• Title/Summary/Keyword: digital rights

Search Result 460, Processing Time 0.025 seconds

A Critical Review on Data Localization in the Financial Cloud (금융 클라우드의 데이터 국지화에 대한 비판적 고찰)

  • Jang, Woo-Kyung;Kim, In-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1191-1204
    • /
    • 2019
  • In January 2019, the government revised the regulation on electronic financial supervision to revitalize the use of cloud in the financial sector. However, as cloud policies and regulations cloud undermine financial firms' autonomous security activities or restrict some of the people's basic rights, there has been little movement in the financial sector to use important information as the cloud. In addition, the data localization policy, which requires important information to be kept only in Korea, is a representative regulation that prevents the revitalization of cloud use, which also creates discrimination problems for overseas operators. Therefore, policy and regulatory improvements are needed to enable the cloud to provide a foundation for digital financial innovation through data. This study looked into the current status of cloud policies for domestic and foreign financial companies and analyzed policies and regulations for domestic financial companies. Through these efforts, the government aims to draw up limitations and problems in cloud policies for domestic financial companies and propose policy alternatives, such as measures to improve regulations on localizing data for financial companies to revitalize their use of cloud.

Domastic Blockchain Legislation and Policy Analysis and the Limitations Deriving and Present Improvement Points (국내 블록체인 법제 및 정책 분석과 한계점 도출 및 향상점 제시 -산업 활성화와 정보보호 중심으로-)

  • An, Myeonggu;Park, Yongsuk
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.9
    • /
    • pp.44-51
    • /
    • 2019
  • Recently, various platforms utilizing blockchains have appeared. In order to develop the blockchain, it is required to improve related laws and institutions. In this respect, we analysis of the laws and systems related to domestic blockchains, draw out the limitations, and suggest directions for improvement. The research method was analyzed the literature and related laws through literature review. It is difficult to analyze the whole law and system at one time, so we examined the necessary laws and systems to revitalize the blockchain. It is confirmed that legal improvement is needed on the scope of electronic transactions and electronic financial transactions, electronic commerce, digital signatures, import and export, personal information protection, blockchain industry promotion and research. Through this, we expect a balanced development of effective blockchain revitalization and protection of national fundamental rights. Individual studies on the legal provisions and systems for each item in the future can be conducted.

A Secure License Sharing Scheme for Domain DRM System Against Replay Attack (재생 공격에 안전한 Domain DRM 시스템을 위한 License 공유 방식)

  • Choi, Dong-Hyun;Lee, Yun-Ho;Kang, Ho-Gab;Kim, Seung-Joo;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.1
    • /
    • pp.97-101
    • /
    • 2007
  • The purpose of DRM is to protect the copyrights of content providers and to enable only designated users to access digital contents. From the consumers' point of view, they have a tendency to go against complex and confusing limitations. Moreover, consumers' rights of use of the content obtained legally were frequently harmed by arbitrary limitations. The concept of Authorized Domain (AD) was presented to remove such problems. However, the previous work on authorized domain has two problems. The first is that it requires a rather expensive revocation mechanism for withdraw process. The second is that the modules still can play contents which are previously obtained even though they are currently out of the authorized domain. On the contrary, our scheme presents the content from being played by modules which are out of the domain for better security. Furthermore our scheme does not need to maintain a revocation list and prevent replay attack.

Real-Time Copyright Security Scheme of Immersive Content based on HEVC (HEVC 기반의 실감형 콘텐츠 실시간 저작권 보호 기법)

  • Yun, Chang Seob;Jun, Jae Hyun;Kim, Sung Ho;Kim, Dae Soo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.1
    • /
    • pp.27-34
    • /
    • 2021
  • In this paper, we propose a copyright protection scheme for real-time streaming of HEVC(High Efficiency Video Coding) based realistic content. Previous research uses encryption and modular operation for copyright pre-protection and copyright post-protection, which causes delays in ultra high resolution video. The proposed scheme maximizes parallelism by using thread pool based DRM(Digital Rights Management) packaging with only HEVC's CABAC(Context Adaptive Binary Arithmetic Coding) codec and GPU based high-speed bit operation(XOR), thus enabling real-time copyright protection. As a result of comparing this scheme with previous research at three resolutions, PSNR showed an average of 8 times higher performance, and the process speed showed an average of 18 times difference. In addition, as a result of comparing the robustness of the forensic mark, the filter and noise attack, which showed the largest and smallest difference, with a 27-fold difference in recompression attacks, showed an 8-fold difference.

How to Prove the Identity of Artist When Creating Non-fungible Tokens (대체불가능 토큰을 생성할 때 어떻게 예술가의 신원을 증명할까?)

