• Title/Summary/Keyword: Digital Copying

Search Result 58, Processing Time 0.021 seconds

The Issues of Digital Copying and Application of Fair Use in the Network Environment (네트워크 환경에서의 디지털복제와 공정사용 법리 적용의 문제점)

  • Hong Jae-Hyun
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.31 no.4
    • /
    • pp.139-164
    • /
    • 1997
  • The digital copying and digital transmission are rapidily Increasing with the innovation of information technology and the development of networking technology. But It Is Inevitable to limit copyright for the public benefit and cultural development In the digital environment in like manner with the analog environment. First, this study examinated the international trends and legulations relating to the copyright limitations In the U.S. and Japan for the fair use. Second, it dealed with the problems of the digital copying relating to the temporary storage In RAM and screen display that are recently becoming international issues. Third, it concretely explored and analyzed the problems according to the application of the fall use of the private copying, the library copying, and the copying for the purpose of school education in the network environment. In conclusion, to solve these problems that Is occurred from legulations In the analog environment Is needed the revision of the existing copyright law in Korea. Finally, this study suggested 'the copyright collecive management system' and 'the private copying levy system' as the systemic devices to control the digital private copying.

  • PDF

A Novel Audio Watermarking Algorithm for Copyright Protection of Digital Audio

  • Seok, Jong-Won;Hong, Jin-Woo;Kim, Jin-Woong
    • ETRI Journal
    • /
    • v.24 no.3
    • /
    • pp.181-189
    • /
    • 2002
  • Digital watermark technology is now drawing attention as a new method of protecting digital content from unauthorized copying. This paper presents a novel audio watermarking algorithm to protect against unauthorized copying of digital audio. The proposed watermarking scheme includes a psychoacoustic model of MPEG audio coding to ensure that the watermarking does not affect the quality of the original sound. After embedding the watermark, our scheme extracts copyright information without access to the original signal by using a whitening procedure for linear prediction filtering before correlation. Experimental results show that our watermarking scheme is robust against common signal processing attacks and it introduces no audible distortion after watermark insertion.

  • PDF

DRM System using GStreamer based on DMP (GStreamer를 이용한 DMP기반의 DRM시스템)

  • Park, Ki-Chul;Lee, Joo-Young;Ahn, Sang-Woo;Nam, Je-Ho;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.3
    • /
    • pp.445-451
    • /
    • 2008
  • Due to illegal copying and distribution via the internet, the digital media that have been introduced create certain intellectual property issues. Because of this, several intellectual property groups have been created to create and maintain Digital Rights Management systems (DRM), in order to crack down on illegal and unauthorized copying. However, these systems are often created by many different companies, which leads to problems of interoperability. In this paper, we designed and implemented a DRM system with streamer, following the DMP.

Design and Implementation of Digital Jikin using Smartphone Application

  • Hong, Daewon;Kang, Miju;Chun, Junchul
    • Journal of Internet Computing and Services
    • /
    • v.18 no.5
    • /
    • pp.87-94
    • /
    • 2017
  • Due to the recent advances of IT industry, many companies and institutions have been used electronic documents rather than original paper copies. However, the characteristic of electronic document allows it to be readily damaged from proscribed copying, counterfeit, and falsification. These can cause the serious security problems for electronic documents. Conventional security methods for digital documents involve adding a separated image or marker, but these methods can reduce the readability of document. Therefore, we proposed a digital Jikin (Korean traditional stamp) which is normally used to identify the source or author of a document in asia. The proposed digital Jikin can preserve the readability of electronic document while protecting the document from proscribed copying, counterfeit, or falsification using image processing approach. In this paper, a digital Jikin application is designed and implemented under android platform and it converts the critical information of document onto the digital Jikin. The proposed digital Jikin contains important information in the boundary of Jikin not only about the author of documents or source, but also keywords, number of images, and many more. Therefore, the authenticity of document or whether the document has been altered or not by other person can be evaluated by the server. The proposed digital Jikin can be sent to a server through the wireless networks and can be stored using PHP and MySQL. We believe that the proposed method can offer the better and simple solution for strengthening the security of electronic document.

Content-based Video Retrieval for Illegal Copying Contents Detection using Hashing (Hashing을 이용한 불법 복제 콘텐츠 검출을 위한 내용 기반 영상 검색)

  • Son, Heusu;Byun, Sung-Woo;Lee, Soek-Pil
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.67 no.10
    • /
    • pp.1358-1363
    • /
    • 2018
  • As the usage of the Internet grows and digital media become more diversified, it has become much easier for digital contents to be distributed and shared. This makes easier to access the desired digital contents. On the other hand, there is an increasing need to protect the copyright of digital works. There are some prevalent ways to protect ownership, but they accompany several disadvantages. Among those ways, watermarking methods have the advantage of ensuring invisibility, but they also have a disadvantage that they are vulnerable to external attacks such as a noise and signal processing. In this paper, we propose the detecting method of illegal contents that is robust against external attacks to protect digital works. We extract HSV and LBP features from images and use Euclidian-based hashing techniques to shorten the searching time on high-dimensional and near-duplicate videos. According to the results, the proposed method showed higher detection rates than that of the Watermarking techniques in terms of the images with fabrications or deformations.

