Computer Science and Information Technologies, Computer Science and Information Technologies 2009

Font Size: 
Copyright and IPR management for cultural heritage digital content in peer to peer networks
G. Stylios, D. Tsolis, E. Georgatos, S. Chatzikostas, M. Orologa, I. Badouvas, S. Sioustas

Last modified: 2021-01-29

Abstract


As a general and effective protection measure forcopyright violations which occur with the use ofdigital technologies including peer to peer (P2P)networks, copyright owners from the cultural sectoroften use digital watermarking techniques so as toencrypt copyright information to the content orotherwise restrict or even block access to the digitalcontent through the Internet and the P2Pinfrastructure. This paper claims that DRM and P2Pcan be quite complementary. Specifically, a P2Pinfrastructure is presented which allows broaddigital cultural content exchange while on the sametime supports copyright protection and managementthrough watermarking technologies for digitalimages.

Keywords


IPR management; cultural heritage; digital content; peer to peer networks

References


1. Cox IJ., Miller M.L. and Bloom J.A. “DigitalWatermarking”. Morgan Kaufmann Publishers, 2002.

2. “The Digital Dilemma: Intellectual Property in theInformation Age”. In: National Research Council“Computer Science and Telecommunications Board”.National Academy Press, Washington, 1999, pp. 2-3.

3. “Digital Millennium Copyright Act”. House of
Representatives, 1998.

4. Nikolaidis N., Pitas I. “Digital Image Watermarking”.An Overview, ICMCS, Vol. 1, 1999, pp. 1-6.

5. Nikolaidis N. and Pitas I. “Robust imagewatermarking in the spatial domain”. SignalProcessing, Elsevier, 1998; Vol. 66, No. 3, pp. 385-403.

6. Nikolaidis N., Tsekeridou S., Nikolaidis A., Tefas A.,Solachidis V. and Pitas I. “Applications of chaoticsignal processing techniques to multimediawatermarking”. In: Proc. of the IEEE workshop onNonlinear Dynamics in Electronic Systems. Catania,Italy, 2000, pp. 1-7.

7. Davis R. “The Digital Dilemma”. Communications ofthe ACM, 2001; Vol. 44, pp. 80.

8. Wayner P. “Disappearing Cryptography —Information Hiding: Steganography andWatermarking”. Morgan Kaufmann, 2002, pp. 291-318.

9. Sioutas 8. “NBDT: An efficient P2P indexing schemefor Web Service Discovery”. International Journal ofWeb Engineering and Technologies, Vol. 4(1),pp. 95-113.

10. Kaporis A. et. al “Improved Bounds for Finger Searchona RAM”. ESA, LNCS 2832, 2003, pp. 325-336.

11,Kaporis A. et. al “Dynamic Interpolation SearchRevisited”. ICALP, LNCS 4051, 2006, pp. 382-394.

12.Einhorn M. and Rosenblatt B. “Peer to PeerNetworking and Digital Rights Management - HowMarket Tools Can Solve Copyright Problems”. PolicyAnalysis Journal, 2005; No. 534.

13.Barni M., Bartolini F., Cappellini V., Piva A. “A DCT-domain system for robust image watermarking”. Signal Processing "Special Issue on Watermarking", 1998; 3(66), pp. 357-372.

14. Fotopoulos V., Skodras A.N. “A Subband DCT Approach to Image Watermarking”. In: Proc. of the x European Signal Processing Conference (EUSIPCO-2000). Tampere, Finland, 2000.


Full Text: PDF