• Title/Summary/Keyword: 디지털 콘텐츠 보호

Search Result 481, Processing Time 0.022 seconds

A Study on Copyright Infringement over Online Streaming Services by Reconstructing Web Cache (웹 브라우저 캐시 재조립을 통한 온라인 스트리밍 서비스 상의 저작권 침해 가능성에 관한 연구)

  • Lim, Yirang;Chung, Hyunji;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.559-572
    • /
    • 2020
  • As internet technology advances, users can share content online, and many sharing services exist. According to a recently published digital forensic study, when playing an online streaming service, you can restore the played video by reconstructing the Chrome cache file left on local device such as a PC. This can be seen as evidence that the user watched illegal video content. From a different point of view, copyright infringement occurs when a malicious user restores video stream and share it to another site. In this paper, we selected 23 online streaming services that are widely used both at home and abroad. After streaming videos, we tested whether we can recover original video using cache files stored on the PC or not. As a result, the paper found that in most sites we can restore the original video by reconstructing cache files. Furthermore, this study also discussed methodologies for preventing copyright infringement in online streaming service.

Copyright Protection for the Video image with Coded Watermarking (암호화 워터마킹을 사용한 비디오 영상의 저작권 보호)

  • Park, Young;Kim, Hang-Rae;Rhu, Ho-Joon;Kim, Jae-Won
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.11a
    • /
    • pp.120-123
    • /
    • 2003
  • In this paper, a digital watermarking scheme whichis effective in protecting a copyright of video image under an image transformation and impulse noise is proposed. The proposing scheme is to use a coded watermark that insert the personal ID of copyrighter. The recovery ability is improved by the coded watermark. Also the coded watermark is abel to trace the illegal distributors. Binary image is used as watermark image, the value of PSNR and recovered rates of watermark are obtained in order to confirm the required invisibility and robustness in watermark system. The experimental results show that image quality is less degraded as the PSNR of 98.21 ㏈. It is also observed that excellent watermark recovery is achieved under the image transformation and impulse noise.

  • PDF

Design of Security Framework for Next Generation IPTV Services (차세대 IPTV 서비스를 위한 보안 프레임워크 설계)

  • Lee, Seung-Min;Nah, Jae-Hoon;Seo, Dong-Il
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.33-42
    • /
    • 2010
  • With the emergence of increasingly complex networks and diverse user terminals, demand for the next generation IPTV service is rapidly growing. It enables any content to seamlessly be reused on the diverse terminals as well as be broadcasted in real-time through the complex networks. In this paper, a novel security framework is proposed for the real-time and reusable IPTV services. The proposed framework is advantageous over the conventional content protection techniques in easily producing the scalable content with lightweight, perceptual, transcodable, and adjustable security features. It does not only ensure end-to-end security over the entire service range based on a single security mechanism, but also can control a level of security while dynamically transcoding the original content. This approach basically performs selective encryption during and after the compression using scalable video coding. The suitability of the proposed approach is demonstrated through experiments with a practical service scenario. Therefore, it is expected that security technology alone could practically contribute to creating new business opportunities for IPTV services.

A Study on the Paperless Waiting Order Count System for Green IT (Green IT를 위한 Paperless 순번대기표 시스템에 관한 연구)

  • Kang, Min-Sik
    • Journal of Digital Contents Society
    • /
    • v.12 no.4
    • /
    • pp.511-518
    • /
    • 2011
  • One of the most important paradigms in society has recently been a set of efforts to prepare for the future and to protect the environment by saving carbon that occurs in everyday life as well as in the industry. In order to successfully deal with this new paradigm, Korean government has adopted and implemented various policies including the green certification, the development of green technologies and green growth. Many agencies and organizations in both public and private sectors have established plans about the carbon savings and performed a lot of research using IT technology. For example, attempts have been made in Korea to use as electronic documents instead of paper documents using these green IT and mobile devices. This paper proposes a 'Paperless' waiting order count system using QR code and mobile phone as an example of green IT for 'Low carbon and Green growth'.

SDN based Discrimination Mechanism for Control Command of Industrial Control System (SDN 기반 산업제어시스템 제어명령 판별 메커니즘)

  • Cho, Minjeong;Seok, Byoungjin;Kim, Yeog;Lee, Changhoon
    • Journal of Digital Contents Society
    • /
    • v.19 no.6
    • /
    • pp.1185-1195
    • /
    • 2018
  • Industrial Control System (ICS) is a system that carry out monitoring and controls of industrial control process and is applied in infrastructure such as water, power, and gas. Recently, cyber attacks such as Brutal Kangaroo, Emotional Simian, and Stuxnet 3.0 have been continuously increasing in ICS, and these security risks cause damage of human life and massive financial losses. Attacks on the control layer among the attack methods for ICS can malfunction devices of the field device layer by manipulating control commands. Therefore, in this paper, we propose a mechanism that apply the SDN between the control layer and the field device layer in the industrial control system and to determine whether the control command is legitimate or not and we show simulation results on a simply composed control system.

