You are previewing Intellectual Property Protection for Multimedia Information Technology.
O'Reilly logo
Intellectual Property Protection for Multimedia Information Technology

Book Description

"Since previously published intellectual property law and business research discusses institutional analyses without interdisciplinary insights by technical experts, and technical references tend to concern engineering solutions without considering the social impact of institutional protection of multimedia digital information, there is a growing demand for a resource that bridges the gap between multimedia intellectual property protection law and technology.

Intellectual Property Protection for Multimedia Information Technology provides scholars, management professionals, researchers, and lawyers in the field of multimedia information technology and its institutional practice with thorough coverage of the full range of issues surrounding multimedia intellectual property protection and its proper solutions from institutional, technical, and legal perspectives."

Table of Contents

  1. Copyright
  2. Preface
  3. Acknowledgment
  4. Frameworks
    1. Digital Library Protection Using Patent of Retrieval Process
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. DIGITAL LIBRARY PROTECTION
      5. CASE STUDY
      6. MATHEMATICAL FOUNDATION AND REASONING
      7. DISCUSSION
      8. CONCLUSION
      9. REFERENCES
    2. Intellectual Property Rights: From Theory to Practical Implementation
      1. ABSTRACT
      2. INTRODUCTION
      3. INTELLECTUAL OBJECTS
      4. NORMATIVE JUSTIFICATIONS FOR INTELLECTUAL PROPERTY RIGHTS
      5. THE CASE AGAINST INTELLECTUAL PROPERTY RIGHTS
      6. LEGAL INFRASTRUCTURE TO PROTECT INTELLECTUAL PROPERTY RIGHTS IN THE UNITED STATES
      7. RECENT LEGISLATION
      8. UCITA
      9. DIGITAL RIGHTS MANAGEMENT AND TRUSTED PLATFORMS
      10. CONTROVERSIAL ISSUES AND LEGAL CASES
      11. CONCLUSION
      12. REFERENCES
      13. ENDNOTE
    3. Multimedia Encryption Technology for Content Protection
      1. ABSTRACT
      2. INTRODUCTION
      3. THE BASICS OF MULTIMEDIA CONTENT
      4. BRIEF HISTORY OF MULTIMEDIA CONTENT ENCRYPTION
      5. INTELLECTUAL PROPERTY INVESTIGATION
      6. GENERAL REQUIREMENTS OF MULTIMEDIA CONTENT ENCRYPTION
      7. GENERAL ENCRYPTION SCHEMES
      8. SPECIAL ENCRYPTION SCHEMES
      9. OPEN ISSUES
      10. CONCLUSION
      11. ACKNOWLEDGMENT
      12. REFERENCES
    4. Masking Models and Watermarking: A Discussion on Methods and Effectiveness
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. FUTURE TRENDS
      5. CONCLUSION
      6. REFERENCES
      7. ENDNOTES
    5. Damageless Watermark Extraction Using Nonlinear Feature Extraction Scheme Trained on Frequency Domain
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. DISCUSSION
      5. CONCLUSION
      6. REFERENCES
    6. Perceptual Data Hiding in Still Images
      1. ABSTRACT
      2. INTRODUCTION
      3. BASICS OF HUMAN VISUAL SYSTEM MODELLING
      4. EXPLOITATION OF HVS CONCEPTS FOR DATA HIDING
      5. LIMITS OF CLASSICAL HVS MODELS
      6. IMPROVED MASK BUILDING FOR DATA HIDING
      7. CONCLUSION
      8. REFERENCES
  5. Solutions
    1. Online Personal Data Licensing: Regulating Abuse of Personal Data in Cyberspace
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. CONCLUSION AND FUTURE WORK
      5. REFERENCES
      6. ENDNOTES
    2. Property Protection and User Authentication in IP Networks Through Challenge-Response Mechanisms: Present, Past, and Future Trends
