• Title/Summary/Keyword: 콘텐츠추적정보

Search Result 168, Processing Time 0.03 seconds

High-Speed Search for Pirated Content and Research on Heavy Uploader Profiling Analysis Technology (불법복제물 고속검색 및 Heavy Uploader 프로파일링 분석기술 연구)

  • Hwang, Chan-Woong;Kim, Jin-Gang;Lee, Yong-Soo;Kim, Hyeong-Rae;Lee, Tae-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1067-1078
    • /
    • 2020
  • With the development of internet technology, a lot of content is produced, and the demand for it is increasing. Accordingly, the number of contents in circulation is increasing, while the number of distributing illegal copies that infringe on copyright is also increasing. The Korea Copyright Protection Agency operates a illegal content obstruction program based on substring matching, and it is difficult to accurately search because a large number of noises are inserted to bypass this. Recently, researches using natural language processing and AI deep learning technologies to remove noise and various blockchain technologies for copyright protection are being studied, but there are limitations. In this paper, noise is removed from data collected online, and keyword-based illegal copies are searched. In addition, the same heavy uploader is estimated through profiling analysis for heavy uploaders. In the future, it is expected that copyright damage will be minimized if the illegal copy search technology and blocking and response technology are combined based on the results of profiling analysis for heavy uploaders.

The Methodology on Entrance Unit Classification of Division.Department.Majors for the Designed IT Manpower Training (맞춤형 IT인력 양성을 위한 "학부.학과.전공" 분류 방법)

  • Shim, Jae-Ruen;Choi, Jin-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.879-882
    • /
    • 2007
  • 현재와 같은 지식정보화사회에서는 우수한 IT인력 확보가 곧 국가와 기업의 경쟁력이다. 이를 위해 대학과 기업은 맞춤형 IT인력 양성을 위해 다양한 산학협력을 실시하고 있다. 본 논문에서는 부산지역 4년제 대학의 1999학년도부터 2006학년도까지 총 8년간의 입시 변화를 추적 조사하여 IT관련 모집단위의 핵심단어를 5개 그룹($\Delta$전기 전자분야(G1), $\Delta$통신분야(G2), $\Delta$컴퓨터분야(G3), $\Delta$멀티미디어 콘텐츠(G4), $\Delta$IT융합 특성화(G5))으로 묶고, 각 그룹별로 다시 몇 개의 세분류로 나누어 제시하였다. 본 논문은 대학의 IT관련 학부명 학과명 전공명 등 모집단위의 변화가 어떤 변화를 거쳤으며 또한 이의 모집정원은 어떤 변화를 가져 왔는지에 대한 총괄적인 조사를 위한 IT $\ulcorner$학부 학과 전공$\lrcorner$ 의 핵심단어에 의한 그룹별 분류 체계에 관한 연구이다.

  • PDF

Development of Forensic Marking technology for tracing multiple users (다중 불법콘텐츠 복제자 추적 기술 개발)

  • Kim, Jong-An;Kim, Jin-Han;Kim, Jong-Heum
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.102-106
    • /
    • 2008
  • Forensic Marking is the technology that enables the service providers (SP) to identify the illegal digital contents distributors by first inserting markings (data indicating the user information and playback time) in realtime into the digital contents at time of playback of digital contents, and then later by extracting inserted markings from the contents which are illegally captured from the multimedia device such as IPTV STBs and distributed over the Internet. Digital Rights Management (DRM), which is a very popular content protection technology, has the security hole that can be vulnerable because the encrypted digital contents are transformed into their original plaintext forms after the decrypting process on the STBs. Therefore Forensic Marking (FM) has now become a companion content protection solution to DRM. This article describes a new way of tracking up to 4 illegal content users in FM implementation using the blue-difference chroma component of YCbCr color space. This FM technology has many advantages like fast processing time and easy portability to STB devices compared to that of the traditional watermarking processing in the frequency domain.

