• Title/Summary/Keyword: 지적재산권정보

Search Result 255, Processing Time 0.034 seconds

A Method of QoS Measurement of Multimedia Data based on Digital Watermarking (멀티미디어 데이터의 QoS 보장을 위한 디지털 워터마킹 기법 적용)

  • Ryu Kyeung-Ha;Kim Min-Su;Jung Ho-Youl;Chung Hyun-Yeol
    • Proceedings of the Acoustical Society of Korea Conference
    • /
    • spring
    • /
    • pp.327-330
    • /
    • 2002
  • 디지털 워터 마킹은 일반적으로 지적 재산권의 보호를 위해서 컨텐츠 소유자가 자신의 컨텐츠에 저작권 정보를 나타내는 워터마크를 삽입하여 제 3자가 허가 없이 디지털 컨텐츠의 사용을 할 경우 불법적인 사용을 막아내는 데 사용된다. 본 논문에서는 워터마킹 기법의 새로운 적용 예로써 인터넷 또는 무선 환경을 통한 멀티미디어 데이터 전송 시 수신된 데이터의 품질을 사용자 측면에서 측정 할 수 있는 방안, 즉 디지털 워터마킹 기법의 새로운 적용 예에 대하여 고찰하였다. 제안하는 방법은 네트워크 상에서 발생하는 패킷 손실, 지연 등의 통계적 해석으로 수신 된 멀티미디어 데이터의 품질을 평가하는 척도로 사용하는 기존의 방법과는 달리 사용자 측면에서 눈으로 보이는 데이터의 일그러짐 정도나, 음질의 왜곡을 정량적인 측정치로 보여 줄 수 있음으로써, 오디오 데이터의 QoS(Quality of Service)를 보장하기 위한 수단이나 수신품질에 따른 차별화 된 과금 결정 등에 활용할 수 있을 것이다. 이를 위해 본 논문에서는 멀티미디어 데이터의 품질 측정을 위한 블라인드 워터마킹 기법을 적용하고 다양한 비트 에러율 (Bit Error Rate, BER)을 갖는 BSC(Binary Symmetric Channel)에 적용시켜 봄으로써 멀티미디어 데이터에 삽입된 워터마크 신호의 검출정도와 수신된 미디어 신호의 PSNR비가 선형적인 분포를 가지게 됨을 확인 할 수 있었다.

  • PDF

A Study on Building an Open Access Based Institutional Repository in the University for Scholarly Communication (대학 학술정보 관리를 위한 오픈 액세스 기반 기관 레포지터리 운영방안 연구)

  • Kim, Sun-Mi;Lee, Na-Nee
    • Journal of Information Management
    • /
    • v.36 no.2
    • /
    • pp.45-71
    • /
    • 2005
  • As circumstances of scholarly communication have been changed over time, there is a growing interest among academic institutions in collecting, preserving, and creating value-added services from digital contents being created by members of the academic community. The purpose of this study is to build an open access based Institutional Repository(IR) in the university for scholarly communication. For this study, this paper analyzes the example of, and makes a full range of process and implementation plan, and then suggests a realistic model of IR which is for dissertations/theses, academic journals, working papers, etc. The intellectual property right issues related to IR are also discussed.

Model Type Inference Attack Using Output of Black-Box AI Model (블랙 박스 모델의 출력값을 이용한 AI 모델 종류 추론 공격)

  • An, Yoonsoo;Choi, Daeseon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.817-826
    • /
    • 2022
  • AI technology is being successfully introduced in many fields, and models deployed as a service are deployed with black box environment that does not expose the model's information to protect intellectual property rights and data. In a black box environment, attackers try to steal data or parameters used during training by using model output. This paper proposes a method of inferring the type of model to directly find out the composition of layer of the target model, based on the fact that there is no attack to infer the information about the type of model from the deep learning model. With ResNet, VGGNet, AlexNet, and simple convolutional neural network models trained with MNIST datasets, we show that the types of models can be inferred using the output values in the gray box and black box environments of the each model. In addition, we inferred the type of model with approximately 83% accuracy in the black box environment if we train the big and small relationship feature that proposed in this paper together, the results show that the model type can be infrerred even in situations where only partial information is given to attackers, not raw probability vectors.

Design and Implementation of Web-Based R&D Result Management System (웹 기반의 연구 성과물관리시스템의 설계 및 구현)

  • Han Hee-Jun;Lee Seung-Bock;Huh Tae-Sang;Seo Hyeon-Deok;Yae Yong-Hee
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.05a
    • /
    • pp.112-117
    • /
    • 2005
  • The result management of R&D projects which carried by national research organization, research institute contributed by government, many universities and enterprises through intra system has not been processed in regular order. To maximize results of R&D products, we must draw up a plan for effective management, spread, and application. In this paper, we argue on the design and implementation of web-based system for managing R&D results(project, paper, book, seminar, intellectual property, technology transfer information, etc) systematically. This system is operated within intranet system, and the data managed by this result management system will be used for related information management through connection with research net based national R&D structure but also it will be major knowledges available for researches executed in many research institutes and organizations.

  • PDF

A Study on role of Science Museum for STEAM Education (융합교육에 있어서 과학관의 역할 연구)

  • Yoon, Young-doo;Choi, Hun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.6
    • /
    • pp.1353-1358
    • /
    • 2015
  • The creative economy is the industrialization era, the information age, knowledge-based economy, linking the new economic paradigm. The core words of the creative economy are stand for creativity, innovation, consumer protection and utilization of intellectual property. Creative ideas are combined with software technology will make innovative ecosystem-based structured market such as Apple, Google, Facebook. Intangible assets attributable to creativity than ever before in human history that is important as the economic value. In addition, innovative ideas, creativity and economic growth beyond the knowledge and information society is required. Because the core has a fusion of science and technology, industry, culture and industry convergence, various genres of creative activity support, and cultural and high-tech fusion industries, such as content creation and job creation through economic traction is needed. In this study, we analyze the case of the US Smithsonian Institution proposes the direction of Science Museum in creative workforce.

