• Title/Summary/Keyword: users' rights

Search Result 197, Processing Time 0.032 seconds

An Embedding /Extracting Method of Audio Watermark Information for High Quality Stereo Music (고품질 스테레오 음악을 위한 오디오 워터마크 정보 삽입/추출 기술)

  • Bae, Kyungyul
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.2
    • /
    • pp.21-35
    • /
    • 2018
  • Since the introduction of MP3 players, CD recordings have gradually been vanishing, and the music consuming environment of music users is shifting to mobile devices. The introduction of smart devices has increased the utilization of music through music playback, mass storage, and search functions that are integrated into smartphones and tablets. At the time of initial MP3 player supply, the bitrate of the compressed music contents generally was 128 Kbps. However, as increasing of the demand for high quality music, sound quality of 384 Kbps appeared. Recently, music content of FLAC (Free License Audio Codec) format using lossless compression method is becoming popular. The download service of many music sites in Korea has classified by unlimited download with technical protection and limited download without technical protection. Digital Rights Management (DRM) technology is used as a technical protection measure for unlimited download, but it can only be used with authenticated devices that have DRM installed. Even if music purchased by the user, it cannot be used by other devices. On the contrary, in the case of music that is limited in quantity but not technically protected, there is no way to enforce anyone who distributes it, and in the case of high quality music such as FLAC, the loss is greater. In this paper, the author proposes an audio watermarking technology for copyright protection of high quality stereo music. Two kinds of information, "Copyright" and "Copy_free", are generated by using the turbo code. The two watermarks are composed of 9 bytes (72 bits). If turbo code is applied for error correction, the amount of information to be inserted as 222 bits increases. The 222-bit watermark was expanded to 1024 bits to be robust against additional errors and finally used as a watermark to insert into stereo music. Turbo code is a way to recover raw data if the damaged amount is less than 15% even if part of the code is damaged due to attack of watermarked content. It can be extended to 1024 bits or it can find 222 bits from some damaged contents by increasing the probability, the watermark itself has made it more resistant to attack. The proposed algorithm uses quantization in DCT so that watermark can be detected efficiently and SNR can be improved when stereo music is converted into mono. As a result, on average SNR exceeded 40dB, resulting in sound quality improvements of over 10dB over traditional quantization methods. This is a very significant result because it means relatively 10 times improvement in sound quality. In addition, the sample length required for extracting the watermark can be extracted sufficiently if the length is shorter than 1 second, and the watermark can be completely extracted from music samples of less than one second in all of the MP3 compression having a bit rate of 128 Kbps. The conventional quantization method can extract the watermark with a length of only 1/10 compared to the case where the sampling of the 10-second length largely fails to extract the watermark. In this study, since the length of the watermark embedded into music is 72 bits, it provides sufficient capacity to embed necessary information for music. It is enough bits to identify the music distributed all over the world. 272 can identify $4*10^{21}$, so it can be used as an identifier and it can be used for copyright protection of high quality music service. The proposed algorithm can be used not only for high quality audio but also for development of watermarking algorithm in multimedia such as UHD (Ultra High Definition) TV and high-resolution image. In addition, with the development of digital devices, users are demanding high quality music in the music industry, and artificial intelligence assistant is coming along with high quality music and streaming service. The results of this study can be used to protect the rights of copyright holders in these industries.

Problems of Water Use and Estimation of Water Right in North Han River Shared by North and South Korea (II) - Estimation of Water Right in Downstream Area (남북공유하천 북한강의 물이용 문제점 및 수리권 추정 (II) -하류유역 수리권 추정)

  • Ahn, Jong-Seo;Lee, Gwang-Man;Jung, Kwan-Sue
    • Journal of Korea Water Resources Association
    • /
    • v.44 no.4
    • /
    • pp.315-325
    • /
    • 2011
  • There are not many practical measures to solve a water conflict, when a hydromorphologically asymmetric situation in international rivers exists whereby downstream users may not affect upstream users but upstream users do cause downstream impacts. In taking advantage of this merit, North Korea has built Imnam Dam in upstream of North Han River and uses water for trans-basin hydropower generation. As an impact of this dam South Korean' area as a downstream user has been suffered from water deficit and dry river. It is very critical for South Korea to solve a key problem such as water allocation for water supply and river maintenance. Therefore, this study is aim to suggest alternatives for equitable water allocation in consideration of special circumstances between the South and the North. For this, reviewing the allocation methods of water rights is carried using lessons obtained from international river cases. The results show that the minimum desired streamflow is calculated at 7.3 $m^3/sec$; water budget analysis by the equitable distribution of streamflows at the border line of the North Han River, the difference in water supply deficiency is at 3.7 $m^3/sec$ before and after Imnam Dam; in the determined distribution method, the difference in water deficiency is at 11.38 $m^3/sec$. These results show that South Korea should be secured 11.38 $m^3/sec$ from North Korean's Imnam Dam in respective of water use right and sound river maintenance.

