• Title/Summary/Keyword: Data Copyright

Search Result 263, Processing Time 0.029 seconds

SCORM based Reusability Strategy on Moving Picture Contents (SCORM 기반 동영상 콘텐츠의 재사용 전략)

  • Jang, Jae-Kyung;Kim, Sun-Hya;Kim, Ho-Sung
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.1
    • /
    • pp.203-211
    • /
    • 2008
  • Due to the advent of presumer and digital production of moving picture, a lot of UCC has been generated by editing the previous moving pictures in various way. It causes a lot of problems on copyright, duplication, and content. In reorganizing the contents, it is necessary to increase productivity and reusability by managing production pipeline systematically through the standardization of moving picture content. For this purpose, we try to develop the moving picture content management system that can manage all kinds of information on the production pipeline, based on SCORM of e-learning by considering production, publication and re-editing. Using the meta-data of content object, user and producer can easily search and reuse the contents. Hence, they can choose the contents object according to their preference and reproduce their own creative UCC by reorganizing and packaging the selected objects. The management of copyright by the unit of scene would solve the problem of copyright. The sequencing technique of SCORM as an interactive storytelling method makes it possible to produce individual contents by user's preference.

The Study of Similarity Measure on O-Line Game Software (온라인 게임 소프트웨어 복제도 산출기법에 관한 연구)

  • Kim, Jin-Yong;Kim, Jin-Uk
    • Journal of Korea Game Society
    • /
    • v.4 no.1
    • /
    • pp.50-57
    • /
    • 2004
  • The copyright against the game which is successful to a performance, is increasing rapidly. The compute r game is sensitive to a popularity. Game from the hazard which it develops short time, the expense which is cheap, about lower the dispute with a copyright, a reproduction and the ticket paragraph increases with the insufficient back of technical power. It analyzes the quality of the tools comparison it will be able to analyze the source codes from the dissertation which it sees. It analyzed the game source code and against the method which produces the original program and the reproduction degree of reproduction program for it researched. The method which produces a reproduction degree game feature following function shares a module especially. After from each module separating a file in file structure, source pro gram and data structure form, it calculates a similarity measure. It followed in important degree of each function and weight it let and the fixed quantity reproduction degree of full game program it produced.

  • PDF

Reversible Watermarking For Relational Databases using DE (Difference Expansion) Algorithm (DE 알고리즘을 사용한 관계형 데이터베이스를 위한 가역 워터마킹)

  • Kim, Cheonshik
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.3
    • /
    • pp.7-13
    • /
    • 2015
  • Generally, watermarking can be used copyright for contents such as audios, videos, images, and texts. With the development of Internet, many malicious attackers illegally copy relational databases synchronized applications Therefore, it is needed for the protection of databases copyright, because databases involve various sensitive information such as personal information, information industry, and secret national intelligence. Thus, the protection of relational databases is a major research field in the databases research topics. In this paper, we will review previous researches related the protection of relational databases and propose new method for relational data. Especially, we propose watermarking scheme for databases using reversible method in this paper. As an experimental result, the proposed scheme is very strong to malicious attacks. In addition, we proved our proposed scheme is to apply real application.

IPMP information editing system of MPEG-4 authorizing tool base for digital contents management and protection (디지털 콘텐츠 보호 및 관리를 위한 MPEG-4 저작도구 기반의 IPMP 정보 편집 시스템)

  • 박철민;최종근;김광용;홍진우;정회경
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.225-228
    • /
    • 2004
  • Digital contents is used already in near place with us. Contents of MPEG-4 standard is used to process multimedia data in field of communication, computer, broadcasting mobile etc. However, absence of copyright management and protection system and interoperability problem of right system between each corporation happened. Because MPEG establish IPMP(Intellectual Property Management and Protection) system standard in agreement with MPEG-4 system standard, proposed cooperation method to manage and protect copyright. Accordingly, in this paper, put in copyright of authorized contents management and protection extension system implementation adding MPEG-4 IPMP system like plug-in into existing MPEG-4 authorizing tool. Therefore, author edits IPMP information to protect contents or object, and process the information in system and authorize MPEG-4 digital contents that have management and protection sign according to IPMP standard. This system designed and implemented to divided into IPMP information save processor, IPMP information creation processor, media IPPM processor, XMT-A to MP4 converter IPMP extension.

  • PDF

An Analysis on the Results of the Operation for Library Remuneration System (도서관보상금제도의 운영성과에 대한 분석)

  • Joung, Kyoung Hee
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.49 no.4
    • /
    • pp.265-288
    • /
    • 2015
  • This study analyzed the contracts for library remuneration, amount of the remuneration, average amount of the remuneration in relation to kinds of libraries, distribution of the remuneration, and types and publication year of the works to be collected remuneration based on the data during 2004~2014 from the KORRA. As results, current library remuneration system has limitations for libraries to digitize and transmit to the public their collections, Also, there are some limitations to the protection for copyright holders because the amount of the remuneration collected from libraries has declined and non distribution remuneration has been so high. This study suggested that the library remuneration system needs to be revised considering the scope of library materials to be digitized and predicted frequency of use. Also, the better practical solution to protect copyright holders is not a raise of the library remuneration but the efficient use of the non distribution remuneration.

