The Method of Digital Copyright Authentication for Contents of Collective Intelligence |
Yun, Sunghyun
(Division of Information and Communication Engineering, Baekseok University)
Lee, Keunho (Division of Information and Communication Engineering, Baekseok University) Lim, Heuiseok (Dept. of Computer Science and Engineering, Korea University) Kim, Daeryong (Dept. of Business, Delaware State University) Kim, Jung-hoon (Dept. of Saemaeul Studies and International Development, Youngnam University) |
1 | Development of distribution and diffusion service technology through individual and collective Intelligence to digital contents, ICT R&D program of MSIP/IITP, 1st Year Annual Report, Korea University, 2014. |
2 | Want, R., "iPhone: Smarter Than the Average Phone," IEEE Pervasive Computing, Vol. 9, No. 3, pp. 6-9, IEEE, 2010. DOI |
3 | Dion Hinchcliffe, "The app store: The new "must-have" digital business model", http://www.zdnet.com/article/ the-app-store-the-new-must-have-digital-business-model/, 2010. |
4 | Christopher A. H. Vollmer, Sebastian Blum, Kristina Bennin, "How Media Companies Can Make Multichannel Networks Profitable," Forbes, http://www.forbes.com/2014/12/19/how-media/a-companies-can-make-multichannel-networks-profitable/, 2014. |
5 | Zhao J, "A WWW service to embed and prove digital copyright watermarks," Proc. Of the European Conference on Multimedia Application, Services and Techniques, pp. 695-710, 1996. |
6 | Mason A, Salmon RA, Devlin J, "User requirements for watermarking in broadcast applications," International broadcasting convention (IBC 2000), Amsterdam, The Netherlands, 2000. |
7 | Piva A, Bartolini F, Barni M, "Managing copyright in open networks," IEEE Internet Computing, pp. 18-26, 2002. |
8 | Business Model Breakdown - Quirky.com, http://www.lumosforbusiness.com/blog/722/28-06-2010/Business+Model+Breakdown++Quirkycom, Lumos Business Solutions Inc. |
9 | Rivest R, Shamir A, Adleman L, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Communications of the ACM 21 (2), pp. 120-126, 10.1145/359340.359342, 1978. DOI |
10 | Taher ElGamal, "A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms," IEEE Transactions on Information Theory 31 (4), pp. 469-472, 10.1109/TIT.1985. DOI |
11 | Samtani R, "Ongoing innovation in digital watermarking," Computer 42, pp. 92-94, 10.1109/MC.2009.93, 2009. DOI |
12 | Kirstein M, "Beyond traditional DRM: moving to digital watermarking & fingerprinting in media," MultiMedia Intelligence, 2008. |
13 | "Announcing the ADVANCED ENCRYPTION STANDARD (AES)," FIPS 197, NIST, 2012. |
14 | Rosenblatt. Bill, Trippe. Bill, Mooney. Stephen, Digital Right Management: Business and Technology. M&T Books, 2002. |
15 | Eric Diehl, Securing Digital Video: Techniques for DRM and Content Protection. Springer, 2012. |