• Title/Summary/Keyword: contents protection

Search Result 1,062, Processing Time 0.027 seconds

Wavelet based data Watermarking (웨이브릿 기반의 데이터 워터마킹)

  • 김동현
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.6
    • /
    • pp.1224-1228
    • /
    • 2003
  • The use of digital imaging technique and digital contents based on internet has grown rapidly for last several years, and the needs of digital image protection become more important. For the purpose of copyright protection on digital image, the verification of authentication techniques like content authentication, ownership authentication, illegal copy and etc are needs. Digital watermarking, the invisible encryption technique to insert digital watermarking into image, the sophisticated perceptual information should be used for providing transparency and robustness of images on watermarking process. In this paper, we implement the algorithm for preventing forged attack. ownership protection and authentication by transforming the wavelet algorithms in frequency domain in terms of human visual system.

A Survey research on Current Situation and Effectiveness of Performance Information in the Hang-Tag of Functional Outdoor Jacket (기능성 아웃도어 재킷의 행택을 통한 성능정보 제공 현황과 유용성 및 대안연구)

  • Lee, Eun Byol;Bang, Gi seong;Yoo, Shin Jung
    • Fashion & Textile Research Journal
    • /
    • v.16 no.5
    • /
    • pp.800-810
    • /
    • 2014
  • In this study, the current status of product information of functional outdoor jackets in the hang-tags was investigated in perspective of consumer protection. Effectiveness and preferred alternatives to hang-tag information were also investigated. For the market survey, 1560 hang-tags from 676 functional outdoor jackets were investigated. For the effectiveness and preferred alternatives, 472 adults in their 20-60's were surveyed. The average number of hang-tags was 2.3 but 5.9% did not provide any product information. The contents included functional property of fabric; quality guarantee; brand introduction; product characteristics; instructions for care/usage; subsidiary material information, and they were different depending on end-use of jackets. Consumers strongly wanted explanations of the terms used in the hang-tag and could not accurately figure out the functions of the products from hang-tag information regardless of expression methods. The percentage of incorrect answer of 'figure/foreign language' method was extremely high. It is a noticeable feature of graph method that customers perceived that the graph was difficult to understand, but the percentage of correct answers was much higher than other methods, implying that graph method was possibly more useful at delivering accurate information to the customers who pursuit information. Customers strongly agreed to need of alternative methods and preferred an unified performance grade from selected functions based on the end-use of products. Customers also wanted to include the information of performance change after laundering. The results could provide practical insights to the consumers, companies, and the government to prepare proper guideline/policies for consumer protection.

The Design of a Multimedia Data Management and Monitoring System for Digital Rights Protection using License Agent (라이선스 에이전트를 이용한 디지털 저작권 보호를 위한 멀티미디어 데이터 관리 및 감시 시스템의 설계)

  • Park, Jae-Pyo;Lee, Kwang-Hyung;Kim, Won;Jeon, Moon-Seok
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.2
    • /
    • pp.281-292
    • /
    • 2004
  • As the logistic environment of digital contents is rapidly changing, the protection of the digital rights for digital content has been recognized as one of critical Issues. Digital Right Management(DRM) has taken much interest Internet Service Provider(ISP), authors and publishers of digital content as an interested approach to create a trusted environment for access and use of digital resources. This paper propose an interested digital rights protection scheme using license agent to address problems facing contemporary DRM approached : static digital rights management, and limited application to on-line environment. We introduce a dynamic mission control technology to realize dynamic digital rights management. And we incorporate license agent to on- and off-line monitoring and tracking. The proposed system prevent illegal access and use by using PKI security method, real time action monitoring for user, data security for itself.

  • PDF

Effect of Foliar and Root Application of Silicon Against Rice Blast Fungus in MR219 Rice Variety

