• Title/Summary/Keyword: 유통 피해

Search Result 132, Processing Time 0.026 seconds

Detection Technique of Suspected Piracy Sites based on Image Black List (이미지 블랙리스트 기반 저작권 침해 의심 사이트 탐지 기법)

  • Kim, Eui-Jin;Jung, In-Su;Song, Yu-Rae;Kwak, Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.05a
    • /
    • pp.148-150
    • /
    • 2021
  • 저작권 콘텐츠의 해외 진출과 함께, 국내·외 저작권 시장 규모가 증가하고 있다. 이와 동시에 등장한 저작권 침해사이트는 메인 페이지에 저작권 침해사이트를 대표하는 이미지를 게시하는 특징이 있다. 이러한 저작권 침해사이트는 음악, 영화, 드라마 등의 저작권 콘텐츠를 불법 유통시키며 저작권 시장에 피해를 입히고 있다. 공공기관에서는 저작권 침해를 방지하기 위해 저작권 침해사이트를 차단하는 등의 대응을 하고 있지만, 저작권 침해사이트의 생성 속도에 비해 침해 여부 판단 속도가 상대적으로 느려서 차단에 어려움이 존재한다. 따라서, 본 논문에서는 저작권 침해사이트의 대표 이미지를 활용한 이미지 블랙리스트에 기반하여 저작권 침해 의심 사이트 탐지 기법을 제안하고자 한다.

Digital Watermarking Techniques Robust to Distortion Attacks (왜곡 공격에 강인한 디지털 워터마킹 기법)

  • Su-Kyoung Kim;Yu-ran Jeon;Jung-Hwa Ryu;Il-Gu Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.345-346
    • /
    • 2024
  • 디지털 기술과 정보통신 기술이 발전하면서 디지털 콘텐츠의 불법복제 및 유통으로 인한 저작권 침해 피해가 증가하고 있다. 저작권 침해 문제를 예방하기 위해 다양한 디지털 워터마킹 기술이 제안되었지만, 디지털 이미지 워터마킹은 이미지에 기하학적 변형을 가하면 삽입된 워터마크가 훼손되어 탐지가 어렵다는 문제가 있다. 본 연구에서는 왜곡 공격에 강인한 상관관계 측정 기반 워터마킹 기법을 제안한다. 제안한 방식은 교차 상관 기법을 이용해 이미지와 워터마크의 상관관계를 계산하고 임계값과 비교하여 공간 영역에서의 비가시성 워터마크의 존재 여부를 검증할 수 있는 디지털 워터마킹 방법이다. 실험 결과에 따르면 표준편차 120의 가우시안 노이즈 공격을 가해도 원본 워터마크와 0.1 이상의 상관관계를 보이며, 종래의 방식보다 높은 탐지 성능을 나타냈다.

Studies on Ecology and Injury Characteristics of Japanese Suniperus Bark Borer, Semanotus bifasciatus Mostschulsky (측백하늘소의 생태 및 가해특성에 관한 연구)

  • Kim Kyu Chin;Park Jong Dae
    • Korean journal of applied entomology
    • /
    • v.23 no.2 s.59
    • /
    • pp.109-115
    • /
    • 1984
  • This study was conducted to investigate the bionomics, host range and damage aspect of Japanese juniperus bark borer, Semanotus bifasciatus M., which shoves the severe damage for the Juniperace in Chonnam province, recently. Host plants were Juniperus virginiana, J. chinensis var. kaizuka, J. chinensis, Biata orientalis var. nepalensis, Chamaccyparis ostus and Thujopsis dolabrata. Out of those, J. chinensis var. kaizuka is newly investigated in this study. Damage rate in each area was $16.5\%$ in Kwangju, $4.25\%$ in Damyang ana $6.5\%$ in Hwasoon. Adults appear once a year, with a peak at late March to early April. Adults emergence during the day showed the peak at 13 to 15 hours and were influenced in the maximum temperature in a day. Attack direction of larva after invasion in the stem was $62\%$ toward base, $22\%$ toward tip and $16\%$ toward horizon, and the damage in each DBH (Diameter of breast height) was the greatest at $30\~40mm$. At period of each stage, egg was $15.8\~19.7$ days, larva was $l12\~126$ days and pupa was $15\~21$ days. Longevity of adult was 19 days for female and 16 days for male.

