• Title/Summary/Keyword: contents protection

Search Result 1,061, Processing Time 0.034 seconds

Video Copyright Protection through Watermarking of Wavelet Transform based on the Frequency (주파수기반 웨이브릿 변환의 워터마킹을 통한 동영상 저작권 보호에 관한 연구)

  • Han, Mi-Ja;Kim, Dan-Hwan;Jung, Chang-Ryul;Jeong, Byeong-Yeol;Lee, Sung-Keun;Koh, Jin-Kwang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.535-539
    • /
    • 2008
  • With the advancement which development and information communication of the computer is quick about lower with multimedia technical diffusion of network base the necessity the use of the digital image technique which is various regarding the protection of sharp increasing multimedia contents raised its head in the social whole. The copyright protection against a multimedia data hazard the authentication techniques it will be able to confirm the content authentication, ownership authentication, illegal copy of the image which stands is demanded. confronts to the water marking technique of existing and the researches the fact that against a picture is most. In this paper, It does not damage the video data. As inserts copyright information and it protects the copyright. It is with a copyright protection which leads the wavelet transform which is a watermark of frequency base from visual system viewpoint in the human being center with it proposes the watermarking technique against a forgery prevention.

  • PDF

Contents and Its Implications of U.S. Consumer Financial Protection Bureau (CFPB)'s 2015 「Arbitration Studies: Report to Congress」 (미국 소비자금융보호위원회(CFPB)의 2015년 「중재연구 의회보고서」의 내용과 시사점)

  • AHN, Keon-Hyung
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.77
    • /
    • pp.69-89
    • /
    • 2018
  • The United States of America is one of the most favoring countries in which mandatory pre-arbitration clauses in the form of adhesion contract have been widely recognized and supported by courts and the Federal Arbitration Act. However, after the financial crisis in 2008 and the National Arbitration Forum scandal in 2009, in enacting the Dodd-Frank Wall Street Reform and Consumer Protection Act ('Dodd-Frank Act'), Section 1028(a) of the Act requires the newly created Consumer Financial Protection Bureau (CFPB) to provide Congress with a report on "the use of agreements providing for arbitration of any future dispute between covered persons and consumers". Section 1028(b) also grants the CFPB the authority to "prohibit or impose conditions or limitations on the use of an agreement between a covered person and a consumer for a consumer financial product or service providing for arbitration of any future dispute between the parties, if the Bureau finds that such a prohibition or imposition of conditions or limitations is in the public interest and for the protection of consumers." Pursuant to the Dodd-Frank Act, the CFPB issued a report entitled "2015 Arbitration Study: Report to Congress 2015 (Report)" in March 2015. This paper examines some major legal issues of the Report and makes a few recommendations for Korean financial institutions which entered into the U.S. financial market or has a plan to do so in the near future.

  • PDF

A Study on the Jamming Simulator Design for the Test & Evaluation of Broadband Radar's Electronic Protection Techniques (광대역 레이더의 전자보호기법 시험평가를 위한 재밍시뮬레이터 설계 연구)

  • Lee, Sung-Ho;Jung, Hoi-In
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.6A
    • /
    • pp.611-621
    • /
    • 2010
  • When an enemy platforms transmit electronic jamming or tracking interference signal to a friendly ship's radar, the radar have to avoid the jamming and to track targets continually without losing the targets with the electronic protection techniques. Electronic protection is an essential key for a platform to survive in electronic warfare, for this purpose, jamming simulator was developed to provide electronic warfare environments for the test and evaluate the effectiveness of radar's electronic protection techniques. Jamming simulator has ability to generate a variety of deception and noise jamming signals using the DRFM which minimize phase distortions of 1GHz broadband radar signal with the phase sampling method. This paper presents the design contents of the jamming simulator to process the analysis of broadband radar signal and generate jamming signal, also proposes the algorithms of the deception and noise jamming and verifies the effectiveness of the simulator by field trial.

Analysis on Domestic and Foreign Privacy Information Acts to Suggest Directions for Developing Korean Privacy Information Protection Act (국내 개인정보보호법의 발전방향 제시를 위한 국외 개인정보보호법 분석)

  • You, Han-Na;Kim, Hyung-Joo;Lee, Jae-Sik;Park, Tae-Sung;Jun, Moon-Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1091-1102
    • /
    • 2012
  • With a recent rapid increase in infringement on privacy information, a need to protect privacy information is called for more than ever. Keeping pace with such concern and demands of the times, Korea has established and executed "Privacy Information Protection Act" on September 30th, 2011. This regulation was enacted from an individually regulated method to a basic regulation that includes public and private institutions. Also, the regulation includes diverse contents for the sake of protecting privacy information by expanding a range of protection subjects and limiting the process of uniquely identifiable information. In this context, the study has suggested a direction for development on Korea's Privacy information Protection Act by taking a look at the status on privacy information protection acts from home and foreign nations and conducting a comparative analysis between domestic and foreign acts.

Analysis of the effects of digital privacy security awareness and digital civic engagement on digital privacy protection behavior : focusing on volition and horizontality (디지털 개인 보안 인식과 디지털 시민 참여의식이 디지털 개인 정보보호 행동에 미치는 영향 분석: 자의성과 수평성을 중심으로)

  • Lee, Ryo-whoa;Hu, Sung-ho
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.4
    • /
    • pp.349-358
    • /
    • 2022
  • The aim of this study to analyze the effect of person and situation on digital privacy protection behaviors. The research method design is a factorial design of volition and horizontality. The measurement variables used in the investigation are digital privacy security awareness, digital civic engagement, and digital privacy protection behavior. As a result, the volition had a significant effect on digital privacy protection behavior, and it was found that influence of the high-volition-based condition was greater than the low-volition-based condition. The horizontality had a significant effect on digital privacy security awareness, digital civic engagement, and it was found that influence of the high-horizontality-based condition was greater than the low-horizontality-based condition. In addition, the discussion explains the suitable contents of information security usability based on these research results.

