• Title/Summary/Keyword: Copyright Recognition

Search Result 31, Processing Time 0.025 seconds

Design and Implementation of Tor Traffic Collection System Using Multiple Virtual Machines (다수의 가상머신을 이용한 토르 트래픽 수집 시스템 설계 및 구현)

  • Choi, Hyun-Jae;Kim, Hyun-Soo;Shin, Dong-Myung
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.1
    • /
    • pp.1-9
    • /
    • 2019
  • We intend to collect and analyze traffic efficiently in order to detect copyright infringement that illegally share contents on Tor network. We have designed and implemented a Tor traffic collection system using multiple virtual machines. We use a number of virtual machines and Mini PCs as clients to connect to Tor network, and automate both the collection and refinement processes in the traffic collection server through script-based test client software. Through this system, only the necessary field data on Tor network can be stored in the database, and only 95% or more of recognition of Tor traffic is achieved.

A Study on Protection of Iris and fingerprint Data Based on Digital Watermarking in Mid-Frequency Band (중간 주파수 영역에서의 디지털 워터마킹 기법에 의한 홍채 및 지문 데이터 보호 연구)

  • Jeong, Dae-Sik;Park, Kang-Ryoung
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.9
    • /
    • pp.1227-1238
    • /
    • 2005
  • Recently, with the advance of network and internet technologies, it is appeared the Problem that the digital contents such as image, voice and video are illegally pirated and distributed. To protect the copyright of the digital contents, the digital watermarking technology of inserting the provider's information into the contents has been widely used. In this paper, we propose the method of applying the digital watermarking into biometric information such as fingerprint and iris in order to prevent the problem caused by steal and misuse. For that, we propose the method of inserting watermark in frequency domain, compare the recognition performance before and aster watermark inserting. Also, we experiment the robustness of proposed method against blurring attack, which is conventionally taken on biometrics data. Experimental results show that our proposed method can be used for protecting iris and fingerprint data, efficiently.

  • PDF

Study on the Convenient Interface to the University Web-based Library System (Web을 기반으로 한 대학교 도서관 시스템에 있어서 용이한 인터페이스에 관한 연구)

  • 이현정;정재욱
    • Archives of design research
    • /
    • v.15 no.1
    • /
    • pp.93-100
    • /
    • 2002
  • The University's web library is a form of library that enables to deal with information about searching loaning, returning of books or data housed in it through web. With the advent of the network and multimedia following the entrance to an information-oriented society, we are experiencing a big change in how to communicate and acquire information. Massive multimedia information transmitted by image and moving picture through the network, made it possible to overstep the limit of the physical gap between information suppliers and users. Despite this important role, it is accompanied by problems such as copyright, scarcity of recognition, paralysis of infra, technical matters and reliability which demand development. In this thesis, according to the State University Evaluation Standards, search node and user interface by system used in 20 different universities possessing web-based library sites were compared are analysed. On the basis of this, an experimental user interface for web-based University libraries was produced, and various questionnaires and data leer this produced interface were collected, classified and analyzed. With the application of the results for the work above to the general search system interface of the web-based library, we proposed a new user interface that contains the following functions, such as location and loan condition of books, search frequency and steps for purchasing books inside the web library.

  • PDF

The Server based Realtime Biometric Signature Scheme (서버 기반 실시간 바이오메트릭 서명 기법)

  • Yun, Sunghyun
    • Journal of Digital Convergence
    • /
    • v.11 no.9
    • /
    • pp.173-179
    • /
    • 2013
  • In a biometric authentication scheme, a user's biometric data that is unique to the user is used to prove the user's identity to the third party. Since the user should have to participate in every authentication sessions, it's not possible to delegate other users to authenticate instead of himself/herself. In a biometric signature scheme, contrary to authentication scheme, a user's biometric data is used to prove that "this message is signed by the signer who claims to be" to the third party. However, once the biometric key is created, it can be accessed by the signer. Thus, it's possible to lend the biometric key to other users. In this study, the server based biometric realtime signature scheme is proposed. The proposed scheme can be applied to sign the vote in electronic voting or to authenticate the copyright owner in DRM enabled mobile commerce where the proxy signatures are not allowed.

A Study on the Activation Plan for Legal Deposit in National Assembly Library of South Korea: Focusing on Thesis and Dissertation (국회도서관 납본 활성화 방안에 관한 연구 - 디지털 학위논문을 중심으로 -)

  • Lee, Seungmin
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.53 no.4
    • /
    • pp.73-93
    • /
    • 2019
  • This study empirically analyzed the recognition and current status of university libraries related to the legal deposit of thesis and dissertation and investigated the ways to activate legal deposit to National Assembly Library. As a result, most universities conduct legal deposit of thesis and dissertation. However, most librarians face difficulties resulted from the duplication of deposits to many institutions. In the case that the deposits are not made, the main reasons are the university library's policies, duplication and inefficiency of the deposit procedures, and the limitation of obtaining copyright agreements. In order to address these limitations and to maximize the social and informational values of thesis and dissertation, this research proposed approaches to legal deposit of thesis and dissertation, including strengthening digital deposit system through the establishment of independent legal deposit law, preparing the effective ways of preservation. constructing an integrated deposit system, and developing professional collection of thesis and dissertation which can consolidate National Assembly Library.

