• Title/Summary/Keyword: 디지털저작권침해

Search Result 75, Processing Time 0.024 seconds

How Protect Terrestrial Broadcast Contents? KBS' Systematic Strategy to Restrict Illegal Use (지상파 방송프로그램 어떻게 보호할 것인가? KBS의 방송프로그램 보호 전략)

  • Kim, Byung-Sun;Cho, In-Joon;Hahm, Sang-Jin;Lee, Keun-Sik
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2010.07a
    • /
    • pp.208-211
    • /
    • 2010
  • 2012년 지상파 방송은 아날로그 송출을 종료하고 디지털 방송으로 전환된다. 이렇게 전환되는 지상파 디지털 방송은 무료로 누구나 시청할 수 있는 보편적 서비스를 지향하기 때문에, 케이블TV, 위성TV, IPTV 등의 다른 매체와는 달리 기술적 보호조치 없이 방송되고 있다. 또한 DTV 방송프로그램은 원본과 똑같은 화질로 개인이 쉽게 저장할 수 있고 인터넷을 통하여 누구나 쉽게 접근이 가능하기 때문에, DTV 방송프로그램의 무단복제와 인터넷을 통한 불법재배포는 큰 문제점으로 대두되고 있다. 이러한 불법 대량배포는 방송프로그램의 저작권을 심각히 침해할 뿐만 아니라, 방송사의 고품질의 방송프로그램을 제작환경을 더욱 열악하게 만들고 있다. 또한 일반 사용자는 인식하지 못하는 사이에 인터넷을 통해 불법 콘텐츠를 사용하게 되는 악순환에 빠지게 된다. 이에 본 논문은 KBS에서 추진하고 있는 여러 콘텐츠 보호 기술들을 하나의 보호 고리로 연결하는 KBS 보호기술 체계를 소개하고자 한다. 이를 위하여 KBS는 아래의 3가지 보호 기술을 개발하여 체계적으로 연결하여 적용하고 있다. 첫째, 프로그램의 저작권과 배포 정보를 나타내는 프로그램 보호신호(PPI, Program Protection Information)와 워터마크를 방송 신호에 삽입하여 수신기에서의 프로그램 보호를 추진한다, 둘째, 인터넷 OSP(Online Service Provider)와의 제휴를 통하여 콘텐츠 필터링 기술을 도입하여 프로그램 불법 업로드, 다운로드를 방지한다. 셋째, KBS 저작물 인터넷 모니터링 시스템을 개발하여 인터넷 상의 불법 프로그램 배포정보를 획득하여 불법배포가 진행되는 사이트에 보호를 요청한다.

  • PDF

Wavelet based data Watermarking (웨이브릿 기반의 데이터 워터마킹)

  • 김동현
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.6
    • /
    • pp.1224-1228
    • /
    • 2003
  • The use of digital imaging technique and digital contents based on internet has grown rapidly for last several years, and the needs of digital image protection become more important. For the purpose of copyright protection on digital image, the verification of authentication techniques like content authentication, ownership authentication, illegal copy and etc are needs. Digital watermarking, the invisible encryption technique to insert digital watermarking into image, the sophisticated perceptual information should be used for providing transparency and robustness of images on watermarking process. In this paper, we implement the algorithm for preventing forged attack. ownership protection and authentication by transforming the wavelet algorithms in frequency domain in terms of human visual system.

The Study on the Introduction of Clear QAM and 8VSB in the Digital Conversion of Pay TV (유료방송 디지털 전환에서 클리어 쾀과 8VSB 도입에 관한 연구)

  • Kim, Hee-Kyung
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.4
    • /
    • pp.23-34
    • /
    • 2013
  • This study would verify the validity of two transmission technology, 'Clear QAM' and '8VSB'. 'Clear QAM' and '8VSB', the transmisson technology, have been suggested as the concrete alternatives in the situation that half of subscriber of multi channel tv service have been still out of benefit from digital convert. In this study, we have shown that the introduction of 'Clear QAM' and '8VSB' should ease economical burdens and information minority group without extra set-top box. But there is another concern that it should negatively affect on the contents industry by a devaluation of the multi channel tv service or by an infringement of copyright. In these reasons, it is still difficult to solve the related concern, though the government have to set up the politic goal for the related industry as well digital convert. This study suggested that Korea Communication Commission consider above-mentioned technology temporarily, and reconsider 'Clear QAM' around the completion of the digital convert project.