  • Abed-Ashtiani, Farnaz;Kadir, Jugah-Bin;Selamat, Ahmad-Bin;Hanif, Ahmad Husni Bin-Mohd;Nasehi, Abbas
    • The Plant Pathology Journal
    • /
    • v.28 no.2
    • /
    • pp.164-171
    • /
    • 2012
  • Rice blast disease caused by Magnaporthe grisea (Hebert) Barr [teleomorph] is one of the most devastating diseases in rice plantation areas. Silicon is considered as a useful element for a large variety of plants. Rice variety MR219 was grown in the glasshouse to investigate the function of silicon in conferring resistance against blast. Silica gel was applied to soil while sodium silicate was used as foliar spray at the rates of 0, 60, 120, 180 g/5 kg soil and 0, 1, 2, 3 ml/l respectively. The treatments were arranged in a completely randomized design. Disease severity and silicon content of leaves were compared between the non-amended controls and rice plants receiving the different rates and sources of silicon. Silicon at all rates of application significantly (${\alpha}$ = 0.05) reduced the severity of disease with highest reduction (75%) recorded in treatments receiving 120 g of silica gel. SEM/EDX observations demonstrated a significant difference in weight concentration of silicon in silica cells on the leaf epidermis between silicon treated (25.79%) and non treated plants (7.87%) indicating that Si-fertilization resulted in higher deposition of Si in silica cells in comparison with non-treated plants. Application of silicon also led to a significant increase in Si contents of leaves. Contrast procedures indicated higher efficiency of silica gel in comparison to sodium silicate in almost all parameters assessed. The results suggest that mitigated levels of disease were associated with silicification and fortification of leaf epidermal cells through silicon fertilization.

Robust Audio Watermarking in Frequency Domain for Copyright Protection (저작권 보호를 위한 주파수 영역에서의 강인한 오디오 워터마킹)

  • Dhar, Pranab Kumar;Kim, Jong-Myon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.2
    • /
    • pp.109-117
    • /
    • 2010
  • Digital watermarking has drawn extensive attention for protecting digital contents from unauthorized copying. This paper proposes a new watermarking scheme in frequency domain for copyright protection of digital audio. In our proposed watermarking system, the original audio is segmented into non-overlapping frames. Watermarks are then embedded into the selected prominent peaks in the magnitude spectrum of each frame. Watermarks are extracted by performing the inverse operation of watermark embedding process. Simulation results indicate that the proposed scheme is robust against various kinds of attacks such as noise addition, cropping, resampling, re-quantization, MP3 compression, and low pass filtering. Our proposed watermarking system outperforms Cox's method in terms of imperceptibility, while keeping comparable robustness with the Cox's method. Our proposed system achieves SNR (signal-to-noise ratio) values ranging from 20 dB to 28 dB. This is in contrast to Cox's method which achieves SNR values ranging from only 14 dB to 23 dB.

Proposal for Social Casino Game Policy based on Responsible Game System (책임게임시스템 기반 소셜 카지노 게임 정책 제언)

  • Song, Seung-keun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2039-2044
    • /
    • 2016
  • This study aims to investigate the safety instrument to prepare the policy alternative for social web-board game which will be developed to base on social network in the future although social casino game is not available in Korea now. We reviewed several literature about responsible game system applied to especially U.S. New Jersey, responsible gambling system acted in the being advanced all countries. Game experts built up user protection model as previous work to prepare the law and policy which such a responsible game system will apply for current web-board gaem and future social casino game. As a result, this research revealed that standard of judgement which can identify four kind of addiction danger user group are raised. We expect to help this user protection alternative to provide the law and policy instrument for future social casino game and complement the problem of current web-board enforcement.

Research on technical protection measures through risk analysis of pseudonym information for life-cycle (가명정보 Life-Cycle에 대한 위험 분석을 통한 관리적/기술적 보호조치 방안에 대한 연구)

  • Cha, Gun-Sang
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.53-63
    • /
    • 2020
  • In accordance with the revision of the Data 3 Act, such as the Personal Information Protection Act, it is possible to process pseudonym information without the consent of the information subject for statistical creation, scientific research, and preservation of public records, and unlike personal information, it is legal for personal information leakage notification and personal information destruction There are exceptions. It is necessary to revise the pseudonym information in that the standard for the pseudonym processing differs by country and the identification guidelines and anonymization are identified in the guidelines for non-identification of personal information in Korea. In this paper, we focus on the use of personal information in accordance with the 4th Industrial Revolution, examine the concept of pseudonym information for safe use of newly introduced pseudonym information, and generate / use / provide / destroy domestic and foreign non-identification measures standards and pseudonym information. At this stage, through the review of the main contents of the law or the enforcement ordinance (draft), I would like to make suggestions on future management / technical protection measures.

