• Title/Summary/Keyword: digital property

Search Result 738, Processing Time 0.025 seconds

A Study of the Developing Model of Record Contents: Focused on the Architecture Cultural Property Record (기록 콘텐츠 개발 모형에 관한 연구 - 건축 문화재 기록을 중심으로 -)

  • Ryu, Han-Jo;Kim, Ik-Han
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.9 no.1
    • /
    • pp.221-248
    • /
    • 2009
  • All records have attribute of representing the object, so archives should develop digital record exhibition to facilitate attribute that representing the object. If building cultural properties are chose as the represented object, it should be followed by analysis of nature values and record contents and applied to the suitable framework. Therefore, this study suggests the organized process of designing the framework which develops digital representing contents based on records.

A Interoperable Digital Content Protection System Based on DMP (DMP 기반의 상호운용 가능한 디지털 콘텐츠 보호 시스템)

  • Hao, Ri-Ming;Choi, Bong-Kyu;Yoon, Hwa-Mok;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.626-629
    • /
    • 2007
  • The digital content was supplied quickly with advancement of video compressive technique and the network. Simultaneously illegal copy and diffuse via Internet, it was caused to necessitate the intellectual property right protection of the digital content. With this background, Various standardization groups and content provision enterprises developed the solution for a digital content protection. But the problem which lack interoperability is appeared, cause of independent development among other equipment. To find solution about this, MPEG(Moving Picture Experts Group) has progressed standardization against IPMP (Intellectual Property Management and Protection) techniques which are possible interoperability. In spite of it, with reason why insufficient function, DMP(Digital Media Project) standard was presented with the alternative against this. In this paper, we analyze MPEG IPMP standards and DMP ToolPack concepts to compare between them, and through these, designed and implemented digital content protection system which possible interoperability.

  • PDF

UTILITY OF DIGITAL COVERING THEORY

  • Han, Sang-Eon;Lee, Sik
    • Honam Mathematical Journal
    • /
    • v.36 no.3
    • /
    • pp.695-706
    • /
    • 2014
  • Various properties of digital covering spaces have been substantially used in studying digital homotopic properties of digital images. In particular, these are so related to the study of a digital fundamental group, a classification of digital images, an automorphism group of a digital covering space and so forth. The goal of the present paper, as a survey article, to speak out utility of digital covering theory. Besides, the present paper recalls that the papers [1, 4, 30] took their own approaches into the study of a digital fundamental group. For instance, they consider the digital fundamental group of the special digital image (X, 4), where X := $SC^{2,8}_4$ which is a simple closed 4-curve with eight elements in $Z^2$, as a group which is isomorphic to an infinite cyclic group such as (Z, +). In spite of this approach, they could not propose any digital topological tools to get the result. Namely, the papers [4, 30] consider a simple closed 4 or 8-curve to be a kind of simple closed curve from the viewpoint of a Hausdorff topological structure, i.e. a continuous analogue induced by an algebraic topological approach. However, in digital topology we need to develop a digital topological tool to calculate a digital fundamental group of a given digital space. Finally, the paper [9] firstly developed the notion of a digital covering space and further, the advanced and simplified version was proposed in [21]. Thus the present paper refers the history and the process of calculating a digital fundamental group by using various tools and some utilities of digital covering spaces. Furthermore, we deal with some parts of the preprint [11] which were not published in a journal (see Theorems 4.3 and 4.4). Finally, the paper suggests an efficient process of the calculation of digital fundamental groups of digital images.

Design of Digital License for Ownerships Certification While Preserving the Original Program Source Code (프로그램 소스 코드의 원본을 공개하지 않는 소유권 증명을 위한 디지털 라이센스 설계)

  • Kim Hyung-Jong;Lee Dong-Seob;Cha Byung-Rae
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.4
    • /
    • pp.29-37
    • /
    • 2006
  • The intellectual property system was very important to the past industrial society. It is so important to the 21C information age. It is a leading role to developing these information society. Not only the digital content control but the technology of program source code for the intellectual property is so much mean to international competition. On occurring disputation property, we have to prove the fact, there is a problem to show the original source code. In this paper, we simulate the digital licence for program source code to prevent the infringement of copyright and the tipping-off information.

  • PDF

Process Analysis of Digital Right Management for Web-Based Multicast Contents

  • Toyib, Wildan;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.12
    • /
    • pp.1601-1612
    • /
    • 2011
  • In recent years, advanced in digital technologies have created significant changes in the way we reproduce, distribute and market Intellectual Property (IP). DRM for multicast contents is complicated risk, the further technology development and human demand, this approaching is still being researched by the scientist and all by the company which is conducting in piracy management reduced, and every country has national policy to make this consortium to limit piracy properties, based on this paper research development, just only two approaching to reduce piracy in DRM they are Industrial Property (IP) and Copyright. In this paper, we are not only figuring and analyzing about the processes to reduce and limit the piracy and unprotected copy law but also describing about the encryption process, watermarking and digital signature process algorithms. The basic concepts of this encryption process for web-based multicast content in DRM are implemented in Java. We conduct this method is a computerized through web based application system approaching to reduce unprotected copy and piracy. Which is used in DRM for multicast content in every section, by providing a fundamental in information technology development, we believe this research is reliable to prove that is unprotected copy, and piracy can be reduced by protecting with this paradigm.