A digital Audio Watermarking Algorithm using 2D Barcode (2차원 바코드를 이용한 오디오 워터마킹 알고리즘)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.2
    • /
    • pp.97-107
    • /
    • 2011
  • Nowadays there are a lot of issues about copyright infringement in the Internet world because the digital content on the network can be copied and delivered easily. Indeed the copied version has same quality with the original one. So, copyright owners and content provider want a powerful solution to protect their content. The popular one of the solutions was DRM (digital rights management) that is based on encryption technology and rights control. However, DRM-free service was launched after Steve Jobs who is CEO of Apple proposed a new music service paradigm without DRM, and the DRM is disappeared at the online music market. Even though the online music service decided to not equip the DRM solution, copyright owners and content providers are still searching a solution to protect their content. A solution to replace the DRM technology is digital audio watermarking technology which can embed copyright information into the music. In this paper, the author proposed a new audio watermarking algorithm with two approaches. First, the watermark information is generated by two dimensional barcode which has error correction code. So, the information can be recovered by itself if the errors fall into the range of the error tolerance. The other one is to use chirp sequence of CDMA (code division multiple access). These make the algorithm robust to the several malicious attacks. There are many 2D barcodes. Especially, QR code which is one of the matrix barcodes can express the information and the expression is freer than that of the other matrix barcodes. QR code has the square patterns with double at the three corners and these indicate the boundary of the symbol. This feature of the QR code is proper to express the watermark information. That is, because the QR code is 2D barcodes, nonlinear code and matrix code, it can be modulated to the spread spectrum and can be used for the watermarking algorithm. The proposed algorithm assigns the different spread spectrum sequences to the individual users respectively. In the case that the assigned code sequences are orthogonal, we can identify the watermark information of the individual user from an audio content. The algorithm used the Walsh code as an orthogonal code. The watermark information is rearranged to the 1D sequence from 2D barcode and modulated by the Walsh code. The modulated watermark information is embedded into the DCT (discrete cosine transform) domain of the original audio content. For the performance evaluation, I used 3 audio samples, "Amazing Grace", "Oh! Carol" and "Take me home country roads", The attacks for the robustness test were MP3 compression, echo attack, and sub woofer boost. The MP3 compression was performed by a tool of Cool Edit Pro 2.0. The specification of MP3 was CBR(Constant Bit Rate) 128kbps, 44,100Hz, and stereo. The echo attack had the echo with initial volume 70%, decay 75%, and delay 100msec. The sub woofer boost attack was a modification attack of low frequency part in the Fourier coefficients. The test results showed the proposed algorithm is robust to the attacks. In the MP3 attack, the strength of the watermark information is not affected, and then the watermark can be detected from all of the sample audios. In the sub woofer boost attack, the watermark was detected when the strength is 0.3. Also, in the case of echo attack, the watermark can be identified if the strength is greater and equal than 0.5.

The Antecedents of Switching Cost and its Effect on Customer Loyalty in Digital Music Service Industry (온라인 음악서비스 산업에서 전환비용의 선행요인 및 전환비용이 고객충성도에 미치는 영향)

  • Kang, Sung-Min;Uhm, Gi-Heon
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.157-180
    • /
    • 2010
  • Rapid development of information technology has generated a new industry and market. In particular, network technology such as the Internet and other computer networks made transaction activities switched from traditional offline commerce to e-commerce. Among them, digital content is bit-based object which is created and distributed through electronic environment. In particular, many entertainment contents such as the music, the movies, and the computer game softwares are main products. Although digital content commerce has high potential demand, it lacks the consideration about the factor related to maintaining existing customer such as customer loyalty and switching costs. There has been a number of research on customer loyalty and other factors affecting it in the traditional electronic commerce environment, but there is a lack of research which examines the characteristics of digital content. The study about the effect of switching costs on customer loyalty in digital content commerce is necessary because the customers of digital content commerce market are from those of other e-commerce market or traditional offline commerce market. In addition, customer loyalty and switching costs are important factors because they may build up greater customer retention. For that reason, this study focused on examining the relationships among switching costs, antecedents for switching costs, and customer loyalty in online digital music service industry. The study has three major purposes: (1) to find antecedents of switching costs on digital content commerce and examine effect of antecedents for switching costs; (2) to identify effect of switching costs on customer loyalty in digital content commerce and examine moderating effects of alternative attractiveness; (3) to identify the differences of antecedents for switching costs by contents transmission type(streaming service and downloading service). And, the online digital music service industry is selected in this study since there are many users and transactions incurring. To accomplish these purposes, a survey questionnaire was developed and distributed to 256 informants. Survey instrument was developed based on previous research and pre-established survey items. Total of 206 surveys are collected and used in the data analysis. Among the respondents, 56.8% is male and 43.2% is female. Also, 86 responses were streaming service user group and 120 responses were download service user group. These data was analyzed using regression analysis. Major findings of empirical analysis can be summarized as follows. First, switching costs have positive effect on customer loyalty in digital content commerce environment. Second, the influence of switching costs on customer loyalty increases under conditions of high alternative attractiveness. Third, DRM convenience and breadth of use have positive effect on switching costs. The findings imply that the digital content provider should pay more attention to switching costs in addition to customer satisfaction in order to attract customers. Also, increasing the convenience of DRM use by securing the convenience of user interface and expanding the support device and increasing the service use scope by providing diverse value-added service helps to create a switching barrier. The result of the study can become a practical use in marketing strategy for maintaining existing customer. In particular, switching barrier is very important under conditions of high competition in the online music service market. This study can be used as a basis for further studies about customer retention in digital content commerce.

