You are previewing Information Technology for Intellectual Property Protection.
O'Reilly logo
Information Technology for Intellectual Property Protection

Book Description

Information technology for intellectual property protection has become an increasingly important issue due to the expansion of ubiquitous network connectivity, which allows people to use digital content and programs that are susceptible to unauthorized electric duplication or copyright and patent infringement.Information Technology for Intellectual Property Protection: Interdisciplinary Advancements contains multidisciplinary knowledge and analysis by leading researchers and practitioners with technical backgrounds in information engineering and institutional experience in intellectual property practice. Through its discussions of both engineering solutions and the social impact of institutional protection, this book fills a gap in the existing literature and provides methods and applications for both practitioners and IT engineers.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Preface
    1. INTRODUCTION
    2. CHALLENGES
    3. ORGANIZATION
    4. GUIDELINE
  5. Acknowledgment
  6. Section 1: Technologies
    1. Chapter 1: Distributed Multiresolution Transform Based Framework for Watermarking
      1. ABSTRACT
      2. INTRODUCTION
      3. DIGITAL WATERMARKING: PROBLEM FORMULATION
      4. REQUIREMENTS FOR WATERMARKING SCHEMES
      5. TYPES OF WATERMARKING
      6. APPLICATIONS OF WATERMARKING
      7. LITERATURE SURVEY FOR DIGITAL WATERMARKING
      8. DISTRIBUTED MULTIRESOLUTION TRANSFORM (DMT)
      9. CHAOTIC MAPS
      10. PROPOSED WATERMARKING FRAMEWORK
      11. CONCLUSION
    2. Chapter 2: Masking Models and Watermarking
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. RECENT PAST AND PRESENT TRENDS
      5. CONCLUSION
    3. Chapter 3: Multimedia Content Encryption for Secure Multimedia Communication
      1. ABSTRACT
      2. INTRODUCTION
      3. THE BASIC OF MULTIMEDIA CONTENT ENCRYPTION
      4. BRIEF HISTORY OF MULTIMEDIA CONTENT ENCRYPTION
      5. INTELLECTUAL PROPERTY INVESTIGATION
      6. GENERAL REQUIREMENTS OF MULTIMEDIA CONTENT ENCRYPTION
      7. GENERAL ENCRYPTION SCHEMES
      8. SPECIAL ENCRYPTION SCHEMES
      9. OPEN ISSUES
      10. CONCLUSION
    4. Chapter 4: Advancement on Damage-Less Watermark Extraction Using Non-Linear Feature Extraction Scheme Trained on Frequency Domain
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. PROPOSED METHOD
      5. EXPERIMENTS AND FUTURE WORKS
      6. DISCUSSION AND FUTURE WORKS
      7. CONCLUSION
    5. Chapter 5: Property Protection and User Authentication in IP Networks through Challenge-Response Mechanisms
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. FUTURE WORKS
      5. CONCLUSION
    6. Chapter 6: Access Control on Semantic Web Data Using Query Rewriting
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. A BRIEF OVERVIEW ON SEMANTIC WEB
      4. 3. ACCESS CONTROL MODELS FOR SEMANTIC WEB
      5. 4. QUERY REWRITING FOR ACCESS CONTROL
      6. 6. RELATED WORK
      7. 7. CONCLUSION AND FUTURE WORK
    7. Chapter 7: An Auction Mechanism Considering Seat Reservations in Movie Theater Services
      1. ABSTRACT
      2. INTRODUCTION1
      3. APPROACH FOR SERVICE DESIGN
      4. FORMULATION OF BASIC FRAMEWORK
      5. PROPOSED AUCTION MECHANISM WITH SEAT RESERVATIONS
      6. THEORETICAL EQUILIBRIUM
      7. EXPERIMENTS WITH HUMAN SUBJECTS
      8. AGENT-BASED SIMULATION
      9. CONCLUSION
  7. Section 2: Institutional Studies
    1. Chapter 8: Legal Protection of the Web Page
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. DEFINITION OF DATABASE AND WEB PAGE
      5. FUTURE TRENDS
      6. CONCLUSION
    2. Chapter 9: Collaborative Production, the Knowledge Commons and the Application of Open Content Licenses
      1. ABSTRACT
      2. INTRODUCTION
      3. RES PRIVATAE, RES PUBLICÆ AND RES COMMUNES IN MODERN SOCIETY
      4. COPY: RIGHT AND LEFT LICENSES
      5. THE CONTEMPORARY MEDIA ENVIRONMENT
      6. THE CASE FOR OPEN CONTENT LICENSES
      7. A BRIEF GUIDE TO OPEN CONTENT LICENSES
      8. FUTURE TRENDS
      9. CONCLUSION
    3. Chapter 10: Managing Collective Intelligence in Semantic Communities of Interest
      1. ABSTRACT
      2. INTRODUCTION
      3. REFERENCE P2P ARCHITECTURE AND KNOWLEDGE MODEL
      4. CONSTRUCTION OF THE COLLECTIVE INTELLIGENCE
      5. APPLICATION TO THE E-HEALTH DOMAIN
      6. RELATED WORK
      7. CONCLUSION
      8. APPENDIX
    4. Chapter 11: A Social Bookmarking-Based People Search Service
      1. ABSTRACT
      2. INTRODUCTION
      3. WEB SEARCH SERVICE IN PEOPLE SEARCH AND RESOURCE SEARCH
      4. PEOPLE SEARCH SERVICE WITH COLLECTIVE INTELLIGENCE
      5. BUILDING COP FROM COLLABORATIVE SOCIAL TAGGING
      6. SOCIAL BOOKMARKING-BASED PEOPLE SEARCH SERVICE
  8. Compilation of References
  9. About the Contributors