From Invisible to Irresistible: Intellectual Property and Digital Media & Entertainment Ventures in Korea (지적재산권 관리가 국내 디지털 미디어 콘텐츠 업체 VC 투자 유치에 미치는 영향)

  • Eun Jung Hyun
    • Smart Media Journal
    • /
    • v.12 no.3
    • /
    • pp.93-101
    • /
    • 2023
  • In this paper, we investigate the relationship between a company's Intellectual Property (IP) portfolio strength and its success in obtaining venture funding in the Korean digital media & entertainment industry. Using data from 685 Korean digital media & entertainment companies registered in Crunchbase, a global database provider of venture funding information, we found that a strong IP portfolio is positively associated with funding success. Furthermore, our study revealed that the effect of IP portfolio strength on funding success is stronger for younger companies, suggesting that IP portfolio is more critical for firms that have less reputation and track record.

COMPARISON BETWEEN DIGITAL CONTINUITY AND COMPUTER CONTINUITY

  • HAN, SANG-EON
    • Honam Mathematical Journal
    • /
    • v.26 no.3
    • /
    • pp.331-339
    • /
    • 2004
  • The aim of this paper is to show the difference between the notion of digital continuity and that of computer continuity. More precisely, for digital images $(X,\;k_0){\subset}Z^{n_0}$ and $(Y,\;k_1){\subset}Z^{n_1}$, $if(k_0,\;k_1)=(3^{n_0}-1,\;3^{n_1}-1)$, then the equivalence between digital continuity and computer continuity is proved. Meanwhile, if $(k_0,\;k_1){\neq}(3^{n_0}-1,\;3^{n_1}-1)$, then the difference between them is shown in terms of the uniform continuity property.

  • PDF

DRM System using GStreamer based on DMP (GStreamer를 이용한 DMP기반의 DRM시스템)

  • Park, Ki-Chul;Lee, Joo-Young;Ahn, Sang-Woo;Nam, Je-Ho;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.3
    • /
    • pp.445-451
    • /
    • 2008
  • Due to illegal copying and distribution via the internet, the digital media that have been introduced create certain intellectual property issues. Because of this, several intellectual property groups have been created to create and maintain Digital Rights Management systems (DRM), in order to crack down on illegal and unauthorized copying. However, these systems are often created by many different companies, which leads to problems of interoperability. In this paper, we designed and implemented a DRM system with streamer, following the DMP.

A Verifiable and Traceable Secondhand Digital Media Market Protocol

  • Chen, Chin-Ling;Chen, Chin-Chang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.8
    • /
    • pp.1472-1491
    • /
    • 2011
  • As used product transactions are currently on the rise, the demand for transactions of secondhand digital content will grow in the future; thus, learning to make secure transactions while avoiding cyber attacks becomes an important issue. In this paper, we combine the new buyer's secret key, the new buyer's watermark to embed in resold digital content, and the reseller's encrypted watermark, which can prove legal ownership of the reseller. Using the privacy homomorphism property of RSA and exponential calculus, the original seller of digital content can verify the legality of the reseller and the new buyer. We also reduced the load of encryption/decryption digital content using a partial encryption/decryption algorithm to make our protocol more efficient and practical. In the proposed protocol, the seller is not able to conduct piracy and easily frame any other innocent secondhand buyer when a case of piracy is found. In fact, piracy can be clearly traced using the privacy homomorphism property of RSA and the embedded watermark mechanism. Further, in the proposed protocol, the seller himself can trace the piracy using exponential calculus. Since it is unnecessary to trust third party participation, the conspiracy problem is resolved and the new buyer is not required to participate in the dispute. Moreover, the seller, reseller and new buyer can simultaneously benefit from the secondhand transaction.

The Study on Recording Method for Buried Cultural Property Using Photo Scanning Technique (사진스캐닝 기술에 의한 매장문화재 기록방법에 대한 연구)

  • Koo, Ja-bong
    • Journal of Digital Contents Society
    • /
    • v.16 no.5
    • /
    • pp.835-847
    • /
    • 2015
  • Photo scanning can create point cloud and polygon models like 3D scanners bringing an object into the 3 dimensional world by combining several sheets of photographic information. The created data give us information about planes and sectional forms required for a 2 dimensional survey as well as 3 dimensional figures of buried cultural property. It requires a lot of time to record buried cultural property in the field, however, the photo scanning technique does not need additional equipment and manpower so the work may begin immediately while the property is protected. Moreover, it reduces financial burdens as it creates 3 dimensional data using images acquired by photography but provides the optimal condition to check 3 dimensional information quickly and easily.