Trademark Protection In The Fashion Industry with ICT Issues (패션산업의 상표권 보호 및 ICT 쟁점 - Louboutin 사건, Levi 사건에 대한 분석을 중심으로 -)

  • Lee, Jae-Kyoung
    • Journal of Legislation Research
    • /
    • no.44
    • /
    • pp.185-209
    • /
    • 2013
  • With the broader range of information and communications technology, of which fashion is a foundational medium, to analyze fashion as an information technology in order to better understand the industry's desire for intellectual property protection, popular resistance to such protection, and the most efficacious balance between them in terms of creative expression. It is, therefore to be focused on cultural and historical reasons for the limited degree of intellectual property protection extended in the past to certain categories of human creativity, including fashion design. So, the question of why some tension still exists between creators and consumers of fashion, how information theory can contribute to an explanation for that tension, and what role law can play in its resolution with Louboutin case and Levi case. Consumers and designers alike are better served by promotion of fair competition, lower litigation costs, and the inventive synergy of the fashion industry. Louboutin shows the comfortable, respectful limits of trademark law, while Levi illustrates the dangerous, overreaching deference that a few circuits have granted to famous marks. The Supreme Court could clarify the standard for dilution claims, requiring that a junior mark be "identical or nearly identical" or even "significantly similar" to a senior mark. Courts should need a deference in making dilution determinations and can choose to make this factor quite subjective with the highest degree of similarity.

Instagram Users Behavior Analysis in a Digital Forensic Perspective (디지털 포렌식 관점에서의 인스타그램 사용자 행위 분석)

  • Seo, Seunghee;Kim, Yeog;Lee, Changhoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.407-416
    • /
    • 2018
  • Instagram is a Social Network Service(SNS) that has recently become popular among people of all ages and it makes people to construct social relations and share hobbies, daily routines, and useful information. However, since the uploaded information can be accessed by arbitrary users and it is easily shared with others, frauds, stalking, misrepresentation, impersonation, an infringement of copyright and malware distribution are reported. For this reason, it is necessary to analyze Instagram from a view of digital forensics but the research involved is very insufficient. So in this paper, We performed reverse engineering and dynamic analysis of Instagram from a view of digital forensics in the Android environment. As a result, we checked three database files that contain user behavior analysis data such as chat content, chat targets, posted photos, and cookie information. And we found the path to save 4 files and the xml file to save various data. Also we propose ways to use the above results in digital forensics.

Analyzing cinematic consumption patterns of the p2p users (P2P 영화파일공유 이용자의 영화소비패턴 분석)

  • Yi, Sun-Hi;Choe, Soo-Young
    • 한국HCI학회:학술대회논문집
    • /
    • 2007.02b
    • /
    • pp.728-736
    • /
    • 2007
  • P2P 파일공유는 1999년 처음 등장한 이래 저작권 침해로 디지털 콘텐츠 시장을 파괴하는 '해적'으로 간주 되어왔다. 하지만 최근 들어 P2P 시장의 산업적 가능성을 새롭게 주목하는 움직임이 나타나고 있다. 아울러 학계에서는 P2P의 경제적 영향력을 공급자 편향의 시각이 아닌 소비자 측면을 포함한 균형적 관점으로 바라보기 시작했다. 본 연구 역시 균형적 관점에서 P2P를 바라보려는 접근법의 일환으로, P2P 영화파일 공유 이용자들의 영화소비패턴을 실증적으로 살펴보고자 하였다. 실제 P2P 영화파일 공유 이용자들에 대한 설문결과, 이용자들은 단일한 영화소비성향을 가지고 있지 않았으며 다운로드와 극장 관람빈도가 모두 높은 이른바 '얼리어답터'형과 다운로드를 극장관람의 대체재로 여기는 소위 '해적'형이 공존하고 있었다. 이 중 그간 산업계에서 우려하던 해적형의 비율은 10% 정도로 낮았고, 대부분의 P2P 이용자들은 오히려 일반 극장 관람객보다 더 적극적으로 극장소비를 하는 사람들로 영화산업에 긍정적인 기여를 하는 것으로 밝혀졌다. 이러한 소비자 분석결과는 향후 본격화되고 있는 P2P 다운로드 유료화 시장에 대한 전망을 밝게 하는 것으로, 현재 유료화에 있어 가장 중시해야 할 것은 불법 무료 다운로드에 대한 경계가 아니라, 소비자 편의적인 시스템의 개발임을 시사한다.