A Study on the Possibility of Assuring 'The Right to be Forgotten' Through the Digital Extinction Technology (디지털 소멸 기술을 통한 잊힐 권리의 보장 가능성 연구)

  • Joo, Moon-ho;Lim, Jong-in
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.435-447
    • /
    • 2016
  • As data can be permanently stored and freely distributed, in modern society, the Internet became a world that remembers everything forever. Because of that, there has been increasing the number of accident with never-forgetting data and, as a result, a movement has been emerged to apply a notion of 'oblivion' to internet world. The movement is called 'The right to be forgotten.' However, 'The right to be forgotten' in a higher level which internet users want to be guaranteed is very limited in the juridical approach because of the confliction with the other basic rights and problems. On the other hand, the requests of individuals to guarantee 'The right to be forgotten' has been urged digital extinction technology, such as volatile SNS, Digital Aging System, to be developed. With introduction of oblivion, digital extinction technology with setting expire date on digital information can present a new solution on assuring 'The right to be forgotten.' This research establishes the detail scope of, analyzes the level of assurance of, and, through digital extinction technology with the established scope, suggest the potential assurance of the 'The right to be forgotten'.

A Study on Development of Patent Information Retrieval Using Textmining (텍스트 마이닝을 이용한 특허정보검색 개발에 관한 연구)

  • Go, Gwang-Su;Jung, Won-Kyo;Shin, Young-Geun;Park, Sang-Sung;Jang, Dong-Sik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.8
    • /
    • pp.3677-3688
    • /
    • 2011
  • The patent information retrieval system can serve a variety of purposes. In general, the patent information is retrieved using limited key words. To identify earlier technology and priority rights repeated effort is needed. This study proposes a method of content-based retrieval using text mining. Using the proposed algorithm, each of the documents is invested with characteristic value. The characteristic values are used to compare similarities between query documents and database documents. Text analysis is composed of 3 steps: stop-word, keyword analysis and weighted value calculation. In the test results, the general retrieval and the proposed algorithm were compared by using accuracy measurements. As the study arranges the result documents as similarities of the query documents, the surfer can improve the efficiency by reviewing the similar documents first. Also because of being able to input the full-text of patent documents, the users unacquainted with surfing can use it easily and quickly. It can reduce the amount of displayed missing data through the use of content based retrieval instead of keyword based retrieval for extending the scope of the search.

Designing the Promotion Policy of Korea ESCO Industry through the Examination of Foreign Country Exercises (해외사례 조사를 통한 국내 ESCO 산업 활성화 방안)

  • Min, Eunju;Kim, Myeongrok;Nam, Kitae;Kang, Mingoo;Kim, Suduk
    • Environmental and Resource Economics Review
    • /
    • v.26 no.1
    • /
    • pp.103-121
    • /
    • 2017
  • The domestic ESCO project was introduced in 1992 as one of the energy efficiency improvement programs. In recent energy market, the changes in the market conditions such as smart grid, renewable energy, and the importance of demand response became important issues. As the diversified business models are required, examples of overseas exercises are examined. Business areas in Europe or the US where the ESCO industry has been active include measures to improve the efficiency of energy facilities in all areas, ranging from energy supply facilities and energy services to end users. This type of ESCO overseas business model can be classified into various types such as project execution method, supplier demand management, financing method, climate change and emission rights, new and renewable energy, and other criteria. In this study, we propose to adopt IEC (Integrated Energy Contracting) contract method in domestic ESCO market for additional business models. Current convention of listing the specific individual business types being allowed by regulation turned out to be obstacles to the revitalization of the related market. In order to achieve the goal of energy conservation, it is recommended, instead, to revise the current funding guidelines to be a negative system.

