Information technology for intellectual property protection is a hot issue on the globe in the twenty first century because the recent expansion of network connectivity to the Internet known as ubiquitous allows people to enjoy a number of contents and programs stored in the digital forms which are fragile to unauthorized electric duplication or copyright and patent infringement. Institutional protection against digital infringement of multimedia intellectual property has been practically supported by technical solutions which digitally maneuver multimedia contents and programs in the Internet. The advent of new solutions in the area of information technology will allow easy access to the tools for multimedia intellectual property infringement as a negative side effect of innovation.
Facing the digital infringement of intellectual property of contents and programs as operating software of those contents, those in the fields of multimedia information engineering and its institutional operations have been aware of a need of a complete reference of past, current, and future trends of multimedia intellectual property protection from technology to institutions. This book offers a first reference on information technology for intellectual property protection with multidisciplinary knowledge and analyses which are given by leading researchers and practitioners with technical backgrounds in information engineering and institutional experiences in intellectual property practice.INTRODUCTION
The principal concern of this book is to provide those in the information technology and its institutional practice with a series of concise and thorough references on a variety of issues of intellectual property protection and its proper solutions from the technical aspects. We discuss both technical and institutional solutions to intellectual property protection.
We thoroughly discuss institutional and technical issues and provide their solutions on information technology for intellectual property protection. The goal of this book is to design a complete reference in the area of information technology for intellectual property protection. Already published books just discuss institutional analyses without interdisciplinary insights by technical experts. Meanwhile, technical references only talk about engineering solutions without the social impact to institutional protection. This book should fill in that gap to fulfill a great mission under which people in the field of information technology for intellectual property protection can discuss all the related issues and their solutions from both institutional and technical aspects.CHALLENGES
The book brings in a first guidance or introductory reference to graduate students and students in professional schools, researchers, and practitioners in the areas of policy, engineering, and education, and provides them with mandatory knowledge bases on information technology for intellectual property protection. This kind of complete reference has not been available in the previous research publication. Its scholarly value is found in the brand new aspect of engineering solutions to intellectual property protection.
The content of the book is appealing to academia, in which those concerned about intellectual property management are eager to acquire sound techniques for intellectual property protection and fundamental knowledge on intellectual property rights in the frontiers of IT outbursts. Meanwhile, the book works as a technical milestone for research trends of intellectual property protection engineering in the target of the next ten years. Both practitioners with technical agendas and IT engineers of institutional agendas should appreciate this kind of interdisciplinary title.ORGANIZATION
The book is organized into eleven chapters:
Chapter 1 discusses a robust watermarking technique which is based on distributed multi-resolution transforms (DMT) and singular value decomposition to improve the protection of images.
Chapter 2 discusses masking models and watermarking with two strategies for using a masking model in its application to a classic watermarking technique.
Chapter 3 discusses content encryption for secure communication and provides an overview of encryption technology from background, brief history, and requirement to research progress with general and special encryption algorithms.
Chapter 4 discusses damage-less watermark extraction for information hiding using non-linear feature extraction scheme trained on frequency domain.
Chapter 5 discusses user authentication in IP networks and introduces basic concepts of authentication and challenge-response frameworks.
Chapter 6 discusses query rewriting algorithms for access control to avoid resource-leakage in Semantic Web systems.
Chapter 7 discusses ticketing services using an auction system design for seat reservations at theaters.
Chapter 8 discusses legal protection of Web pages from the database perspective and refers to the World Intellectual Property Organization Copyright Treatments and European Directive 96/92/CE with its future trends.
Chapter 9 discusses a concept of knowledge commons and open content licenses from the perspective of communities.
Chapter 10 discusses a peer-to-peer architecture based on autonomous and self-emerging communities for managing collective knowledge.
Chapter 11 discusses a community creation using bookmarks as resources available in the Internet to make linkages between people of common interests.GUIDELINE
The main target of prospective academic audience is graduate students who study computer science, information engineering, system engineering, information studies, management of information technology, and library science. Another target is students who are working towards professional degrees in business schools, management schools, MOT programs, public policy schools, law schools, or their equivalents. The other target is not a small number of practitioners including lawyers who counsel to IT companies as in-house counsels or at firms, chief information officers (CIOs), chief technology officers (CTOs), and chief risk management officers (CROs) in enterprises and the consultants in those related fields. Not the last but an important part of prospective audience is found in a large number of intellectual property related staff or administrators in universities and librarians.
The book is designed to offer a reference in the communities on information technology for intellectual property protection. The book has eleven chapters, which should be well allocated as assignments in class at Junior or Senior engineering of the undergraduate lectures, and master-level graduate schools.