Research Trends Investigation Using Text Mining Techniques: Focusing on Social Network Services (텍스트마이닝을 활용한 연구동향 분석: 소셜네트워크서비스를 중심으로)

  • Yoon, Hyejin;Kim, Chang-Sik;Kwahk, Kee-Young
    • Journal of Digital Contents Society
    • /
    • v.19 no.3
    • /
    • pp.513-519
    • /
    • 2018
  • The objective of this study was to examine the trends on social network services. The abstracts of 308 articles were extracted from web of science database published between 1994 and 2016. Time series analysis and topic modeling of text mining were implemented. The topic modeling results showed that the research topics were mainly 20 topics: trust, support, satisfaction model, organization governance, mobile system, internet marketing, college student effect, opinion diffusion, customer, information privacy, health care, web collaboration, method, learning effectiveness, knowledge, individual theory, child support, algorithm, media participation, and context system. The time series regression results indicated that trust, support satisfaction model, and remains of the topics were hot topics. This study also provided suggestions for future research.

A Study on Media Security in Ubiquitous Network System (유비쿼터스 네트워크 시스템에서의 미디어 보안에 관한 연구)

  • Ju, Min-Seong;Ahn, Seong-Soo;Woo, Young-Hwan;Kim, Yong-Tae;Kim, Tai-Hoon;Park, Gil-Cheol;Kim, Seok-Soo
    • Convergence Security Journal
    • /
    • v.7 no.1
    • /
    • pp.29-34
    • /
    • 2007
  • Recently, the distribution and using of the digital multimedia contents are easy by developing the internet application program and related technology. However, the digital signal is easily duplicated and the duplicates have the same quality compare with original digital signal. To solve this problem, there is the multimedia fingerprint which is studied for the protection of copyright. Fingerprinting scheme is a technique which supports copyright protection to track redistributers of electronic information using cryptographic techniques. Only regular user can know the inserted fingerprint data in fingerprinting schemes differ from a symmetric/asymmetric scheme and the scheme guarantee an anonymous before re-contributed data. In this paper, we present a new scheme which is the detection of colluded multimedia fingerprint by neural network. This proposed scheme is consists of the anti-collusion code generation and the neural network for the error correction.

  • PDF

Implementation of multi-channel IPCC platform for RBAC based CRM service (RBAC기반의 CRM 서비스를 위한 멀티 채널 IPCC 플랫폼 구현)

  • Ha, Eunsil
    • Journal of Digital Contents Society
    • /
    • v.19 no.9
    • /
    • pp.1751-1758
    • /
    • 2018
  • An integrated medical information system that integrates systems consisting of different environments centered on hospital information systems should be provided as a system that prioritizes the improvement of the quality of medical services, customer satisfaction, and patient safety. The RBAC-based medical information system is granted the access right according to task type, role, and rules. Through this, it is possible to use SMS channel, medical reservation and cancellation, customized statistics, and CRM / EMR interworking service using multi-channel to enable communication service without help of counselor and reduce the default rate of reservation patient, Operational improvement services can be extended to medical staff, patients and their families, as well as expanding to important decisions for patients.

AIS application program implementation and test based on IMO Maritime Cloud analysis (IMO 마리타임 클라우드 분석을 통한 AIS응용 프로그램 구현 및 테스트)

  • Lee, Jea-Wook;Mun, ChangHo;Lee, Seojeong
    • Journal of Digital Contents Society
    • /
    • v.16 no.6
    • /
    • pp.927-934
    • /
    • 2015
  • IMO e-Navigation is ongoing project for safety navigation and protection of maritime environment. Maritime Cloud is a part of e-Navigation Strategy Implementation Plan. It is IT framework technology for exchanging information among maritime stakeholders. We found configuration and operation process by analysis on Maritime Cloud architecture and EPD which is a client program. Through the result, we actually implemented client program. Client program targets Berthing data serviced on AIS-ASM. And we used MMS which is function of message exchanging of Maritime Cloud. The test result show data exchanging succeeded. And it will be helpful to develop Maritime Cloud service, to advance Korean Maritime Cloud.

Analysis and Experiment of Portrayal Process based on S-100 Standard of Marine Safety Information (해양안전정보의 S-100 표준 기반 표출 프로세스 분석 및 실험)

  • Kim, Hyoseung;Mun, Changho;Lee, Seojeong
    • Journal of Digital Contents Society
    • /
    • v.19 no.7
    • /
    • pp.1289-1296
    • /
    • 2018
  • The e-Navigation promoted by the International Maritime Organization is a technology that provides marine-related information necessary for ship and shore side by electronic means for marine safety, security and protecting marine environment. The IHO S-100 standard is a geospatial standard that can express various hydrographic information. Various specifications including S-101 for electronic charts are being developed. In this paper, to help developers who are interested in implementing the technology of S-100, we not only analyze the process to portray the S-100 based data but also implement a case study on S-129 under keel clearance management. The portrayal process consists of data encoding and portrayal engine. Data encoding includes generation of application schema and data set. Portrayal engine is performed by the reform of the generated data set, the XSLT processing, and then the generation of drawing instructions.