  • PDF

A Study on the Cause Analysis and Countermeasures of the Traditional Market for Fires in the TRIZ Method (TRIZ 기법에 의한 재래시장 화재의 원인분석과 대책에 관한 연구)

  • Seo, Yong-Goo;Min, Se-Hong
    • Fire Science and Engineering
    • /
    • v.31 no.4
    • /
    • pp.95-102
    • /
    • 2017
  • The fires in the traditional markets often occur recently with the most of them expanded into great fires so that the damage is very serious. The status of traditional markets handling the distribution for ordinary people is greatly shrunk with the aggressive marketing of the local large companies and the foreign large distribution companies after the overall opening of the local distribution market. Most of the traditional markets have the history and tradition from decades to centuries and have grown steadily with the joys and sorrows of ordinary people and the development of the local economy. The fire developing to the large fire has the characteristics of the problem that the fire possibility is high since all products can be flammable due to the deterioration of facilities, the arbitrary modification of equipment, and the crowding of the goods for sale. Furthermore, most of the stores are petty with their small sizes so that the passage is narrow affecting the passage of pedestrians. Accordingly, the traditional markets are vulnerable to fire due to the initial unplanned structural problem so that the large scale fire damage occurs. The study is concerned with systematically classifying and analyzing the result by applying the TRIZ tool to the fire risk factors to extract the fundamental problem with the fire of the traditional market and make the active response. The study was done for preventing the fire on the basis of it and the expansion to the large fire in case of fire to prepare the specific measure to minimize the fire damage. On the basis of the fire expansion risk factor of the derived traditional market, the study presented the passive measures such as the improvement of the fire resisting capacity, the fire safety island, etc. and the active and institutional measures such as the obligation of the fire breaking news facilities, the application of the extra-high pressure pump system, the divided use of the electric line, etc.

Changes of Quality in Dried Omija (Schizandra chinensis Baillon During Storage) (건조 오미자의 저장중 품질변화)

  • 최윤희;정영근;박기훈;박문수
    • Food Science and Preservation
    • /
    • v.8 no.4
    • /
    • pp.351-355
    • /
    • 2001
  • This study was carried out to examine the of quality on the dried Omija according to its package materials and storage plates. The changes of moisture contents, anthocyanin content, molds damage rates, and color values were measured during storage. In the sealing up by the P.E file, the moisture contents of the dried Omija had just a little differences among the storage places, but in the gauze bag remarkably as the storage period goes on, especially in this case, 8 months later since the storage in the cool chamber, the damage rates of the dried Omija by the mold was 9.0%, twice as much as in the indoor bag packaging it was increasand after 10 months, that was lather high in the indoor and warehouse. The anthocyanin content of the dried Omija after the storage of 10 months was the highest at 0.05mm black P.E film package in the cool chamber, which was 55.7 mg/100g, but in the indoor and warehouse 39.7, 45.0mg/100g, respectively. These results show thats the storage conditions had an important effect on the quality of the dried Omija during the long-term storage.

  • PDF

A Study on the Countermeasures for Prevention of Opening a Fraud Account (사기이용계좌 개설 방지를 위한 대응방안 연구)

  • Kim, Chang Woo;Yoon, Ji Won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.1
    • /
    • pp.173-179
    • /
    • 2015
  • Financial fraud such as phishing have passed several years from the occurrence, in spite of the widely known through the media, regardless of the social status or age, financial fraud has occurred on an ongoing basis, the damage is not reduced. The fraud account, the person who made the account, the user is different, it is possible to avoid tracking financial channel, and is used as a receiving means for fraud money of various crimes. Efforts of financial institutions and financial supervisory institutions, it has been promoted by preparing various measures for the eradication of fraud account so far been used as a means of financial crime, the proliferation of financial fraud, opening and distribution of fraud account is a receiving means for fraud money are also increasing continuously, it is necessary to take countermeasures. In spite of the continuous crackdown of financial institutions and financial supervisory institutions, it is causing serious damage to society, analyzes the current situation of fraud account, to present an effective and aggressive countermeasure of financial institutions in this paper.

