Browse > Article
http://dx.doi.org/10.15207/JKCS.2015.6.6.185

The Method of Digital Copyright Authentication for Contents of Collective Intelligence  

Yun, Sunghyun (Division of Information and Communication Engineering, Baekseok University)
Lee, Keunho (Division of Information and Communication Engineering, Baekseok University)
Lim, Heuiseok (Dept. of Computer Science and Engineering, Korea University)
Kim, Daeryong (Dept. of Business, Delaware State University)
Kim, Jung-hoon (Dept. of Saemaeul Studies and International Development, Youngnam University)
Publication Information
Journal of the Korea Convergence Society / v.6, no.6, 2015 , pp. 185-193 More about this Journal
Abstract
The wisdom contents consists of an ordinary person's ideas and experience. The Wisdom Market [1] is an online business model where wisdom contents are traded. Thus, the general public could do business activities in the Wisdom Market at ease. As the wisdom contents are themselves the thought of persons, there exists many similar or duplicated contents. Existing copyright protection schemes mainly focus on the primary author's right. Thus, it's not appropriate for protecting the contents of Collective Intelligence that requires to protect the rights of collaborators. There should exist a new method to be dynamic capable of combining and deleting rights of select collaborators. In this study, we propose collective copyright authentication scheme suitable for the contents of Collective Intelligence. The proposed scheme consists of collective copyright registration, addition and verification protocols. It could be applied to various business models that require to combine multiple rights of similar contents or to represent multiple authorships on the same contents.
Keywords
Collective Intelligence; Contents Protection; Copyright Protection; Collective Copyright; Authorship Management;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Development of distribution and diffusion service technology through individual and collective Intelligence to digital contents, ICT R&D program of MSIP/IITP, 1st Year Annual Report, Korea University, 2014.
2 Want, R., "iPhone: Smarter Than the Average Phone," IEEE Pervasive Computing, Vol. 9, No. 3, pp. 6-9, IEEE, 2010.   DOI
3 Dion Hinchcliffe, "The app store: The new "must-have" digital business model", http://www.zdnet.com/article/ the-app-store-the-new-must-have-digital-business-model/, 2010.
4 Christopher A. H. Vollmer, Sebastian Blum, Kristina Bennin, "How Media Companies Can Make Multichannel Networks Profitable," Forbes, http://www.forbes.com/2014/12/19/how-media/a-companies-can-make-multichannel-networks-profitable/, 2014.
5 Zhao J, "A WWW service to embed and prove digital copyright watermarks," Proc. Of the European Conference on Multimedia Application, Services and Techniques, pp. 695-710, 1996.
6 Mason A, Salmon RA, Devlin J, "User requirements for watermarking in broadcast applications," International broadcasting convention (IBC 2000), Amsterdam, The Netherlands, 2000.
7 Piva A, Bartolini F, Barni M, "Managing copyright in open networks," IEEE Internet Computing, pp. 18-26, 2002.
8 Business Model Breakdown - Quirky.com, http://www.lumosforbusiness.com/blog/722/28-06-2010/Business+Model+Breakdown++Quirkycom, Lumos Business Solutions Inc.
9 Rivest R, Shamir A, Adleman L, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Communications of the ACM 21 (2), pp. 120-126, 10.1145/359340.359342, 1978.   DOI
10 Taher ElGamal, "A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms," IEEE Transactions on Information Theory 31 (4), pp. 469-472, 10.1109/TIT.1985.   DOI
11 Samtani R, "Ongoing innovation in digital watermarking," Computer 42, pp. 92-94, 10.1109/MC.2009.93, 2009.   DOI
12 Kirstein M, "Beyond traditional DRM: moving to digital watermarking & fingerprinting in media," MultiMedia Intelligence, 2008.
13 "Announcing the ADVANCED ENCRYPTION STANDARD (AES)," FIPS 197, NIST, 2012.
14 Rosenblatt. Bill, Trippe. Bill, Mooney. Stephen, Digital Right Management: Business and Technology. M&T Books, 2002.
15 Eric Diehl, Securing Digital Video: Techniques for DRM and Content Protection. Springer, 2012.