• Title/Summary/Keyword: 웹하드

Search Result 34, Processing Time 0.024 seconds

A Study of Performance Evaluation Standard for Scanned Cartoon Book Identification Technology (스캔 만화 식별 기술 성능평가 기준에 관한 연구)

  • Yoon, Hee-Don;Kim, Tae-Hyun;Kang, Ho-Gab;Cho, Seong-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.29-35
    • /
    • 2015
  • In order to identify scanned cartoon books which are illegally distributed, the copyright project granted from the Korea Copyright Commission (Project title: Identification and Copy Protection Technology of Scanned Text/Comic Books) secured basic solutions for scanned cartoon books. The purpose of this paper is to propose a performance evaluation standard with essential items required for developing technology to identify whether a comic book is illegally scanned and distributed. For this purpose, types of scanned comic books which are illegally distributed through webhard sites are analysed, the transformed factors are classified and major detail items of the factors are identified.

An Identification and Feature Search System for Scanned Comics (스캔 만화도서 식별 및 특징 검색 시스템)

  • Lee, Sang-Hoon;Choi, Nakyeon;Lee, Sanghoon
    • Journal of KIISE:Databases
    • /
    • v.41 no.4
    • /
    • pp.199-208
    • /
    • 2014
  • In this paper, we represent a system of identification and feature search for scanned comics in consideration of their content characteristics. For creating the feature of the scanned comics, we utilize a method of hierarchical symmetry fingerprinting. Proposed identification and search system is designed to give online service provider, such as Webhard, an immediate identification result under conditions of huge volume of the scanned comics. In simulation part, we analyze the robustness of the identification of the fingerprint to image modification such as rotation and translation. Also, we represent a structure of database for fast matching in feature point database, and compare search performance between other existing searching methods such as full-search and most significant feature search.

A Study on Image Feature Point Extraction for Realistic Contents (실감형 콘텐츠를 위한 영상 특징점 추출 기법 연구)

  • Kim, Jin-Sung;Park, Byeong-Chan;Won, Yu-Hyeon;Kim, Young-Mo;Kim, Seok-Yoon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.07a
    • /
    • pp.385-386
    • /
    • 2018
  • 최근 실감형 미디어에 대한 관심이 증폭되고 있으며 제조, 교육, 의료, 국방 등에 분야에서 기존 산업과 융합하여 많은 연구가 진행되고 있으며 MPEG에서도 이러한 실감형 미디어 기술에 대한 자체적인 표준화가 진행 중에 있다. 하지만 실감형 미디어에 대한 제작기술과 디스플레이기술에 대한 이슈는 있으나 콘텐츠 보호에 대한 기술 연구는 활발하게 진행되지 않고 있다. 더구나 실감형 미디어가 최근 웹하드, 토렌트 등에서 불법 유출 되고 있어 이에 대응한 저작권기술연구가 필요하다. 본 논문은 MPEG 산하에서 표준화가 진행되는 실감형 미디어 지원 포맷인 OMAF 구조를 설명하고 이에 대한 기술적 특징을 활용하여 특징점으로 활용될 수 있는 이미지 영역에 대한 선택 방안을 제안한다.

  • PDF

A Study on Project Performance in Cloud Computing : Focus on User Experience of GoogleDocs (클라우드 컴퓨팅 환경에서의 프로젝트 수행 성과에 관한 연구 : GoogleDocs 사용 경험을 중심으로)

  • Woo, Hyeok-Jun;Shim, Jeong-Hyun;Lee, Jung-Hoon
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.1
    • /
    • pp.71-100
    • /
    • 2011
  • There are expectations about future internet technology with IT development by end-users. Cloud computing is attracted to satisfy those demands. However, adoption of cloud computing is not active that much. Therefore, this study verified how cloud computing environment affects performance of team project. We conducted empirical study on performance of team project with cloud computing as technology tool focusing on Task-Technology Fit Model. We collected samples that were undergraduate and graduate school students and had experience on initial cloud computing such as Google-Docs and Webhard when they conducted team project for assignment. We focused on accessibility and reliability as task-technology fit and those variables treated as first order factor. Result showed that cloud computing is suitable technology tool for team project. This study suggests positive effects of cloud computing for collaboration by proving perceived fit and performance in initial cloud computing.

