• Title/Summary/Keyword: 정보복제

Search Result 783, Processing Time 0.023 seconds

DRM System using Gstreamer based on DMP (DMP 기반의 Gstreamer를 이용한 DRM시스템)

  • Park, Ki-Chul;Lee, Joo-Young;Ahn, Sang-Woo;Nam, Je-Ho;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.611-614
    • /
    • 2007
  • Due to illegal copying and distribution via the internet, the digital media that have been introduced create certain intellectual property issues. Because of this, several intellectual property groups have been created to create and maintain Digital Rights Management systems (DRM), in order to crack down on illegal and unauthorized copying. However, these systems are often created by many different companies, which leads to problems of interoperability. Despite attempts to regulate DRM systems, including the MPEG group's Intellectual Property Management and Protection" system, the system is still struggling to maintain some sort of interoperability between differing protocols. In this paper, we designed and implemented a DRM system with Gstreamer, following the DMP.

  • PDF

Integrity Authentication Algorithm of JPEG Compressed Images through Reversible Watermarking (가역 워터마킹 기술을 통한 JPEG 압축 영상의 무결성 인증 알고리즘)

  • Jo, Hyun-Wu;Yeo, Dong-Gyu;Lee, Hae-Yeoun
    • The KIPS Transactions:PartB
    • /
    • v.19B no.2
    • /
    • pp.83-92
    • /
    • 2012
  • Multimedia contents can be copied and manipulated without quality degradation. Therefore, they are vulnerable to digital forgery and illegal distribution. In these days, with increasing the importance of multimedia security, various multimedia security techniques are studied. In this paper, we propose a content authentication algorithm based on reversible watermarking which supports JPEG compression commonly used for multimedia contents. After splitting image blocks, a specific authentication code for each block is extracted and embedded into the quantized coefficients on JPEG compression which are preserved against lossy processing. At a decoding process, the watermarked JPEG image is authenticated by extracting the embedded code and restored to have the original image quality. To evaluate the performance of the proposed algorithm, we analyzed image quality and compression ratio on various test images. The average PSNR value and compression ratio of the watermarked JPEG image were 33.13dB and 90.65%, respectively, whose difference with the standard JPEG compression were 2.44dB and 1.63%.

An Adaptive Storage System for Enhancing Data Reliability in Solar-powered Sensor Networks (태양 에너지 기반 센서 네트워크에서 데이터의 안정성을 향상시키기 위한 적응형 저장 시스템)

  • Noh, Dong-Kun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.5
    • /
    • pp.360-370
    • /
    • 2009
  • Using solar power in wireless sensor networks requires a different approach to energy optimization from networks with battery-based nodes. Solar energy is an inexhaustible supply which can potentially allow a system to run forever, but there are several issues to be considered such as the uncertainty of energy supply and the constraint of rechargeable battery capacity. In this paper, we present SolarSS: a reliable storage system for solar-powered sensor networks, which provides a set of functions, in separate layers, such as sensory data collection, replication to prevent failure-induced data loss, and storage balancing to prevent depletion-induced data loss. SolarSS adapts the level of layers activated dynamically depending on solar energy availability, and provides an efficient resource allocation and data distribution scheme to minimize data loss.

A Longitudinal Study on the Changes to Copyright Policies for Korean KCI Journals (국내 학술지 저작권 정책 변화 의미 분석)

  • Joung, Kyoung Hee;Kim, Gyuhwan
    • Journal of the Korean Society for information Management
    • /
    • v.34 no.2
    • /
    • pp.159-180
    • /
    • 2017
  • This study analyzed changes to copyright policies in KCI journals comparatively using the previous 2 research results published in 2008 and 2016 and then gave insight into the meaning of the changes. The results of the study are as follows: Journals making the subject of copyright public had increased from 34% in 2008 to 67% in 2016. Journals transferring copyright from authors remained almost the same, with only a slight increase from 90% to 91% in the same period. Journals using the term 'publication rights' instead of 'copyright' had decreased; on the other hand, journals using the term 'reproduction right' and 'right of transmission' had increased. Use of copyright transfer agreement had increased from 25% to 50%; on the other hand, self archiving policy remained almost the same, decreasing slightly from 13% to 12%. This study argues that these changes mean the establishment of copyright industrialization for Korean journals and that the publishing bodies appear to be the most powerful main agent among stakeholders participating in scholarly publishing in this process.

Improvement to High-Availability Seamless Redundancy (HSR) Unicast Traffic Performance Using a Hybrid Approach, QRPL (High-Availability Seamless Redundancy (HSR)의 Unicast 트래픽 성능 향상을 위한 QRPL 알고리즘)

  • Altaha, Ibraheem Raed;Rhee, Jong Myung
    • Journal of Satellite, Information and Communications
    • /
    • v.11 no.2
    • /
    • pp.29-35
    • /
    • 2016
  • High-availability seamless redundancy (HSR) is a fault-tolerant protocol for Ethernet networks that provides two frame copies for each frame sent. Each copy is forwarded on a separate physical path. HSR is a potential candidate for several fault-tolerant Ethernet applications, including smart-grid communications. However, the major drawback of the HSR protocol is that it generates and circulates unnecessary frames within connected rings regardless of the presence of a destination node in the ring. This downside degrades network performance and can deplete network resources. Two simple but efficient approaches have previously been proposed to solve the above problem: quick removing (QR) and port locking (PL). In this paper, we will present a hybrid approach, QRPL, by combining QR with PL, resulting in further traffic reductions. Our analysis showed that network traffic is significantly reduced for a large-sized HSR connected ring network compared to the standard HSR protocol, QR, and PL.

