• Title/Summary/Keyword: intellectual property

Search Result 1,036, Processing Time 0.038 seconds

Blind Digital Watermarking Methods for Omni-directional Panorama Images using Feature Points (특징점을 이용한 전방위 파노라마 영상의 블라인드 디지털 워터마킹 방법)

  • Kang, I-Seul;Seo, Young-Ho;Kim, Dong-Wook
    • Journal of Broadcast Engineering
    • /
    • v.22 no.6
    • /
    • pp.785-799
    • /
    • 2017
  • One of the most widely used image media in recent years, omni-directional panorama images are attracting much attention. Since this image is ultra-high value-added, the intellectual property of this image must be protected. In this paper, we propose a blind digital watermarking method for this image. In this paper, we assume that the owner of each original image may be different, insert different watermark data into each original image, and extract the watermark from the projected image, which is a form of service of omni- directional panorama image. Therefore, the main target attack in this paper is the image distortion which occurs in the process of the omni- directional panorama image. In this method, SIFT feature points of non-stitched areas are used, and watermark data is inserted into data around each feature point. We propose two methods of using two-dimensional DWT coefficients and spatial domain data as data for inserting watermark. Both methods insert watermark data by QIM method. Through experiments, these two methods show robustness against the distortion generated in the panorama image generation process, and additionally show sufficient robustness against JPEG compression attack.

Deep Learning Framework for Watermark-Adaptive and Resolution-Adaptive Image Watermarking (워터마크 및 해상도 적응적인 영상 워터마킹을 위한 딥 러닝 프레임워크)

  • Lee, Jae-Eun;Seo, Young-Ho;Kim, Dong-Wook
    • Journal of Broadcast Engineering
    • /
    • v.25 no.2
    • /
    • pp.166-175
    • /
    • 2020
  • Recently, application fields for processing and using digital image contents in various forms and types are rapidly increasing. Since image content is high value-added content, the intellectual property rights of this content must be protected in order to activate the production and use of the digital image content. In this paper, we propose a deep learning based watermark embedding and extraction network. The proposed method is to maximize the robustness of the watermark against malicious/non-malicious attacks while preserving the invisibility of the host image. This network consists of a preprocessing network that changes the watermark to have the same resolution as the host image, a watermark embedding network that embeds watermark data while maintaining the resolution of the host image by three-dimensionally concatenating the changed host image and the watermark information, and a watermark extraction network that reduces the resolution and extracts watermarks. This network verifies the invisibility and robustness of the proposed method by experimenting with various pixel value change attacks and geometric attacks against various watermark data and host images with various resolutions, and shows that this method is universal and practical.

An Empirical Study on the Obstacle Factor of Standardization and Overcoming the Obstacles of Enterprises Using the Structural Equation Model (구조방정식 모형을 활용한 표준화 장애요인과 기업의 장애극복방안에 관한 실증연구)

  • Jeong, Myoung-Sun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.3
    • /
    • pp.171-179
    • /
    • 2018
  • In order to ensure the interoperability of products and technologies, companies apply standard technology in R&D but encounter various obstacles in this process, which they try to overcome through active standardization activities. Various studies have investigated the obstacles and coping strategies of companies in the R&D process. However, studies on the obstacles and coping strategies in the standardization process are insufficient, and the types of obstacles related to standardization, so a variety of studies are also needed on the types of activities. In this study, we tried to determine the types of obstacles related to standardization and to examine how these obstacles affect the standardization activities of companies. The analysis used the data from the 'National Standards Survey' which was conducted by the Korean Standards Association in Korea for companies engaged in the electrical, electronic, and information-related fields in Korea. The relationship between standard-related difficulties, needs and standardization activities was verified through structural equation modeling. The analysis results revealed that the standards-related disability issues have some influence on the standardization activities and the mediating effect by the necessity of the standard was investigated. We also found that many companies are making various efforts to overcome the barriers caused by standard activities. This suggests that a company can build a virtuous cycle structure by performing strategic actions to overcome obstacles by standardization activity and reducing the obstacles caused by standard-related research and development.