A Reference Frame Selection Method Using RGB Vector and Object Feature Information of Immersive 360° Media (실감형 360도 미디어의 RGB 벡터 및 객체 특징정보를 이용한 대표 프레임 선정 방법)

  • Park, Byeongchan;Yoo, Injae;Lee, Jaechung;Jang, Seyoung;Kim, Seok-Yoon;Kim, Youngmo
    • Journal of IKEEE
    • /
    • v.24 no.4
    • /
    • pp.1050-1057
    • /
    • 2020
  • Immersive 360-degree media has a problem of slowing down the video recognition speed when the video is processed by the conventional method using a variety of rendering methods, and the video size becomes larger with higher quality and extra-large volume than the existing video. In addition, in most cases, only one scene is captured by fixing the camera in a specific place due to the characteristics of the immersive 360-degree media, it is not necessary to extract feature information from all scenes. In this paper, we propose a reference frame selection method for immersive 360-degree media and describe its application process to copyright protection technology. In the proposed method, three pre-processing processes such as frame extraction of immersive 360 media, frame downsizing, and spherical form rendering are performed. In the rendering process, the video is divided into 16 frames and captured. In the central part where there is much object information, an object is extracted using an RGB vector per pixel and deep learning, and a reference frame is selected using object feature information.

Assessment and Support Measures of Academic Journals in the National Open Access Platform AccessON

  • Hyekyong Hwang;Eun Jee Lee;Wan Jong Kim;Jin Ho Park
    • Journal of Information Science Theory and Practice
    • /
    • v.12 no.3
    • /
    • pp.75-88
    • /
    • 2024
  • This study aims to assess the maturity of Korean open access (OA) journals using the OA infrastructure provided by the Korea Institute of Science and Technology Information, and develop necessary strategies for future improvement. The assessment model consists of three dimensions, 12 items, and 24 sub-items. The importance of the three dimensions (A: OA policy establishment and disclosure, B: OA sustainability, and C: Journal openness quality) was differentiated by the Analytic Hierarchy Process, and the maturity stages were divided into five levels (Entry, Growth1, Growth2, Maturity1, and Maturity2). The assessment was carried out twice for 100 academic journals. The results indicated that the proportion of journals at or above the Growth1 level increased by 11% to reach 83% during the second assessment phase, which could be owing to the learnings of the first assessment. Following expert consultations on the assessment results, three support measures were identified to activate OA. The first includes OA promotion and education activities, which involve creating standard regulations and guidelines, and advancing educational activities for societies that are either preparing for or currently implementing OA. The second involves providing support for technical aspects, such as identifiers, XMLization, and copyright management, through peer review and OA publishing platforms. The third includes collaborative activities to enhance journal evaluations and the recognition criteria for researchers' achievements in OA journals, and fostering cooperation with national and research and development institutions for financial support.

An Embedded Watermark into Multiple Lower Bitplanes of Digital Image (디지털 영상의 다중 하위 비트플랜에 삽입되는 워터마크)

  • Rhee, Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.6 s.312
    • /
    • pp.101-109
    • /
    • 2006
  • Recently, according to the number of internet in widely use and the development of the related application program, the distribution and use of multimedia content(text, images, video, audio etc.) is very easy. Digital signal may be easily duplicated and the duplicated data can have same quality of original data so that it is difficult to warrant original owner. For the solution of this problem, the protection method of copyright which is encipher and watermarking. Digital watermarking is used to protect IP(Intellectual Property) and authenticate the owner of multimedia content. In this paper, the proposed watermarking algerian embeds watermark into multiple lower bitplanes of digital image. In the proposed algorithm, original and watermark images are decomposed to bitplanes each other and the watermarking operation is executed in the corresponded bitplane. The position of watermark image embedded in each bitplane is used to the watermarking key and executed in multiple lower bitplane which has no an influence on human visual recognition. Thus this algorithm can present watermark image to the multiple inherent patterns and needs small watermarking quantity. In the experiment, the author confirmed that it has high robustness against attacks of JPEG, MEDIAN and PSNR but it is weakness against attacks of NOISE, RNDDIST, ROT, SCALE, SS on spatial domain when a criterion PSNR of watermarked image is 40dB.