ID-Based Proxy Re-encryption Scheme with Chosen-Ciphertext Security (CCA 안전성을 제공하는 ID기반 프락시 재암호화 기법)

  • Koo, Woo-Kwon;Hwang, Jung-Yeon;Kim, Hyoung-Joong;Lee, Dong-Hoon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.1
    • /
    • pp.64-77
    • /
    • 2009
  • A proxy re-encryption scheme allows Alice to temporarily delegate the decryption rights to Bob via a proxy. Alice gives the proxy a re-encryption key so that the proxy can convert a ciphertext for Alice into the ciphertext for Bob. Recently, ID-based proxy re-encryption schemes are receiving considerable attention for a variety of applications such as distributed storage, DRM, and email-forwarding system. And a non-interactive identity-based proxy re-encryption scheme was proposed for achieving CCA-security by Green and Ateniese. In the paper, we show that the identity-based proxy re-encryption scheme is unfortunately vulnerable to a collusion attack. The collusion of a proxy and a malicious user enables two parties to derive other honest users' private keys and thereby decrypt ciphertexts intended for only the honest user. To solve this problem, we propose two ID-based proxy re-encryption scheme schemes, which are proved secure under CPA and CCA in the random oracle model. For achieving CCA-security, we present self-authentication tag based on short signature. Important features of proposed scheme is that ciphertext structure is preserved after the ciphertext is re-encrypted. Therefore it does not lead to ciphertext expansion. And there is no limitation on the number of re-encryption.

A Study for Database of Uibang Yuchui (醫方類聚) and Its Value as the Intellectual Property of Traditional Korean Medical Knowledge (지식재산으로서의 의방유취의 가치와 DB구축의 필요성에 관한 소고)

  • Ahn, Sang-Woo;Han, Jiwon;Park, Joo-Young;Cha, Wung-Seok
    • The Journal of Korean Medical History
    • /
    • v.31 no.1
    • /
    • pp.123-134
    • /
    • 2018
  • Today, knowledge itself has become a resource which must be protected by the pertinent community of its contributors and users, from being manipulated or distorted by third-party players. The preservation of knowledge in relationship to the cultural context of its origins, has been recognized by international organizations intent on maintaining authentic voice and perspective. Globally, the WIPO (World Intellectual Property Organization) organizes the annual IGC (Intergovernmental Committee) meeting to address various issues associated with each country's utilization of intellectual and bio source property. Korean Medicine is the official name for the traditional medicine that has been inherited from the cultures of the Korean Peninsula. It is one of the four practices of East Asian Medicine including Traditional Chinese Medicine (TCM) from China, Kampo Medicine of Japan, and Sino-Vietnamese Medicine in Vietnam. As a cultural treasure representing centuries of evolving knowledge, Korean Medicine is protected under intellectual property rights afforded by WIPO, and must be understood in relationship to, and distinct from, TCM. It is understood that China has a strong political purpose to claim all the traditional medicines of the East Asian region under the name of TCM, including Korean Medicine. In fact TCM was authorized as the representative name for all East Asian medicine by decisions made by the ISO (International Standard Organization) in 2015. This paper proposes a pilot study on how to protect the intellectual property of Korean Medicine from efforts by China to claim it under the umbrella of TCM. Using the Uibang Yuchui (醫方類聚, Classified Collection of Medical Formulas) this paper suggests establishing a Database of UBYC, which was published in 1477 by the Joseon Korea government. UBYC was the reorganized version of contemporary East Asian medical sources, and has already hundreds of year's rich indigenous and culturally specific medical history of Korea, from which Korean Medicine has been built.

An Efficiency Management Scheme using Big Data of Healthcare Patients using Puzzy AHP (퍼지 AHP를 이용한 헬스케어 환자의 빅 데이터 사용의 효율적 관리 기법)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.13 no.4
    • /
    • pp.227-233
    • /
    • 2015
  • The recent health care is growing rapidly want to receive offers users a variety of medical services, can be exploited easily exposed to a third party information on the role of the patient's hospital staff (doctors, nurses, pharmacists, etc.) depending on the patient clearly may have to be classified. In this paper, in order to ensure safe use by third parties in the health care environment, classify the attributes of patient information and patient privacy protection technique using hierarchical multi-property rights proposed to classify information according to the role of patient hospital officials The. Hospital patients and to prevent the proposed method is represented by a mathematical model, the information (the data consumer, time, sensor, an object, duty, and the delegation circumstances, and so on) the privacy attribute of a patient from being exploited illegally patient information from a third party the prevention of the leakage of the privacy information of the patient in synchronization with the attribute information between the parties.