• Title/Summary/Keyword: copyright infringement

Search Result 120, Processing Time 0.027 seconds

Applied Method to Trusted Digital Content Distribution Architecture (신뢰할 수 있는 디지털 콘텐츠 유통 아키텍처 방안)

  • Kim, Hye-Ri;Hong, Seng-Phil;Lee, Chul-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.151-162
    • /
    • 2008
  • As the innovative internet technologies and multimedia are being rapidly developed, digital content is a remarkable new growth industry and supplied by various channel. For example, domestic sales volume in digital contents marked an annual increase of 14.7% since 2003. Against the merits of digital content distribution, Information reengineering aspects are getting more serious issues in these days such as infringement of copyright, flood of inappropriate content, invasion and infringement of privacy, etc. In this paper, we are making a suggestion of the TDCDA-Trusted Digital Content Distribution Architecture in order to solve above problems. TDCDA is provided to how well-define and design the trusted path in digital contents distribution in internet environments using a secure distribution mechanism, digital content integrity and copyright protection. Finally, we also proposed the TDCDA algorithm and applicable guidelines for feasible approach in real computing environment.

A Study on the UCC Copyright which uses the Broadcasting Contents and the ODR(Online Dispute Resolution) through the Online Technical embodiment : Focusing on the CCl as the Conversational law Approach (방송콘텐츠를 이용한 UCC의 저작권 문제와 온라인 기술 구현을 통한 ODR(Online Dispute Resolution)의 가능성에 관한 연구 : Conversational Law 접근으로써 CCL을 중심으로)

  • Kim, Mi-Sun;Yu, Sae-Kyung
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02b
    • /
    • pp.558-564
    • /
    • 2008
  • The study aims to examine the UCC (User Created Contents) Copyright which use the broadcasting contents. UCC are classified by UGC(User Generated Contents), UMC(User Modified Contents), and URC(User Recreated Contents). Especially UMC and URC correspond to a problem of copyright. Following the Copyright Protection Center investigation in 2006, it reported that 83.7% UCC are infringement of copyright. In spite of remarkable the UCC copyright problem, the concrete resolution does not exist. Also it is difficult to apply the offline legal conformity because of online nature of the UCC. The study observes the UCC copyright dispute instances which use the broadcasting contents and investigates a resolution of the UCC copyright. Considering the online media nature, it tries to analyse CCL(Creative Common License) as the ODR(online Dispute Resolution). It is meaningful to search the possibility of UCC copyright problem through the online technical embodiment.

  • PDF

A Study on An Identification System for Scanned Cartoon Book (북스캔 만화 저작물 식별 시스템에 관한 연구)

  • Han, Byung Jun;Kim, Tae-Hyun;Kang, Ho-Gap;Cho, Seong-Hwan;Lee, Kyun Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.131-137
    • /
    • 2014
  • Although illegal reproduction of cartoon books are prevalent with rapid growth of webhard services and smartphone use, fingerprinting technology for product identification, as seen in music and videos, has not been developed yet. This leads to indiscriminate illegal reproduction of cartoon books, causing great amount of copyright damages from copyright infringement of the rightful owners. The copyright R&D project granted from the Korea Copyright Permission (Project Title: Identification and Copy Protection Technology of Bookscaned Text/Comic Books) has been carried out in order to develop technology to effectively identify illegal reproduction and distribution of scanned cartoon books. The developed technology will contribute to increase of royalty payments and robust ecosystem of cartoon book markets. The study is to propose an enhanced implementation model for identification of scanned cartoon books on the basis of hierarchical symmetric difference feature algorithms adopted from existing feature extraction algorithms for video.