Study on Security Grade Classification of Financial Company Documents (금융기관 문서 보안등급 분류에 관한 연구)

  • Kang, Bu Il;Kim, Seung Joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1319-1328
    • /
    • 2014
  • While the recent advance in network system has made it easier to collect and process personal information, the loss of customers, financial companies and even nations is getting bigger due to the leakage of personal information. Therefore, it is required to take a measure to prevent additional damage from the illegal use of leakaged personal information. Currently, financial companies use access control in accordance with job title or position on general documents as well as important documents including personal information. Therefore, even if a documents is confidential, it is possible for a person of the same job title or position to access the document properly. This paper propose setting up security grade of documents to improve current access control system. It will help preventing the leakage of personal information.

Consumer Sentiment and Behavioral Intentions Regarding Dark Patterns in Online Shopping: Qualitative Research Approach (온라인 쇼핑의 다크패턴에 대한 소비자 감정 및 행동 의도: 질적연구를 통합 접근)

  • Hae-Jin Kim;Jibok Chung
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.1
    • /
    • pp.137-142
    • /
    • 2024
  • User interface (UI) functions are distorted and appear as a dark pattern that intentionally deceives or entices users. Consumers who are unaware of dark patterns are constrained in their choices, resulting in unnecessary economic damage. In this study, we aimed to investigate consumers' various shopping emotions and behavioral intentions after recognizing dark patterns in online shopping malls through qualitative research methods. As a result of the study, the rate of perception differed slightly depending on the type of dark pattern, and it was found that it induced consumer emotions such as distrust of the company, user deception, and displeasure. It has been found that the behavior after recognizing the dark pattern shows passive behaviors such as vowing to prevent recurrence and warning acquaintances rather than actively protesting to the company and demanding compensation for damages.

A Feature Point Recognition Ratio Improvement Method for Immersive Contents Using Deep Learning (딥 러닝을 이용한 실감형 콘텐츠 특징점 인식률 향상 방법)

  • Park, Byeongchan;Jang, Seyoung;Yoo, Injae;Lee, Jaechung;Kim, Seok-Yoon;Kim, Youngmo
    • Journal of IKEEE
    • /
    • v.24 no.2
    • /
    • pp.419-425
    • /
    • 2020
  • The market size of immersive 360-degree video contents, which are noted as one of the main technology of the fourth industry, increases every year. However, since most of the images are distributed through illegal distribution networks such as Torrent after the DRM gets lifted, the damage caused by illegal copying is also increasing. Although filtering technology is used as a technology to respond to these issues in 2D videos, most of those filtering technology has issues in that it has to overcome the technical limitation such as huge feature-point data volume and the related processing capacity due to ultra high resolution such as 4K UHD or higher in order to apply the existing technology to immersive 360° videos. To solve these problems, this paper proposes a feature-point recognition ratio improvement method for immersive 360-degree videos using deep learning technology.

Study of Document Distribution System Architecture for Digital Secret Document Leakage Prevention (전자기밀문서 유출봉쇄 유통시스템 구조 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.143-158
    • /
    • 2010
  • The illegal leakage of enterprise digital confidential information will threaten the enterprise with bankruptcy. Today since most small-and-medium companies have no capability to fight against illegally compromising their critically confidential documents in spite of knowing the leakage of them, strongly safe distribution system of the digital confidential documents should be designed so in secure as to prevent any malicious intent of embezzlement from accessing the critical information. Current DRM-based protection system is not always perfect to protect the digital secrets, even seems to leave the secrets open. Therefore our study has analyzed the illegal leakage paths that hackers attack against and the vulnerability of the current protection systems. As result, we study the group communication based system architecture satisfying the security conditions to make even legitimate working employee keep out of the confidential documents, without performance degradation. The main idea of this architecture is to stay every secrets in encrypted form; to isolate the encrypted documents from the crypto-key; to associate every entity with one activity and to authenticate every entity with DSA-based public key system; multiple authentication method make hackers too busy to get a privilege to access the secrets with too many puzzle pieces. This paper deal with the basic architectural structure for the above issues.