• Title/Summary/Keyword: Software Copyright

Search Result 104, Processing Time 0.023 seconds

Status and Development of Geomatic s in China

  • Li, Li
    • Proceedings of the Korean Society of Surveying, Geodesy, Photogrammetry, and Cartography Conference
    • /
    • 2002.04a
    • /
    • pp.17-24
    • /
    • 2002
  • Mechanization is the characteristic of the industrial era and computerization is the characteristic of the Information Era. Now we are facing on the transition from Industrial Era to information Era. Established the National Geo-spatial Data Infrastructures is the fundamental base for information society and is one part of the national basic economic development plan. From 1980's China started his successful transition from traditional methods to high-tech based mapping. China has laid out a high accuracy national GPS (global Positioning System) network, and completed the geographic information databases for scale of 1:1million and 1:250,000. Now it is working on the databases for scales of 1:50,000 and 1:10,000, the world highest level. The massive national programmed has been dubbed "Digital China," since it involves massive quantities of digitized geographical information. Simultaneity, GIS technology and the geo-spatial data have been used widely in electronic government affair, environmental protection, disaster control, ITS and etc. The users have realized the benefits more and more widely. Internet is an efficient way to distribute the geo-information, the State Bureau of Surveying and Mapping has give great effort to settle down the rules and standards to establish the clearing house. Some National Geo-standards have issued, and some of them are on the way. The GIS software is another important factor in the GIS industry. Chinese government working-out some good policy to supports the GIS software developer to have their own copyright. This paper is based on the above to introduce the status and development of Geomatics in China. in China.

  • PDF

Image Watermarking for Copyright Protection of Images on Shopping Mall (쇼핑몰 이미지 저작권보호를 위한 영상 워터마킹)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.4
    • /
    • pp.147-157
    • /
    • 2013
  • With the advent of the digital environment that can be accessed anytime, anywhere with the introduction of high-speed network, the free distribution and use of digital content were made possible. Ironically this environment is raising a variety of copyright infringement, and product images used in the online shopping mall are pirated frequently. There are many controversial issues whether shopping mall images are creative works or not. According to Supreme Court's decision in 2001, to ad pictures taken with ham products is simply a clone of the appearance of objects to deliver nothing but the decision was not only creative expression. But for the photographer's losses recognized in the advertising photo shoot takes the typical cost was estimated damages. According to Seoul District Court precedents in 2003, if there are the photographer's personality and creativity in the selection of the subject, the composition of the set, the direction and amount of light control, set the angle of the camera, shutter speed, shutter chance, other shooting methods for capturing, developing and printing process, the works should be protected by copyright law by the Court's sentence. In order to receive copyright protection of the shopping mall images by the law, it is simply not to convey the status of the product, the photographer's personality and creativity can be recognized that it requires effort. Accordingly, the cost of making the mall image increases, and the necessity for copyright protection becomes higher. The product images of the online shopping mall have a very unique configuration unlike the general pictures such as portraits and landscape photos and, therefore, the general image watermarking technique can not satisfy the requirements of the image watermarking. Because background of product images commonly used in shopping malls is white or black, or gray scale (gradient) color, it is difficult to utilize the space to embed a watermark and the area is very sensitive even a slight change. In this paper, the characteristics of images used in shopping malls are analyzed and a watermarking technology which is suitable to the shopping mall images is proposed. The proposed image watermarking technology divide a product image into smaller blocks, and the corresponding blocks are transformed by DCT (Discrete Cosine Transform), and then the watermark information was inserted into images using quantization of DCT coefficients. Because uniform treatment of the DCT coefficients for quantization cause visual blocking artifacts, the proposed algorithm used weighted mask which quantizes finely the coefficients located block boundaries and coarsely the coefficients located center area of the block. This mask improves subjective visual quality as well as the objective quality of the images. In addition, in order to improve the safety of the algorithm, the blocks which is embedded the watermark are randomly selected and the turbo code is used to reduce the BER when extracting the watermark. The PSNR(Peak Signal to Noise Ratio) of the shopping mall image watermarked by the proposed algorithm is 40.7~48.5[dB] and BER(Bit Error Rate) after JPEG with QF = 70 is 0. This means the watermarked image is high quality and the algorithm is robust to JPEG compression that is used generally at the online shopping malls. Also, for 40% change in size and 40 degrees of rotation, the BER is 0. In general, the shopping malls are used compressed images with QF which is higher than 90. Because the pirated image is used to replicate from original image, the proposed algorithm can identify the copyright infringement in the most cases. As shown the experimental results, the proposed algorithm is suitable to the shopping mall images with simple background. However, the future study should be carried out to enhance the robustness of the proposed algorithm because the robustness loss is occurred after mask process.

