Information Technology for Intellectual Property Protection - Advances in IT Standards and Standardization Research
Latest Publications


TOTAL DOCUMENTS

11
(FIVE YEARS 0)

H-INDEX

1
(FIVE YEARS 0)

Published By IGI Global

9781613501351, 9781613501368

Author(s):  
Giaime Ginesu ◽  
Mirko Luca Lobina ◽  
Daniele D. Giusto

Authentication is the way of identifying an individual. The techniques used to accomplish such practice strongly depend on the involved parties, their interconnection, and the required level of security. In all cases, authentication is used to enforce property protection, and may be specifically intended for the copyright protection of digital contents published on the Internet. This work introduces the basic concepts of authentication explaining their relationship with property protection. The basic functionalities of Challenge-Response frameworks are presented, together with several applications and the future trends.


Author(s):  
Kensuke Naoe ◽  
Yoshiyasu Takefuji

The proposed method contributes to secure image digital watermarking for content identification without damaging or losing any detailed data of visual images. The features of our proposed method employ an application to authenticate multimedia, similarity comparison, verification of image integrity and copyright protection of multimedia contents.


Author(s):  
Jeff J.S. Huang ◽  
Stephen J.H. Yang ◽  
Jeng C.C Chen ◽  
Irene Y.S. Li ◽  
Indy Y.T. Hsiao

The emergence of Web 2.0 has brought along the trend of community. It is also the trend that contributes to socialization of the Internet. The essence of Web 2.0 is creation and sharing which give rise to social networking communities such as Blog, Wikipedia and Facebook. Through Wikipedia, Blogs, Facebook and other kinds of social networking websites, interactive relationship and bridge of knowledge sharing have been built up successfully. This paper attempts to propose an effective way to locate people with shared interests. By using Internet resources bookmarked by the users, the similarity of interests between them can be analyzed. Based on this relationship, people could build communities. Also, through community activities, the innovation and exchange of collective intelligence are accomplished.


Author(s):  
Davide Mula ◽  
Mirko Luca Lobina

We start to analyze each component of database’s definition and to find them in a web page so that we can compare those juridical goods. After that we analyze present legislation concern database and in particular World Intellectual Property Organization Copyright Treatments and European Directive 96/92/CE, which we consider as the best legislation in this field. In the end, we outline future trends that seem to appreciate and apply our theory.


Author(s):  
Mirko Luca Lobina ◽  
Daniele D. Giusto ◽  
Davide Mula

Many audio watermarking techniques, presented in the last years, make use of masking and psychological models derived from signal processing. Such a basic idea is winning because it guarantees a high level of robustness and bandwidth of the watermark as well as fidelity of the watermarked signal. This work first describes the relationship between Digital Right Management, Intellectual Property, and use of watermarking techniques. Then, the crossing use of watermarking and Masking Models is detailed, providing schemes, examples, and references. Finally, the authors present two strategies that make use of a Masking Model, applied to a classic watermarking technique. The joint use of classic frameworks and Masking Models seems to be one of the trends for the future of research in watermarking. Several tests on the proposed strategies with the state of the art are also offered to give an idea of how to assess the effectiveness of a watermarking technique.


Author(s):  
Gaurav Bhatnagar ◽  
Jonathan Wu ◽  
Balasubramanian Raman

In this chapter, a robust watermarking technique based on distributive multiresolution transforms (DMT) and singular value decomposition is presented to improve the protection of the images. First, the watermark image is mapped to another form to get reference watermark which is secret and only known to the owner/creator. In order to map watermark image into reference form, chaotic maps are used. The core idea of the proposed technique is to decompose host image via DMT followed by reference watermark embedding in DMT coefficients by modifying the singular values. After embedding, inverse transform is performed to get watermarked image. Two new different distributive multiresolution transforms, namely distributive multiresolution Fourier and distributive multiresolution cosine transform, are explored and used. The feasibility of the proposed method and its robustness against different kind of attacks are verified by computer simulations, and superiority is carried out by the comparisons with the existing methods.


Author(s):  
Nariaki Nishino ◽  
Koji Fukuya ◽  
Kanji Ueda

This paper proposes a new auction mechanism with seat reservations in movie theaters using an interdisciplinary approach. In movie theater services, the movie price is generally fixed, not depending on the quality of contents or the theater seat. It implies that such a service mechanism by fixed pricing might not reflect the value of movie contents. In this study, a new mechanism of theater services is proposed introducing the Vickrey–Clarke–Groves (VCG) mechanism and Gale–Shapley (GS) mechanism, which present effectiveness in the field of mechanism design. First derived is the theoretical predictions of equilibrium and how the mechanism works using experiments with human subjects. In addition, agent-based simulation is conducted using agents that make the decisions observed in the experiments. Consequently, the results present the validity of the proposed mechanism, showing an increase in the social surplus.


Author(s):  
Shiguo Lian

The principal concern of this chapter is to provide those in the secure multimedia communication or content protection community with an overview of multimedia content encryption technology. Multimedia (image, audio or video) content encryption technologies are reviewed, from the background, brief history, and performance requirement, to research progress. Additionally, the general encryption algorithms are classified, and their performances are analyzed and compared. Furthermore, some special encryption algorithms are introduced. Finally, some open issues and potential research topics are presented, followed by some conclusions. The author hopes that the chapter will not only inform researchers of the progress of multimedia content encryption but also guide the design of practical applications in industry field.


Author(s):  
Stefano Montanelli ◽  
Silvana Castano ◽  
Alfio Ferrara ◽  
Gaia Varese

In this paper, the authors present a reference P2P architecture based on autonomous, self-emerging semantic communities of interest (CoIs) for collective intelligence creation and management. An approach for enabling knowledge organization and management at the level of a single peer is presented in the paper, as well as techniques for supporting a peer to participate to the construction of a shared community vocabulary, according to the terminological preferences automatically extracted from its personal knowledge. Furthermore, an application example in the e-health domain is presented in the framework of the iCoord system for P2P semantic coordination to show the use of a manifesto-based collective intelligence for enforcing effective collaboration in a real case study.


Author(s):  
Jian Li ◽  
William K. Cheung

Semantic Web technologies allow on-line resources to be semantically annotated to support more effective and intelligent online services. However, ontologies sometimes may contain sensitive information. Providing access to them requires proper control to ensure the data protection requirement. Yet, the protection should not be too restrictive to make the access management inflexible. While there has been recent work on policy-based access control, in this paper, the authors present a policy representation specifically for access control on ontology-based data and explain how issues like policy propagation and policy conflict resolution are addressed. The authors present bucket-based query rewriting algorithms for realizing the access control policies to avoid sensitive resources leakage in the context of the Semantic Web. The authors validate the correctness of the proposed mechanisms by going through some illustrative examples in detail.


Sign in / Sign up

Export Citation Format

Share Document