A Study on the Extended Fair Use of Copyrighted Digital Contents (디지털 콘텐츠 저작물의 공정이용 확대에 대한 연구)

  • Kim, Seong-Mook
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.2
    • /
    • pp.217-222
    • /
    • 2020
  • The concept and discussion of copyright should reflect changes in using environments of digital properties and developments of technology. Further discussions are required about protection, transfer and usage of copyright for user created contents or digital activities. Digital archives should clarify the ranges of permitted usage or guides to quotation. One should not be biased toward regulating digital copying, but consider the value of diverse transformation of digital properties. This will trigger tension between private and public usage, or sharing of digital fabrications, which leads to the necessity of discussions on policy level. The interpretation of copyright is limited to protecting the copyright owner's right, but it should be suggested to widen the range to permitting fair use. The extended fair use of digital contents and by clarifying specific rules will activate creation and distribution of digital contents and contribute to more productive usage of innovation.

Rethinking the Right to Culture in the Digital Age The Issues of Copying Culture and Content Curation (디지털 시대 문화 권리의 제고 복제문화와 콘텐츠 큐레이션의 쟁점)

  • Lee, Kwang-Suk
    • Korean journal of communication and information
    • /
    • v.74
    • /
    • pp.197-224
    • /
    • 2015
  • This paper critically investigates the cultural phenomenon surrounding the news mobile phone app in which 'curation', relying on the news editing and adaption, has become much more significant than making the news directly. This study affirms the fact that a copying culture which is basically a combinative effect of duplication (alias) and imitation(mimesis) enables us enrich the human beings' creative activities. However, we need to warn the regressive aspects of copying culture challenging the journalistic principles. This study exemplifies a case of Pikicast, which has become the most rapid growing news content mobile app in Korea. By doing a case study, this paper suggests that 'social gift' should be given to the online users as a whole. The communal and social gift would be an alternative way to the unpaid crawling of the news resources from the digital commons by the news content curating corporation such as Pikicast.

  • PDF

A Study on Integrity Verification and Tamper Detection of Digital Image (디지털 영상의 무결성 검증과 변형 검출에 관한 연구)

  • Woo, Chan-Il;Goo, Eun-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.10
    • /
    • pp.203-208
    • /
    • 2019
  • Digital watermarking was developed to protect copyright by discouraging the illegal copying of digital content. On the other hand, recently, watermarking has also been used to verify the integrity of digital content, such as medical images, and detect illegal manipulation or distortion locations. Watermarking should be tenacious so as to protect copyright from illegal copying and should remain firm to the content through a range of attacks, such as distortion or filtering. At the same time, however, it should be removed easily even in a slight transformation of the material to verify the integrity. Therefore, this paper proposes a watermarking technique that easily checks and verifies the deformation or manipulation of digital images. In the proposed method, the entire image was examined in $16{\times}16$ blocks to check for deformation of the image. When deformation was detected, further inspection proceeded in $4{\times}4$ blocks and the location where deformation occurred was identified.

DIGITAL WATERMARK REPRODUCTION IMAGE ATTESTATION THAT USES PHASE ONLY CORRELATION METHOD

  • Inaba, Fumiya;Tanaka, Ken-Ichi
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2009.01a
    • /
    • pp.508-511
    • /
    • 2009
  • The infringement of the copyright is a problem by the distribution of digital contents copied illegally. The digital watermark is expected as a thing preventing unjust copying by burying information in digital data such as image, animation, the sound, TV, radio and movies. [1] [2]But a noise is included in a digital watermark reproduction image. So there is the case that the certification of the reproduction image has difficulty with. If a computer cannot recognize the information reproduced from digital watermarking, the information does not have a meaning. This paper aimed at improvement of the proof of a digital-watermarking reproduction image. And it is verified whether the difference of the form of a character affects the degree of correlation.

  • PDF

DRM System using Gstreamer based on DMP (DMP 기반의 Gstreamer를 이용한 DRM시스템)

  • Park, Ki-Chul;Lee, Joo-Young;Ahn, Sang-Woo;Nam, Je-Ho;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.611-614
    • /
    • 2007
  • Due to illegal copying and distribution via the internet, the digital media that have been introduced create certain intellectual property issues. Because of this, several intellectual property groups have been created to create and maintain Digital Rights Management systems (DRM), in order to crack down on illegal and unauthorized copying. However, these systems are often created by many different companies, which leads to problems of interoperability. Despite attempts to regulate DRM systems, including the MPEG group's Intellectual Property Management and Protection" system, the system is still struggling to maintain some sort of interoperability between differing protocols. In this paper, we designed and implemented a DRM system with Gstreamer, following the DMP.

  • PDF