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. FUTURE WORKS
      5. CONCLUSION
      6. REFERENCE
    3. Q-R Code Combined with Designed Mark
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. CONCLUSION
      5. ACKNOWLEDGMENT
      6. REFERENCES
    4. Visual Environment for DOM-Based Wrapping and Client-Side Linkage of Web Applications
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. FUNCTIONAL LINKAGE AMONG WRAPPED WEB APPLICATIONS
      5. CONCLUSION
      6. REFERENCES
    5. Symbolic Computation for DS-CDMA Code Acquisition Using First Order Logic
      1. ABSTRACT
      2. INTRODUCTION
      3. ATP STRATEGY
      4. NUMERIC RESULT
      5. CONCLUSION
      6. REFERENCE
    6. Device Driver Based Computer in Broadband Age
      1. ABSTRACT
      2. BACKGROUND
      3. CONCLUSION
      4. ACKNOWLEDGMENT
      5. REFERENCES
  6. Surveys
    1. Cultivating Communities Through the Knowledge Commons: The Case of Open Content Licenses
      1. ABSTRACT
      2. INTRODUCTION
      3. RES PRIVATÆ, RES PUBLICÆ, AND RES COMMUNES IN MODERN SOCIETY
      4. FUTURE TRENDS
      5. CONCLUSION
      6. REFERENCES
    2. E-Commerce and Digital Libraries
      1. ABSTRACT
      2. INTRODUCTION
      3. ISSUES CONFRONTING DIGITAL LIBRARIES
      4. XML MIGHT HOLD THE KEY
      5. CONCLUSION
      6. REFERENCES
    3. Intellectual Property Protection and Standardization
      1. ABSTRACT
      2. INTRODUCTION
      3. USE OF PROTECTION STRATEGIES AND MOTIVES FOR PATENTING
      4. FACTORS EXPLAINING PARTICIPATION IN STANDARDIZATION
      5. CONCLUSION
      6. ACKNOWLEDGMENT
      7. REFERENCES
      8. ENDNOTES
    4. The Performance of Standard Setting Organizations: Using Patent Data for Evaluation
      1. ABSTRACT
      2. INTRODUCTION
      3. SSOs AND INTELLECTUAL PROPERTY
      4. DATA
      5. CITATION PATTERNS
      6. SELECTION vs. CAUSATION
      7. CONCLUSION
      8. REFERENCES
      9. ENDNOTES
    5. Patents and Standards in the ICT Sector: Are Submarine Patents a Substantive Problem or a Red Herring?
      1. ABSTRACT
      2. INTRODUCTION
      3. RESEARCH OBJECTIVE AND METHODOLOGY
      4. THE ORIGINS OF SUBMARINE PATENTS
      5. PATENT STRATEGIES AND TECHNOLOGY LICENSING PRACTICES IN THE ICT SECTOR
      6. STANDARDIZATION AND SUBMARINE PATENTS
      7. LICENSING OF PATENTS AND STANDARDIZATION
      8. DISCUSSION
      9. REFERENCES
    6. Legal Protection of the Web Page as a Database
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. FUTURE TRENDS
      5. CONCLUSION
      6. REFERENCES
    7. Steganography and Steganalysis
      1. ABSTRACT
      2. INTRODUCTION
      3. CONCLUSION
      4. REFERENCES
    8. Intellectual Property Protection in Multimedia Grids
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND—LEGISLATION IN MULTIMEDIA GRIDS
      4. DATA GRIDS AND GRID SERVICE PROVIDERS
      5. MOVIE-EDITING SOFTWARE: AN EXAMPLE MULTIMEDIA GRID APPLICATION
      6. MULTIMEDIA GRID LICENSING
      7. CONTRACTING A NODE TO THE GRID
      8. CONCLUSION
      9. REFERENCES
    9. Secure Image Archiving Using Novel Digital Watermarking Techniques
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
      4. ADAPTIVE WATERMARKING AND KEY GENERATION USING NEURAL NETWORK
      5. BACK PROPAGATION NETWORK
      6. THREE LAYER IMAGE DATA STRUCTURE
      7. CONCLUSION
      8. REFERENCES
  7. Compilation of References
  8. About the Contributors
  9. Index