• Title/Summary/Keyword: copyright paper

Search Result 572, Processing Time 0.03 seconds

A RST Resistant Logo Embedding Technique Using Block DCT and Image Normalization (블록 DCT와 영상 정규화를 이용한 회전, 크기, 이동 변환에 견디는 강인한 로고 삽입방법)

  • Choi Yoon-Hee;Choi Tae-Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.5
    • /
    • pp.93-103
    • /
    • 2005
  • In this paper, we propose a RST resistant robust logo embedding technique for multimedia copyright protection Geometric manipulations are challenging attacks in that they do not introduce the quality degradation very much but make the detection process very complex and difficult. Watermark embedding in the normalized image directly suffers from smoothing effect due to the interpolation during the image normalization. This can be avoided by estimating the transform parameters using an image normalization technique, instead of embedding in the normalized image. Conventional RST resistant schemes that use full frame transform suffer from the absence of effective perceptual masking methods. Thus, we adopt $8\times8$ block DCT and calculate masking using a spatio-frequency localization of the $8\times8$ block DCT coefficients. Simulation results show that the proposed algorithm is robust against various signal processing techniques, compression and geometrical manipulations.

Machine Learning Data Extension Way for Confirming Genuine of Trademark Image which is Rotated (회전한 상표 이미지의 진위 결정을 위한 기계 학습 데이터 확장 방법)

  • Gu, Bongen
    • Journal of Platform Technology
    • /
    • v.8 no.1
    • /
    • pp.16-23
    • /
    • 2020
  • For protecting copyright for trademark, convolutional neural network can be used to confirm genuine of trademark image. For this, repeated training one trademark image degrades the performance of machine learning because of overfitting problem. Therefore, this type of machine learning application generates training data in various way. But if genuine trademark image is rotated, this image is classified as not genuine trademark. In this paper, we propose the way for extending training data to confirm genuine of trademark image which is rotated. Our proposed way generates rotated image from genuine trademark image as training data. To show effectiveness of our proposed way, we use CNN machine learning model, and evaluate the accuracy with test image. From evaluation result, our way can be used to generate training data for machine learning application which confirms genuine of rotated trademark image.

  • PDF

A Reference Frame Selection Method Using RGB Vector and Object Feature Information of Immersive 360° Media (실감형 360도 미디어의 RGB 벡터 및 객체 특징정보를 이용한 대표 프레임 선정 방법)

  • Park, Byeongchan;Yoo, Injae;Lee, Jaechung;Jang, Seyoung;Kim, Seok-Yoon;Kim, Youngmo
    • Journal of IKEEE
    • /
    • v.24 no.4
    • /
    • pp.1050-1057
    • /
    • 2020
  • Immersive 360-degree media has a problem of slowing down the video recognition speed when the video is processed by the conventional method using a variety of rendering methods, and the video size becomes larger with higher quality and extra-large volume than the existing video. In addition, in most cases, only one scene is captured by fixing the camera in a specific place due to the characteristics of the immersive 360-degree media, it is not necessary to extract feature information from all scenes. In this paper, we propose a reference frame selection method for immersive 360-degree media and describe its application process to copyright protection technology. In the proposed method, three pre-processing processes such as frame extraction of immersive 360 media, frame downsizing, and spherical form rendering are performed. In the rendering process, the video is divided into 16 frames and captured. In the central part where there is much object information, an object is extracted using an RGB vector per pixel and deep learning, and a reference frame is selected using object feature information.

A Study on Necessary Guidelines for Teachers of Distance Learning due to COVID-19 (COVID-19에 따른 원격수업 시 교사들에게 필요한 사항)

  • Won, Jeongmin;Ahn, Sung Hun
    • Journal of Creative Information Culture
    • /
    • v.7 no.3
    • /
    • pp.167-176
    • /
    • 2021
  • In this paper, from the pervious studies investigating the current status of distance learning due to COVID-19, the needs of teachers for effective distance learning were analyzed. As a result, it was found that support related to distance learning contents was necessary. Specifically, it is necessary to establish a platform specialized for content production for distance learning, expand teacher training related to content production and operation, and improve the copyright system related to content production. In addition, since distance classes differ from those of back-to-school classes in system and characteristics, it is necessary to supplement the institutional aspects for distance classes. It is judged that it is necessary to support the evaluation method suitable for distance learning, the authority to operate the curriculum, and the learning management system. In addition, it was analyzed that it is necessary to expand the infrastructure for distance learning, and a structure and platform for self-directed improvement programs and self-directed distance learning are needed to prevent the learning gap problem from repeating due to distance learning.