A Study on An Identification System for Scanned Cartoon Book (북스캔 만화 저작물 식별 시스템에 관한 연구)

  • Han, Byung Jun;Kim, Tae-Hyun;Kang, Ho-Gap;Cho, Seong-Hwan;Lee, Kyun Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.131-137
    • /
    • 2014
  • Although illegal reproduction of cartoon books are prevalent with rapid growth of webhard services and smartphone use, fingerprinting technology for product identification, as seen in music and videos, has not been developed yet. This leads to indiscriminate illegal reproduction of cartoon books, causing great amount of copyright damages from copyright infringement of the rightful owners. The copyright R&D project granted from the Korea Copyright Permission (Project Title: Identification and Copy Protection Technology of Bookscaned Text/Comic Books) has been carried out in order to develop technology to effectively identify illegal reproduction and distribution of scanned cartoon books. The developed technology will contribute to increase of royalty payments and robust ecosystem of cartoon book markets. The study is to propose an enhanced implementation model for identification of scanned cartoon books on the basis of hierarchical symmetric difference feature algorithms adopted from existing feature extraction algorithms for video.

A Study on Fingerprinting Robustness Indicators for Immersive 360-degree Video (실감형 360도 영상 특징점 기술 강인성 지표에 관한 연구)

  • Kim, Youngmo;Park, Byeongchan;Jang, Seyoung;Yoo, Injae;Lee, Jaechung;Kim, Seok-Yoon
    • Journal of IKEEE
    • /
    • v.24 no.3
    • /
    • pp.743-753
    • /
    • 2020
  • In this paper, we propose a set of robustness indicators for immersive 360-degree video. With the full-fledged service of mobile carriers' 5G networks, it is possible to use large-capacity, immersive 360-degree videos at high speed anytime, anywhere. Since it can be illegally distributed in web-hard and torrents through DRM dismantling and various video modifications, however, evaluation indicators that can objectively evaluate the filtering performance for copyright protection are required. In this paper, a robustness indicators is proposed that applies the existing 2D Video robustness indicators and considers the projection method and reproduction method, which are the characteristics of Immersive 360-degree Video. The performance evaluation experiment has been carried out for a sample filtering system and it is verified that an excellent recognition rate of 95% or more has been achieved in about 3 second execution time.

The Base of Understanding for Interdisciplinary Studies on Cyber Crimes - Centering on Regulations in Criminal Law - (사이버범죄의 학제간 연구를 위한 이해의 기초 - 형법상 규제를 중심으로 -)

  • Lim, Byoung-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.3
    • /
    • pp.237-242
    • /
    • 2008
  • This study aims to provide theoretical base in criminal law for engineers in the viewpoint of jurists to encourage interdisciplinary studies on cyber crimes. Apart from seriousness of discussion on torrent cyber crimes, a good effect of the internet networks such as sharing of information has bee emphasized while the evil influence of its side effect has been neglected. Therefore, this study suggests that we need to consider reinforcement of cyber ethics, and legal mind of IT technicians, strict security by managers, active efforts to develop legitimate contents by managers of web hardware and P2P, and reinforcement of punishments against crimes by internet users. And this study approaches new norms on computer and cyber crimes in interpretational sense of criminal law, and provides the theoretical base of the criminal law focusing on traditional theories, assumptions, and precedents involved in regulations against computer virus distribution.

  • PDF

A Study on the System Development for Automatic Webtoon Download and Feature Registration (웹툰 저작물 자동 수집 및 특징점 등록 시스템 개발에 관한 연구)

  • Yoon, Hee-Don;Kim, Tae-Hyun;Kang, Ho-Gab;Cho, Seong-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.2
    • /
    • pp.25-31
    • /
    • 2017
  • This paper aims to develope the technology for monitoring and identifying webtoon works that are being illegally distributed through the web-hard, torrent and overseas websites. The technology is to effectively prevent the illegal distribution and protect the copyrights of the webtoon works, leading to create a healthy market. This paper deals with the technology for (a) automatic collection of webtoon works from the webtoon service sites, (b) extraction of the features from the images of the collected webtoon works, and (c) registers them in the feature database. For these purposes, the required system performance and features were analyzed and the structures of webtoon service sites were examined, through which the system for automatic registration of webtoon works and features was developed. The system can work for the early stage blockage of illegal distributions of webtoon works which occur during the period from webtoon posting to feature registration.