A Study on the Transition from the Library's Copyright Compensation Regime to the Orphan Works Regime (도서관 보상금 체제에서 고아저작물 체제로의 전환 모색)

  • Joung, Kyounghee
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.48 no.4
    • /
    • pp.193-214
    • /
    • 2014
  • Thise study focuses on the direction to the revisions of copyright law in Korea, so that orphan works in libraries can be used more widely on the Internet. In particular, this study analyzes the problems of the provisions 31 and 50 in the copyright law related to the mass digitations of orphan works in libraries. This study also reviews the Directive 2012/28/EU, 3 orphan works bills in USA, and provisions related to the orphan works in The Enterprise and Regulatory Reform(ERR) Act 2013 in UK. Finally this study suggests the 3 directions to support mass digitations of orphan works in libraries. First, digitized orphan works in libraries are to be made a transmission to the public on the Internet; Second, compensation and approval fees are not required or minimized; and third, libraries have to stop the use of the orphan works if copyright owners require. If not, libraries have to negotiate with the copyright owners about the fees necessary.

Real-time Audio Watermarking System Considering Audio Source and User (음원 및 사용자를 고려한 실시간 오디오 워터마킹 시스템)

  • Cho, Jung-Won;Jeong, Seung-Do
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.11
    • /
    • pp.3213-3217
    • /
    • 2009
  • Distribution, duplication and manipulation of the digital contents are very easy due to the characteristics of the digital contents. Thus, damages of invasion of property right rapidly increase due to infringement of copyright for the digital contents. To prevent illegal use and to settle conflict about ownership of the digital contents, continuous efforts with enormous expense are devoted. In this paper, we design and implement real-time audio watermarking system to protect ownership and copyright for the digital contents. The proposed system also clarifies where the responsibility about the illegal distribution lies. The system has convenient user interface so that general administrator without an expert knowledge of the protection of copyright can use easily. In addition, unlike the traditional watermarking system, our system has merit to offer information about the illegal distribution for clear post-management.

Terrestrial DTV Broadcasting Program Protection System based on Program Protection Information (방송프로그램 보호신호에 기반한 지상파 방송프로그램 보호 시스템)

  • Choo, Hyon-Gon;Lee, Joo-Young;Nam, Je-Ho
    • Journal of Broadcast Engineering
    • /
    • v.15 no.2
    • /
    • pp.192-204
    • /
    • 2010
  • As illegal distribution of the terrestial DTV broadcast program occurs very frequently in on-line, the needs to protect broadcast program have increased. In this paper, a new approach to implement a system for terrestial DTV broadcast program protection based on program protection information(PPI) is proposed. In our approach, the broadcast program is recorded with encryption according to redistribution condition of the PPI and packaged into a file with key information and PPI together. And we also define a set of domain protocol for supporting user fair-use of broadcast program. In the proposed system, copy control can also be provided by process of home domain management. Implementation results show that our system can protect broadcast programs with efficiency and can support conditional distribution within home domain in order to satisfy user fair-use.

Robust Audio Watermarking in Frequency Domain for Copyright Protection (저작권 보호를 위한 주파수 영역에서의 강인한 오디오 워터마킹)

  • Dhar, Pranab Kumar;Kim, Jong-Myon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.2
    • /
    • pp.109-117
    • /
    • 2010
  • Digital watermarking has drawn extensive attention for protecting digital contents from unauthorized copying. This paper proposes a new watermarking scheme in frequency domain for copyright protection of digital audio. In our proposed watermarking system, the original audio is segmented into non-overlapping frames. Watermarks are then embedded into the selected prominent peaks in the magnitude spectrum of each frame. Watermarks are extracted by performing the inverse operation of watermark embedding process. Simulation results indicate that the proposed scheme is robust against various kinds of attacks such as noise addition, cropping, resampling, re-quantization, MP3 compression, and low pass filtering. Our proposed watermarking system outperforms Cox's method in terms of imperceptibility, while keeping comparable robustness with the Cox's method. Our proposed system achieves SNR (signal-to-noise ratio) values ranging from 20 dB to 28 dB. This is in contrast to Cox's method which achieves SNR values ranging from only 14 dB to 23 dB.

Design of a Reliable Data Diode System (신뢰성 있는 단방향 데이터 전송 시스템 설계)

  • Kim, Dongwook;Min, Byunggil
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1571-1582
    • /
    • 2016
  • One of the issues, which is dealed with in undirectional data transmission technology, is reducing the packet loss in TCP based data transfer. We can decrease the packet loss by using several well known error correction approaches. Although we utilize those previous approaches, the packet loss by both link errror and buffer overflow could be occurred. In this paper, we propose the RED(REliable Data diode). RED also uses the TCP proxy approach for supporting the TCP based data transfer which is similar with the existing unidirectional data transmission technologies. The RED transmission system could alleviate the packet loss caused by buffer overflow by exploiting the delaying transmission of TCP packets. Furthermore, in order to reduce the packett loss caused by link error in the unidirectional transmission link, the RED transmission system transmits one or more duplicated packets to the RED reception system by considering both the remaining resources and packet importance.