A Study on the Copyright Contents of Medical Library Web Site (국내 의과대학도서관 웹사이트에 나타난 저작권관련사항에 관한 연구)

  • Choi, Hung-Sik;Yoon, Mi-Hui
    • Journal of Korean Library and Information Science Society
    • /
    • v.37 no.4
    • /
    • pp.371-389
    • /
    • 2006
  • The purpose of this study is to induce a librarian to construct databases lawfully and the user with a copyright and the fair use. Based on information from web sites, the domestic medical libraries(32) were investigated for analyzing how to deal with copyright problems. The results show that only 28% of the medical libraries provide users with information on copyright at their web site. The terminology used was different among libraries. 44.4% of the libraries use 'copyright law' and 33.3% 'copyright' The terminology appeared at the 'notice' menu and 'library guidance' menu. The detail part of copyright contents was shown at 'the data copy and transmission', 'full text DB use', 'thesis and dissertation service', 'FAX/file transfer', 'Image(Ariel)', and 'interlibrary loan'. In general, there was a necessity to the correct understanding of the copyright and fair use.

  • PDF

Comparative analysis of group cognizance regarding application of copyright laws in library (도서관 저작권보상에 대한 집단인식 비교연구)

  • Kim, Po-Ok;Lee, Jin-Suk
    • Journal of Information Management
    • /
    • v.35 no.3
    • /
    • pp.29-50
    • /
    • 2004
  • This study, considering the many disputes in today's society centered around copyrights, aimed at analyzing and investigating the scope of application for copyright laws in library, whether where is a reach or not, and also the procedures and cognitive degrees in copying and transmission of copyrights materials. Especially the usage of the digital resources built by major domestic libraries have been looked at, and how they reveal the cognitive degree of copyright laws toward various social stratums have been analyzed. Research subjects in each social stratum were firstly classified, which centered around university library users, authors as well as librarians in each university library public access post, then the difference of understanding toward copyright laws between each of these 3 groups was analyzed, and also at the same time the problems in usage authorization procedures of copyrighted materials in library were analyzed. so that the solutions to such problems can be found.

Digital Cage Watermarking using Human Visual System and Discrete Cosine Transform (인지 시각시스템 및 이산코사인변환을 이용한 디지털 이미지 워터마킹)

  • 변성철;김종남;안병하
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.1
    • /
    • pp.17-23
    • /
    • 2003
  • In this Paper. we Propose a digital watermarking scheme for digital images based on a perceptual model, the frequency masking, texture making, and luminance masking Properties of the human visual system(HVS), which have been developed in the context of image compression. We embed two types of watermark, one is pseudo random(PN) sequences, the other is a logo image. To embed the watermarks, original images are decomposed into $8\times8$ blocks, and the discrete cosine transform(DCT) is carried out for each block. Watermarks are casted in the low frequency components of DCT coefficients. The perceptual model adjusts adaptively scaling factors embedding watermarks according to the local image properties. Experimental results show that the proposed scheme presents better results than that of non-perceptual watermarking methods for image qualify without loss of robustness.

VMProtect Operation Principle Analysis and Automatic Deobfuscation Implementation (VMProtect 동작원리 분석 및 자동 역난독화 구현)

  • Bang, Cheol-ho;Suk, Jae Hyuk;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.605-616
    • /
    • 2020
  • Obfuscation technology delays the analysis of a program by modifying internal logic such as data structure and control flow while maintaining the program's functionality. However, the application of such obfuscation technology to malicious code frequently occurs to reduce the detection rate of malware in antivirus software. The obfuscation technology applied to protect software intellectual property is applied to the malicious code in reverse, which not only lowers the detection rate of the malicious code but also makes it difficult to analyze and thus makes it difficult to identify the functionality of the malicious code. The study of reverse obfuscation techniques that can be closely restored should also continue. This paper analyzes the characteristics of obfuscated code with the option of Pack the Output File and Import Protection among detailed obfuscation technologies provided by VMProtect 3.4.0, a popular tool among commercial obfuscation tools. We present a de-obfuscation algorithm.

Zero-Watermarking based on Chaotic Side Match Vector Quantization (무질저한 SMVQ 기반의 제로-워터마킹)

  • Kim, Hyung-Do;Park, Chan-Kwon
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.7
    • /
    • pp.37-44
    • /
    • 2009
  • Digital watermarking is a technology for preventing illegal copying, for protecting intellectual property rights and copyrights, and for suggesting grounds of the ownership by inserting watermarks into digital contents. Generally speaking, watermarking techniques cannot escape from data distortion and quality degradation due to the watermark insertion. In order to overcome the shortcoming, zero-watermarking techniques which do not change the original data have been proposed recently. This paper proposes CSMVQ(Chaotic SMVQ), a zero-watermarking system for SMVQ(Side Match Vector Quantization) which shows better compression ratio and quality and less blocking effect than VQ(Vector Quantization). In SMVQ, compression progresses from left top to right bottom in order to use the information of the two neighbor blocks, so it is impossible to insert watermarks chaotically. In the process of encoding, CSMVQ dynamically considers the information of the (1 to 4) neighbor blocks already encoded. Therefore, watermark can be inserted into digital contents in chaotic way. Experimental results show that the image quality compressed by CSMVQ is better than that of SMVQ and the inserted watermark is robust against some common attacks.