Shopping Cart | Login | Register | Language: English
Information Technology for Intellectual Property Protection: Interdisciplinary Advancements
Buy Hardcover + Free E-Access
Qty:
$156.00
List Price: $195.00
You Save: $39.00
20% Online Bookstore Discount*
Free Lifetime E-Access*
I will be using e-access as an:
In Stock. Have the hardcover format as soon as Dec. 25 with express shipping*. Free instant online e-access upon order completion.

Information Technology for Intellectual Property Protection: Interdisciplinary Advancements

Release Date: November, 2011. Copyright © 2012. 367 pages.
ISBN13: 9781613501351|ISBN10: 1613501358|EISBN13: 9781613501368|
DOI: 10.4018/978-1-61350-135-1
Cite Book

MLA

Sasaki, Hideyasu. "Information Technology for Intellectual Property Protection: Interdisciplinary Advancements." IGI Global, 2012. 1-367. Web. 21 Dec. 2014. doi:10.4018/978-1-61350-135-1

APA

Sasaki, H. (2012). Information Technology for Intellectual Property Protection: Interdisciplinary Advancements (pp. 1-367). Hershey, PA: IGI Global. doi:10.4018/978-1-61350-135-1

Chicago

Sasaki, Hideyasu. "Information Technology for Intellectual Property Protection: Interdisciplinary Advancements." 1-367 (2012), accessed December 21, 2014. doi:10.4018/978-1-61350-135-1

Export Reference

Mendeley
Favorite
Access on Platform
Browse by Subject
Top

Description

Information technology for intellectual property protection has become an increasingly important issue due to the expansion of ubiquitous network connectivity, which allows people to use digital content and programs that are susceptible to unauthorized electric duplication or copyright and patent infringement.

Information Technology for Intellectual Property Protection: Interdisciplinary Advancements contains multidisciplinary knowledge and analysis by leading researchers and practitioners with technical backgrounds in information engineering and institutional experience in intellectual property practice. Through its discussions of both engineering solutions and the social impact of institutional protection, this book fills a gap in the existing literature and provides methods and applications for both practitioners and IT engineers.

Top

Table of Contents and List of Contributors

Search this Book: Reset
Table of Contents
Preface
Hideyasu Sasaki
Chapter 1
Gaurav Bhatnagar, Jonathan Wu, Balasubramanian Raman
In this chapter, a robust watermarking technique based on distributive multiresolution transforms (DMT) and singular value decomposition is... Sample PDF
Distributed Multiresolution Transform Based Framework for Watermarking
$30.00
List Price: $37.50
Chapter 2
Mirko Luca Lobina, Daniele D. Giusto, Davide Mula
Many audio watermarking techniques, presented in the last years, make use of masking and psychological models derived from signal processing. Such a... Sample PDF
Masking Models and Watermarking: A Discussion on Methods and Effectiveness
$30.00
List Price: $37.50
Chapter 3
Shiguo Lian
The principal concern of this chapter is to provide those in the secure multimedia communication or content protection community with an overview of... Sample PDF
Multimedia Content Encryption for Secure Multimedia Communication
$30.00
List Price: $37.50
Chapter 4
Kensuke Naoe, Yoshiyasu Takefuji
The proposed method contributes to secure image digital watermarking for content identification without damaging or losing any detailed data of... Sample PDF
Advancement on Damage-Less Watermark Extraction Using Non-Linear Feature Extraction Scheme Trained on Frequency Domain
$30.00
List Price: $37.50
Chapter 5
Giaime Ginesu, Mirko Luca Lobina, Daniele D. Giusto
Authentication is the way of identifying an individual. The techniques used to accomplish such practice strongly depend on the involved parties... Sample PDF
Property Protection and User Authentication in IP Networks through Challenge-Response Mechanisms: Present, Past and Future Trends
$30.00
List Price: $37.50
Chapter 6
Jian Li, William K. Cheung
Semantic Web technologies allow on-line resources to be semantically annotated to support more effective and intelligent online services. However... Sample PDF
Access Control on Semantic Web Data Using Query Rewriting
$30.00
List Price: $37.50
Chapter 7
Nariaki Nishino, Koji Fukuya, Kanji Ueda
This paper proposes a new auction mechanism with seat reservations in movie theaters using an interdisciplinary approach. In movie theater services... Sample PDF
An Auction Mechanism Considering Seat Reservations in Movie Theater Services
$30.00
List Price: $37.50
Chapter 8
Davide Mula, Mirko Luca Lobina
We start to analyze each component of database’s definition and to find them in a web page so that we can compare those juridical goods. After that... Sample PDF
Legal Protection of the Web Page
$30.00
List Price: $37.50
Chapter 9
Natalie Pang
In recent years impacts of information and communication technologies, market enclosures, and the opposing struggle to retain community and public... Sample PDF
Collaborative Production, the Knowledge Commons and the Application of Open Content Licenses
$30.00
List Price: $37.50
Chapter 10
Stefano Montanelli, Silvana Castano, Alfio Ferrara, Gaia Varese
In this paper, the authors present a reference P2P architecture based on autonomous, self-emerging semantic communities of interest (CoIs) for... Sample PDF
Managing Collective Intelligence in Semantic Communities of Interest
$30.00
List Price: $37.50
Chapter 11
Jeff J.S. Huang, Stephen J.H. Yang, Jeng C.C Chen, Irene Y.S. Li, Indy Y.T. Hsiao
The emergence of Web 2.0 has brought along the trend of community. It is also the trend that contributes to socialization of the Internet. The... Sample PDF
A Social Bookmarking-Based People Search Service: Building Communities of Practice with Collective Intelligence
$30.00
List Price: $37.50
Top

