• Title/Summary/Keyword: Data Copyright

Search Result 261, Processing Time 0.026 seconds

VR Image Watermarking Method Considering Production Environments (제작 환경을 고려한 VR 영상의 워터마킹 방법)

  • Moon, Won-jun;Seo, Young-ho;Kim, Dong-wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.561-563
    • /
    • 2019
  • This paper proposes a watermarking method for copyright protection of images used in VR. The Embedding method is that finds the point through the SIFT feature points, inserts the watermark by using DWT and QIM on the surrounding area. The objective image to extract the embedded watermark is the projected image and its method finds the SIFT feature points and extracts watermark data from its surrounding areas after correction by using inverse process of matching and projection in the VR image production process. By comparing the NCC and BER between the extracted watermark and the inserted watermark, the watermark is determined by accumulating the watermark having a threshold value or more. This is confirmed by comparing with a conventional method.

  • PDF

Exploring Considerations for Developing Metaverse Ethical Guidelines

  • HoSung WOO;Yong KIM
    • Journal of Research and Publication Ethics
    • /
    • v.4 no.2
    • /
    • pp.1-5
    • /
    • 2023
  • Purpose: There are already hundreds of millions of users of the Metaverse platform, and within a few years, it is expected to develop into a stage for new economic activities with huge industrial ripple effects due to the size of users. The purpose of this study is to derive considerations for the development of metaverse ethical guidelines. Research design, data, and methodology: The concept of the metaverse was examined through various opinions of industry and experts on the metaverse, and literature related to metaverse ethics was analyzed in the Korean journal database. Results: Six issues were identified through the existing research. (1) Establishing a unified definition of metaverse (2) Necessity of establishing ethical principles considering the operator (3) Personal information protection and privacy (4) Expression in a virtual environment (5) Copyright and intellectual property rights of creations (6) Virtual economy and fairness of trade. Conclusions: Metaverse ethics will be developed and implemented in a form and method different from the real world, but basically, continuous discussions on ethical rationality are needed in the process. In addition, since the ethical judgment in the metaverse environment accompanies cultural differences and epochal changes, it is necessary to focus on metaverse ethics cases.

A Study on the Fingerprinting scheme without Trusted Third Party (신뢰기관 비참여의 핑커프린팅 기법에 관한 연구)

  • Yong, Seung-Lim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.7
    • /
    • pp.81-88
    • /
    • 2009
  • Fingerprinting scheme is a technique which supports the copyright protection to track redistributors of digital content using cryptographic techniques. These schemes enable the original merchant to identify the original buyer of the digital data by embedding fingerprints into digital contents. Asymmetric property of fingerprinting schemes is important to keep the buyer's privacy. In this paper, we propose a symmetric encryption based fingerprinting protocol without trusted third party. Our scheme enables the reduction of computational costs for the encryption using symmetric key encryption scheme. Since a trusted third party doesn't take part in making the fingerprint of each buyer, the protocol doesn't need to control the trusted third party and it is more secure against collusion attack.

Design and Implementation of Tor Traffic Collection System Using Multiple Virtual Machines (다수의 가상머신을 이용한 토르 트래픽 수집 시스템 설계 및 구현)

  • Choi, Hyun-Jae;Kim, Hyun-Soo;Shin, Dong-Myung
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.1
    • /
    • pp.1-9
    • /
    • 2019
  • We intend to collect and analyze traffic efficiently in order to detect copyright infringement that illegally share contents on Tor network. We have designed and implemented a Tor traffic collection system using multiple virtual machines. We use a number of virtual machines and Mini PCs as clients to connect to Tor network, and automate both the collection and refinement processes in the traffic collection server through script-based test client software. Through this system, only the necessary field data on Tor network can be stored in the database, and only 95% or more of recognition of Tor traffic is achieved.

How to Review a Paper Written by Artificial Intelligence (인공지능으로 작성된 논문의 처리 방안)

  • Dong Woo Shin;Sung-Hoon Moon
    • Journal of Digestive Cancer Research
    • /
    • v.12 no.1
    • /
    • pp.38-43
    • /
    • 2024
  • Artificial Intelligence (AI) is the intelligence of machines or software, in contrast to human intelligence. Generative AI technologies, such as ChatGPT, have emerged as valuable research tools that facilitate brainstorming ideas for research, analyzing data, and writing papers. However, their application has raised concerns regarding authorship, copyright, and ethical considerations. Many organizations of medical journal editors, including the International Committee of Medical Journal Editors and the World Association of Medical Editors, do not recognize AI technology as an author. Instead, they recommend that researchers explicitly acknowledge the use of AI tools in their research methods or acknowledgments. Similarly, international journals do not recognize AI tools as authors and insist that human authors should be accountable for the research findings. Therefore, when integrating AI-generated content into papers, it should be disclosed under the responsibility of human authors, and the details of the AI tools employed should be specified to ensure transparency and reliability.

