly always technology developed at public research entities results in laboratory prototypes. When it is required to define the technology transfer contract terms for the license of the university patrimonial rights to external funding companies or other interested parties, a question arises: what is the monetary value? In this paper, we present a method for technology valuation based on the identification of specific value points related to its development. The final technology value must be within previously defined value limits. This paper consists of the review of issues related to technology transfer and commercialization, the identification of characteristics of technologies in the early stage of technology development, the formulation of framework of methods to value the early stage technologies, and the conclusion and implication of the previous review.

  • PDF

A Study on Participatory Digital Archives (참여형 디지털 아카이브 활성화 방안 연구)

  • Park, Jinkyung;Kim, You-seung
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.28 no.2
    • /
    • pp.219-243
    • /
    • 2017
  • This study aims to provide alternative strategies for promoting active engagement of users in participatory archives. It focuses on users and their active participation in digital archives beyond providing simple participation opportunities. In doing so, the study reviewed relevant literature that analyzes interpretation and development of participatory digital archives. Moreover, it examined several cases of participatory digital archives as to how they apply for user participation, policy, and service. As a general property, main participants, duration, and technology were examined. Technology was further subdivided into open source software, availability of Open API, availability of mobile web, and offline archives. Participation method was divided into active participation, hub participation, and passive participation according to degree of user participation, and the participation functions provided by each archive were compared and analyzed. In policy area, terms of use, personal information processing policy, copyright policy, collection policy, major collections, scope of collections, classification methods, and descriptive elements of each archive were discussed. Services were divided into content, search, and communication area. Based on such analysis, this study proposed ways for promoting active engagement of users in participatory digital archives in terms of participation, policy, content service, and communication service.