• Title/Summary/Keyword: Copyright Ownership

Search Result 54, Processing Time 0.023 seconds

Copyright Protection Protocol providing Privacy (프라이버시를 제공하는 저작권 보호 프로토콜)

  • Yoo, Hye-Joung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.2
    • /
    • pp.57-66
    • /
    • 2008
  • There have been proposed various copyright protection protocols in network-based digital multimedia distribution framework. However, most of conventional copyright protection protocols are focused on the stability of copyright information embedding/extracting and the access control to data suitable for user's authority but overlooked the privacy of copyright owner and user in authentication process of copyright and access information. In this paper, we propose a solution that builds a privacy-preserving proof of copyright ownership of digital contents in conjunction with keyword search scheme. The appeal of our proposal is three-fold: (1) content providers maintain stable copyright ownership in the distribution of digital contents; (2) the proof process of digital contents ownership is very secure in the view of preserving privacy; (3) the proposed protocol is the copyright protection protocol added by indexing process but is balanced privacy and efficiency concerns for its practical use.

Zero-Watermarking Algorithm in Transform Domain Based on RGB Channel and Voting Strategy

  • Zheng, Qiumei;Liu, Nan;Cao, Baoqin;Wang, Fenghua;Yang, Yanan
    • Journal of Information Processing Systems
    • /
    • v.16 no.6
    • /
    • pp.1391-1406
    • /
    • 2020
  • A zero-watermarking algorithm in transform domain based on RGB channel and voting strategy is proposed. The registration and identification of ownership have achieved copyright protection for color images. In the ownership registration, discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD) are used comprehensively because they have the characteristics of multi-resolution, energy concentration and stability, which is conducive to improving the robustness of the proposed algorithm. In order to take full advantage of the characteristics of the image, we use three channels of R, G, and B of a color image to construct three master shares, instead of using data from only one channel. Then, in order to improve security, the master share is superimposed with the copyright watermark encrypted by the owner's key to generate an ownership share. When the ownership is authenticated, copyright watermarks are extracted from the three channels of the disputed image. Then using voting decisions, the final copyright information is determined by comparing the extracted three watermarks bit by bit. Experimental results show that the proposed zero watermarking scheme is robust to conventional attacks such as JPEG compression, noise addition, filtering and tampering, and has higher stability in various common color images.

A Study on the Watermarketing of Keyframe-Based for copyright Protection of video (동영상의 저작권 보호를 위한 키 프레임 기반의 워터마킹에 관한 연구)

  • Kim, Dan-Hwan;Oh, Moo-Song
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.1
    • /
    • pp.102-107
    • /
    • 2005
  • With the advancement which development and information communication of the computer is quick about lower with multimedia technical diffusion of network base the necessity the use of the digital image technique which is various regarding the protection of sharp increasing multimedia contents raised its head in the social whole. the copyright protection against a multimedia data hazard the authentication techniques it will be able to confirm the content authentication, ownership authentication, illegal copy of the image which stands is demanded. confronts to the water marking technique of existing and the researches the fact that against a picture is most. In this paper, It does not damage the video data which is a multimedia contents not to be, it inserts copyright information and it protects the right of ownership. It is with a copyright protection which leads the wavelet transform which is a watermark of frequency base from visual system viewpoint in the human being center with it proposes the watermarking technique against a forgery prevention.

A Study on the Copyright Policy for Academic Libraries (저작권 귀속 문제를 중심으로 한 대학도서관 저작권 정책에 관한 연구)

  • Hwang, Ok-Gyung
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.40 no.4
    • /
    • pp.183-198
    • /
    • 2006
  • The purpose of the study was to suggest a model for copyright policy development in the academic libraries. For this purpose. the study investigated the relevant literature, performed a questionnaire survey of 200 academic libraries in Korea, and analyzed the provisions of the copyright policies of 14 academic institutions and libraries in America. According to the result of the questionnaire survey, only 5% of the libraries had their own copyright policies, and 95% of the no-policy-libraries were in need of the development of the policies. And based on the result of the case study on the copyright policies, the study categorized the copyright ownership of the works created by community members into 10 cases and suggested policy alternatives in each cases.