  • PDF

Security Analysis and Improvement of an Anonymous Asymmetric Fingerprinting Scheme with Trusted Third Party (익명적 비대칭 핑거프린팅 기법의 보안 취약성 분석 및 개선 방안)

  • Kwon, Sae-Ran
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.5
    • /
    • pp.396-403
    • /
    • 2009
  • An anonymous asymmetric fingerprinting protocol combined with watermarking techniques, is one of the copyright protection technologies keeping both right of a seller and that of a buyer, where a seller and an anonymous buyer perform such a protocol that employs various cryptographic tools in order that the seller does not know the exact watermarked copy that the buyer receives, while inserting an invisible non-removable fingerprint i.e., each different unique watermark, into each copy of the digital content to be sold. In such a protocol innocent buyers are kept anonymous during transactions, however, the unlawful reseller is unambiguously identified with a real identity as a copyright violator. In 2007, Yong and Lee proposed an anonymous asymmetric fingerprinting scheme with trusted third party. In this paper we point out the weakness of their scheme such as: the buyer with intention can remove the fingerprint in the watermarked content, because he/she can decrypt the encrypted fingerprint with a symmetric key using man-in-the-middle-attack; a real identity of a buyer can be revealed to the seller through the identification process even though he/she is honest. Furthermore, we propose an improved secure and efficient anonymous asymmetric fingerprinting scheme which enables to reduce the number of communication between the participants.

Track Models Generation Based on Spatial Image Contents for Railway Route Management (철도노선관리에서의 공간 영상콘텐츠 기반의 궤적 모델 생성)

  • Yeon, Sang-Ho;Lee, Young-Wook
    • Proceedings of the KSR Conference
    • /
    • 2008.11b
    • /
    • pp.30-36
    • /
    • 2008
  • The Spatial Image contents of Geomorphology 3-D environment is focused by the requirement and importance in the fields such as, national land development plan, telecommunication facility management, railway construction, general construction engineering, Ubiquitous city development, safety and disaster prevention engineering. The currently used DEM system using contour lines, which embodies geographic information based on the 2-D digital maps and facility information has limitation in implementation in reproducing the 3-D spatial city. Moreover, this method often neglects the altitude of the rail way infrastructure which has narrow width and long length. There it is needed to apply laser measurement technique in the spatial target object to obtain accuracy. Currently, the LiDAR data which combines the laser measurement skill and GPS has been introduced to obtain high resolution accuracy in the altitude measurement. In this paper, we tested of the railway facilities using laser surveying system, then we propose data a generation of spatial images for the optimal manage and synthesis of railway facility system in our 3-D spatial terrain information. For this object, LiDAR based height data transformed to DEM, and the realtime unification of the vector via digital image mapping and raster via exactness evaluation is transformed to make it possible to trace the model of generated 3-dimensional railway model with long distance for 3D tract model generation. As the results, We confirmed the solutions of varieties application for railway facilities management using 3-D spatial image contents.

  • PDF

A Study on eye-tracking software design and development for e-sports viewing on the web (e 스포츠 웹 시청 연구를 위한 시선 분석도구 설계 및 개발)

  • Ko, Eunji;Choi, SunYoung
    • Journal of Korea Game Society
    • /
    • v.15 no.4
    • /
    • pp.121-132
    • /
    • 2015
  • This study suggests a design for an analytical software program and method for multitasking e-sports viewing through the web using an eye tracking device. To fulfill this task, we designed a Window of Interest (WOI) to measure and record visually on a screen wherever numerous multitasking activities occur. In addition, we developed an OBS (Opensource Broadcaster Software) plug-in that records and streams participant viewing behavior patterns in real time. The purpose of this study is as follows. First, unlike existing tools that limit web interface recording to still images, the developed tool can record dynamically via media such as videos. Second, when several windows are processed on a screen, the tool can accurately record the gaze positions of the participants. Lastly, the tool can enhance the objective validity of the data as it can be implemented in natural situations. Therefore, this study can trace natural viewing patterns and behavior as we do not create artificial experimental environments and stimuli.