Reviews and Testimonials

The content of the book is appealing to academia, in which those concerned about intellectual property management are eager to acquire sound techniques for intellectual property protection and fundamental knowledge on intellectual property rights in the frontiers of IT outbursts. Meanwhile, the book works as a technical milestone for research trends of intellectual property protection engineering in the target of the next ten years. Both practitioners with technical agendas and IT engineers of institutional agendas should appreciate this kind of interdisciplinary title.

– Hideyasu Sasaki, Ritsumeikan University, Japan
Top

Topics Covered

  • Access Control for Semantic Web Data
  • Feature Extraction
  • Managing Collective Intelligence
  • Masking models and watermarking
  • Multimedia Content Encryption
  • Open content licenses
  • Property Protection and User Authentication
  • Robust Watermarking Techniques
  • Secure Multimedia Communication
  • Social Bookmarking-Based People Search
Top

Preface

Information technology for intellectual property protection is a hot issue on the globe in the twenty first century because the recent expansion of network connectivity to the Internet known as ubiquitous allows people to enjoy a number of contents and programs stored in the digital forms which are fragile to unauthorized electric duplication or copyright and patent infringement. Institutional protection against digital infringement of multimedia intellectual property has been practically supported by technical solutions which digitally maneuver multimedia contents and programs in the Internet. The advent of new solutions in the area of information technology will allow easy access to the tools for multimedia intellectual property infringement as a negative side effect of innovation.

Facing the digital infringement of intellectual property of contents and programs as operating software of those contents, those in the fields of multimedia information engineering and its institutional operations have been aware of a need of a complete reference of past, current, and future trends of multimedia intellectual property protection from technology to institutions. This book offers a first reference on information technology for intellectual property protection with multidisciplinary knowledge and analyses which are given by leading researchers and practitioners with technical backgrounds in information engineering and institutional experiences in intellectual property practice.

INTRODUCTION

The principal concern of this book is to provide those in the information technology and its institutional practice with a series of concise and thorough references on a variety of issues of intellectual property protection and its proper solutions from the technical aspects. We discuss both technical and institutional solutions to intellectual property protection.

We thoroughly discuss institutional and technical issues and provide their solutions on information technology for intellectual property protection. The goal of this book is to design a complete reference in the area of information technology for intellectual property protection. Already published books just discuss institutional analyses without interdisciplinary insights by technical experts. Meanwhile, technical references only talk about engineering solutions without the social impact to institutional protection.  This book should fill in that gap to fulfill a great mission under which people in the field of information technology for intellectual property protection can discuss all the related issues and their solutions from both institutional and technical aspects.

