• Title/Summary/Keyword: 데이터 소유권

Search Result 101, Processing Time 0.027 seconds

Image Watermarking using Wavelet Transform and Human Visual System (웨이블릿 변환 및 인간 시각 시스템을 이용한 원문 워터마킹)

  • 김상국;김태중;황재호;이재광
    • The Journal of the Korea Contents Association
    • /
    • v.4 no.3
    • /
    • pp.61-70
    • /
    • 2004
  • As multimedia data and their applications are rapidly distributed on the Web, the research on watermark insertion and integrity assurance vigorously increases. In this paper, Discrete Wavelet Transformation dissolves an original image into the three level of low, middle, and high bandwidths. Human Visual System with the significant coefficients extracted from the middle obtains enhanced image quality and robustness using watermark insertion. Experimental results show that various attacks cannot destroy pre-inserted watermark and recovered image is of good quality by measuring PSNR.

  • PDF

Privacy Preserving Source Based Deduplication In Cloud Storage (클라우드 스토리지 상에서의 프라이버시 보존형 소스기반 중복데이터 제거기술)

  • Park, Cheolhee;Hong, Dowon;Seo, Changho;Chang, Ku-Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.123-132
    • /
    • 2015
  • In cloud storage, processing the duplicated data, namely deduplication, is necessary technology to save storage space. Users who store sensitive data in remote storage want data be encrypted. However Cloud storage server do not detect duplication of conventionally encrypted data. To solve this problem, Convergent Encryption has been proposed. But it inherently have weakness due to brute-force attack. On the other hand, to save storage space as well as save bandwidths, client-side deduplication have been applied. Recently, various client-side deduplication technology has been proposed. However, this propositions still cannot solve the security problem. In this paper, we suggest a secure source-based deduplication technology, which encrypt data to ensure the confidentiality of sensitive data and apply proofs of ownership protocol to control access to the data, from curious cloud server and malicious user.

Social Welfare Ethics in the Information Age - Focusing on Dataveillance through Social Welfare Information System - (사회복지정보화의 윤리적 쟁점 - 사회보장정보시스템을 통한 데이터감시를 중심으로-)

  • Kim, Suyoung
    • Korean Journal of Social Welfare
    • /
    • v.68 no.1
    • /
    • pp.193-224
    • /
    • 2016
  • The article aims to discuss ethical issues of social welfare informationisation, focusing on dataveillance through social welfare information system in South Korea. The Korean government plans to upgrade social welfare information system, by strengthening welfare fraud tracking and adding blind spot discovering functions. However, surveillance over poor population's data is inevitable when conducting such investigations. This article reviews current debates on dataveillance. It then conducts a case study on social welfare dataveillance in South Korea, asking what ethical problems lie in the dataveillance in terms of privacy, accuracy, property, and accessibility issues. Subsequently, this paper identifies three fundamental ethical dilemmas of social welfare in the informational age. Finally, it suggests policy alternatives to tackle the ethical problems and dilemmas of social welfare informationisation.

  • PDF

Image-Adaptive Watermarking of Wavelet base for Digital Image Protection (디지털 영상 데이터의 정보 보호를 위한 웨이브릿 기반의 이미지 적응 워터마킹)