Medical Image Watermarking Based on Visual Secret Sharing and Cellular Automata Transform for Copyright Protection

  • Fan, Tzuo-Yau;Chao, Her-Chang;Chieu, Bin-Chang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.6177-6200
    • /
    • 2018
  • In order to achieve the goal of protecting medical images, some existing watermark techniques for medical image protection mainly focus on improving the invisibility and robustness properties of the method, in order to prevent unnecessary medical disputes. This paper proposes a novel copyright method for medical image protection based on visual secret sharing (VSS) and cellular automata transform (CAT). This method uses the protected medical image feature as well as VSS and a watermark to produce the ownership share image (OSI). The OSI is used for medical image verification and must be registered to a certified authority. In the watermark extraction process, the suspected medical image is used to generate a master share image (MSI). The watermark can be extracted by combining the MSI and the OSI. Different from other traditional methods, the proposed method does not need to modify the medical image in order to protect the copyright of the image. Moreover, the registered OSI used to verify the ownership and its appearance display meaningful information, facilitating image management. Finally, the results of the final experiment can prove the effectiveness of our method.

QNFT: A Post-Quantum Non-fungible Tokens for Secure Metaverse Environment

  • Abir El Azzaoui;JaeSoo Kim
    • Journal of Information Processing Systems
    • /
    • v.20 no.2
    • /
    • pp.273-283
    • /
    • 2024
  • The digital domain has witnessed unprecedented growth, reshaping the way we interact, work, and even perceive reality. The internet has evolved into a vast ecosystem of interconnected virtual worlds, giving birth to the concept of the Metaverse. The Metaverse, often envisioned as a collective virtual shared space, is created by the convergence of virtually enhanced physical reality and interactive digital spaces. Within this Metaverse space, the concept of ownership, identity, and authenticity takes on new dimensions, necessitating innovative solutions to safeguard individual rights. The digital transformation through Metaverse has also brought forth challenges, especially in copyright protection. As the lines between the virtual and physical blur, the traditional notions of ownership and rights are being tested. The Metaverse, with its multitude of user-generated content, poses unique challenges. The primary objective of this research is multifaceted. Firstly, there's a pressing need to understand the strategies employed by non-fungible token (NFT) marketplaces within the Metaverse to strengthen security and prevent copyright violations. As these platforms become centers for digital transactions, ensuring the authenticity and security of each trade becomes paramount. Secondly, the study aims to delve deep into the foundational technologies underpinning NFTs, from the workings of blockchain to the mechanics of smart contracts, to understand how they collectively ensure copyright protection. Thus, in this paper, we propose a quantum based NFT solution that can secure Metaverse and copyright contents in an advanced manner.

The Study on the Creativity and Legal Status of Directing from Copyright Law Point of View (저작권법의 시각에서 본 연극연출의 창작성과 법적 지위에 관한 연구)

  • Jung, Young Mee
    • Journal of Korean Theatre Studies Association
    • /
    • no.40
    • /
    • pp.401-450
    • /
    • 2010
  • This thesis purposes to suggest that creative stage directors have copyright ownership and we make them create high-quality of theatre direction. Stage directors are sincere creator of the theatre stage today. We have little judicial precedents about stage directors, no artistic examination related directing. Stage directors are performers who have neighboring rights, there is a problem that they won't have the exclusive right of making derivative works in this country. Others will make creation (such as cinemas, animations, novels) based on stage expression without permission, because stage directors don't have exclusive right of making derivative works. Copyright law can't protect the concept of stage directors and building blocks of them which are drama text, actors and theatre space, because copyright law don't protect idea according to idea/expression dichotomy. The expression of stage direction is belong to five fundamentals which are composition, picturization, movement, rhythm, pantomimic dramatization that are come from Dean & Carra's work. Directors' work is to make theatrical works based on literary works. Therefore, theatrical works are derivative works which based on drama texts. Also, theatrical works are able to be joint works. In the case of that stage directors write drama text and create expression on the stage, they have to own authorship of both works. Merger doctrine should not apply theatre directors' works strictly like any other functional works because stage directors usually create noble expression which have been not before. We need shift of the definition of theatrical works which are derivative works or joint works to protect theatre directors' creativity. Hereafter, the special legal section for dramatic(theatrical) works including the flexible legal definition for performing arts should be established, and 'contract form' for stage directors should be made. Acting edition(literary works) should be published to grant creative directors compensation. I emphasize to grant ownership of copyright to creative stage directors, to encourage directors' works. Therefore, copyright law will be the support for development of cultural arts institutionally.

