• Title/Summary/Keyword: Uploaders

Search Result 5, Processing Time 0.023 seconds

Efficient Illegal Contents Detection and Attacker Profiling in Real Environments

  • Kim, Jin-gang;Lim, Sueng-bum;Lee, Tae-jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.6
    • /
    • pp.2115-2130
    • /
    • 2022
  • With the development of over-the-top (OTT) services, the demand for content is increasing, and you can easily and conveniently acquire various content in the online environment. As a result, copyrighted content can be easily copied and distributed, resulting in serious copyright infringement. Some special forms of online service providers (OSP) use filtering-based technologies to protect copyrights, but illegal uploaders use methods that bypass traditional filters. Uploading with a title that bypasses the filter cannot use a similar search method to detect illegal content. In this paper, we propose a technique for profiling the Heavy Uploader by normalizing the bypassed content title and efficiently detecting illegal content. First, the word is extracted from the normalized title and converted into a bit-array to detect illegal works. This Bloom Filter method has a characteristic that there are false positives but no false negatives. The false positive rate has a trade-off relationship with processing performance. As the false positive rate increases, the processing performance increases, and when the false positive rate decreases, the processing performance increases. We increased the detection rate by directly comparing the word to the result of increasing the false positive rate of the Bloom Filter. The processing time was also as fast as when the false positive rate was increased. Afterwards, we create a function that includes information about overall piracy and identify clustering-based heavy uploaders. Analyze the behavior of heavy uploaders to find the first uploader and detect the source site.

SNS Social Comparison Satisfaction Mechanism : based on User's Independence and Interdependence Propensity (소셜 네트워크 서비스의 사회비교 메커니즘 : 이용자의 독립 성향과 상호작용 성향을 기반으로)

  • Kim, Songmi;Kim, Hana
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.9
    • /
    • pp.238-248
    • /
    • 2020
  • This study examines the feelings of positivity and negativity generated through upward social comparison and explores the impact of the results of the emotions on SNS users' posting behavior. In particular, this study aims to systematically identify the influence of upward social comparison on SNS followers and uploaders' SNS usage behavior and the structural principle of social network circulation in which followers become uploaders again. According to the analysis, interaction-oriented followers made negative upward social comparison and positive upward social comparison, while negative upward social comparison reduced the publication of independence tendency. However, positive upward social comparison has been shown to increase both independent and interactive postings. The results of this study are meaningful in that SNS has expanded the results of prior studies, in which social comparison theories were biased toward negative upward comparisons, to positive upward comparisons. In addition, this study suggested a practical strategy for SNS platform operators on how SNS users would not deviate from other platforms.

High-Speed Search for Pirated Content and Research on Heavy Uploader Profiling Analysis Technology (불법복제물 고속검색 및 Heavy Uploader 프로파일링 분석기술 연구)

  • Hwang, Chan-Woong;Kim, Jin-Gang;Lee, Yong-Soo;Kim, Hyeong-Rae;Lee, Tae-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1067-1078
    • /
    • 2020
  • With the development of internet technology, a lot of content is produced, and the demand for it is increasing. Accordingly, the number of contents in circulation is increasing, while the number of distributing illegal copies that infringe on copyright is also increasing. The Korea Copyright Protection Agency operates a illegal content obstruction program based on substring matching, and it is difficult to accurately search because a large number of noises are inserted to bypass this. Recently, researches using natural language processing and AI deep learning technologies to remove noise and various blockchain technologies for copyright protection are being studied, but there are limitations. In this paper, noise is removed from data collected online, and keyword-based illegal copies are searched. In addition, the same heavy uploader is estimated through profiling analysis for heavy uploaders. In the future, it is expected that copyright damage will be minimized if the illegal copy search technology and blocking and response technology are combined based on the results of profiling analysis for heavy uploaders.

A Design of Promotion Management System for Webtoon

  • Jeong, Hyun-jin;Lee, Seung-hwan;Lee, Jun-hyun;Huh, Jun-ho
    • Journal of Multimedia Information System
    • /
    • v.4 no.4
    • /
    • pp.211-218
    • /
    • 2017
  • Recently, the number of subscribers of the webtoons published by some major internet portal companies and others is increasing and their revenues are continually rising. Accordingly, a number of studies are being conducted for this phenomenon. For the uploaders off webtoons, their works are graded and added up for the promotion review but the criteria of such a promotion system usually fall short of readers' expectations. Although most of the subscribes of webtoons are drawn into subscription mainly by the recommendation of people around them, the responses from the new subscribers were often quite different from what the portal companies have anticipated, affecting the rank of the webtoon. Thus, a promotion management system which provides a reliable and clear method of assessment is proposed in this study including the revenue and copyright management scheme for the cartoonists.

Research on illegal copyright distributor tracking and profiling technology (불법저작물 유포자 행위분석 프로파일링 기술 연구)

  • Kim, Jin-gang;Hwang, Chan-woong;Lee, Tae-jin
    • Journal of Internet Computing and Services
    • /
    • v.22 no.3
    • /
    • pp.75-83
    • /
    • 2021
  • With the development of the IT industry and the increase of cultural activities, the demand for works increases, and they can be used easily and conveniently in an online environment. Accordingly, copyright infringement is seriously occurring due to the ease of copying and distribution of works. Some special types of Online Service Providers (OSP) use filtering-based technology to protect copyrights, but they can easily bypass them, and there are limits to blocking all illegal works, making it increasingly difficult to protect copyrights. Recently, most of the distributors of illegal works are a certain minority, and profits are obtained by distributing illegal works through many OSP and majority ID. In this paper, we propose a profiling technique for heavy uploader, which is a major analysis target based on illegal works. Creates a feature containing information on overall illegal works and identifies major heavy uploader. Among these, clustering technology is used to identify heavy uploader that are presumed to be the same person. In addition, heavy uploaders with high priority can be analyzed through illegal work Distributor tracking and behavior analysis. In the future, it is expected that copyright damage will be minimized by identifying and blocking heavy uploader that distribute a large amount of illegal works.