  • Kim, Kuk-Se;Lee, Jeong-Ki;Park, Chan-Mo;Bae, Il-Ho;Cho, Ai-Ri;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.59-263
    • /
    • 2003
  • 정보통신의 비약적인 발전에 힘입어 멀티미디어 데이터는 언제 어디서든 전송 받거나 공유할 수 있게 되었다. 아날로그 형태에서 디지털의 아날로그를 형태로 빠르게 대체되고 있으며, 디지털로 신호를 표현하는 방법은 기존 사용하여 표현하는 방법에 비해 많은 장점을 가지고 있다. 하지만 디지털로 된 데이터는 언제 어디서든 대단위 복제가 가능하다. 즉, 저작권 침해, 불법 복제 및 배포, 손쉽게 위조할 수 있다는 점이 그것이다. 디지털 컨텐츠의 불법 복제와 유통은 저작자의 창작 의욕과 수입원을 차단하는 매우 중요한 문제이며, 이를 방지하기 위해서 멀티미디어 데이터의 저작권을 가진 소유자가 원하는 정보를 삽입함으로써 데이터의 저작권 보호와 복사 방지 및 불법적인 유통을 막고자 하는 기술이 개발되고 있다. 디지털 영상 정보의 보호를 위해 디지털 영상의 불법적인 내용 조작을 막고, 영상의 소유권을 보장할 수 있는 방법으로 디지털 워터마크(Digital Watermark)가 있다. 디지털 워터마크는 공개키 알고리즘이나 방화벽 등으로 해독된 영상에 대하여 부가적인 보호를 제공한다. 디지털 영상에 대한 저작권 정보, 배포자 정보 그리고 사용자 정보를 영상에 삽입함으로써 훗날 법적인 문제가 발생하였을 때 해결책을 제시할 수 있다. 본 논문에서는 디지털 영상 데이터의 정보 보호를 위해 주파수 영역에서의 웨이브릿 변환(Wavelet Transform)을 이용한 이미지 적응 디지털 워터마킹(Image-Adaptive Digital Watermarking) 방법을 제안한다. 이미지 적응 웨이브릿(Image-Adaptive Wavelet)은 영상을 주파수적으로 분해하면서 각 대역들의 공간 영역에서의 정보를 함께 지니고 JND(Just noticeable difference)을 포함한다. 이미지 적응 웨이브릿의 이러한 특성을 이용하여 다해상도 분해하고, 손실 압축(toss Compression) 이나 필터링(Filtering), 잡음(Noise) 등에 크게 영향받는 저주파 성분과 인간의 시각적으로 큰 의미를 갖는 고주파 성분의 특성을 이용하여 워터마크를 삽입한다.

  • PDF

A Study on Digital Image Watermarking for Embedding Audio Logo (음성로고 삽입을 위한 디지털 영상 워터마킹에 관한 연구)

  • Cho, Gang-Seok;Koh, Sung-Shik
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.39 no.3
    • /
    • pp.21-27
    • /
    • 2002
  • The digital watermarking methods have been proposed as a solution for solving the illegal copying and proof of ownership problems in the context of multimedia data. But it is still difficult to have been overcame the problem of the protection of property to multimedia data, such as digital images, digital video, and digital audio. This paper describes a watermarking algorithm that embeds non-linearly audio logo watermark data which is converted from audio signal of the ownership in the components of pixel intensities in an original image and that insists of ownership by hearing the audio signal transformed from the extracted audio logo through the speaker. Experimental results show that our algorithm using audio logo proposed in this paper is robust against attacks such as particularly lossy JPEG image compression. 

Evaluation of International BIM Standard Contracts to establish BIM Copyrights and Operational Protocols in Korea (국제 BIM 표준계약서 분석을 통한 국내 BIM 저작권 보호 및 운용 체계 수립에 관한 연구)

  • Koo, Bonsang;Shin, Byungjin
    • Korean Journal of Construction Engineering and Management
    • /
    • v.17 no.6
    • /
    • pp.24-30
    • /
    • 2016
  • Building Information Modeling, and its associated work practices, requires project participants to share not only 3D geometric data, but also information in the model that may be considered proprietary and even trade secrets. Thus protection of intellectual property, or BIM copyrights, must be in place for participants to share proprietary information among project stakeholders. Currently Korea does not have adequate copyright laws or mechanisms to provide such protection. This research examined three BIM copyright legal documents, namely U.S.' ConsensusDOCS 301, AIA Document E203/G202, and U.K.'s CIC BIM Protocol to determine how copyright protection is realized, and to formulate appropriate stipulations within the Korean construction context. The resultant requirements include stipulating ownership at to the BIM originator, adopting a license-sublicense scheme, employing a federated model, and use of a formal model delivey table to allocate responsibilities. Given Korea's adoption stage, liability should be minimal, and license revocation should be allowed if payments are not met. The three BIM legal documents focus on practical measures that allow participants to customize requirements for individual projects, and such conventions should be emulated in Korea.