  • PDF

Image Forensic Decision Algorithm using Edge Energy Information of Forgery Image (위·변조 영상의 에지 에너지 정보를 이용한 영상 포렌식 판정 알고리즘)

  • Rhee, Kang Hyeon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.3
    • /
    • pp.75-81
    • /
    • 2014
  • In a distribution of the digital image, there is a serious problem that is distributed an illegal forgery image by pirates. For the problem solution, this paper proposes an image forensic decision algorithm using an edge energy information of forgery image. The algorithm uses SA (Streaking Artifacts) and SPAM (Subtractive Pixel Adjacency Matrix) to extract the edge energy informations of original image according to JPEG compression rate(QF=90, 70, 50 and 30) and the query image. And then it decides the forge whether or not by comparing the edge informations between the original and query image each other. According to each threshold in TCJCR (Threshold by Combination of JPEG Compression Ratios), the matching of the edge informations of original and query image is excused. Through the matching experiments, TP (True Positive) and FN (False Negative) is 87.2% and 13.8% respectively. Thus, the minimum average decision error is 0.1349. Also, it is confirmed that the performed class evaluation of the proposed algorithm is 'Excellent(A)' because of the AUROC (Area Under Receiver Operating Characteristic) curve is 0.9388 by sensitivity and 1-specificity.

The Behavioral Model of Digital Music Piracy on the Web (인터넷에서의 디지털 음악 저작권 침해 행동에 관한 연구)

  • Han, Jung-Hee;Chang, Hwal-Sik
    • The Journal of Information Systems
    • /
    • v.16 no.1
    • /
    • pp.135-158
    • /
    • 2007
  • The purpose of this research is to identify multidimensional motivation factors that determine the piracy of copyrighted digital music. The model is based on TPB(theory of planned behavior) as well as other models in consumer behavior. An empirical study resulted in the following findings. first Both individual's attitude toward music piracy and individual's perceived behavior control have positive impacts on the individual's behavioral intention of piracy. It turned out that perceived behavior control has a stronger impact on behavioral intention than attitude does. Second, the level of individual's moral judgment has negative impacts on both the attitude and behavioral intention toward music piracy. Third, individual's experience in music piracy positively affects the attitude, but does not directly or indirectly affect the behavior intention. Fourth, an economic gain from music piracy is not a significant factor in determining both attitude and behavioral intention. Fifth, the risk of being prosecuted for music piracy is a major factor in determining one's attitude, although the risk is not significant enough to change one's behavioral intention. This research found that individuals' intention to pirate digital music is mainly affected by the moral and ethical standards of the individuals and by the extra resources and abilities they possess. Such factors as economic gain and law enforcement were not significant enough to alter one's behavioral intention. This research is significant in that it established a behavioral model to understand the piracy of copyrighted digital music and that it empirically tested the model with Internet users in Korea. This is one of the first empirical studies in Korea to touch such ethically and perhaps politically sensitive issues as online music piracy.

  • PDF

Secret Sharing Scheme using Gray Code based on Steganography (스테가노그라피 기반에서 그레이코드를 사용한 비밀공유 기법)

  • Kim, Cheon-Shik;Yoon, Eun-Jun;Hong, You-Sik;Kim, Hyoung-Joong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.1
    • /
    • pp.96-102
    • /
    • 2009
  • Due to the rapid growth of the Internet, it is possible to distribute the digital content efficiently. However, the need for image data protection and secret communication technique is also on the rise because of an infringement of the copyright by malicious attackers. Shamir and Lin-Tsai proposed simple secret image encryption algorithms based on the principle of secret sharing, respectively. However, their secret sharing schemes have a serious problem which can be declined the image quality and it is possible for third party to know embed information. In this paper, we propose a new secret sharing scheme using gray code that can be increased the image quality and security. As a result of our experiment, the proposed scheme is not only shown of good image quality and but also provide enhanced security compare with Shamir and Lin-Tasi's schemes.

A Classification Method for Executable Files based on Comparison of Undocumented Information in the PE Header (실행파일 헤더내 문서화되지 않은 정보의 비교를 통한 실행파일 분류 방법)

  • Kim, Jung-Sun;Kang, Jung-Min;Kim, Kang-San;Shin, Wook
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.1
    • /
    • pp.43-50
    • /
    • 2013
  • File identification and analysis is an important process of computer forensics, since the process determines which subjects are necessary to be collected and analyzed as digital evidence. An efficient file classification aids in the file identification, especially in case of copyright infringement where we often have huge amounts of files. A lot of file classification methods have been proposed by far, but they have mostly focused on classifying malicious behaviors based on known information. In copyright infringement cases, we need a different approach since our subject includes not only malicious codes, but also vast number of normal files. In this paper, we propose an efficient file classification method that relies on undocumented information in the header of the PE format files. Out method is useful in copyright infringement cases, being applied to any sort of PE format executable file whether the file is malicious, packed, mutated, transformed, virtualized, obfuscated, or not.