A study on the effect of introducing EBS AR production system on content (EBS AR 실감영상 제작 시스템 도입이 콘텐츠에 끼친 영향에 대한 연구)

  • Kim, Ho-sik;Kwon, Soon-chul;Lee, Seung-hyun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.711-719
    • /
    • 2021
  • EBS has been producing numerous educational contents with traditional virtual studio production systems since the early 2000s and applied AR video production system in October 2020, twenty-years after. Although the basic concept of synthesizing graphic elements and actual image in real time by tracking camera movement and lens information is similar to the previous one but the newly applied AR video production system contains some of advanced technologies that are improved over the previous ones. Marker tracking technology that enables camera movement free and position tracking has been applied that can track the location stably, and the operating software has been applied with Unreal Engine, one of the representative graphic engines used in computer game production, therefore the system's rendering burden has been reduced, enabling high-quality and real-time graphic effects. This system is installed on a crane camera that is mainly used in a crane shot at the live broadcasting studio and applied for live broadcasting programs for children and some of the videos such as program introductions and quiz events that used to be expressed in 2D graphics were converted to 3D AR videos which has been enhanced. This paper covers the effect of introduction and application of the AR video production system on EBS content production and the future development direction and possibility.

Construction of an Effective Web-based Change Management System (웹 기반의 효과적인 변경관리 시스템 구축)

  • Yoo Jae-Soo;Cho Chang-Hee;Lee Byoung-Yup
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.4
    • /
    • pp.11-19
    • /
    • 2005
  • With the development of IT technologies, IT environment is making great change over life whole and is displacing business and business achievement systems of industry at the fast speed. The system which is proposed in this paper, supports environments to share codes, execution files and objects between project teams to maximize productivity and efficiency in web environments. Through impact assessment which is achieved at correction and development of existing programming codes by maintenance requirements, it minimizes obstacle occurrence factors and supports tracing obstacle sources. Through conversion the correction and development histories of existing sources and executable files between project teams to XML documents suitable to share in web, it stores them to relational database. In this paper, through impact assessment and change management for the correction and development of applications in the existing system development environments, we support efficient IT developments.

  • PDF

Research on Functional Use nnd Demands for Cellular Phone in The Aged (노령인구의 핸드폰 기능사용 현황 및 수요 조사)

  • Jung, Jae-Bum;Nam, Ki-Chun;Choi, Moon-Gee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.2
    • /
    • pp.455-462
    • /
    • 2009
  • The present study focused on the status of functional use and demands for cellular phone in the aged. Through a survey of 206 aged people, we asked the present use of UI(User Interface) and problems in use of functions of cellular phone. The survey consist of questions about use of internet and mobil products, receptiveness of various mobil contents and machines, and marketable evaluation. The results showed that great part of elder people used only cellular phone as telephone. However, it appeared that relatively younger people in the participants In survey used more and more various functions of cellular phone such as digital camera. Moreover, according to the situations of health, economy, culture of participants, they demanded more various functions and UI in cellular phone.

Wireless DDoS Attack Detection and Prevention Mechanism using Packet Marking and Traffic Classification on Integrated Access Device (IAD 기반 패킷 마킹과 유무선 트래픽 분류를 통한 무선 DDoS 공격 탐지 및 차단 기법)

  • Jo, Je-Gyeong;Lee, Hyung-Woo;Park, Yeoung-Joon
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.6
    • /
    • pp.54-65
    • /
    • 2008
  • When DDoS attack is achieved, malicious host discovering is more difficult on wireless network than existing wired network environment. Specially, because wireless network is weak on wireless user authentication attack and packet spoofing attack, advanced technology should be studied in reply. Integrated Access Device (IAD) that support VoIP communication facility etc with wireless routing function recently is developed and is distributed widely. IAD is alternating facility that is offered in existent AP. Therefore, advanced traffic classification function and real time attack detection function should be offered in IAD on wireless network environment. System that is presented in this research collects client information of wireless network that connect to IAD using AirSensor. And proposed mechanism also offers function that collects the wireless client's attack packet to monitoring its legality. Also the proposed mechanism classifies and detect the attack packet with W-TMS system that was received to IAD. As a result, it was possible for us to use IAD on wireless network service stably.