JOURNAL BROWSE
Search
Advanced SearchSearch Tips
The Method of Digital Copyright Authentication for Contents of Collective Intelligence
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
The Method of Digital Copyright Authentication for Contents of Collective Intelligence
Yun, Sunghyun; Lee, Keunho; Lim, Heuiseok; Kim, Daeryong; Kim, Jung-hoon;
  PDF(new window)
 Abstract
The wisdom contents consists of an ordinary person's ideas and experience. The Wisdom Market [1] is an online business model where wisdom contents are traded. Thus, the general public could do business activities in the Wisdom Market at ease. As the wisdom contents are themselves the thought of persons, there exists many similar or duplicated contents. Existing copyright protection schemes mainly focus on the primary author's right. Thus, it's not appropriate for protecting the contents of Collective Intelligence that requires to protect the rights of collaborators. There should exist a new method to be dynamic capable of combining and deleting rights of select collaborators. In this study, we propose collective copyright authentication scheme suitable for the contents of Collective Intelligence. The proposed scheme consists of collective copyright registration, addition and verification protocols. It could be applied to various business models that require to combine multiple rights of similar contents or to represent multiple authorships on the same contents.
 Keywords
Collective Intelligence;Contents Protection;Copyright Protection;Collective Copyright;Authorship Management;
 Language
Korean
 Cited by
1.
A Study on the influence of Self-Efficacy to Goal Setting in the age of Convergence - Focusing on the Self-regulatory depletion and non-depletion group, Journal of Digital Convergence, 2016, 14, 3, 151  crossref(new windwow)
2.
Study on analysis of the Corporate requirements and CPND Value chain for e-book Market Activation, Journal of Digital Convergence, 2016, 14, 4, 163  crossref(new windwow)
3.
Logistic Regression Model on the copyright licence diversification through interindividual Digital Contents distribution, Journal of Digital Convergence, 2016, 14, 12, 27  crossref(new windwow)
 References
1.
Development of distribution and diffusion service technology through individual and collective Intelligence to digital contents, ICT R&D program of MSIP/IITP, 1st Year Annual Report, Korea University, 2014.

2.
Want, R., "iPhone: Smarter Than the Average Phone," IEEE Pervasive Computing, Vol. 9, No. 3, pp. 6-9, IEEE, 2010.

3.
Dion Hinchcliffe, "The app store: The new "must-have" digital business model", http://www.zdnet.com/article/ the-app-store-the-new-must-have-digital-business-model/, 2010.

4.
Christopher A. H. Vollmer, Sebastian Blum, Kristina Bennin, "How Media Companies Can Make Multichannel Networks Profitable," Forbes, http://www.forbes.com/2014/12/19/how-media/a-companies-can-make-multichannel-networks-profitable/, 2014.

5.
Zhao J, "A WWW service to embed and prove digital copyright watermarks," Proc. Of the European Conference on Multimedia Application, Services and Techniques, pp. 695-710, 1996.

6.
Mason A, Salmon RA, Devlin J, "User requirements for watermarking in broadcast applications," International broadcasting convention (IBC 2000), Amsterdam, The Netherlands, 2000.

7.
Piva A, Bartolini F, Barni M, "Managing copyright in open networks," IEEE Internet Computing, pp. 18-26, 2002.

8.
Business Model Breakdown - Quirky.com, http://www.lumosforbusiness.com/blog/722/28-06-2010/Business+Model+Breakdown++Quirkycom, Lumos Business Solutions Inc.

9.
Rivest R, Shamir A, Adleman L, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Communications of the ACM 21 (2), pp. 120-126, 10.1145/359340.359342, 1978. crossref(new window)

10.
Taher ElGamal, "A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms," IEEE Transactions on Information Theory 31 (4), pp. 469-472, 10.1109/TIT.1985. crossref(new window)

11.
Samtani R, "Ongoing innovation in digital watermarking," Computer 42, pp. 92-94, 10.1109/MC.2009.93, 2009. crossref(new window)

12.
Kirstein M, "Beyond traditional DRM: moving to digital watermarking & fingerprinting in media," MultiMedia Intelligence, 2008.

13.
"Announcing the ADVANCED ENCRYPTION STANDARD (AES)," FIPS 197, NIST, 2012.

14.
Rosenblatt. Bill, Trippe. Bill, Mooney. Stephen, Digital Right Management: Business and Technology. M&T Books, 2002.

15.
Eric Diehl, Securing Digital Video: Techniques for DRM and Content Protection. Springer, 2012.