• Title/Summary/Keyword: contents protection

Search Result 1,062, Processing Time 0.036 seconds

Educational Needs Analysis of General Security Jobs in Physical Protection Field using the DACUM Technique (DACUM기법을 활용한 물리적방호 분야 일반보안 직무의 교육 요구분석)

  • Lee, Jin Gu;Jung, Il Chan;Park, Min Ju
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.5
    • /
    • pp.234-246
    • /
    • 2021
  • The purpose of this study is to develop the main subjects of the job-based curriculum by deriving the job analysis results of general security job workers in the physical protection field responsible for responding to threats to nuclear materials and nuclear facilities. In the job analysis stage, FGI was conducted on 7 content experts to derive 8 duties and 55 tasks. In addition, knowledge and skills were drawn for each task. In the analysis of educational needs, surveys were conducted for workers in general security jobs to derive the top 25 educational priorities through t-test and Borich needs assess model. At the stage of selecting core tasks and organizing required/optional contents, 42 tasks, both above average or at least one of them, were derived as core tasks based on the result of evaluation of importance and difficulty ratings of 55 tasks through a questionaire. In addition, tasks applied to the top 25 rankings derived from Borich needs assess model were applied as the required contents when designing courses, and tasks which applied only one of them were selected as optional contents. At the stage of required/optional modules and educational contents, four required modules and five optional modules were derived by drifting similar tasks between the required and optional contents. Based on the above results, the study suggested academic and practical implications and future suggestions.

Active Video Watermarking Technique for Infectious Information Hiding System (전염성 정보은닉 시스템을 위한 능동형 비디오 워터마킹 기법)

  • Jang, Bong-Joo;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.8
    • /
    • pp.1017-1030
    • /
    • 2012
  • Most watermarking schemes for video contents protection have been studied to increase watermark's robustness and invisibility against such compressions and many kinds of signal processing after embedding copyright information to the original contents. This paper proposes an active watermarking that infect watermark to contents in the video decoding process using embedded infectious watermark and control signals from a video encoder side. To achieve this algorithm, we design a kernel based watermarking in video encoder side that is possible to recover the original contents and watermark in watermark detection procedure perfectly. And then, by reversible de-watermarking in video decoder side, we design the active watermark infection method using detected watermark and control signal. This means that our system can provide secure re-distributions of video contents without any quality degration and watermark bit error against transcoding or re-encoding processing. By experimental results, we confirmed that the embedded watermark was infected by video contents and codec perfectly without any declines of compression ratio and video quality.

Serious Game : A Study on Aware of Protection for Rights of Software and Digital Contents (기능성 게임 : 소프트웨어 및 디지털콘텐츠 저작권 보호 인식에 관한 고찰)

  • Yoon, Sun-Jung;Park, Hee-Sook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.8
    • /
    • pp.1950-1956
    • /
    • 2010
  • There are scattered various kinds of software and digital contents around modern peoples. Most of peoples do not realize the importance of the problem related with rights protections of software and digital contents that most of peoples are acting illegal use or illegal copy of software or digital contents without any sense of guilt. In this paper, we carry out a survey targeting IT department majors and non-IT department majors about their aware of rights of software and digital contents and then we suggest a problem from the results of a survey and study a solution for advancing problem of aware of rights. The most effective solution of aware improvement of rights is continuous and repetitive education concerning rights. Also, Reasonable prices that should makes for paying cost of copyrights by users.

A Study on the Countermeasure to Deal with Cyber Terrorism (사이버테러리즘의 대응방안에 관한 연구)

  • Oh Tae-Kon
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.3
    • /
    • pp.93-101
    • /
    • 2005
  • These days, modern society is facing a 'turning point of paradigm' from industrial society to knowledge and information society. It indicates an entry to the high-speed network society centering on knowledge. Specifically, Korea has invested enormously to If Industry and finally other advanced countries are eager to export technologies of our country through benchmarking. However, because of our growth-oriented policy, Korea is not very good at dealing with the dysfunctions of information-centered society, and one of the representative problems is cyber-terrorism. Cyber terrorism which anonymous actors do to the uncertain number of people is one of the new types of terrorism. This study aims at political and legal speculations on cyber terrorism for protection of contents and find its countermeasures.

  • PDF

Design of a Key Transfer System Using SOAP for Multimedia Contents Protection (멀티미디어 콘텐츠 보호를 위한 SOAP을 이용한 키 전송 시스템 설계)

  • Lee, Keun-Wang;Kim, Jeong-Jai
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.1
    • /
    • pp.108-113
    • /
    • 2008
  • A proposed system can decrypt each contents block through a double buffer algorithm which can continually buffer contents by dividing a multimedia contents into some blocks and provides more improved method of encryption than existing system by being not capable of decrypting the whole multimedia contents if one key is exposed. Also, using digital signature and public encryption algorithm for mutual authentication between systems, this paper proposes the system which sends and encrypts symmetric keys for contents encryption through SOAP messages.