Video Copyright Protection through Watermarking of Wavelet Transform based on the Frequency (주파수기반 웨이브릿 변환의 워터마킹을 통한 동영상 저작권 보호에 관한 연구)

  • Han, Mi-Ja;Kim, Dan-Hwan;Jung, Chang-Ryul;Jeong, Byeong-Yeol;Lee, Sung-Keun;Koh, Jin-Kwang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.535-539
    • /
    • 2008
  • With the advancement which development and information communication of the computer is quick about lower with multimedia technical diffusion of network base the necessity the use of the digital image technique which is various regarding the protection of sharp increasing multimedia contents raised its head in the social whole. The copyright protection against a multimedia data hazard the authentication techniques it will be able to confirm the content authentication, ownership authentication, illegal copy of the image which stands is demanded. confronts to the water marking technique of existing and the researches the fact that against a picture is most. In this paper, It does not damage the video data. As inserts copyright information and it protects the copyright. It is with a copyright protection which leads the wavelet transform which is a watermark of frequency base from visual system viewpoint in the human being center with it proposes the watermarking technique against a forgery prevention.

  • PDF

Asymmetric Watermarking Using Public Key Infrastructure (공개키 기반 구조를 이용한 비대칭 워터마킹)

  • Jun Young-Min;Yang Sun-Ouk;Kim Gye-Young
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.9
    • /
    • pp.1282-1293
    • /
    • 2004
  • This paper proposes an asymmetric watermarking system using Public Key Infrastructure. The distinguishing characteristic of the proposed method connects between the two different techniques, cryptography technique and watermarking technique, by using the authentication technique. The connection between the two techniques are established based on the special qualities of each technique. Watermarks that are inserted into the digital contents consist of a digital signature described as an encrypted copyright information with the private key of a distributor or a copyright holder, and an authentication code. In the situation where the ownership of the digital contents has to be decided, authentication technique examines the data integrity of the digital contents based on an authentication and decides the ownership of the digital contents by examining whether it satisfies or not satisfies the integrity test. The formal case uses decryption method which compares the user defined copyright information, and the decrypted copyright information extracted from the watermark in the digital contents that are decrypted by distributors' public key The latter case determines the ownership by comparing the similarity between encrypted copyright information separated from the watermark that are extracted from the digital contents, and the user defined encrypted copyright information that are separated from the watermark The proposed method provides protection from the assault which attempts to identify or erase the encoding key.

  • PDF

Objective Material analysis to the device with IoT Framework System

  • Lee, KyuTae;Ki, Jang Geun
    • International Journal of Advanced Culture Technology
    • /
    • v.8 no.2
    • /
    • pp.289-296
    • /
    • 2020
  • Software copyright are written in text form of documents and stored as files, so it is easy to expose on an illegal copyright. The IOT framework configuration and service environment are also evaluated in software structure and revealed to replication environments. Illegal copyright can be easily created by intelligently modifying the program code in the framework system. This paper deals with similarity comparison to determine the suspicion of illegal copying. In general, original source code should be provided for similarity comparison on both. However, recently, the suspected developer have refused to provide the source code, and comparative evaluation are performed only with executable code. This study dealt with how to analyze the similarity with the execution code and the circuit configuration and interface state of the system without the original source code. In this paper, we propose a method of analyzing the data of the object without source code and verifying the similarity comparison result through evaluation examples.