Level of User Awareness for Illegal Downloading of Movie Content (영상 컨텐츠 불법 복제에 관한 사용자 의식 수준)

  • Rhee, Hae-Kyung;Kim, Hee-Wan
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.11
    • /
    • pp.212-224
    • /
    • 2009
  • Proliferation of high performance internet infrastructures finally allows their users download a single copy of regular movie just within in a couple of seconds. Ease of accesses to the software for downloading consequently leads them insensitive to the ethics or legitimacy of their conduct. Thus, strong legal action is enforced for piracy over nationally through strengthen the copyright law. We in this paper conducted a survey to see whether netizens prefer to download just for the matter of their convenience. Whilst the level of awareness is addressed even in a far-fetched manner in the area of music piracy and computer software piracy, the case of movie is much different in that we even fail to find any survey that has been made for movie piracy. The survey has been made by devising questionnaires for netizens and it was posted web WorldSurvey, which is the most prominent online survey site in Korea. To our surprise, 9 out of 10 respondents expressed they actually resort to illegal downloading for the reason of convenience. We realized one more surprise. More than 95% of netizens conspicuously aware of their downloading behaviors are mischievous and illegal without reservation.

Development of Information Ethics Curriculum Centered on Core Concepts for Elementary School (핵심 개념 중심의 정보 윤리 영역에 대한 초등학교 정보과 교육과정 개발)

  • Jeong, Youngsik;Shin, Soobum;Kim, Chul
    • Journal of The Korean Association of Information Education
    • /
    • v.21 no.6
    • /
    • pp.733-742
    • /
    • 2017
  • In recent years, There is a growing demand for more instructional hours because of the shortage of classes required for the software education included in the 2015 Revised Practical Arts Curriculum of elementary schools. Therefore, the Korea Association of Information Education developed the Informatics Curriculums Standard Model from 2014 to 2016 to revise the next 2020 curriculum. However, the KAIE curriculum lacks linkages with secondary school informatics curriculum and is not composed of core concept-based achievement criteria so that teachers have a lot of difficulties in reconstructing and operating the KAIE curriculum. In this study, four core concepts of information ethics were selected by conducting Delphi survey focusing on the teachers of elementary schools. In other words, we selected the core concepts of the information ethics domain: internet etiquette, personal information protection, information life, and copyright protection. Also, we suggested 16 specific criteria for the core concepts.

Program Plagiarism Detection through Memory Access Log Analysis (메모리 액세스 로그 분석을 통한 프로그램 표절 검출)

  • Park, Sung-Yun;Han, Sang-Yong
    • The KIPS Transactions:PartD
    • /
    • v.13D no.6 s.109
    • /
    • pp.833-838
    • /
    • 2006
  • Program Plagiarism is an infringement of software copyright. In detecting program plagiarism, many different source program comparison methods has been studied. But, it is not easy to detect plagiarized program that made a few cosmetic changes in program structures and variable names In this paper, we propose a new ground-breaking technique in detecting plagiarism by Memory Access Log Analysis.

Audio Steganography Method Using Least Significant Bit (LSB) Encoding Technique

  • Alarood, Alaa Abdulsalm;Alghamdi, Ahmed Mohammed;Alzahrani, Ahmed Omar;Alzahrani, Abdulrahman;Alsolami, Eesa
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.427-442
    • /
    • 2022
  • MP3 is one of the most widely used file formats for encoding and representing audio data. One of the reasons for this popularity is their significant ability to reduce audio file sizes in comparison to other encoding techniques. Additionally, other reasons also include ease of implementation, its availability and good technical support. Steganography is the art of shielding the communication between two parties from the eyes of attackers. In steganography, a secret message in the form of a copyright mark, concealed communication, or serial number can be embedded in an innocuous file (e.g., computer code, video film, or audio recording), making it impossible for the wrong party to access the hidden message during the exchange of data. This paper describes a new steganography algorithm for encoding secret messages in MP3 audio files using an improved least significant bit (LSB) technique with high embedding capacity. Test results obtained shows that the efficiency of this technique is higher compared to other LSB techniques.