  • Kim, Taekyung;Yang, Ji Yeon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.5
    • /
    • pp.669-676
    • /
    • 2022
  • Non-fungible tokens (NFTs) have the advantage of being able to reliably manage details after minting, but how can ideas be protected before being converted to NFTs? The use of NFTs to increase the value of digital assets is increasing, but the problem of creating and selling NFTs without the consent of the creator is also increasing. Existing methods for protecting creators include a method of using a traditional authentication system and a method of using a social network, but each has limitations. Therefore, in this study, an identity token utilization method is proposed as a way to supplement the existing limitations. When an identity token is used, a certified NFT is issued through an existing identity authentication authority, so the verification of the authenticity of the token becomes clear. In addition, in inheritance and transfer, it becomes possible to respond to legal problems related to the transfer of creative rights.

A Study on the Maritime and Fisheries Sector for the Implementation of an Diplomacy Strategy (우리나라 외교정책과 해양‧수산분야 협력방안에 관한 연구)

  • Seongwook Park;Jooah Lee;Jeong-Mi Cha
    • Ocean and Polar Research
    • /
    • v.45 no.1
    • /
    • pp.23-31
    • /
    • 2023
  • The core of the foreign policy of the Yoon Suk-yeol government is the promotion of active economic and security diplomacy as indicated in Policy Tasks No. 98. To this end, economic consultative bodies such as Regional Comprehensive Economic Partnership Agreement(RCEP), Comprehensive and Progressive Agreement for Trans-Pacific Partnership (CPTPP), and Indo-Pacific Economic Framework (IPEF) are taking the initiative to respond to the formation of supply chain, human rights, environment, and digital-related norms, and actively support Korean companies' overseas expansion. Due to the nature of the Ministry of Oceans and Fisheries (MOF) as an organization established centered on the space of the ocean, the MOF faces difficulties in bringing the functions of other ministries into the space of the ocean. Considering the vision, objectives, and detailed plans of the MOF, the contribution of the MOF in the field of active economic security, one of the main foreign policies of the Yoon Suk-yeol government, is perhaps too obvious. However, since the re-launch of the MOF, the ODA budget for the oceans and fisheries sector is too small compared to other ministries, so even if new policy demands are discovered, there are many difficulties in implementing these policies in practice. Recognizing these problems, this paper examines the background and contents of foreign policies that have been promoted for the efficient promotion of RCEP, CPTPP and IPEF and introduces the areas of cooperation in the oceans and fisheries sector in these foreign policies.

Transformation of the Music Market brought about by Technology (테크놀로지가 가져온 음악 시장의 변혁)

  • kim, Joy
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.3
    • /
    • pp.537-541
    • /
    • 2022
  • As technology advances, various applications linked to the music industry are becoming popular through new media. There have been many changes in the music market. Beyond the existing music market, where music copyright and performance rights were the center of the music business, we are unifying and operating communication channels that connect artists and fans, such as investment products derived from music copyrights. The technology that connects the fandom with additional business digital content has transformed into global platforms such as HYBE Entertainment's and YG Entertainment's Weverse, as well as SM Entertainment's Bubble. In addition, various national support projects to build a 5G MEC (MobileEdge Computing) environment to quickly respond to the rapidly changing 5G industry ecosystem are supporting for the immersive content demonstration, immersive content testing, and technical analysis, we are laying the groundwork to efficiently respond to the ever-expanding metaverse content market. Technology is changing dramatically. Therefore, we would like to study to changes in the music market brought about by technology and suggest strategies for a new era in the music business.

A Case Study on the Construction of Cyber Textbook Museum Database (사이버교과서박물관 데이터베이스 구축에 관한 사례 연구)

  • Kim, Eun-Ju;Lee, Myeong-Hee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.20 no.4
    • /
    • pp.67-84
    • /
    • 2009
  • Cyber Textbook Museum is created by the Korean Educational Development Institute in part of the project to manage the knowledge and information of Korea to promote understanding of Korean education and its history. The original and full text of textbooks dating from the 1890s to the present have been digitized and arranged for easy access over internet. An exclusive portal site dealing with Korean textbooks and curriculum materials was made to provide not only the directory service of textbooks and curriculums in diverse data classifications, school levels, years/periods and subjects but also the keyword search by searching engine. Users can search the necessary materials easily and systematically over the screen and use all the functions except save, capture and print. The management system for textbook image(DjVu format), search system and DRM(Digital Rights Management) system were developed. Finally, four suggestions are proposed which are related in the aspects of policy, technical, systematic aspects for active and tremendous use of the site.

