• Title/Summary/Keyword: digital rights

Search Result 463, Processing Time 0.025 seconds

On-line Circulation of MP3 Digital Music based on Digital Rights Management Technology (디지털 저작권 관리 기술을 이용한 MP3 디지털 음악의 온라인 유통)

  • Kang, Woo-Jun;Kim, Ung-Mo
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.11S
    • /
    • pp.3694-3701
    • /
    • 2000
  • Internet purchase is increasing according to the activation of Electronic Commerce. Currently, the hardware is main purchase items in the Electronic Commerce. The on-line purchase of digital product, that is electronic file type of product, has many merits such as, does not cost in logistics, is ease of searching the product, and is possible of 'Try and Buy' system. But, actually digital products have not been major product and Cause of its piracy problem. Therefore, the tchnology of digital rights management is focused within EC. The piracy problem of digital products comes from the lack of safety in DP license control technology. Current EC has no method to identify the object that has the right to use the digital product. The protecting of object change is impossible and the protection of hacking is not enough and EC has many problems in efficient license control because of the incompletion of EC structure. In this paper, we propose the design and implementation of on-line circulation system, which can activate on-line circulation of MP3 digital data product in EC, by using the new license control technology, that is Dynamic License Control technology.

  • PDF

A Study on the Effects of Ethical Dilemma Discussion Program for University Students (대학생의 윤리적 딜레마 토의 프로그램 효과에 관한 연구)

  • Yang, Hyun-Joo;Park, Mee-Ra;Je, Nam-Joo
    • Journal of Digital Convergence
    • /
    • v.17 no.9
    • /
    • pp.291-299
    • /
    • 2019
  • This study is a nonequivalent control group pretest-posttest designed to understand the effect of ethical dilemma discussion program on human rights sensitivity and ethical values of university students. By providing ethical dilemma discussion program to university students in C university, G-do, the effectiveness was verified. Analyzed using IBM SPSS 24.0. The normality of the variables was verified by Shapiro-Wilk test. Homogeneity was verified using real number and percentage, Fisher's exact probability test and independent t-test. The program's effect was verified using paired t-test. The results of this study are as follows: after the ethical dilemma discussion program, the experimental group's human rights sensitivity(t=-2.32, p=.025), and ethical value(t=-2.43, p=.020) were higher than the control group. Therefore, the ethical dilemma discussion program of this study helped improve the human rights susceptibility and ethical values of the subjects. Further research is needed to verify the effects of ethics education on diverse groups.

Implementation of Digital Contents Safety Trade System using Encryption Technology (암호 기술을 이용한 디지털 콘텐츠 안전 거래 시스템 구현)

  • Yang, Jeong Mo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.4
    • /
    • pp.119-125
    • /
    • 2013
  • The amount of digital content grows exponentially by the development of the internet and the change of computing environments and the target also is getting wider. The industry using this digital content has been growing greatly. However, the distribution of pirated digital content is increasing using internet because digital content is easy to store and transmit and the damage is growing. In this paper, we propose safety trading system which can conceal the author's information safely in digital content in order to block illegal distribution of digital content. ARIA encryption algorithm is used to protect the concealed information of author in digital content and it is a help to track the illegal traders by doing fingerprinting of buyer information to digital content and managing the transaction information. The technical support for copyright dispute is to allow by providing the capability to verify illegal edit to original digital contents.

Analysis of dCollection License System based on the Case Study of Digital Rights Management System for Open Access (오픈액세스를 위한 저작권관리시스템 사례 연구를 통한 dCollection 라이선스관리시스템 분석)

  • Park Mi-Sung
    • Journal of Korean Library and Information Science Society
    • /
    • v.36 no.4
    • /
    • pp.255-284
    • /
    • 2005
  • In this paper, we have made an analysis of dCollection license system and have presented the development subject based on various case study of digital rights Management( DRM ) under domestic and abroad Open Access circumstances. For this study, fist we made an investigation into the concept and the technical component of the copyright, license and DRM that act as obstacle to open access. It is hoped that the first study will be able to help people better understand the relationship between the related technique and Open Access System. Second we analyzed Creative Commons, RoMEO, Dspace system as abroad cases and Kyungpook National University's DRM system and Seoul National University's DRM system as domestic cases for copyright protection under open access circumstances. finally we will face up to the domestic open access reality and plan the future by presenting the development subject through dCollection license system analysis.

  • PDF

A Study on Limitations on the Right of Reproduction and Right of Communication to the Public in Digital Networked Environment (디지털 복제권 및 전송권 제한에 관한 연구)

  • 정경희;이두영
    • Journal of the Korean Society for information Management
    • /
    • v.18 no.4
    • /
    • pp.127-142
    • /
    • 2001
  • It has been criticized that the right of reproduction and right of communication to the public in the Copyrigt Act of Korea, which was amended in the year of 2000 in line with new environments around digital networks, limited the limitation to author’s property right in private use and library exemption too much. Solving the problem above, this study analyzes comparatively WCT, Amended Proposal for a Directive on Copyright and Related Rights in the Information Society, Copyright Law of the United States of America, Copyright Amendment(Digital Agenda), and Copyright Act of Korea. Based on the results from related case analyses and a survey on how stakeholders view copyright issue, in addition, this study presents a reasonable way of limiting rights of reproduction and rights of communication to the public.