A Study on the Authentication of Digital Content in Cloud Computing Environment

  • Jang, Eun-Gyeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.11
    • /
    • pp.99-106
    • /
    • 2022
  • In this paper, we proposes digital content management technology in a cloud computing environment. proposes digital content management technology in a cloud computing environment. Computing services using networks are basic infrastructure services that cannot be missed in the era of the 4th Industrial Revolution. Financial services, digital content services, and industrial and home network services using smartphones are changing from services in the local area to a cloud service environment where the entire service is possible. Therefore, this study proposed a system to safely support digital content services suitable for cloud computing environments. The proposed system provides convenience and safety for users to access the system, protects the copyright of digital content authors, and provides a secure digital content distribution and management system. The purpose of this study is to stabilize and revitalize the digital content market by providing a digital content distribution structure suitable for the cloud computing environment.

How to Review a Paper Written by Artificial Intelligence (인공지능으로 작성된 논문의 처리 방안)

  • Dong Woo Shin;Sung-Hoon Moon
    • Journal of Digestive Cancer Research
    • /
    • v.12 no.1
    • /
    • pp.38-43
    • /
    • 2024
  • Artificial Intelligence (AI) is the intelligence of machines or software, in contrast to human intelligence. Generative AI technologies, such as ChatGPT, have emerged as valuable research tools that facilitate brainstorming ideas for research, analyzing data, and writing papers. However, their application has raised concerns regarding authorship, copyright, and ethical considerations. Many organizations of medical journal editors, including the International Committee of Medical Journal Editors and the World Association of Medical Editors, do not recognize AI technology as an author. Instead, they recommend that researchers explicitly acknowledge the use of AI tools in their research methods or acknowledgments. Similarly, international journals do not recognize AI tools as authors and insist that human authors should be accountable for the research findings. Therefore, when integrating AI-generated content into papers, it should be disclosed under the responsibility of human authors, and the details of the AI tools employed should be specified to ensure transparency and reliability.

Perception of Library Personel Towards Socal Media Utilization for Information Service Delivery in University Libraries in Kwara State

  • Saliu Abdulfatai;Aishat Temitope Akinbowale
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.14 no.4
    • /
    • pp.85-99
    • /
    • 2024
  • The study examined perception of library personnel towards social media utilization for information service delivery in kwara state university library. It adopted the descriptive survey design with population consisting of 27 professional librarians in three selected university libraries in kwara State. Total enumerative sampling techniques were used because the population of the study is manageable by the researcher. Percentage and mean were used in analyzing the data. Primary data solicited would be cleaned, coded and entered into the Statistical Package for Social Sciences (SPSS) version 20 software for quantitative analysis. The findings of the study revealed the services rendered by library professional in university libraries in Kwara State, are Current Awareness Services (CAS), Photocopying services, Technical Services, Circulation/borrowing services, Internet services, and Bibliographic verification services. Majority of the respondent indicated Myspace, Google plus, Flickr, Telegram, Twitter, WhatsApp and Facebook are the social media platforms used for service delivery by librarians. Also, majority of the respondents in university libraries indicated Google plus, LinkedIn, Myspace, Skype, WhatsApp, Flickr, WeChat, Twitter and Facebook as social media space use for information service delivery effectively and Bandwidth problem, Limited fund, Lack of maintenance culture, Lack of Awareness, Copyright Issue, Technophobia are the major challenges inhibiting the use of social media for service delivery by the library staff. Lastly, the study concluded with recommendations.

A Study of ePub-based Standard Framework Supporting Mutual Comparability of eBook DRM (전자책 DRM의 상호호환성을 지원하는 ePub 기반 표준 프레임워크에 관한 연구)

  • Kang, Ho-Gap;Kim, Tae-Hyun;Yoon, Hee-Don;Cho, Seong-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.6
    • /
    • pp.235-245
    • /
    • 2011
  • EBooks refer to electronic versions of books which are accessible via internet with forms of digital texts. In recent years, Amazon's Kindle digital eBooks has revealed the possibilities of success of the e-book market, which leads other companies to launch eBook service such as Google's eBook stores and Apple's iPad and eBook service. These reveal that the eBook market is finally showing a substantial amount of growth. Although the issue of technical support of eBook copyright protection emerges from the fast growing eBook marketplace, current technic of commercial DRM for protecting eBook copyright protection still has problems of non-comparability. Therefore, with the current technical status, DRM comparability problems, which have already occurred in music DRM environment, would also happen in eBook environment. This study suggests a standard framework to support eBook DRM comparability. When development of the standard reference software for eBook DRM comparability is completed, the sources will be registered as shareware to be open to public.