Real-time Audio Watermarking System Considering Audio Source and User (음원 및 사용자를 고려한 실시간 오디오 워터마킹 시스템)

  • Cho, Jung-Won;Jeong, Seung-Do
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.11
    • /
    • pp.3213-3217
    • /
    • 2009
  • Distribution, duplication and manipulation of the digital contents are very easy due to the characteristics of the digital contents. Thus, damages of invasion of property right rapidly increase due to infringement of copyright for the digital contents. To prevent illegal use and to settle conflict about ownership of the digital contents, continuous efforts with enormous expense are devoted. In this paper, we design and implement real-time audio watermarking system to protect ownership and copyright for the digital contents. The proposed system also clarifies where the responsibility about the illegal distribution lies. The system has convenient user interface so that general administrator without an expert knowledge of the protection of copyright can use easily. In addition, unlike the traditional watermarking system, our system has merit to offer information about the illegal distribution for clear post-management.

Copyright Issues to User-Contributed Content in Participatory Digital Archives (참여형 디지털 아카이브에서의 이용자기여콘텐츠에 관한 저작권 고찰)

  • Kim, Su-jin;Sinn, Donghee
    • The Korean Journal of Archival Studies
    • /
    • no.49
    • /
    • pp.5-49
    • /
    • 2016
  • This study investigates how participatory digital archives should handle user-contributed content in order to legitimately collect from and make available to users according to current copyright laws and related regulations. In doing so, this study surveys the current national and international copyright laws that would apply for digital contents in archives. It also reviews the existing literature that analyzes the understanding and interpretation of regulations and specific infringement cases. Then, it examines the cases of participatory digital archives as to how they deal with the copyright issues to user-contributed content and provide guidance to users in this respect. Based on such analysis, the study suggests a few methods of how digital archives acquire necessary rights for the user-contributed content being housed in archives and how they provide useful guidance to users about their rights and responsibilities. These methods include terms and conditions for contribution/service and essential elements in terms, contributor agreements and their details, and other user guidelines.

A Study on the coverage of e-commerce insurance (전자상거래 보험의 담보범위에 관한 고찰)

  • Shin, Gun-Hoon
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.27
    • /
    • pp.129-161
    • /
    • 2005
  • Todays, computers in business world are potent facilitators that most companies could not without them, while they are only tools. They offer extremely efficient means of communication, particularly when connected to Internet. What I stress in this article is the risks accompanied by e-commerce rather than the advantages of Internet or e-commerce. The management of e-commerce companies, therefore, should keep in mind that the benefit of e-commerce through the Internet are accompanied by enhanced and new risks, cyber risks or e-commerce risks. For example, companies are exposed to computer system breakdown and business interruption risks owing to traditional and physical risks such as theft and fire etc, computer programming errors and defect softwares and outsider's attack such as hacking and virus. E-commerce companies are also exposed to tort liabilities owing to defamation, the infringement of intellectual property such as copyright, trademark and patent right, negligent misrepresent and breach of confidential information or privacy infringement. In this article, I would like to suggest e-commerce insurance or cyber liability insurance as a means of risk management rather than some technical devices, because there is not technically perfect defence against cyber risks. But e-commerce insurance has some gaps between risks confronted by companies and coverage needed by them, because it is at most 6 or 7 years since it has been introduced to market. Nevertheless, in my opinion, e-commerce insurance has offered the most perfect defence against cyber risks to e-commerce companies up to now.

  • PDF

A Study on the Market Status and Issues of e-Commerce Insurance (전자상거래 보험의 시장현황 및 쟁점에 관한 고찰)