The Current State and Legal Issues of Online Crimes Related to Children and Adolescents

  • Hyoung-ryul Kim
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.34 no.4
    • /
    • pp.222-228
    • /
    • 2023
  • There are two categories of online crimes related to children and adolescents: those committed by adolescents and those committed against children and adolescents. While recent trends in criminal law show consensus on strengthening punishment in cases of crimes against children and adolescents, there are mixed stances in cases of juvenile delinquency. One perspective emphasizes strict punishment, whereas the other emphasizes dispositions aligned with human rights. While various forms of online crime share the commonality in that the main part of the criminal act occurs online, they can be categorized into three types: those seeking financial gain, those driven by sexual motives, and those engaged in bullying. Among these, crimes driven by sexual motives are the most serious. Second-hand trading fraud and conditional (sexual) meeting fraud fall under the category of seeking financial gain and occur frequently. Crimes driven by sexual motives include obscenity via telecommunication, filming with discrete cameras, child and adolescent sexual exploitation material, fake video distribution, and blackmail/coercion using intimate images/videos ("sextortion"). These crimes lead to various legal issues such as whether to view vulgar acronyms or body cams that teenagers frequently use as simple subcultures or crimes, what criteria should be applied to judge whether a recorded material induces sexual desire or shame, and at what stage sexual grooming becomes punishable. For example, sniping posts, KakaoTalk prisons, and chat room explosions are tricky issues, as they may or may not be punished depending on the case. Particular caution should be exercised against the indiscriminate application of a strict punishment-oriented approach to the juvenile justice system, which is being discussed in relation to online sexual offenses. In the punishment case of online crime, juvenile offenders with a high potential for future improvement and reform must be treated with special consideration.

An Embedding /Extracting Method of Audio Watermark Information for High Quality Stereo Music (고품질 스테레오 음악을 위한 오디오 워터마크 정보 삽입/추출 기술)

  • Bae, Kyungyul
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.2
    • /
    • pp.21-35
    • /
    • 2018
  • Since the introduction of MP3 players, CD recordings have gradually been vanishing, and the music consuming environment of music users is shifting to mobile devices. The introduction of smart devices has increased the utilization of music through music playback, mass storage, and search functions that are integrated into smartphones and tablets. At the time of initial MP3 player supply, the bitrate of the compressed music contents generally was 128 Kbps. However, as increasing of the demand for high quality music, sound quality of 384 Kbps appeared. Recently, music content of FLAC (Free License Audio Codec) format using lossless compression method is becoming popular. The download service of many music sites in Korea has classified by unlimited download with technical protection and limited download without technical protection. Digital Rights Management (DRM) technology is used as a technical protection measure for unlimited download, but it can only be used with authenticated devices that have DRM installed. Even if music purchased by the user, it cannot be used by other devices. On the contrary, in the case of music that is limited in quantity but not technically protected, there is no way to enforce anyone who distributes it, and in the case of high quality music such as FLAC, the loss is greater. In this paper, the author proposes an audio watermarking technology for copyright protection of high quality stereo music. Two kinds of information, "Copyright" and "Copy_free", are generated by using the turbo code. The two watermarks are composed of 9 bytes (72 bits). If turbo code is applied for error correction, the amount of information to be inserted as 222 bits increases. The 222-bit watermark was expanded to 1024 bits to be robust against additional errors and finally used as a watermark to insert into stereo music. Turbo code is a way to recover raw data if the damaged amount is less than 15% even if part of the code is damaged due to attack of watermarked content. It can be extended to 1024 bits or it can find 222 bits from some damaged contents by increasing the probability, the watermark itself has made it more resistant to attack. The proposed algorithm uses quantization in DCT so that watermark can be detected efficiently and SNR can be improved when stereo music is converted into mono. As a result, on average SNR exceeded 40dB, resulting in sound quality improvements of over 10dB over traditional quantization methods. This is a very significant result because it means relatively 10 times improvement in sound quality. In addition, the sample length required for extracting the watermark can be extracted sufficiently if the length is shorter than 1 second, and the watermark can be completely extracted from music samples of less than one second in all of the MP3 compression having a bit rate of 128 Kbps. The conventional quantization method can extract the watermark with a length of only 1/10 compared to the case where the sampling of the 10-second length largely fails to extract the watermark. In this study, since the length of the watermark embedded into music is 72 bits, it provides sufficient capacity to embed necessary information for music. It is enough bits to identify the music distributed all over the world. 272 can identify $4*10^{21}$, so it can be used as an identifier and it can be used for copyright protection of high quality music service. The proposed algorithm can be used not only for high quality audio but also for development of watermarking algorithm in multimedia such as UHD (Ultra High Definition) TV and high-resolution image. In addition, with the development of digital devices, users are demanding high quality music in the music industry, and artificial intelligence assistant is coming along with high quality music and streaming service. The results of this study can be used to protect the rights of copyright holders in these industries.