• Title/Summary/Keyword: 디지털 콘텐츠 보호

Search Result 481, Processing Time 0.031 seconds

A Study on Video Copy Detection Methods Using Representative Color Sequence for Protecting Copyrights (저작권 보호를 위한 대표 색상 시퀀스를 이용한 동영상 복사 검출 방법)

  • Choi, Min-Seok;Choi, Sung-Wook
    • Journal of Digital Convergence
    • /
    • v.10 no.5
    • /
    • pp.185-191
    • /
    • 2012
  • This study deals with the technical approach related to the protection of digital video contents copyright, which has currently become a major issue in the digital contents market. With the production and distribution of digital video contents rapidly increasing, various policies and technical approaches are being made in relation to the protection of intellectual property rights. The technical approach from a DRM (Digital Rights Management) perspective was made from various angles, but its limitations have also been exposed in terms of convenience and quality. In this study, rather than the existing encoding certification and watermark technologies, it introduces technical approaches from a content-based copy detection method, while suggesting a copy detection method using the representative color sequence. In particular, this study takes into consideration the distribution environment of the domestic video market and deals with the technical approach in a direction that can control the illegal distribution of high quality videos.

디지털콘텐츠의 저작권 문제 ④

  • Seong, Seon-Je
    • Digital Contents
    • /
    • no.10 s.137
    • /
    • pp.116-121
    • /
    • 2004
  • 21세기는 바야흐로 디지털의 시대이며 문화의 시대이다. 문화상품의 전쟁시대인 21세기에 애니메이션은 우리에게 가장 잠재력이 많고 경쟁력이 높은 문화상품이다. 애니메이션은 더 이상 어린이나 청소년의 단순한 소일거리 대상이 아니다. 따라서 세계 각국은 애니메이션 산업의 발전을 위해 전력을 기울이고 있는 실정이다. 이렇게 애니메이션에 관심이 집중되다보니 부작용 내지는 역효과도 발생하게 되는 것은 어찌 보면 당연하다 할 수 있다. 그 중의 하나로 애니메이션의 유통 단계에서 저작권을 비롯한 지적재산권의 보호 문제를 들 수 있다. 이에 이번 호에는 디지털콘텐츠 산업 중에서도‘애니메이션’을 중심으로 법적 문제를 다루고자 한다.

  • PDF

A Study on Protection Technology Criteria for Preventing Contents Abuse on On-line (온라인상의 콘텐츠 오남용 방지를 위한 보호기술 기준에 대한 연구)

  • Hong, Sung-Hyuk;Yoon, Eun-Jun;Han, Jae-Hong;Park, Jong-Hyuk
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.3
    • /
    • pp.432-437
    • /
    • 2009
  • Due to fast development of communications, knowledge and information have been become digitalized and distributed actively. However, the misuse and abuse of digital properties and security problems frequently take place. In this paper, we analyze the cases of the misuse and abuse of contents and the contents protection technology. We propose important items for protection technology to prevent contents from misuse and abuse based on results of the analyses. These important items are expected to be used as important factors for establishing protection technology standards.

  • PDF

A Study of Information Dealing System Based on Internet (인터넷 기반 정보거래시스템에 관한 연구)

  • Hong, G.C.;Moon, B.J.
    • Electronics and Telecommunications Trends
    • /
    • v.17 no.6 s.78
    • /
    • pp.193-203
    • /
    • 2002
  • 본 고에서는 인터넷 기반에서 디지털 콘텐츠 유료화를 위한 정보거래시스템의 구현을 목표로 디지털 콘텐츠 유료화에 관한 최신의 기술 동향 및 실제적인 시스템 구현을 위한 구성 요소들을 살펴 보고자 한다. 이에 디지털 콘텐츠 유료화를 위해서 반드시 필요되는 디지털 콘텐츠 보안 기술, 과금(빌링)시스템, 전자 결제 방식 및 PG, 디지털 콘텐츠 전송기술, 디지털 콘텐츠 저작권 보호 기술 등에 대한 내용 중심으로 고찰할 것이다. 또한 이를 기반으로 구현하고자 하는 정보거래시스템의 커머스 모델로는 C-to-C 개념으로 인터넷 기반의 정보 생성자와 정보 이용자를 직접 연계하고, 정보 이용에 대한 지불 처리가 가능하도록 하여 기존의 C-to-B 및 B-to-B 기반 전자상거래에서 C-to-C 기반 전자상거래 개념 도입을 통한 정보거래 기반 및 정보 자체에 대한 인터넷 거래 활성화를 유도할 수 있는 기술적 기반 환경을 조성하고, 실제적으로 활용이 가능한 프로토타입 모델을 설계하고자 한다.

Smartphone Content Security Scheme for Protect Malware Attacks (멀웨이 공격을 예방하기 위한 스마트폰 콘텐츠 보호 기법)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.12 no.4
    • /
    • pp.327-333
    • /
    • 2014
  • Recently, smartphone are increasing in Internet-enabled applications to install and delete benefits as well as internet through various interfaces such as 3G network, Wi-Fi, Wibro without the constraints of time and place. However, the prevalence of smartphones and the activity was generated from an existing PC smartphone security threats are causing a ripple in a society. In this paper, we serve live content services on the first and last content by creating an electronic signature is the signature of either the loss of any Content provided by both authentication and non-repudiation content protection scheme is proposed. The proposed method of secure smartphone users to download and install the content or an application for downloading content over the content for secure authentication.