Generative AI Technology Trends and Development Prospects for Digital Asset Creation (디지털 에셋 창작을 위한 생성형 AI 기술 동향 및 발전 전망)

  • K.S. Lee;S.W. Lee;M.S. Yoon;J.J. Yu;A.R. Oh;I.M. Choi;D.W. Kim
    • Electronics and Telecommunications Trends
    • /
    • v.39 no.2
    • /
    • pp.33-42
    • /
    • 2024
  • With the recent rapid development of artificial intelligence (AI) technology, its use is gradually expanding to include creative areas and building new content using generative AI solutions, reaching beyond existing data analysis and reasoning applications. Content creation using generative AI faces challenges owing to technical limitations and other aspects such as copyright compliance. Nevertheless, generative AI may increase the productivity of experts and overcome barriers to creative work by allowing users to easily express their ideas as digital content. Thus, various types of applications will continue to emerge. As images and videos can be created using text input on a prompt, generative AI allows to create and edit digital assets quickly. We present trends in generative AI technology for images, videos, three-dimensional (3D) assets and scenes, digital humans, interactive content, and interfaces. In addition, the prospects for future technological development in this field are discussed.

Status and Development of Geomatic s in China

  • Li, Li
    • Proceedings of the Korean Society of Surveying, Geodesy, Photogrammetry, and Cartography Conference
    • /
    • 2002.04a
    • /
    • pp.17-24
    • /
    • 2002
  • Mechanization is the characteristic of the industrial era and computerization is the characteristic of the Information Era. Now we are facing on the transition from Industrial Era to information Era. Established the National Geo-spatial Data Infrastructures is the fundamental base for information society and is one part of the national basic economic development plan. From 1980's China started his successful transition from traditional methods to high-tech based mapping. China has laid out a high accuracy national GPS (global Positioning System) network, and completed the geographic information databases for scale of 1:1million and 1:250,000. Now it is working on the databases for scales of 1:50,000 and 1:10,000, the world highest level. The massive national programmed has been dubbed "Digital China," since it involves massive quantities of digitized geographical information. Simultaneity, GIS technology and the geo-spatial data have been used widely in electronic government affair, environmental protection, disaster control, ITS and etc. The users have realized the benefits more and more widely. Internet is an efficient way to distribute the geo-information, the State Bureau of Surveying and Mapping has give great effort to settle down the rules and standards to establish the clearing house. Some National Geo-standards have issued, and some of them are on the way. The GIS software is another important factor in the GIS industry. Chinese government working-out some good policy to supports the GIS software developer to have their own copyright. This paper is based on the above to introduce the status and development of Geomatics in China. in China.

  • PDF

Robust Layered Watermarking of Digital Audio for Possible Timing Changes (시간축 변형을 고려한 디지털 오디오의 계층적 워터마크)

  • 정사라;홍진우
    • The Journal of the Acoustical Society of Korea
    • /
    • v.21 no.8
    • /
    • pp.719-726
    • /
    • 2002
  • In this paper, we present a layered watermarking technique for digital audio data that is capable of detecting timing change and adapting complexity in detection. The proposed watermarking uses echo hiding as the first layer, which enables the detector to estimate linear speed change. The spread spectrum watermark is then inserted in the second layer which includes additional information like copyright data. We use two kinds of sequences in the second layer, one of which is for synchronization and the other is for data. The results of previous layer are used to make estimate of timing change in the next layer. The detector in the presented method can select detecting range form the first layer to the first layer, second pre-layer, or second main-layer due to the required system specification. Experimental results show that the proposed watermarking technique is robust to several processing attacks including timing change.

Blind Video Watermarking Using Minimum Modification of Motion Vectors (움직임벡터의 변경을 최소화한 블라인드 비디오 워터마킹)

  • Kang, Kyung-Won;Moon, Kwang-Seok;Kim, Jong-Nam
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.7
    • /
    • pp.864-871
    • /
    • 2006
  • With the advancement of the digital broadcasting and popularity of Internet, there is an increasing demand for digital data. Recently, several studies have been made on the digital watermarking for copyright protection of digital data. We propose a blind video watermarking using minimum modification of motion vectors. Conventional methods based on motion vectors do watermarking using modification of motion vectors. However, change of motion vectors results in the degradation of video quality. Thus, our proposed algorithm minimizes modification of the original motion vectors to avoid degradation of video quality using simple embedded conditions. Besides, our scheme guarantees the amount of embedded watermark data using the adaptive threshold considering the human visual characteristic. In addition, this is compatible with current video compression standards without changing the bitstream. Experimental result shows that the proposed scheme obtains better video quality than other previous algorithms by about $0.5{\sim}1.0\;dB$.

  • PDF

An Improved Method of Digital Watermarking Applied to Binary Printed Images (이진 프린트 영상에 적용하는 디지털 워터마킹의 성능 개선)

  • 김현주;곽내정;권혁봉;안재형
    • Journal of Korea Multimedia Society
    • /
    • v.4 no.3
    • /
    • pp.247-256
    • /
    • 2001
  • Digital watermarking is a copyright protection technique for digital images which embed a code into the digital data so the data is marked. Watermarking techniques previously deal with on-line digital data and have been developed to withstand digital attacks such image processing, compression and geometric transformation. In this paper we propose a novel method of embedding watermarks in printed images. In the proposed algorithm, watermark is embedded in a dithered binary image by comparing the $2\times{2}$ blocks of the counting array is the number of 1 (WHITE) in the $16\times{16}$ blocks of the dithered binary image with predefined reference block pattern, which is generated by watermark values. The proposed algorithm is able to provide more information at a watermark because the proposed algorithm use both '1'and '0' as watermark values. The watermark information is detected by comparing the watermark which is reconstructed from the image which is embedded watermark with the original watermark which is embedded in a binary image. The performance of the proposed algorithm is compared with that of the conventional watermark embedding algorithm for printed images by detecting watermark for scan images.

  • PDF