  • PDF

Design and Implementation of Tool Server and License Server REL/RDD processing based on MPEG-21 Framework (MPEG-21 프레임워크 기반의 REL/RDD 처리를 위한 라이센스 서버와 툴 서버의 설계 및 구현)

  • Hong, Hyun-Woo;Ryu, Kwang-Hee;Kim, Kwang-Yong;Kim, Jae-Gon;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.623-626
    • /
    • 2005
  • The technique of developing Digital Contents have still not be a standard, and it is cause some problems in the Digital Contents's creating, circulation and consumption, So solve the problem, MPEG suggest MPEG-21 framework. In the standard, The IPMP take charge of the Digital Contents's protection and management, and also it is the same as the rights expression language REL and the dictionary defining the word of REL. But. the study of the IPMP is later than the study of REL and RDD, such as the other study of the MPEG-21 standard. So, there is few system based REL and RDD. In this paper, in order to management and protect contents right. So facing the latest standard, we designed and implementation the Tool Server and the License Server based on REL/RDD.

  • PDF

Efficient H.264/AVC Video Scrambling Methods for Digital Rights Management (디지털 저작권 관리를 위한 효율적인 H.264/AVC 비디오 스크램블링 방법)

  • Kim, Soojin;Park, Geun;Cho, Kyeongsoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.1 no.3
    • /
    • pp.187-192
    • /
    • 2012
  • This paper describes efficient H.264/AVC video scrambling methods for digital rights management. The proposed scrambling methods are to scramble level and suffix in entropy encoding and MVD in motion estimation of the H.264 video compression process. Other scrambling methods have been proposed but they degrade the compression efficiency or make it difficult to achieve real-time processing due to the large amount of computational efforts. Since the proposed scrambling methods resolve the drawbacks of other approaches, they do not cause image distortion and the original compression efficiency is maintained. We verified our scrambling methods and evaluated the performance by conducting several experiments with H.264 reference program. Finally, we implemented video player system using USB dongle in order to apply the proposed scrambling/descrambling methods to H.264 video compression.

Digital Watermarking using the Channel Coding Technique (채널 코딩 기법을 이용한 디지털 워터마킹)

  • Bae, Chang-Seok;Choi, Jae-Hoon;Seo, Dong-Wan;Choe, Yoon-Sik
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.10
    • /
    • pp.3290-3299
    • /
    • 2000
  • Digital watermarking has similar concepts with channel coding thechnique for transferring data with minimizing error in noise environment, since it should be robust to various kinds of data manipulation for protecting copyrights of multimedia data. This paper proposes a digital watermarking technique which is robust to various kinds of data manipulation. Intellectual property rights information is encoded using a convolutional code, and block-interleaving technique is applied to prevent successive loss of encoded data. Encoded intelloctual property rithts informationis embedded using spread spectrum technique which is robust to cata manipulation. In order to reconstruct intellectual property rights information, watermark signalis detected by covariance between watermarked image and pseudo rando noise sequence which is used to einbed watermark. Embedded intellectual property rights information is obtaned by de-interleaving and cecoding previously detected wtermark signal. Experimental results show that block interleaving watermarking technique can detect embedded intellectial property right informationmore correctly against to attacks like Gaussian noise additon, filtering, and JPEG compression than general spread spectrum technique in the same PSNR.

  • PDF

Design and Implementation of DRM Proxy for DRM Cloud Service (DRM 클라우드 서비스를 위한 DRM Proxy 설계 및 구현)

  • Lee, Hyejoo;Heo, Changsoo;Seo, Changho;Shin, Sang Uk
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.12
    • /
    • pp.553-560
    • /
    • 2013
  • The development of cloud computing technology and smart devices have increasingly been expanding the influence in various fields. Although DRM(Digital Rights Management) is a very important technology for secure content services, interoperability among DRM technologies must be addressed in order to provide the service without the constraints of time and place on various smart devices. In this paper, we study DRM Cloud which provides DRM functions as a service in cloud computing environment, and address interoperability problem by providing different DRM technologies as a cloud service. That is, when a user wants to play contents with the different DRM technologies on a smart device, the usage of the content is controlled by providing the corresponding DRM module and function as SaaS from DRM cloud. To do this, we define the functions and structure of DRM Proxy which performs smooth service call and provision between DRM cloud user and DRM cloud, and finally we describe the experimental implementation result.

Information Asset Authentication Method for Preventing Data Leakage in Separated Network Environments (단독망 자료유출 방지를 위한 정보자산 인증 방안)

  • Ilhan Kim;Juseung Lee;Hyunsoo Kim
    • Convergence Security Journal
    • /
    • v.24 no.3
    • /
    • pp.3-11
    • /
    • 2024
  • Information security is crucial not only for protecting against external cyber-attacks but also for identifying and blocking internal data leakage risks in advance. To this end, many companies and institutions implement digital rights management(DRM) document security solutions, which encrypt files to prevent content access if leaked, and data loss prevention(DLP) solutions, which control devices such as USB ports on computing equipment to prevent data leaks. At a time when efforts to prevent internal data leaks are crucial, there is a growing need for control policies such as device control and the identification of information assets in standalone network environments, which could otherwise fall into unmanaged domains. In this study, we propose a Generation-Distribution-Application model for device control policies that are uniquely applied to standalone information assets that are not connected to internal networks. To achieve this, we developed an authentication technique linked with the asset management system, where information assets are automatically registered upon acquisition. This system allows for precise identification of information assets and enables flexible device control, and we have designed and implemented a system based on these principles.