The undeniable digital multisignature scheme suitable for joint copyright protection on digital contents (온라인 디지털 콘텐츠 공동 저작권 보호에 적합한 부인봉쇄 디지털 다중서명 기법)

  • 윤성현;한군희
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.05a
    • /
    • pp.261-267
    • /
    • 2004
  • In undeniable digital signature scheme, the signature can not be verified without the signer's cooperation. The undeniable signature scheme can be used to computerize many applications which can not be done by a conventional digital signature scheme. In this study, we propose the undeniable digital multi-signature scheme which requires many signers and designated verifier. The multi-signature can be verified only in cooperation with all signers. The proposed scheme satisfies undeniable property and it is secure against active attacks such as modification and denial of the multi-signature by signers. We also discuss practical applications such as joint copyright protection on digital contents.

  • PDF

S/W Program Plagiarism Inspection Techniques and Analysis of S/W Tools for Protection of Digital Properties (디지털 재산권 보호를 위한 소프트웨어 프로그램 표절 감정 기술과 툴의 분석)

  • 조동욱
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.05a
    • /
    • pp.177-184
    • /
    • 2003
  • Protection of digital properties such as computer S/W, digital contents is the most important topics. For this, this paper describes the domestic and foreign trends for protecting digital properties and S/W tools for inspecting of plagiarism is compared and analyzed. The analysis of research activities of foreign inspection institutes such as JISC and domestic institutes and communities has done. Also, S/W tools for inspecting of natural language plagiarism is analyzed.Having been speed development of The Content Technology,

  • PDF

A Design of DRM Solution in a Distribution Framework of the Digital Content (디지털 콘텐츠 유통 프레임워크에서 DRM적용방법 설계)

  • 전진영;박진홍;신용태;이혜주;홍진우
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.673-675
    • /
    • 2003
  • 정부의 초고속 인터넷 환경을 구축하려는 적극적인 노력과 폭발적인 인터넷 사용자의 증가로 디지털 콘텐츠의 수요는 매우 커지고 있다. 앞으로 고부가가치 산업으로 발전이 예상되는 디지털 콘텐츠 사업에서 콘텐츠의 기밀성을 보장하고 저작권을 보호할 수 있는 유통 구조는 매우 중요한 것으로 판단된다. 본 논문은 현재 논의되고 있는 디지털 콘텐츠 유통에 관련해 MPEG-21과 DRM 기술에 대해 개략 적으로 살펴본 후 콘텐츠 제공자, 유통 업자 DRM 서버, 이용자 시스템으로 이루어진 DRM 기반의 디지털 콘텐츠유통 모델을 제안한다. 그리고 제시된 유통 구조에서 이용될 수 있는 유통 개체간의 키 교환 기법을 제안한다.

  • PDF

The Biometric based Convertible Undeniable Multi-Signature Scheme (바이오정보 기반 전환 부인봉쇄 다중서명 기법)

  • Yun, Sung-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.5
    • /
    • pp.1670-1676
    • /
    • 2010
  • It is easy to reproduce and manipulate the digital contents. It's difficult to distinguish the original contents with a pirate one. A digital signature scheme is used to protect the contents author's ownership and to provide secure contents distribution. Generally, the digital contents is completed with many authors' help. It's necessary to apply a cryptographic method for protecting co-authors' rights and interests. In this paper, the biometric based convertible undeniable multi-signature scheme is proposed. In the proposed scheme, keys are generated by using a signer's biometric data. Consigning the private key to another signer is infeasible. Signers must participate in signature generation and verification stages. Our scheme also provides signature conversion protocol in which the undeniable signature is converted to the ordinary one. For applications, we show how the proposed scheme is used to protect co-authors' rights and to distribute the contents securely.

Design of DID-based Verification Protocol for Strengthening Copyright Holders' Sovereignty (저작권자의 주권 강화를 위한 DID 기반 검증 프로토콜 설계)

  • Kim, Ho-Yoon;Shin, Seung-Soo
    • Journal of Industrial Convergence
    • /
    • v.20 no.9
    • /
    • pp.47-58
    • /
    • 2022
  • Digital content is difficult to distinguish between the original and the replica due to its nature. For this reason, NFT technology using blockchain technology is attracting attention because it can guarantee the proof and scarcity of the original digital content. However, the NFT buyer does not own the copyright to the digital content, but the ownership. In particular, since the minting process of issuing NFTs is possible for anyone, there is a copyright threat to the copyright holder. In this study, we propose a verification protocol based on DID for the process of issuing and transacting NFTs for copyright protection of copyright holders' digital contents. As a research method, the problems of research cases related to digital contents were analyzed and the safety was comparatively analyzed. NFT issuance can only be issued by copyright holders whose identity has been verified through DID, and only users who have completed authentication can participate in the transaction to prevent indiscriminate theft and use of digital content and form a safe and transparent transaction market.