Secure Contents Distribution Scheme Using Steganographic Technique and Its Applications (심층암호 기술을 이용한 안전한 콘텐츠 유통과 응용)

  • 이형우;한군희;전병민
    • The Journal of the Korea Contents Association
    • /
    • v.1 no.1
    • /
    • pp.83-92
    • /
    • 2001
  • In this study, we combine information hiding technique with digital contents protection scheme. For providing secure distribution on digital contents, a new paradigm can be proposed after considering both watermarking and fingerprinting techniques. In detail, publicly verifiable digital signature schemes are applied into digital contents. On signing digital copyrights, we can publicly verify its correctness if needed.

  • PDF

A Study on the Trend of Digital Watermarking Technology (Digital Watermarking 기술동향에 관한 연구)

  • Kang Min-Shik
    • Journal of Digital Contents Society
    • /
    • v.6 no.2
    • /
    • pp.95-99
    • /
    • 2005
  • Recently it is important to protect the digital contents copyright because the multimedia industry is growing rapidly and the network technology is highly developed. Current digital content protection methods have disadvantage that there is very hardly accessible to the digital contents and also it has a limit that it cannot protect the contents once the encrypted contents decrypt. In order to solve this problem, digital watermarking technology has been introduced. This study presents the trend of digital watermarking technology, especially standardization and the trend of digital watermarking algorithms.

  • PDF

A Study on Students' Recognition and Practice of Patient's Medical Information Protection, who are majoring in Medical Records (의무기록 전공학생들의 환자 의료정보 보호인식과 실천인식에 관한 연구)

  • Jung, Sang-Jin
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.1
    • /
    • pp.585-594
    • /
    • 2016
  • This study is aimed at researching and analyzing the students' recognition and practice of the patents medical information, who are majoring in medical records and will be working as medical records technician, letting them recognize the importance of information, and at offering basic data required for development of medical records curriculum and for establishment of medical records protection policy. This study was conducted from 18th May through 6th June 2015, targeting 340 students enrolled four universities, by t-test, variance analysis, Pearson correlation analysis and multiple regression analysis. As a result of this study, the point of protection recognition and practice recognition is 3.55 and 3.49, respectively, out of 5. With regard to recognition of medical information protection, there was a significant difference in grade, satisfaction for major, experience of medical information protection education and recognition of law, while for recognition of practice, in grade, satisfaction for major, educational experience and damage of medical information exposure. Recognition of protection and recognition of practice had a significant static correlation, and recognition of information exposure, recognition of social issue and recognition of legal system had significant positive effect on recognition of practice. In order to raise the recognition of protection and recognition of practice, based on this study, it is considered necessary for the universities to educate the damage of medical information exposure and importance of medical records management, and to raise the students' recognition.

The Study to Interchangeable DRM in IPTV Environment (IPTV 환경에서의 교환 가능한 DRM 적용 방안 연구)

  • Jung, Bynung-Ok;Seo, Sang-Ho;Oh, Sung-Heun
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.3
    • /
    • pp.504-509
    • /
    • 2012
  • Multiple CAS (Conditional Access System) could be safely downloaded and implemented in IPTV environment. Domestic standard of iCAS (Interchangeable CAS) which is providing device compatibility and mobility, can only defines CAS replacement for protecting Real-Time Streaming broadcast. CAS, however has limitations in IPTV's two-way communication environment where it needs to fulfill contents protection requirements of various broadcasting service. In order to supplement the limit of CAS, DRM protection technology should be required. Contents for real time broadcasting service or real time VOD service could be protected by CAS technology whereas services such as PVR, download VOD service or downloaded contents sharing could be protected by DRM technology. Therefore, a flexible IPTV device service environment could be constructed by mutual protection of CAS and DRM. This essay is going to research on the method of applying DRM based on iCAS standard, as well as proposing a system configuration applied with iCAS/DRM in commercialization.

A Natural Scene Statistics Based Publication Classification Algorithm Using Support Vector Machine (서포트 벡터 머신을 이용한 자연 연상 통계 기반 저작물 식별 알고리즘)

  • Song, Hyewon;Kim, Doyoung;Lee, Sanghoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.5
    • /
    • pp.959-966
    • /
    • 2017
  • Currently, the market of digital contents such as e-books, cartoons and webtoons is growing up, but the copyrights infringement are serious issue due to their distribution through illegal ways. However, the technologies for copyright protection are not developed enough. Therefore, in this paper, we propose the NSS-based publication classification method for copyright protection. Using histogram calculated by NSS, we propose classification method for digital contents using SVM. The proposed algorithm will be useful for copyright protection because it lets us distinguish illegal distributed digital contents more easily.