An exploratory analysis of factors influencing online music users' willingness to pay

  • Yu-Xuan, Yuan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.2
    • /
    • pp.217-225
    • /
    • 2023
  • The willingness of online music users to pay is the key to the protection of music copyright and the sustainable development of the industry. This paper aims to study the influencing factors of online music users' willingness to pay based on exploratory analysis. Based on the theory of customer perceived value, the unified theory of technology acceptance and use, and the theory of fan enthusiasm, the research model is constructed. Validate the obtained 583 valid data. Through analysis, I got that perceived value, interpersonal influence, fan enthusiasm, and personal payment awareness directly affect online music users' willingness to pay; practical value and hedonic value have a positive impact on perceived value, and the impact of economic cost and compilation cost has not reached a significant level; Online word-of-mouth negatively moderates the impact of perceived value on users' willingness to pay for music. Music platforms can formulate operating policies based on this.

Analysis Method for Revision and Addition of the Specification to Appraisal (감정 대상 규격서의 수정 및 추가에 대한 분석 방법)

  • Chun, Byung-Tae
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.37-44
    • /
    • 2020
  • As the information society develops, various cases of copyright infringement have occurred. In many disputes between companies, software similarity appraisal is dominated. This thesis is a study on the method of calculating the similarity of the standards subject to appraisal. In other words, it is a study to calculate the amount of revision and addition of the specification to be assessed. The analysis method compares the table of contents of both specifications and finds the same or similar part. The similarity weight is determined according to the degree of similarity. Weights identify and assign the degree of similarity between the expert's expertise and the specification. If it is completely newly added, the similarity weight is 1, if it is partially modified, the similarity weight is 0.4, and if it is almost the same as before, it is calculated by giving a weight of 0.05. Through this paper, it was found that the result of calculating the similarity to the specification is 21.2 pages.

Analysis on Peritext of the Picture-book 『The Legend of Pat-bing-su』 (그림책 『팥빙수의 전설』 페리텍스트의 서사적 의미 분석)

  • A Reum Nam;Sang Lim Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.185-193
    • /
    • 2023
  • The purpose of the study was to analyze the narrative meaning of the peritext in the picture-book of 『The Legend of Pat-bing-su』. For the purpose, based on the narrative components proposed by Nam and Kim, the narrative meanings of the peritext were analyzed. As the results, the peritexts of 『The Legend of Red Pat-bing-su』 include basic information of the title, author's name, and publication information, and physical elements of hard cover binding with matte rectangular paper that matches the narrative, which support prior understanding of the narratives. In addition, the peritext components such as covers, endpapers, title page, and copyright page lead readers to predict or expand narratives components to predict, expand, or transform the narrative, and provide additional information for understanding plots or genres.

A Study on the enforceability of Shrink-wrap License under the Contract Law of USA (미국(美國) 계약법(契約法)하에서 소위 "쉬링크랩라이센스" 계약(契約)에 관한 일고찰(一考察))

  • Hur, Hai-Kwan
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.20
    • /
    • pp.129-150
    • /
    • 2003
  • Software license agreements, to be useful in the mass market, could not be individually negotiated, and had to be standardized and concise. The software license agreement needs to be presented to the licensee-users in a fashion that would allow for mass distribution of software, also for it to enforceable, that would draw the users' attention to the terms and conditions under which the publisher allowed the use of the software. These needs have been accomplished, with or without fail, through so called the "shrink-wrap licenses" Shrink-wrap licenses purpose to transfer computer softwares to their users by defining the terms and conditions of use of the software without implicating the "first sale doctrine" of the Copyright Act. These shrink-wrap licenses have become essential to the software industry. However, in USA, the law applicable to these licenses has been unclear and unsettled. Courts have struggled to develop a coherent framework governing their enforceability. Meanwhile, the National Conference of Commissioners on Uniform State Laws ("NCCUSL") in USA promulgated the Uniform Computer Information Transaction Act ("UCITA") governing contracts for computer information transaction on July 29, 1999. One clear objective of UCITA was to settle the law governing the enforceability of shrink-wrap licenses. In these respects, this paper first introduces the various forms that shrink-wrap licenses take(at Part II. Section 1.), and explains the main advantages of them(at Part II. Section 2.) Here it shows how shrink-wrap licenses value themselves for both software publishers and users, including that shrink-wrap licenses are a valuable contracting tool because they provide vital information and rights to software users and because they permit the contracting flexibility that is essential for today's software products. Next, this paper describes the current legal framework applicable to shrink-wrap licenses in USA(at Part III). Here it shows that in USA the development of case law governing shrink-wrap licenses occurred in two distinct stages. At first stage, judicial hostility toward shrink-wrap licenses marked such that they were not enforced pursuant to Article 2 of the Uniform Commercial Code. At second stage, courts began to recognize the pervasiveness of shrink-wrap licenses, their indispensability to the rapidly expanding information technology industry, and the urgent need to enforce such licenses in order to maintain low prices for consumers of computer hardware or software, resulting in the recognition of shrink-wrap licenses. Finally, in view of the importance of UCITA, this paper examines how it will affect the enforceability of shrink-wrap licenses(at Part IV). The drafters of UCITA, as well as the scholars and practitioners who have criticized it, agree that it validates shrink-wrap licenses, provided certain procedural protections are afforded to purchasers. These procedural protections include the licensee end-user must (i) manifest his assent to the shrink-wrap license, (ii) have an opportunity to review the shrink-wrap license, (iii) have a right to return the product without costs.

