• Title/Summary/Keyword: Webhard

Search Result 14, Processing Time 0.017 seconds

A Study on An Identification System for Scanned Cartoon Book (북스캔 만화 저작물 식별 시스템에 관한 연구)

  • Han, Byung Jun;Kim, Tae-Hyun;Kang, Ho-Gap;Cho, Seong-Hwan;Lee, Kyun Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.131-137
    • /
    • 2014
  • Although illegal reproduction of cartoon books are prevalent with rapid growth of webhard services and smartphone use, fingerprinting technology for product identification, as seen in music and videos, has not been developed yet. This leads to indiscriminate illegal reproduction of cartoon books, causing great amount of copyright damages from copyright infringement of the rightful owners. The copyright R&D project granted from the Korea Copyright Permission (Project Title: Identification and Copy Protection Technology of Bookscaned Text/Comic Books) has been carried out in order to develop technology to effectively identify illegal reproduction and distribution of scanned cartoon books. The developed technology will contribute to increase of royalty payments and robust ecosystem of cartoon book markets. The study is to propose an enhanced implementation model for identification of scanned cartoon books on the basis of hierarchical symmetric difference feature algorithms adopted from existing feature extraction algorithms for video.

Effects of Cyberloafing on Cybersecurity Risks of Organizations: The Case of a Financial Institute (사이버로핑이 조직의 정보보호 리스크에 미치는 영향)

  • Hyunwoo Oh;Beomsoo Kim;Jaeyoung Park
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.813-826
    • /
    • 2023
  • Organization members often use the Internet for non-work purposes during work hours, which is called cyberloafing. Certain types of cyberloafing (e.g., webhard, adult, and gambling sites access) can be a major cause of malware infection, which can ultimately generate significant damages to organizations. It therefore is important to examine the relationship between cyberloafing and cybersecurity risks of organizations. We analyzed log data from an internet filtering system of a financial institute and found that the more employees access to blacklist sites, the higher the possibility of malicious code infection. In other words, cyberloafing increases cybersecurity risks of organizations. We suggest that organizations need to monitor and control their members' internet use in an appropriate way.

A Feature Point Extraction and Identification Technique for Immersive Contents Using Deep Learning (딥 러닝을 이용한 실감형 콘텐츠 특징점 추출 및 식별 방법)

  • Park, Byeongchan;Jang, Seyoung;Yoo, Injae;Lee, Jaechung;Kim, Seok-Yoon;Kim, Youngmo
    • Journal of IKEEE
    • /
    • v.24 no.2
    • /
    • pp.529-535
    • /
    • 2020
  • As the main technology of the 4th industrial revolution, immersive 360-degree video contents are drawing attention. The market size of immersive 360-degree video contents worldwide is projected to increase from $6.7 billion in 2018 to approximately $70 billion in 2020. However, most of the immersive 360-degree video contents are distributed through illegal distribution networks such as Webhard and Torrent, and the damage caused by illegal reproduction is increasing. Existing 2D video industry uses copyright filtering technology to prevent such illegal distribution. The technical difficulties dealing with immersive 360-degree videos arise in that they require ultra-high quality pictures and have the characteristics containing images captured by two or more cameras merged in one image, which results in the creation of distortion regions. There are also technical limitations such as an increase in the amount of feature point data due to the ultra-high definition and the processing speed requirement. These consideration makes it difficult to use the same 2D filtering technology for 360-degree videos. To solve this problem, this paper suggests a feature point extraction and identification technique that select object identification areas excluding regions with severe distortion, recognize objects using deep learning technology in the identification areas, extract feature points using the identified object information. Compared with the previously proposed method of extracting feature points using stitching area for immersive contents, the proposed technique shows excellent performance gain.

Development and Application of ICT Teaching$\cdot$Learning Process Plan for Environmentally Friendly Housing - For an Academic Girl's High School in Gwangju Metropolitan City - (ICT를 활용한 "환경친화적 주거" 교수$\cdot$학습과정안 개발 및 적용 - 광주광역시 인문계 여자고등학교 학생을 대상으로 -)

  • Lee Seon-Hee;Cho Jae-Soon
    • Journal of Korean Home Economics Education Association
    • /
    • v.17 no.4 s.38
    • /
    • pp.101-115
    • /
    • 2005
  • The purpose of this research was to develop and applicate In based teaching$\cdot$learning process plan for Environmentally friendly Housing. The 3 main stages of process were used: analyses, planning & development, and application & evaluation. Three teaching subjects were selected to teach Environmentally friendly housing in the analysis stage. The webhard learning environment was consisted of contents and various materials such as digital video, PPT, group activity, discussion, individual and group reporting forms, and questions. The number of 101 high school students participated for the application stage during september 22-27, 2003. Most of all students evaluated very positively the various aspects of contents as well as LT cooperative learning methods md the web based learning environment. They strongly expressed to practice the practical ways of Environmentally friendly housing learned in the class in the future. The results imply that the contents and In teaching learning plan developed in this study seem to be adequate to be included in the regular text.

  • PDF