CHALLENGES

The book brings in a first guidance or introductory reference to graduate students and students in professional schools, researchers, and practitioners in the areas of policy, engineering, and education, and provides them with mandatory knowledge bases on information technology for intellectual property protection. This kind of complete reference has not been available in the previous research publication. Its scholarly value is found in the brand new aspect of engineering solutions to intellectual property protection.

The content of the book is appealing to academia, in which those concerned about intellectual property management are eager to acquire sound techniques for intellectual property protection and fundamental knowledge on intellectual property rights in the frontiers of IT outbursts. Meanwhile, the book works as a technical milestone for research trends of intellectual property protection engineering in the target of the next ten years. Both practitioners with technical agendas and IT engineers of institutional agendas should appreciate this kind of interdisciplinary title.

ORGANIZATION

The book is organized into eleven chapters:

Chapter 1 discusses a robust watermarking technique which is based on distributed multi-resolution transforms (DMT) and singular value decomposition to improve the protection of images.

Chapter 2 discusses masking models and watermarking with two strategies for using a masking model in its application to a classic watermarking technique.

Chapter 3 discusses content encryption for secure communication and provides an overview of encryption technology from background, brief history, and requirement to research progress with general and special encryption algorithms.

Chapter 4 discusses damage-less watermark extraction for information hiding using non-linear feature extraction scheme trained on frequency domain.

Chapter 5 discusses user authentication in IP networks and introduces basic concepts of authentication and challenge-response frameworks.

Chapter 6 discusses query rewriting algorithms for access control to avoid resource-leakage in Semantic Web systems.

Chapter 7 discusses ticketing services using an auction system design for seat reservations at theaters.

Chapter 8 discusses legal protection of Web pages from the database perspective and refers to the World Intellectual Property Organization Copyright Treatments and European Directive 96/92/CE with its future trends.

Chapter 9 discusses a concept of knowledge commons and open content licenses from the perspective of communities.

Chapter 10 discusses a peer-to-peer architecture based on autonomous and self-emerging communities for managing collective knowledge.

Chapter 11 discusses a community creation using bookmarks as resources available in the Internet to make linkages between people of common interests.

GUIDELINE

The main target of prospective academic audience is graduate students who study computer science, information engineering, system engineering, information studies, management of information technology, and library science. Another target is students who are working towards professional degrees in business schools, management schools, MOT programs, public policy schools, law schools, or their equivalents. The other target is not a small number of practitioners including lawyers who counsel to IT companies as in-house counsels or at firms, chief information officers (CIOs), chief technology officers (CTOs), and chief risk management officers (CROs) in enterprises and the consultants in those related fields. Not the last but an important part of prospective audience is found in a large number of intellectual property related staff or administrators in universities and librarians.

The book is designed to offer a reference in the communities on information technology for intellectual property protection. The book has eleven chapters, which should be well allocated as assignments in class at Junior or Senior engineering of the undergraduate lectures, and master-level graduate schools.
Top

Author(s)/Editor(s) Biography

Hideyasu Sasaki is a graduate from the University of Tokyo (1994). He received an LLM from the University of Chicago Law School (1999), a MS (2001) and a PhD (2003) in cybernetic knowledge engineering (media and governance) with honors from Keio University. He is an associate professor in the Department of Information Science and Engineering, Ritsumeikan University (Kyoto, Japan). He was an assistant professor at Keio University from 2003 to 2005. His research interests include knowledge management (decision making theory and strategic decision science decision) and organizational and collective intelligence computing (support systems and e-negotiation). He is an active co-chair at the ICIW-SLAECE Workshop program committee and a program committee member at ICADL, EJC, etc. He was granted with the ICIW/SLAECE Best Paper Award in 2008. He has published more than forty articles world-wide in the recent five years. Since 2000, he has been admitted to practice as an Attorney-and-Counselor at Law in the New York State Bar.