Protection of Bleached Hair with Maruka Extract-added Hair Treatment (마누카 추출물 첨가 헤어트리트먼트의 탈색모발 보호효과)

  • Kim, Jo-An;Lee, Jae-Nam
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.3
    • /
    • pp.236-243
    • /
    • 2022
  • This study attempted to find the optimum amount of manuka extract ingredient with hair treatments in different manuka extract contents and examine its bleached hair protection effects. For this, the tensile strength and moisture level of the damaged hair were measured. In addition, hair conditions were analyzed, using SEM and FE-SEM. In terms of protection of bleached hair, all experimental groups (M1, M2, M3) were more effective than the control group (no manuka extract added) in tensile strength, moisture level, hair thickness and cuticle conditions. In particular, 'M3 (3% manuka extract)' revealed the largest hair protection effects. The above results confirm that Manuka extract-added hair treatments would be useful in protecting damaged hair as well as scalp as a cosmetic material. It is anticipated that there would be further studies on diverse chemical treatments with a much wider variety of samples.

A Study on Streamlining the Legal Framework for the Efficient Management of Protection and Security of the Government Complexes (정부청사의 효율적 방호·보안관리를 위한 법령체계 정비방안에 대한 소고)

  • Shin, Hyeong-Seok
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.39-57
    • /
    • 2019
  • The executive authority of the Ministry of Public Administration and Security on the 'management of security of the government complexes' is not sufficiently secured only with the organization law, the Government Organization Act. It is needed to establish an administrative actions law, an individual law that sets detailed contents and limitations of the executive authority to be stipulated. The current regulation, Regulation on the Management of the Government Complexes which is a Presidential Decree, is a legal decree that lacks a legal basis. The decree does not match with the current constitutional framework and raises the issue of its legality. The regulation may have the characteristics as a public property management law so far as it stipulates such matters as supply and maintenance management for the complexes, acquisition and disposition of complexes, facilities management of complexes, etc. However, the regulation includes high authority actions by an administrative organization, such as facilities security and order maintenance including restriction and control of access. This makes the regulation have the characteristics of a public property policy act as well. To supplement the legal framework for this situation, it is needed to level up some of the provisions relating to protection and security management to the level of an act as they stipulate high authority actions by an administrative organization. Other matters in the Regulation on the Management of the Government Complexes such as provisions relating to supply and allocation of complexes, etc. may be maintained as they are. In addition, the protection officers (general service official) does not own legal authority and have limitations on securing the capability to deal with the situations on implementing the on-site protection duty. Therefore, it is needed for the protection officers to secure protection duty-related authority by stipulating in a law. The main contents of the law on the protection and security of the government complexes may be those matters providing reservations on the implementations of laws. These may include the limitation of rights of and charging obligations on the people such as restricting the actions of personnel in the complex, rights and obligations of protection personnels relating to their duties, use of weapons, training of protection personnel, penal provisions, etc. These legal reservations should be included in an individual act.

A Study on the Introduction of Legal EMP Protection System (고출력 전자기파 방호 제도 도입에 관한 연구)

  • Chung, Yeon-Choon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.24 no.8
    • /
    • pp.781-790
    • /
    • 2013
  • Nowadays, national critical infrastructures have been known to be highly vulnerable to the EMP threats which are internationally growing. But their realistic solutions have been not made by the lack of detailed rules and regulations in current laws, however, which cover most of cyber threats. This paper takes a look at the domestic and overseas trends on the EMP protections, and proposes the revision directives of relevant laws and the contents included into the proposed legislation. Among them, the amendment of the current "Information Infrastructure Protection Act" is considered to be the most effective, including provisions on protected informations, industrial promotions, R&D supports, education, etc. Anyway, this paper is expected to be helpful for introducing an effective legal scheme on the CIP against EMP threats. domestic rule.

Combination of Set Top Box and Asymmetric Cryptosystem for Secure Storage of Digital Broadcasting Contents (디지털 방송 콘텐츠의 안전한 저장을 위한 Set Top Box와 비대칭 암호 시스템의 결합)

  • 이혜주;최형기;홍진우
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.782-786
    • /
    • 2003
  • It requires protection technologies to permit consumer to store a digital broadcasting content and at the same time to protect the intellectual property from illegal action. There is content encryption as one of protection technologies. In this paper, we proposed a protection scheme for digital broadcasting content that broadcasting server. Multiplexes the encryption key into MPEG-2 TS(transport stream) to be able to encrypt received TS at set top box. The proposed method is to modify PMT(program map table) for the information related encryption key and to multiplex key as TS packets. After then the encryption key is extracted from TS stream which is encrypted in set top box.

  • PDF

The Design of License Agent Rights Protection (디지털 저작권 보호를 위한 라이센스 에이전트의 설계)

  • 이광형;이근왕;김희숙
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.275-282
    • /
    • 2004
  • As the logistic environment of digital contents is rapidly changing, the protection of the digital rights for digital content has been recognized as one of critical issues. Digital Right Management(DRM) has taken much interest Internet Service Provider(ISP), authors and publishers of digital content as an interested approach to create a trusted environment for access and use of digital resources. This paper propose an interested digital rights protection scheme using license agent to address problems facing contemporary DRM approached : static digital rights management, and limited application to on-line environment. We introduce a dynamic mission control technology to realize dynamic digital rights management. And we incorporate license agent to on- and off-line monitoring and tracking. The proposed system prevent illegal access and use by using PBD security method real time action monitoring for user, data security for itself.

  • PDF