Relationship among User's Security Need Sufficiency, Customer Satisfaction and Life Satisfaction in Electronic Security System (기계경비시스템 이용자의 안전욕구충족과 이용만족 및 생활만족의 관계)

  • Kim, Chan-Sun
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.7
    • /
    • pp.257-267
    • /
    • 2009
  • This study aims at diagnosing the relationship among user's security need Sufficiency, customer satisfaction and life satisfaction in electronic security system. For the achievement of this study selected electronic security system users in Seoul as a population for about 25 days from June 20$^{th}$, 2008 to July 15$^{th}$, 2008, segmented. This study selected 378 peoples by distributing 400 unities in total for each 80 peoples throughout purposive sampling method. The final 302 samples were used in statistics. Collected data was analyzed based on the aim of this study using SPSSWIN 16.0, and factor analysis, reliability analysis, stepwise multiple regression analysis and path analysis were used as statistic techniques to analyze. The conclusions are the followings; First, The higher bodily, environmental, mental, informational, and physical security need the more body and property protection satisfaction and facility customer satisfaction. The higher bodily, environmental, and mental security need the more employee service satisfaction. Second, The higher bodily, environmental, informational, and physical security need are perceived, the more influence is marked with life satisfaction and security life satisfaction. Third, The higher personal and property protection, facility, and employee service satisfaction the more security life satisfaction. Also, the higher customer service and personal and property protection satisfaction are perceived, the more influence is marked with life satisfaction. Fourth, Security need sufficiency has little influence on life satisfaction directly, but it has high influences on life satisfaction through customer satisfaction of electronic security system.

Relationship among User's Security Need Sufficiency, Customer Satisfaction and Life Satisfaction in Electronic Security System (기계경비시스템 이용자의 안전욕구충족과 이용만족 및 생활만족의 관계)

  • Kim, Chan-Sun
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.614-619
    • /
    • 2009
  • This study aims at diagnosing the relationship among user's security need Sufficiency, customer satisfaction and life satisfaction in electronic security system. For the achievement of this study selected electronic security system users in Seoul as a population for about 25 days from June 20th, 2008 to July 15th, 2008, segmented Han river based in 5 areas and extracted 1 dong per each area. This study selected 378 peoples by distributing 400 unities in total for each 80 peoples throughout purposive sampling method. The final 302 samples were used in statistics. Collected data was analyzed based on the aim of this study using SPSSWIN 16.0, and factor analysis, reliability analysis, stepwise multiple regression analysis and path analysis were used as statistic techniques to analyze. The conclusions are the followings; First, The higher bodily, environmental, mental, informational, and physical security need the more body and property protection satisfaction and facility customer satisfaction. The higher bodily, environmental, and mental security need the more employee service satisfaction. Second, The higher bodily, environmental, informational, and physical security need are perceived, the more influence is marked with life satisfaction and security life satisfaction. Third, The higher personal and property protection, facility, and employee service satisfaction the more security life satisfaction. Also, the higher customer service and personal and property protection satisfaction are perceived, the more influence is marked with life satisfaction. Fourth, Security need sufficiency has little influence on life satisfaction directly, but it has high influences on life satisfaction through customer satisfaction of electronic security system.

  • PDF

Measurement of the Spatial Dose Rate for Distribution Room in Department of Nuclear Medicine (핵의학과 분배실 내의 공간선량률 측정)

  • Park, Jeong-Kyu;Cho, Euy-Hyun
    • Journal of Digital Contents Society
    • /
    • v.13 no.2
    • /
    • pp.151-157
    • /
    • 2012
  • Even though the protective facility is well made with the development of medicine, the spatial dose within the radiation section could increase the exposure of the workers. The spatial dose is always present in distribution room within the Department of Nuclear Medicine, so the spatial dose of the interior distribution room is measured and analyzed for the prediction of the exposure dose. The spatial dose rate was $6.78{\pm}0.083{\mu}Sv/h$ in the $^{18}F$ distribution room of department of Nuclear Medicine, $9.248{\pm}0.013{\mu}Sv/h$ in $^{99m}Tc$, and $^{131}I$ distribution room. In addition, in case of $^{18}F$ distribution room, the yearly external exposure dose was $42.5{\mu}Sv$ when the nurse does IV in 1m in distance. It also showed that the spatial dose rate on the direction of right oblique showed higher than others by the standard of distribution window of distribution room. Therefore, the staying time of the workers should be short during distributing radiopharmaceuticals in the distribution room and the design of the distribution protection is necessary to reduce the exposure in the direction of right oblique of the protection. The utmost endeavors are required to reduce the worker's individual exposure dose while doing IV.