A Scheme for DID and EMR Integrated System based on Hyperledger Indy (Hyperledger Indy 기반의 DID와 EMR 통합 시스템 기법)

  • Jiyong Yang;Hyosang Eom;Keun-Ho Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.1
    • /
    • pp.47-52
    • /
    • 2024
  • The efficiency and quality of healthcare services rely heavily on the secure protection and transparent management of individuals' medical information, which is becoming increasingly important in the digital age. To address this issue, we propose a distributed identity management (DID) and electronic medical record (EMR) integration system based on Hyperledger Indy, which aims to ensure the ownership of medical information to individuals and increase the accessibility and utilization of medical information. The system will allow individuals to manage their own medical information and share it transparently when necessary, which will improve the efficiency of healthcare services. In addition, the system will securely protect and transparently manage medical information, increasing the transparency of medical services and strengthening individuals' control over their medical information. Thus, the system will contribute significantly to improving the quality of medical services, protecting individuals' medical information, and improving the efficiency of medical services.

Asymmetric Watermarking Using Public Key Infrastructure (공개키 기반 구조를 이용한 비대칭 워터마킹)

  • Jun Young-Min;Yang Sun-Ouk;Kim Gye-Young
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.9
    • /
    • pp.1282-1293
    • /
    • 2004
  • This paper proposes an asymmetric watermarking system using Public Key Infrastructure. The distinguishing characteristic of the proposed method connects between the two different techniques, cryptography technique and watermarking technique, by using the authentication technique. The connection between the two techniques are established based on the special qualities of each technique. Watermarks that are inserted into the digital contents consist of a digital signature described as an encrypted copyright information with the private key of a distributor or a copyright holder, and an authentication code. In the situation where the ownership of the digital contents has to be decided, authentication technique examines the data integrity of the digital contents based on an authentication and decides the ownership of the digital contents by examining whether it satisfies or not satisfies the integrity test. The formal case uses decryption method which compares the user defined copyright information, and the decrypted copyright information extracted from the watermark in the digital contents that are decrypted by distributors' public key The latter case determines the ownership by comparing the similarity between encrypted copyright information separated from the watermark that are extracted from the digital contents, and the user defined encrypted copyright information that are separated from the watermark The proposed method provides protection from the assault which attempts to identify or erase the encoding key.

  • PDF

A Study for Applicating and Introducing the Right to be Forgotten (잊혀질 권리의 도입과 적용에 관한 연구)

  • Seo, Yunhee;Chang, Younghyun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.2 no.3
    • /
    • pp.23-28
    • /
    • 2016
  • As a large portal sites are beginning to replace the function of the mass media, new risks began to raise. It remained without being deleted that data written to the internet was a serious privacy problem occurs. The sensitive information was inferred based on the personal data recorded in the past and also another personal information leakage itself. Witch-hunt through the personally identifiable rob has emerged as a serious social problem and damage to the parties not be able to live a normal life. In this paper, we propose the study on the need for a 'right to be forgotten' to delete the personal information relating to on-line through international case studies and activation measures. At the same time, we proposed improvement measures, such as encryption management, ownership inheritance, and blind treatment.

A Study on the Operation of the Collaborative Repository for University Libraries in Other Countries: with a special reference to materials deposit and services (해외 대학도서관 공동보존서고 운영에 관한 연구 - 자료이관과 자료제공을 중심으로 -)

  • Kang, Eun Yeong
    • Journal of Korean Library and Information Science Society
    • /
    • v.49 no.3
    • /
    • pp.193-217
    • /
    • 2018
  • This study was conducted to investigate the materials deposit policies and service policies of overseas collaborative repositories and provide practical data that can be referred to the management of the collaborative repository in Korea. For this purpose, this study tried to analyzed websites of 7 collaborative repositories and related data. Materials deposit policies were focused on duplicate materials, criteria of materials to be accepted, ownership and withdrawal and service policies were focused on on-site services and off-site services including circulation and document delivery service(electronic copy and photocopy). The results of this study can be used as practical data for the establishment of guidelines for collaborative repository in Korea.