The Technological Competitiveness Analysis of Energy Harvesting by Using the Patents Information (특허정보를 활용한 에너지 하베스팅 기술의 기술경쟁력분석: 한국, 미국, 일본, 유럽, 중국을 중심으로)

  • Kim, Dae-Gi;Lee, Pill-Woo;Kim, Jae-Sung
    • Journal of Korea Technology Innovation Society
    • /
    • v.17 no.1
    • /
    • pp.25-44
    • /
    • 2014
  • This study analyzed technological competitiveness of five major countries by using patent information that is typical intellectual property. Technological activity, patent competitiveness, market securement and patent concentration were designed as evaluation items for the technological competitiveness analysis, and the number of patent applications, family patents and triad patent families, and the paten concentration index were reflected as evaluation factors to be scored. For technologies to be analyzed, it referred to the energy harvesting technologies selected as 500 future technologies in the future technologic white paper 2013 published by KISTI. They were classified into technologies using thermoelectric, piezoelectric and photovoltaic elements, which are main detailed technologies of the energy harvesting technology, to investigate and analyze patent information for each detailed technology to understand their technological competitiveness. As a result, the United States ranked top with 75 and 70 points in the technology using thermoelectric and piezoelectric elements respectively, and Japan ranked top with 90 points in the energy harvesting technology using photovoltaic elements. It was analyzed that Korea held the second rank in the field using piezoelectric and photovoltaic elements, and the fifth in the technology using thermoelectric elements.

Case Study on Production for Stop-motion Animation "Galaxay Kids" (스톱모션 애니메이션 <갤럭시키즈> 제작 사례 연구)

  • Kim, Tak Hoon;Park, Jin Wan
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.1
    • /
    • pp.444-454
    • /
    • 2017
  • Stop-motion animation is highly valued for realistic imagery and its ability to captivate the five senses of the audience. Despite this, practical research in this area is limited to date. The long hours required to produce stop-motion animation and turn these into profits can be attributed for the lack of knowledge in this area. In production research, the matter is made worse as it is difficult to protect the intellectual property made through the collaborated efforts of students and teaching staff through each laborious stage of planning, broadcasting and making 2D models. Meanwhile as the animation industry finds the investigation of new production processes taxing, it has maintained its focus on pre-existing processes such as the use of pipeline. This paper aims to shed light on new production methods that can be used to improve the effectiveness of existing stop-motion production. In addition, by working with Taktoon Enterprises on its T.V series Galaxy Kids the paper will revise real world production methods including the traditional use of hand made models. Thus by investigating the use of graphic technology such as 3D printing the paper will be able to extend current business models. Research conducted in this paper is a necessary part of overcoming various contents production obstacles. Furthermore, it may help publicize issues faced in production leading to the discussion and sharing of new innovations.

Study on the 3GPP International Standard for M2M Communication Networks (M2M네트워크통신을 위한 3GPP 국제표준화 동향연구)

  • Hwang, Jin-ok;Lee, Sang-Gi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.6
    • /
    • pp.1040-1047
    • /
    • 2015
  • This study is investigated for M2M Communication Network Standard based on 3GPP. The environment of M2M communication, we can predict the new mobile service that gathering, handling, controlling, transferring of the data for Intelligence, so that we can consider new direction for a lot of subject of study development issue. This study is shown three types of M2M network structure and four types of use cases on 3GPP International Standard. In Addition, we can introduce the future M2M communication network model, it can be propagate the industry and academic cooperation with 3GPP standards. The suggestion develops multiple applications and multiple devices for industry and academic. With the deployment of network provider, this environment support our current communication market that the standard devices of M2M network and service requirement. We are suggest this study for grasp the initial market with the intellectual property right (IPR) based on International Standards. In the future, we wish the success that grap the initial market or initial academic study with helpful issue.

Automated Detecting and Tracing for Plagiarized Programs using Gumbel Distribution Model (굼벨 분포 모델을 이용한 표절 프로그램 자동 탐색 및 추적)

  • Ji, Jeong-Hoon;Woo, Gyun;Cho, Hwan-Gue
    • The KIPS Transactions:PartA
    • /
    • v.16A no.6
    • /
    • pp.453-462
    • /
    • 2009
  • Studies on software plagiarism detection, prevention and judgement have become widespread due to the growing of interest and importance for the protection and authentication of software intellectual property. Many previous studies focused on comparing all pairs of submitted codes by using attribute counting, token pattern, program parse tree, and similarity measuring algorithm. It is important to provide a clear-cut model for distinguishing plagiarism and collaboration. This paper proposes a source code clustering algorithm using a probability model on extreme value distribution. First, we propose an asymmetric distance measure pdist($P_a$, $P_b$) to measure the similarity of $P_a$ and $P_b$ Then, we construct the Plagiarism Direction Graph (PDG) for a given program set using pdist($P_a$, $P_b$) as edge weights. And, we transform the PDG into a Gumbel Distance Graph (GDG) model, since we found that the pdist($P_a$, $P_b$) score distribution is similar to a well-known Gumbel distribution. Second, we newly define pseudo-plagiarism which is a sort of virtual plagiarism forced by a very strong functional requirement in the specification. We conducted experiments with 18 groups of programs (more than 700 source codes) collected from the ICPC (International Collegiate Programming Contest) and KOI (Korean Olympiad for Informatics) programming contests. The experiments showed that most plagiarized codes could be detected with high sensitivity and that our algorithm successfully separated real plagiarism from pseudo plagiarism.