The Blockchain based Undeniable Multi-Signature Scheme for Protection of Multiple Authorship on Wisdom Contents (지혜콘텐츠 공동저작권 보호에 적합한 블록체인 기반 부인봉쇄 다중서명 기법)

  • Yun, Sunghyun
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.2
    • /
    • pp.7-12
    • /
    • 2021
  • Wisdom Contents are created with experiences and ideas of multiple authors, and consumed in Internet based Social Network Services that are not subjected to regional restrictions. Existing copyright management systems are designed for the protection of professional authors' rights, and effective in domestic area. On the contrary, the blockchain protocol is subjected to the service and the block is added by the consensus of participating nodes. If the data is stored to the blockchain, it cannot be modified or deleted. In this paper, we propose the blockchain based undeniable multi-signature scheme for the protection of multiple authorship on Wizdom Contents. The proposed scheme is consisted of co-authors' common public key generation, multi-signature generation and verification protocols. In the undeniable signature scheme, the signature cannot be verified without help of the signer. The proposed scheme is best suited to the contents purchase protocol. All co-authors cannot deny the fairness of the automated profit distribution through the verification of multiple authorship on Wizdom Contents.

Geometric Multiple Watermarking Scheme for Mobile 3D Content Based on Anonymous Buyer-Seller Watermarking Protocol (익명 Buyer-Seller 워터마킹 프로토콜 기반 모바일 3D 콘텐츠의 기하학적 다중 워터마킹 기법)

  • Lee, Suk-Hwan;Kwon, Seong-Geun;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.2
    • /
    • pp.244-256
    • /
    • 2009
  • This paper presents multiple watermarking method for the copyright protection and the prevention of illegal copying of mobile 3D contents. The proposed method embeds an unique watermark and a WCA watermark into the spatial and encryption domains of mobile 3D content based on anonymous Buyer-Seller watermarking protocol. The seller generates an unique watermark and embeds it into the distribution of vertex data of 3D content object. After receiving the encrypted watermark from WCA, the seller embeds it into the encrypted vertex data by using operator that satisfies the privacy homo morphic property. The proposed method was implemented using a mobile content tool, Power VR MBX and experimental results verified that the proposed method was capable of copyright protection and preventing illegal copying, as the watermarks were also accurately extracted in the case of geometrical attacks, such as noise addition, data accuracy variation, and data up/down scaling.

  • PDF

$\alpha$ Scaling Parameter Optimization On Watermarking Using Autostereogram (오토스테레오그램을 이용한 워터마킹에서 $\alpha$스켈링 파라미터 최적화)

  • 허덕규;이인정;김성옥
    • Journal of Internet Computing and Services
    • /
    • v.2 no.4
    • /
    • pp.101-109
    • /
    • 2001
  • In recent year, the use of digital picture information and general picture information has been increased, However, numerous copyright infringement and pirate copy of picture information through Internet and CD-ROM happen very often, As a result, several methods of watermarking have been presented to solve and verify distortion of the original data, In addition, watermark data have been suggested to resolve the vastness of the original data, Watermarking methods are often used to protect the right of ownership of a copyright, However, these Watermarking methods have brought the obscurity of recognition caused by the complexity of verification procedure and the increase of magnitude computation occurrence, This paper mainly mentions about the local optimization of scaling parameter, the maximization of hiding of Watermark information and maximization of watermark information in case of restoration that determine the amount of inserted information which is used for preventing distortion and transformation of the original data caused by insertion and hiding of Watermark information on compounding Autostereogram into JPEG picture information.

  • PDF

The collection and preservation of national literature (국가문헌의 수집과 보존)

  • 김남석
    • Journal of Korean Library and Information Science Society
    • /
    • v.15
    • /
    • pp.79-111
    • /
    • 1988
  • The purpose of this study has its meaning to indicate the direction on collection and preservation of national literature which is one of the must important functions of the Central National Library. The Central National Library is, however, a representative library of our country and collect every kind of literature and to meet the requests of its users, the present situation of The Central National Library can't be performed sufficiently on these actions. According to studies of this paper, it have suggested the following five methods as a method of collecting national literature. First, the method by registering copyright endowing the number of copyright like ISBN. Second, the method a n.0, pplied by revising and su n.0, pplementing present legal deposit system. Thirdly, the method that the central one institution secure national budget collect literature of nation i.e., central intensive collection one. Fouthly , method of collecting literature by partial charge through local library networks. Fifthly, method by subject intensive collecting. As the preserving method of national literature, this research has indicated the following two ways. First, to keep the literatures forever, the method of The Central National Library keeps records as a limited volume. Second, The method of dispersing records as the local libraries. To put these methods into practice, it must be preceded that not only national helps, budget secures are needed but special committee must be organized to keep and preserve national literatures and material range also be extended and bibliographies for information data issuing must be worked out.

  • PDF

A Study on Analysis of Source Code for Program Protection in ICT Environment (ICT 환경에서 프로그램보호를 위한 소스코드 분석 사례 연구)

  • Lee, Seong-Hoon;Lee, Dong-Woo
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.4
    • /
    • pp.69-74
    • /
    • 2017
  • ICT(Information Communication Technology) is a key word in our society on today. Various support programs by the government have given many quantitative and qualitative changes to the software industries. Software is instructions(Computer Program) and data structure. Software can be divided into Application program and System program. Application programs have been developed to perform special functions or provide entertainment functions. Because of this rapid growth of software industries, one of the problems is issue on copyright of program. In this paper, we described an analysis method for program similarity based on source code in program.