A Study on Arbitration Qualification of Intellectual Property Right Dispute - Focus on Korea and China - (지적재산권분쟁의 중재적격에 관한 연구 -한국과 중국을 중심으로-)

  • Choi, Song-Za
    • Journal of Arbitration Studies
    • /
    • v.21 no.2
    • /
    • pp.27-46
    • /
    • 2011
  • In the intellectual based society of the 21th century, intellectual property of nation and enterprise management has been the key element of nation's competitiveness and development. Therefore in countries like Korea, China, and many other countries, intellectual property of advancement strategy are being constructed and intellectual properties are protected at national level. Top priority task of protecting the intellectual property is to efficiently resolute intellectual property right disputes. Considering the nature of intellectual property right and arbitrage system, arbitration to solve intellectual property disputes is realistically the best method. However, not all cases of them are qualified. In order to relieve the intellectual property disputes through arbitration, qualification must be obtained. During the process, generally and globally, intellectual property right dispute is evaluated by three parts, intellectual property right contract dispute, intellectual property right violation dispute, and intellectual property right validity dispute. Based on UN's "Convention on the Recognition and Enforcement of Foreign Arbitral Awards Agreement" in 1958, June 10th, in New York, both arbitrage organization and judgment can be approved in both Korea and China countries. However, as of today, there is a big gap of arbitration qualification between two countries, which can be troublesome if intellectual property right disputes arise. For instance, in Korea, intellectual property right contract disputes and intellectual property right violation disputes are both generally accepted as arbitration qualification. However for intellectual property right validity dispute, arbitration qualification is only accepted for non-registered intellectual property as in copyright entity. It does not apply to other registered intellectual property right as in patents. In China, arbitration qualification is accepted for intellectual property right contract dispute, and also accepted for intellectual property right violation dispute to copyrights but restricted to others. As for intellectual property right validity dispute, arbitration qualification is completely denied. Therefore, when there is an intellectual property right dispute between Korea and China, the biggest problem is whether China will accept arbitrage judgments made in Korea. Theoretically, arbitrage judgement made in Korea should be also accepted in China's court. However, considering the criticism of China's passive nature of arbitration qualification for its own local intellectual property right disputes, it's very unlikely they'll actively accept arbitrary judgment made in foreign countries. Korea and China must have a more open minded approach for intellectual property disputes and arbitration qualification. Base on WTO's Intellectual Property Right Agreement, it's being defined as private right. Therefore, sovereign principle should be the basic principle of solving intellectual property right disputes. Currently, arbitration qualification is expanding internationally. So both Korea and China must also follow the trend expand the arbitration qualification with a more open minded and forward looking approach, for the good of intellectual property disputes.

  • PDF

A Study on the enforceability of Shrink-wrap License under the Contract Law of USA (미국(美國) 계약법(契約法)하에서 소위 "쉬링크랩라이센스" 계약(契約)에 관한 일고찰(一考察))

  • Hur, Hai-Kwan
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.20
    • /
    • pp.129-150
    • /
    • 2003
  • Software license agreements, to be useful in the mass market, could not be individually negotiated, and had to be standardized and concise. The software license agreement needs to be presented to the licensee-users in a fashion that would allow for mass distribution of software, also for it to enforceable, that would draw the users' attention to the terms and conditions under which the publisher allowed the use of the software. These needs have been accomplished, with or without fail, through so called the "shrink-wrap licenses" Shrink-wrap licenses purpose to transfer computer softwares to their users by defining the terms and conditions of use of the software without implicating the "first sale doctrine" of the Copyright Act. These shrink-wrap licenses have become essential to the software industry. However, in USA, the law applicable to these licenses has been unclear and unsettled. Courts have struggled to develop a coherent framework governing their enforceability. Meanwhile, the National Conference of Commissioners on Uniform State Laws ("NCCUSL") in USA promulgated the Uniform Computer Information Transaction Act ("UCITA") governing contracts for computer information transaction on July 29, 1999. One clear objective of UCITA was to settle the law governing the enforceability of shrink-wrap licenses. In these respects, this paper first introduces the various forms that shrink-wrap licenses take(at Part II. Section 1.), and explains the main advantages of them(at Part II. Section 2.) Here it shows how shrink-wrap licenses value themselves for both software publishers and users, including that shrink-wrap licenses are a valuable contracting tool because they provide vital information and rights to software users and because they permit the contracting flexibility that is essential for today's software products. Next, this paper describes the current legal framework applicable to shrink-wrap licenses in USA(at Part III). Here it shows that in USA the development of case law governing shrink-wrap licenses occurred in two distinct stages. At first stage, judicial hostility toward shrink-wrap licenses marked such that they were not enforced pursuant to Article 2 of the Uniform Commercial Code. At second stage, courts began to recognize the pervasiveness of shrink-wrap licenses, their indispensability to the rapidly expanding information technology industry, and the urgent need to enforce such licenses in order to maintain low prices for consumers of computer hardware or software, resulting in the recognition of shrink-wrap licenses. Finally, in view of the importance of UCITA, this paper examines how it will affect the enforceability of shrink-wrap licenses(at Part IV). The drafters of UCITA, as well as the scholars and practitioners who have criticized it, agree that it validates shrink-wrap licenses, provided certain procedural protections are afforded to purchasers. These procedural protections include the licensee end-user must (i) manifest his assent to the shrink-wrap license, (ii) have an opportunity to review the shrink-wrap license, (iii) have a right to return the product without costs.

  • PDF