An Analysis of Relationship between Industry Security Education and Capability: Case Centric on Insider Leakage (보안교육과 보안관리 역량의 상관관계 분석: 인가된 내부자 기밀유출사례를 중심으로)

  • Lee, Chi-Seok;Kim, Yanghoon
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.2
    • /
    • pp.27-36
    • /
    • 2015
  • Current leakage of industrial technologies with revealing state secret against nation is gradually increasing and scope of the spill is diversified from technology-oriented leakage to new economic security sector like information and communication, electrical and electronic, defense industry, illegal export of strategic material, economic order disturbance by foreign country, infringement of intellectual property, etc. So the spill damage can affect not only leaked company but also national interests and entire domestic industry. According to statistics from National Industrial Security Center of National Intelligence Service, a major cause of technology leakage is not only by external things about hacking and malignant code, but internal leakage of former and current employees account for about 80%. And technology leakage due to temptation of money and personal interests followed by technology leakage of subcontractor is steadily increased. Most studies in the field of security have tended to focus on measuring security capability of company in order to prevent leakage core assets or developing measurement Indicators for management rather than security activities of the company members that is most important. Therefore, this study analyzes the effect of most underlying security education in security activities on security capabilities of enterprise. As a result, it indicates that security education have a positive(+) correlation with security capabilities.

Automatic Interface Synthesis based on IP Categorization and Characteristics Matching (IP 범주화와 특성 대응을 통한 인터페이스 회로 자동 합성)

  • Yun, Chang-Ryul;Jhang, Kyoung-Son
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.43 no.10 s.352
    • /
    • pp.34-44
    • /
    • 2006
  • A system-on-a-chip (SoC) design uses pre-verified IP hardware blocks in order to reduce design time. We need interface circuits to connect IPs with different protocols. In SoC design we should design interface circuits frequently and these tasks are somewhat time-consuming and error-prone. So it is necessary to generate the interface circuits automatically. Several studies have been made on generating interface circuits only from the communication protocols of IPs. With existing approaches, it is not easy to generate interface circuits connecting two IPs only from communication protocols: connection between IP with address and W without address, connection between IP with only one port to transfer address/data and IP with different ports for address and data connection between IP that transfer address and data together and IP that transfer only one address with a number of data in a burst. No consideration of various characteristics of IPs and no changed algorithm are responsible for it. In order to solve this problem, the proposed approach categorizes communication protocols of IPs, and takes characteristics matching of IPs into account during the interface synthesis. In experiments, we show that we could correctly generate and verify interface circuits for IPs with different characteristics.

Mitigating the Partner Uncertainty for Venture Firms in Cross-border Corporate Venture Capital Investment (국제 기업벤처캐피탈 투자에서 벤처기업의 파트너 불확실성 완화)

  • Kang, Shinhyung;Bae, Zong-Tae
    • The Journal of Small Business Innovation
    • /
    • v.19 no.1
    • /
    • pp.37-58
    • /
    • 2016
  • Despite the growing importance of corporate venture capital (CVC) in the venture capital market, little scholarly attention has been devoted to cross-border CVC investment. Venture firms perceive higher risks of technology leakage in cross-border CVC investment than they do in domestic CVC investment due to geographical and cultural disparity. Given that venture firms would not receive CVC investment in the presence of the partner uncertainty, we argue that the likelihood of cross-border CVC investment increases with the strength of intellectual property protection (IPP) regime, the investment timing (i.e. funding round number), and the industry unrelatedness with the corporate investor. Additionally, we investigate how the venture firm's complementary resource need interact with the partner uncertainty in decisions for cross-border CVC investment. By examining 2,873 CVC investment transactions in the period 1994-2009, we found supporting evidence for the strength of IPP regime and the industry unrelatedness in mitigating the partner uncertainty of foreign corporate investors. However, the effectiveness of these factors is moderated by the type of resources that the venture firms need from the foreign corporate investors.

  • PDF