• Title/Summary/Keyword: Data Copyright

Search Result 261, Processing Time 0.026 seconds

Standardization Strategy on 3D Animation Contents (3D 애니메이션 콘텐츠의 SCORM 기반 표준화 전략)

  • Jang, Jae-Kyung;Kim, Sun-Hye;Kim, Ho-Sung
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.218-222
    • /
    • 2006
  • In making 3D animation with digital technology, it is necessary to increase productivity and reusability by managing production pipeline systematically through standardization of animation content. For this purpose, we try to develop the animation content management system that can manage all kind of information on the production pipeline, based on SCORM of e-teaming by considering production, publication and re-editing. A scene as the unit of visual semantics is standardize into an object that contains meta-data of place, cast, weather, season, time and viewpoint about the scene. The meta-data of content includes a lot of information of copyright, publication, description, etc, so that it plays an important role on the management and the publication. If an effective management system of meta-data such as ontology will be implemented, it is possible to search multimedia contents powerfully. Hence, it will bring on production and publication of UCC. Using the meta-data of content object, user and producer can easily search and reuse the contents. Hence, they can choose the contents object according to their preference and reproduce their own creative animation by reorganizing and packaging the selected objects.

  • PDF

Plans for 3D printers Diffusion -Focusing on production figures- (3D프린터 활성화를 위한 방안 -피규어 제작을 중심으로-)

  • Lee, Chang-Jo;Sohn, Jong-Nam
    • Journal of Digital Convergence
    • /
    • v.12 no.9
    • /
    • pp.335-341
    • /
    • 2014
  • Due to the expiration of the 3D printer's patent, the articles covering the market activation and bright prospects for the future industry are being released. What are the requirements for the 3D printer to become popular like a general printer? To get the answer, on-line survey was performed for the activation of 3D printer. As a result, tit is observed that he public prefers creative printer and figure, and prefers to use through pay or free download rather than designing digital blueprint, which is output data. For the activation and popularization of 3D printer, figure is familiar to the public who are frequently exposed to image media contents, and it also has motivation factor to use and purchase 3D printer. For distribution of digital blueprint of figure content, the preparation of related law and regulation and activation of online market would be of help for activation of 3D printer.

A Study of protective measures of the source program for the development of the Internet of Things (IoT): Protection of the program as well as plagiarism research (사물인터넷(IoT)발전을 위한 소스프로그램 보호방안 연구: 프로그램의 보호와 유사표절 연구)

  • Lee, Jong-Sik
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.4
    • /
    • pp.31-45
    • /
    • 2018
  • Recent dramatical development of computer technology related to internet technology intensifies the dispute over software of computer or smart device. Research on software has been flourished with political issuing of fierce competition among nations for software development. Particularly industrial growth in ethernet based big data and IoT (Internet of Things) has promoted to build and develop open source programs based on java, xcode and C. On these circumstances, issue on software piracy has been confronted despite the basic security policy protecting intellectual property rights of software and thus it is of substantial importance to protect the rights of originality of source program license. However, the other issue on source technology protection of developer is the possibility of hindrance to advancement in industry and culture by developing programs. This study discuss the way of enhancing legal stability of IoT application program development and reinforcing precision in inspection of program plagiarism by analyzing the source programs with newly introducing text mining technique, thus suggests an alternative protective way of infringement of personal information due to duplicating program.

A Study on Activation Plan of Data Collection and Cooperation System in Local Council (지방의회 자료수집 및 협력체계의 활성화 방안 연구)

  • Kwack, Dong-Chul;Joung, Hyun-Tae
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.24 no.2
    • /
    • pp.129-150
    • /
    • 2013
  • The libraries of local councils contribute to realize democracy and promote national interests and the welfare of the people, by supporting democratic legislation activities and congressional politics of the local councilors. This study analyzes the libraries of local councils at 17 regional local governments, and it confirms that there are various deviations in their library services such as material acquisitions and legislative information services by regional groups. On the basis of that analysis, the study summarizes the ways for improving the service qualities of the libraries of local councils as follows. First, it is necessary to organize the institute for national council materials. Second, the cooperative network systems should be constructed to share council publications. Third, the provisions related the copyright law and the national assembly library act have to be modified. Fourth, the libraries of local councils share their own materials focusing on digital publications. Fifth, the National Assembly Library expands their legislative information services to the libraries of local councils.

Scrambling Technology using Scalable Encryption in SVC (SVC에서 스케일러블 암호화를 이용한 스크램블링 기술)

  • Kwon, Goo-Rak
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.4
    • /
    • pp.575-581
    • /
    • 2010
  • With widespread use of the Internet and improvements in streaming media and compression technology, digital music, video, and image can be distributed instantaneously across the Internet to end-users. However, most conventional Digital Right Management are often not secure and not fast enough to process the vast amount of data generated by the multimedia applications to meet the real-time constraints. The SVC offers temporal, spatial, and SNR scalability to varying network bandwidth and different application needs. Meanwhile, for many multimedia services, security is an important component to restrict unauthorized content access and distribution. This suggests the need for new cryptography system implementations that can operate at SVC. In this paper, we propose a new scrambling encryption for reserving the characteristic of scalability in MPEG4-SVC. In the base layer, the proposed algorithm is applied and performed the selective scambling. And it encrypts various MVS and intra-mode scrambling in the enhancement layer. In the decryption, it decrypts each encrypted layers by using another encrypted keys. Throughout the experimental results, the proposed algorithms have low complexity in encryption and the robustness of communication errors.

