• Title/Summary/Keyword: 정보복제

Search Result 783, Processing Time 0.025 seconds

Development of Lifecycle Model for Copyright Infringement Site (저작권 침해 사이트 생애 주기 모델 개발)

  • Kim, Deuk-Hun;Jeong, Hae-Seon;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.1
    • /
    • pp.101-121
    • /
    • 2020
  • Technology and culture are converging with various industries to create added value of contents. In addition, the country is creating a foundation environment for grafting new technologies onto the cultural content. However, copyright infringement by voice demand and supply is continuously occurring for cultural contents with copyright, and more and more recently, there have been increasing cases of creating and operating sites with servers overseas to bypass monitoring on infringement sites. To prevent this, various copyright protection studies are under way in many areas, but the current detection and prevention technologies are largely reactive and therefore have problems of effectiveness. Accordingly, this paper proposes a model of the lifecycle of copyright infringement site to lay the foundation for preemptive response to the distribution of illegal copies through analysis of the lifecycle of copyright infringement site.

Adaptive Load Balancing based on Consistency (일관성에 기초한 적응 부하 평형)

  • Kim, Jun-Hyeong;O, Ha-Ryeong;Lee, Jae-Mun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.2 no.3
    • /
    • pp.288-298
    • /
    • 1995
  • Load balancing attempts to improve the performance of a distributed computing system by transferring some of the workload of a congested site to others. A load balancing scheme that supports both the source-initiated and the server- initiated load balancing is proposed in this paper. It can model both the m/m/1 queue(no load balancing) and the m/m/n queue(perfect load balancing) as the extreme State variables are replicated into every site, and copy consistency constraints are relaxed more weakly. We propose weak copy consistency constraints which correlate the outdated state information to that of the current state. We also derive sufficient conditions under which each scheduler can guarantee the load balancing without communication Using this model, the problem of load balancing is converted to that of maintaining the consistency of states and communication overhead becomes less than that of the bidding algorithm. The scheme is simulated by event tracing, compared to the two extreme cases and the bidding algorithm. The results show that the mean response time and the number of messages are reduced by 0-35% and 40-100% respectively, compared with the bidding algorithm. Finally the effects of some system parameters are described.

  • PDF

A Study on Development to Be Protection Profile for Interoperability of Heterogeneous DRM Systems (상이한 DRM 시스템의 호환성을 위한 보호프로파일 개발에 관한 연구)

  • Jo, Hea-Suk;Lee, Kwang-Woo;Jeon, Woong-Ryul;Lee, Yun-Ho;Kim, Seung-Joo;Won, Dong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.16C no.1
    • /
    • pp.1-12
    • /
    • 2009
  • Today, Digital Right Management (DRM) is used to protect copyrights of digital contents from illegal reproduction and redistribution. Unfortunately, current DRM systems are causing user's discomfort because of lack of mutual compatibility. In order to overcome this drawback, technologies for interoperability of heterogeneous DRM systems are developing. In this paper, we study the protection profile for conversion technologies of heterogeneous DRM systems, using the Common Criteria. Especially, this paper is written by reuse of the existing protection profile. Therefore, performance analysis reveals that efficiency of time and cost is significantly improved. This protection profile can be used by contents provider and administrator who manage user's copyrights to reference data for copyright protection.

Design The User Authentication Framework Using u-health System (u-health 시스템을 이용한 사용자 인증 프레임워크 설계)

  • Choo, Yeun-Su;Jin, Byung-Wook;Park, Jae-Pyo;Jun, Moon-Seog
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.219-226
    • /
    • 2015
  • OTP(One Time Password) is for user authentication of Internet banking and users should carry their security card or OTP generator to use OTP. If they lost their security card or OTP generator, there is at risk for OTP leak. This paper suggests a new User Authentication Framework using personal health information from diverse technology of u-Health. It will cover the problem of OTP loss and illegal reproduction A User Authentication Framework is worthy of use because it uses various combinations of user's physical condition which is inconstant. This protocol is also safe from leaking information due to encryption of reliable institutes. Users don't need to bring their OTP generator or card when they use bank, shopping mall, and game site where existing OTP is used.

Development of CPLD technology mapping algorithm improving run-time under Time Constraint (시간적 조건에서 실행시간을 개선한 CPLD 기술 매핑 알고리즘 개발)

  • 윤충모;김희석
    • Journal of the Korea Society of Computer and Information
    • /
    • v.4 no.3
    • /
    • pp.35-46
    • /
    • 1999
  • In this paper, we propose a new CPLD technology mapping algorithm improving run-time under time constraint. In our technology mapping algorithm. a given logic equation is constructed as the DAG type. then the DAG is reconstructed by replicating the node that outdegree is more than or equal to 2. As a result, it makes delay time and the number of CLBs, run-time to be minimized. Also. after the number of multi-level is defined and cost of each nodes is calculated, the graph is partitioned in order to fit to k that is the number of OR term within Cl.B. The partitioned nodes are merged through collapsing and bin packing is performed in order to fit to the number of OR term within CLB. In the results of experiments to MCNC circuits for logic synthesis benchmark, we can shows that proposed technology mapping algorithm reduces run-time much more than the TMCPLD.