전자금융 침해사고 예방 및 대응 강화 방안

  • Lee, Jung-Ho
    • Review of KIISC
    • /
    • v.18 no.5
    • /
    • pp.1-20
    • /
    • 2008
  • 편리한 금융거래 수단으로써 인터넷뱅킹을 포함한 전자금융 서비스가 생활화 되었으며 그 중요성 또한 갈수록 증가하고 있다. 이에 대한 부작용으로서 사용자의 실수나 금융기관, 쇼핑몰, 포털 등의 해킹을 통한 전자금융 접근매체의 유출, 비정상적인 지불결제나 인터넷뱅킹 이체 사고 등 침해사고 또한 함께 증가하고 있다. 금융권은 금융감독원을 중심으로 전자금융 종합보안 대책 수립(2005년) 및 전자금융거래법 시행(2007년) 등을 통해 고객 PC의 해킹방지를 위한 다양한 보안프로그램 제공 의무화, 보안등급에 따른 이체한도 차등화, 금융권 통합 OTP 인증체계 구축 등 전자금융 침해사고 예방을 위한 적극적인 노력을 기울여오고 있으나, 최근 들어 피싱/파밍 등 신종 사이버사기 기법이나 해외의 전문 해커에 의해 개발된 고도의 지능화된 해킹툴이 사용되어 보안프로그램을 무력화시킨 후 고객정보를 유출해가거나 일반 포털사이트, 웹하드, 웹메일 등의 해킹을 통해 인터넷 사이트에 등록된 고객의 인터넷뱅킹 접근 매체를 유출하여 인터넷뱅킹 침해 사고를 일으키는 등의 신종 침해사고를 완벽히 차단하지는 못하고 있어, 더욱 강력한 전자금융 침해사고 예방 통제 방안의 수립과 함께 침해사고 발생 시 원인 파악 및 범인 검거를 위한 역추적 시스템의 구축 등 기존 보안체계를 대폭 강화할 필요성이 발생하고 있다. 본 연구에서는 시중 은행의 인터넷뱅킹 침해사고 발생 현황 조사를 중심으로 최근 발생한 전자금융 침해사고의 추이분석, 침해사고 주요 원인과 기존 대응 체계의 현황, 한계점 등을 파악하였다. 그리고 전자금융 침해사고의 효과적인 예방 및 대응 강화 방안으로서 사용자 관점에서 공인인증서를 중심으로 한 전자금융 접근매체의 관리 강화 방안을 제안하였으며, 전자금융 서비스를 제공하는 금융 기관 관점에서 효과적인 전자금융거래 로깅 및 역추적 시스템의 구축 및 전체 금융기관과 감독기관 간의 유기적인 공조를 기반으로 한 침해사고 공동 대응체계의 구축 및 운영을 위한 시스템의 구성 방법, 운영 프로세스, 관련 법률의 검토 및 대응 방법 등을 제안하였다.

An Exploratory Study on Convergence generation according to the convergence level estimation of Digital Device and Service (디지털기기와 디지털서비스의 컨버전스 수준 평가에 따른 컨버전스 세대의 탐색적 고찰)

  • Kim, Yeon-Jeong
    • Journal of Digital Convergence
    • /
    • v.9 no.4
    • /
    • pp.169-179
    • /
    • 2011
  • The purpose of this study are as follows. First, to analyze digital convergence level of convergence generation to demographic variables. Second, the convergence level to digital device and using frequency to digital service. Third, the convergence level to digital service and using frequency to digital service. The research methods FGI, the interview with IT expert group and survey. The results of research are as follows. First, 30 aging, expert group, higher education group over graduate school are actively using and participated. Second, high level of convergence device are smart-phone, tablet PC, net-book are in order. high level of convergence service are SNS service, twitter, uee, portal messenger and app store, e-Book, web hard are in order. Third, The convergence generation enjoying app-store of smartphone, wireless game and more participating facebook/cyworld twitter, Portal, internet community.