Total views : 443

The Collective Copyright Authentication Scheme Merging Collaborators’ Rights on the Wisdom Contents

Affiliations

  • Division of Information and Communication Engineering, Baekseok University, Korea, Republic of
  • Department of Computer Science and Engineering, Korea University, Korea, Republic of
  • Department of Business, Delaware State University, United States

Abstract


Objectives: As wisdom contents are themselves the thought of people, the contents are made through collaboration of many authors in common, and there exists many duplicated or similar contents also. Methods/Statistical Analysis: Existing copyright authentication schemes mainly focus on the protection of primary author’s right. The collaborators’ rights are subordinated to the primary author. Thus, there needs to be a new scheme that could represent multiple rights on the wisdom contents. We propose the copyright protection scheme suitable for the wisdom contents. The proposed scheme consists of copyright registration, copyright creation and copyright add protocols. The primary author requests the center to do registration of the copyright. The center verifies the primary author’s signature, and if it is valid, the center registers the copyright to the DB. Findings: In this study, we propose the collective copyright authentication scheme. It can merge collaborators’ rights to the existing primary author’s right. It is consisted of collective copyright registration, generation, add and verification protocols. We prove that our scheme is secure against masquerade attack, and the primary author and collaborators cannot deny multiple authorship. The proposed scheme could be extended to make multiple rights by combining each right of similar contents also. In Information Society, as the people’s thoughts are varying each other, the types of software contents are much more various compared to the hardware based products. In this paper, we propose the dynamic copyright protection scheme in which creating and combining multiple authors’ rights are possible. The proposed scheme ensures the right of the primary author and can add the select collaborator’s right. It also could make the business model flexible to provide weighted profit distribution according to the level of developers. Application/Improvements: Due to these properties of our scheme, it’s possible to create or extend the business model which is suitable for trading contents of Collective Intelligence.

Keywords

Authentication, Collaboration, Collective Copyright, Collective Intelligence, Copyright Protection.

Full Text:

 |  (PDF views: 148)

References


  • A Comparative Analysis of Learning Factors through Online Learning and Social Learning. https://www.researchgate.net/publication/301513849_A_Comparative_Analysis_of_Learning_Factors_through_Online_Learning_and_Social_Learning. Date Accessed: 19/10/2015.
  • Want R. iPhone: Smarter than the Average Phone. IEEE Pervasive Computing. 2010 Jul-Sep; 9(3):6-9.
  • The app store: The new "must-have" digital business model. http://www.zdnet.com/article/the-app-store-the-new-must-have-digital-business-model/. Date Accessed: 21/01/2010.
  • How Media Companies Can Make Multichannel Networks Profitable. http://www.forbes.com/sites/strategyand/2014/12/19/how-media-companies-can-make-multichannel-networks-profitable/#1a32a1a66876. Date Accessed: 19/12/2014.
  • Zhao J. A WWW service to embed and prove digital copyright watermarks. Proceeding of the European Conference on Multimedia Application, Services and Techniques.1996 May, p.1-15.
  • Mason A, Salmon RA, Devlin J. User requirements for watermarking in broadcast applications. International broadcasting convention (IBC 2000), 2000.
  • Piva A, Bartolini F, Barni M. Managing copyright in open networks. IEEE Internet Computing. 2002 May-Jun; 6(3):18-26.
  • Business Model Breakdown - Quirky.com. http://www.lumosforbusiness.com/blog/722/28-06-2010/Business+Model+Breakdown++Quirkycom. Date Accessed: 28/06/2010.
  • Rivest R, Shamir A, Adleman L. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM. 1978 Feb; 21(2):120-26.
  • Taher El Gamal. A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. IEEE Transactions on Information Theory. 1985 Jul; 31(4):469-72.
  • Samtani R. Ongoing innovation in digital watermarking. IEEE Computer Society. 2009 Mar; 42(3):92-4.
  • Beyond traditional DRM: moving to digital watermarking and fingerprinting in media. http://www.businesswire.com/news/home/20080219005764/en/Traditional-DRM-Moving-Digital-Watermarking-Fingerprinting-Media. Date Accessed: 19/02/1008.
  • Announcing the Advanced Encryption Standard (AES). http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf. Date Accessed: 26/11/2001.
  • Rosenblatt William, Trippe William, Mooney Stephen. Digital Right Management: Business and Technology. John Wiley & Sons, Inc. New York, NY, USA. 2001.
  • Eric Diehl. Securing Digital Video: Techniques for DRM and Content Protection. Springer, 2012 Ed., 2012 Jun.

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.