Wavelet-based Digital watermarking Using Multiple threshold (다중 임계치를 적용한 웨이브릿 기반 디지털 워터마킹 기법)

  • Kim, Jae-Won;Nam, Jae-Yeal
    • The KIPS Transactions:PartB
    • /
    • v.10B no.4
    • /
    • pp.419-428
    • /
    • 2003
  • Recently, digital watermarking has been proposed as a viable solution to the need of copyright protection and authentication of multimedia data. A robust wavelet-based watermark casting scheme and a watermark retrieval technique are suggested in this paper. We present a method which can add the watermark to the significant coefficients in the DWT domain, and does not require the original image in the detection process. In adaptive watermark casting method is developed to select perceptually significant coefficients for each subband using multiple threshold. In the proposed method, an adaptive multiple threshold scheme is used to reflect characteristics of each subband and complexity of image. The watermark is adaptively weighted in different subbands to achieve robustness as well as high perceptual quality. The watermark, Gaussian random sequence is added to the large coefficients but not in the lowest subband in the DWT domain. Experimental results show that the proposed algorithm produced visually very good watermarked image which has good invisibility to human eyes and very robust against various image processing and compression attacks.

A Study on the Aquisition and Use of Videorecordings in Digital Age - concerning for the public libraries in Pusan - (디지털 시대의 비디오자료 수집과 이용에 관한 연구 -부산지역 공공도서관을 중심으로-)

  • Kim Young-Kyu
    • Journal of Korean Library and Information Science Society
    • /
    • v.30 no.2
    • /
    • pp.199-233
    • /
    • 1999
  • The purpose of this study is to activate the videorecordings in public libraries. The method of activation is to analysis of data which collected through questionnaire from respondent libraries. The results of the study are as follows : 1. The budget of videorecordings is absolutely short. 2 The acquisition policy of videorecordings is not planned because of short budget and little standard selection tool. 3. Most of public libraries wanted to exchange and use of videorecordings through interlibrary loan. 4. The subject of collected videorecordings was almost oriented to the education and motion pictures. 5. Specialized collection policy of public libraries in Pusan is not considered in videorecordings selection. 6. 87 percent of public libraries are not circulate videorecordings to the end-user. 7. Group watching planning of videorecordings in public libraries was done by monthly. 8. 70 percent of public libraries was not perform user reaction survey after watching. 9. 13 percent of public libraries has done the video tape recording of TV programming. 10. Most of public libraries had not a video to introduce themselves and user also had not a plan to create a video. 11. Most of public libraries recognized the copyright law but they wanted to reproduct the videorecordings for user with permission of authors.

  • PDF

A Case Study on HathiTrust as a Sustainable Cooperative Model of Digital Repositories (디지털 리포지터리의 지속가능한 협력 모델로서 하티트러스트 사례 연구)

  • Lee, You-Kyoung;Sung, Yunah;Jung, Young-Mi
    • Journal of Korean Library and Information Science Society
    • /
    • v.47 no.4
    • /
    • pp.443-464
    • /
    • 2016
  • A great number of institutions around the world have been building digital repositories to communicate scholarly information. Meanwhile, digital repositories have been struggling with how to preserve increased volume of digital contents for the long term and how to build a sustainable information environment. The HathiTrust partnership was established to meet the need of a sustainable collaborative model of digital repositories in research libraries, mainly in North America, and has been expanded globally by signing with other libraries around the world. This paper is dealt with the establishment, operation and policy, construction status, and user service of the HathiTrust. The results presented in this paper include the benefits and potential opportunities of the HathiTrust as a participating member. Partnership in HathiTrust would allow each member institution to provide more cost-effective operations, shared management and long-term preservation of digital content, ease of copyright management, and increased accessibility. In the future it is expected to provide a shared storage of printed materials and to facilitate a big data research center.

Wavelet based data Watermarking (웨이브릿 기반의 데이터 워터마킹)

  • 김동현
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.6
    • /
    • pp.1224-1228
    • /
    • 2003
  • The use of digital imaging technique and digital contents based on internet has grown rapidly for last several years, and the needs of digital image protection become more important. For the purpose of copyright protection on digital image, the verification of authentication techniques like content authentication, ownership authentication, illegal copy and etc are needs. Digital watermarking, the invisible encryption technique to insert digital watermarking into image, the sophisticated perceptual information should be used for providing transparency and robustness of images on watermarking process. In this paper, we implement the algorithm for preventing forged attack. ownership protection and authentication by transforming the wavelet algorithms in frequency domain in terms of human visual system.

Analysis of Teachers' Needs for the Active Use of Educational Information Sharing System (교육정보공유체제 이용 활성화를 위한 교사의 요구 분석)

  • Cho, Jin-Suk;Oh, Mi-Ja;Kim, Mi-Ryang
    • The Journal of Korean Association of Computer Education
    • /
    • v.16 no.1
    • /
    • pp.97-110
    • /
    • 2013
  • The purpose of this study is to analyze the needs of teachers as main users to make suggestions for active use of educational information sharing system. The study sets three research tasks about the problems of the current system, improvements, and desired content from the perspective of teachers. To collect specific opinions, we conducted an open questionnaire survey and made a qualitative analysis using the NVivo 10 program. The present system has such problems as functional issues, lack of data reliability, systemic problems for sharing and use. We suggest that in order to enhance Web site services, authoring tools for editing contents and new search engines with customized search function need to be provided. In addition, the open market service system has to be established, so that teachers can actively create, share, and distribute to meet the various needs of teachers. Finally, to promote free access to the system, copyright issues need to be resolved to prevent the potential digital piracy.

  • PDF