Blind Watermarking Using by Multi-wavelet Transform and Binary Image (다중 웨이블릿 변환과 이진영상을 이용한 Blind 워터마킹)

  • Kim, Tae-Ho;Park, Mu-Hun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.413-416
    • /
    • 2005
  • Developement of computer and digitalizing of medical implement are being caused digitalizing of medical image. Medical Images are being managed more by PACS. In this situation comes out many problem about ownership, the right of properity of the medical images and notice wheather the data are modified. Digital watermarking can solve this problem. The proposed schemes have a two weak point that Non-blind method need a original image and Blind method use gaussian watermarking. In this paper, we propose a blind watermarking using binary image in order to easily recognize result of watermark This proposed scheme using wavelet transform and Circular Input method that input in medium-band of frequency domain.

  • PDF

Design and Implementation of Mobile Security System for Digital contents Rights Protection in Wireless Internet Environment (무선 인터넷 환경에서 디지털 컨텐츠 저작권 보호를 위한 모바일 보안 시스템의 설계 및 구현)

  • Kim, Hoo-Jong;Na, Seung-Won
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.695-704
    • /
    • 2003
  • As wireless Internet speads widely, circulation of various types of digital contents become active. Therefore, it is necesary to make a mobile-based DRM (Digatal Rights Management) system to protect digital contents from illegal reproduction and to give proper rights to contents users, In this paper, we present a mibile security system, which protects the copyright for digital contents offered throughout the mobile environment. Our security system is focused on presenting mobile-based DRM architecture. Especially, considering mobile device's decrying power, we adopted partial encryption scheme. For this, wecompared and evaluated the performant of each contents encryption scheme (the entire encryption scheme and the partial encription scheme) and proved that a proper DRM system for current wireless devices is the partial encryption system. Our mobile DRM system can be very efficient to protect contents on the wireless Internet environment.

Design & Implementation of Flight Software Satellite Simulator based on Parallel Processing (병렬처리 기반의 위성 탑재소프트웨어 시뮬레이터 설계 및 개발)

  • Choi, Jong-Wook;Nam, Byeong-Gyu
    • Journal of Satellite, Information and Communications
    • /
    • v.7 no.2
    • /
    • pp.80-86
    • /
    • 2012
  • The software-based satellite simulator has been developed from the start of the project to resolve the restriction and limitation of using hardware-based software development platform. It enables the development of flight software to be performed continuously since initial phase. The satellite simulator emulates the on-board computer, I/O modules, electronics and payloads, and it can be easily adapted and changed on hardware configuration change. It supports the debugging and test facilities for software engineers to develop flight software. Also the flight software can be loaded without any modification and can be executed as faster than real-time. This paper presents the architecture and design of software-based GEO satellite simulator which has hot-standby redundancy mechanism, and flight software development and test under this environment.

BeanFS: A Distributed File System for Large-scale E-mail Services (BeanFS: 대규모 이메일 서비스를 위한 분산 파일 시스템)

  • Jung, Wook;Lee, Dae-Woo;Park, Eun-Ji;Lee, Young-Jae;Kim, Sang-Hoon;Kim, Jin-Soo;Kim, Tae-Woong;Jun, Sung-Won
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.4
    • /
    • pp.247-258
    • /
    • 2009
  • Distributed file systems running on a cluster of inexpensive commodity hardware are being recognized as an effective solution to support the explosive growth of storage demand in large-scale Internet service companies. This paper presents the design and implementation of BeanFS, a distributed file system for large-scale e-mail services. BeanFS is adapted to e-mail services as follows. First, the volume-based replication scheme alleviates the metadata management overhead of the central metadata server in dealing with a very large number of small files. Second, BeanFS employs a light-weighted consistency maintenance protocol tailored to simple access patterns of e-mail message. Third, transient and permanent failures are treated separately and recovering from transient failures is done quickly and has less overhead.

The Watermarking Method Using by Binary Image (이진영상을 이용한 워터마킹 기법)

  • Lim Hyun-Jin;Lee Seung-Kyu;Kim Tea-Ho;Park Mu-Hun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.163-166
    • /
    • 2006
  • The field of medical images has been digitalized as the development of computer and the digitalization of the medical instruments. As a result it causes a lot of problems such as an illegal copy related to medical images and property right of the medical images. Therefore, digital watermarking is used for discrimination whether the data are modified or not. It is also used to protect both the property right of medical images and the private life of many patients. The proposed theories, the Non-blind and the Blind method, have two problems. One is needed an original image and the other is using a gaussian watermarking. This paper proposes the new Blind Watermarking using binary images in order to easily recognize the results of watermark. This algorithm is described that an watermark of a binary image is wavelet-transformed, and then a transformed watermark is inserted in medium-band of frequency domains of original image by the Circular Input method. The propose method presented the good performance of over 0.97 in NC.

  • PDF