  • PDF

Framework for Technology Valuation of Early Stage Technologies (초기단계 기술의 가치평가 방법론 적용 프레임워크)

  • Park, Hyun-Woo;Lee, Jong-Taik
    • Journal of Korea Technology Innovation Society
    • /
    • v.15 no.2
    • /
    • pp.242-261
    • /
    • 2012
  • Early stages of technology valuation have been often overlooked or under-represented. The early stage technologies are even riskier due to their inadequacy of commercial development and market applicability. More than 95% of patents fail to earn any revenues so that the majority of patents were valueless. Technology transfers from laboratories at universities and research institutes to industrial firms have increased to acquire value from invented technologies. Technology transfer, a process of transferring discoveries and innovations resulted from research to commercial sectors, typically comprises several steps: disclosing the discoveries and innovations, i.e., intellectual property (IP), evaluating the IP's economic prospects, securing a patent, copyright or trademark for the IP, commercializing the technology through licensing, forming a joint venture, or selling. At each of those stages in the research and development of technology, the value of technology would play a very important role of making decision on the movement toward the next step, however, the financial value of technology is not easy to determine due to a great amount of uncertainty in the course of research and development, and commercialization. This paper refers to technology embodied as devices, equipment, software or processes primarily developed at public research institutions such as universities. Sometimes it is also as the result of externally financed projects contracted with industry. Nearly always technology developed at public research entities results in laboratory prototypes. When it is required to define the technology transfer contract terms for the license of the university patrimonial rights to external funding companies or other interested parties, a question arises: what is the monetary value? In this paper, we present a method for technology valuation based on the identification of specific value points related to its development. The final technology value must be within previously defined value limits. This paper consists of the review of issues related to technology transfer and commercialization, the identification of characteristics of technologies in the early stage of technology development, the formulation of framework of methods to value the early stage technologies, and the conclusion and implication of the previous review.

  • PDF

A Proposal on Fintech Platform Model Based on Digitalized Securities to Activating the Independent Financial Advisory System (독립투자자문업 활성화를 위한 디지털 수익증권 기반 핀테크 플랫폼 모델 제안)

  • Moon, Myung-Deok;Kim, Sun-Woong;Choi, Heung Sik
    • Knowledge Management Research
    • /
    • v.23 no.1
    • /
    • pp.149-164
    • /
    • 2022
  • This paper analyzes the independent financial advisory business that is not yet active in Korea and proposes a plan to activate the independent financial advisory business using fintech technology. A bill was enacted in 2017 for the domestic independent financial advisory business, but it has not been activated much until now for various reasons. Although existing studies have proposed solutions in various ways, there is no clear solution yet. This paper proposes a new method of revitalizing the independent financial advisory business through fintech technology using the trust system that has recently attracted attention. Digital securities fintech technology using blockchain distributed ledger technology presents new possibilities in the real estate and music copyright markets, and related fintech venture companies continue to emerge in Korea. By combining these digital securities fintech technologies and the business process of ETF, a method was derived so that independent financial advisors can have their own financial products. The proposed model is more decentralized than the existing financial product sales structure, and presents the possibility of a protocol economy through a structure close to a private blockchain while complying with the existing financial order. This paper is meaningful in that it presented new solutions to completely different markets from information convergence perspectives on two completely different markets, and we hope that more business solutions will emerge through knowledge management activities that converge various perspectives in the future.