  • Shin, Gun-Hoon
    • International Commerce and Information Review
    • /
    • v.7 no.3
    • /
    • pp.27-51
    • /
    • 2005
  • Todays, computers in business world are potent facilitators that most companies could not without them, while they are only tools. They offer extremely efficient means of communication, particularly when connected to Internet. What I stress in this article is the risks accompanied by e-commerce rather than the advantages of Internet or e-commerce. The management of e-commerce companies, therefore, should keep in mind that the benefit of e-commerce through the Internet are accompanied by enhanced and new risks, cyber risks or e-commerce risks. For example, companies are exposed to computer system breakdown and business interruption risks owing to traditional and physical risks such as theft and fire etc, computer programming errors and defect softwares and outsider's attack such as hacking and virus. E-commerce companies are also exposed to tort liabilities owing to defamation, the infringement of intellectual property such as copyright, trademark and patent right, negligent misrepresent and breach of confidential information or privacy infringement. In this article, I would like to suggest e-commerce insurance or cyber liability insurance as a means of risk management rather than some technical devices, because there is not technically perfect defence against cyber risks. But e-commerce insurance has some gaps between risks confronted by companies and coverage needed by them, because it is at most 6 or 7 years since it has been introduced to market. Nevertheless, in my opinion, e-commerce insurance has offered the most perfect defence against cyber risks to e-commerce companies up to now.

  • PDF

A Study of Authors' Moral Rights Infringements Regarding Cinematographic Works and Other Visual Works (음악·영상저작물의 동일성유지권 침해관련 연구)

  • Kang, Sang-Gu
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.6
    • /
    • pp.228-236
    • /
    • 2021
  • This research investigates the causes of infringements related to authors' moral rights which has most conflict among moral rights of authorship, through analysis of judicial precedents and compare whether there subsists any differences in viewpoints between judicial precedent trend and those on behind the scene of broadcast production. Copyright is divided into intellectual property and moral rights of authorship. Right to the integrity of the work is part of moral rights of authorship and produce one content and used in various media. When the edit is needed to fit the organization and advertisement time, advanced consultation from the rightful owner or written consent is needed. However, under the time pressure or ignorance of copyright, the arbitrary edits are made and content is used. This infringes the right of the integrity of the work. When we produce and use cinematographic works and other audiovisual works, there are considerable variablilies stemming from authorship, production cost and program staff. Therefore, prior conscent is needed to acquire and use the copyright in a proper manner. However, due to production-oriented environment and low understanding of the copyright protection, we usually depend on the users' work practices rhather than insufficiency of copyright laws in dealing with the infringement of right to the industry. In conclusion, we need to provide meticulous work manual and to focus on systematic eduction of professional copyright manpower.

Security Analysis on Commercial Online Music Streaming Service and Countermeasures (국내 포털사이트 음원서비스 취약점분석 및 대응방안 제안)

  • Lee, Sang-Sik;Choi, Dong-Hyun;Won, Dong-Ho;Kim, Seung-Joo
    • The KIPS Transactions:PartC
    • /
    • v.16C no.6
    • /
    • pp.681-690
    • /
    • 2009
  • Nowadays, the music industry is moving from analog to digital. Most of the big portal sites provide commercial online music streaming services according to the tendency. In this paper, we analyze the security of the Korean commercial online music streaming services which are provide by the Korea's major portal sites(Dosirak, Cyworld, and Naver). Moreover, we show attacks on commercial online music streaming services that lead to an infringement of copyright and propose technical countermeasures for online commercial music streaming services, the contributions of the present work are that the measures protect the copyright of the music.

DRM Implementation by Multimedia Fingerprint (멀티미디어 핑거프린트에 의한 DRM 구현)

  • Rhee, Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.3
    • /
    • pp.50-56
    • /
    • 2009
  • Recently, according to the product variety of multimedia content some problems are occurred as like an illegal copying, an illegal distribution and a copyright infringement etc. So, for the solution of these problems, some methods were proposed as like watermarking which inserts the information of copyright to the content and the cipher for authentication to DRM which prevents an illegal copying using RSA. In this paper, the multimedia fingerprint based on BIBD code is inserted to the bit-plane of the image content for DRM with RSA, and while the decoding processing. The experiment is operated with the consideration of the image transmission and the transformation. As a result it confirmed that the multimedia fingerprint code inserted in image is detected 60% upper at AWGN 7dB and detected completely 100% at AWGN 10dB upper on PSNR 30, 40, 70 and 80 of Stirmark attacks.