Tải bản đầy đủ (.pdf) (483 trang)

Intellectual Property Protection for Multimedia Information Technology docx

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (8.79 MB, 483 trang )

Intellectual Property
Protection for Multimedia
Information Technology
Hideyasu Sasaki
Ritsumeikan University, Japan
Hershey • New York
InformatIon scIence reference
Acquisitions Editor: Kristin Klinger
Development Editor: Kristin Roth
Senior Managing Editor: Jennifer Neidig
Managing Editor: Sara Reed
Copy Editor: Angela Thor
Typesetter: Jamie Snavely
Cover Design: Lisa Tosheff
Printed at: Yurchak Printing Inc.
Published in the United States of America by
Information Science Reference (an imprint of IGI Global)
701 E. Chocolate Avenue, Suite 200
Hershey PA 17033
Tel: 717-533-8845
Fax: 717-533-8661
E-mail:
Web site:
and in the United Kingdom by
Information Science Reference (an imprint of IGI Global)
3 Henrietta Street
Covent Garden
London WC2E 8LU
Tel: 44 20 7240 0856
Fax: 44 20 7379 0609


Web site:
Copyright © 2008 by IGI Global. All rights reserved. No part of this publication may be reproduced, stored or distributed in any form or by
any means, electronic or mechanical, including photocopying, without written permission from the publisher.
Product or company names used in this set are for identication purposes only. Inclusion of the names of the products or companies does
not indicate a claim of ownership by IGI Global of the trademark or registered trademark.
Library of Congress Cataloging-in-Publication Data
Intellectual property protection for multimedia information technology / Hideyasu Sasaki, editor.
p. cm.
Summary: “This book provides scholars, management professionals, researchers, and lawyers in the eld of multimedia information
technology and its institutional practice with thorough coverage of the full range of issues surrounding multimedia intellectual property
protection and its proper solutions from institutional, technical, and legal perspectives” Provided by publisher.
Includes bibliographical references and index.
ISBN 978-1-59904-762-1 (hardcover) ISBN 978-1-59904-764-5 (ebook)
1. Multimedia systems. 2. Information technology Management. 3. Intellectual property. 4. Copyright infringement. I. Sasaki,
Hideyasu.
QA76.575I235 2007
006.7 dc22
2007022234
British Cataloguing in Publication Data
A Cataloguing in Publication record for this book is available from the British Library.
All work contributed to this book set is original material. The views expressed in this book are those of the authors, but not necessarily of
the publisher.
If a library purchased a print copy of this publication, please go to />pdf for information on activating the library's complimentary electronic access to this publication.
Preface xv
Acknowledgment xix
Section I
Frameworks
Chapter I
Digital Library Protection Using Patent of Retrieval Process /
Hideyasu Sasaki and Yasushi Kiyoki 1

Chapter II
Intellectual Property Rights: From Theory to Practical Implementation /
Richard A. Spinello and Herman T. Tavani 25
Chapter III
Multimedia Encryption Technology for Content Protection / Shiguo Lian 70
Chapter IV
Masking Models and Watermarking: A Disussion on Methods and Effectiveness /
Mirko Luca Lobina, Luigi Atzori, and Davide Mula 93
Chapter V
Damageless Watermark Extraction Using Nonlinear Feature Extraction Scheme Trained
on Frequency Domain / Kensuke Naoe and Yoshiyasu Takefuji 117
Chapter VI
Perceptual Data Hiding in Still Images / Mauro Barni, Franco Bartolini, and Alessia De Rosa 143
Table of Contents
Section II
Solutions
Chapter VII
Online Personal Data Licensing: Regulating Abuse of Personal Data in Cyberspace /
Yuh-Jzer Joung and Shi-Cho Cha 162
Chapter VIII
Property Protection and User Authentication in IP Networks Through Challenge-Response
Mechanisms: Present, Past, and Future Trends /
Giaime Ginesu, Mirko Luca Lobina, and Daniele D. Giusto 186
Chapter IX
Q-R Code Combined with Designed Mark / Jun Sasaki, Hiroaki Shimomukai,
and Yutaka Funyu 206
Chapter X
Visual Environment for DOM-Based Wrapping and Client-Side Linkage of Web Applications /
Kimihito Ito and Yuzuru Tanaka 219
Chapter XI

Symbolic Computation for DS-CDMA Code Acquisition Using First Order Logic /
Ruo Ando and Yoshiyasu Takefuji 241
Chapter XII
Device Driver Based Computer in Broadband Age /
Yoshiyasu Takefuji, Koichiro Shoji, and Takashi Nozaki 251
Section III
Surveys
Chapter XIII
Cultivating Communities Through the Knowledge Commons:
The Case of Open Content Licenses / Natalie Pang 260
Chapter XIV
E-Commerce and Digital Libraries / Suliman Al-Hawamdeh and Schubert Foo 278
Chapter XV
Intellectual Property Protection and Standardization / Knut Blind and Nikolaus Thumm 292
Chapter XVI
The Performance of Standard Setting Organizations: Using Patent Data for Evaluation /
Marc Rysman and Tim Simcoe 305
Chapter XVII
Patents and Standards in the ICT Sector: Are Submarine Patents a Substantive Problem
or a Red Herring? / Aura Soininen 320
Chapter XVIII
Legal Protection of the Web Page as a Database / Davide Mula and Mirko Luca Lobina 358
Chapter XIX
Steganography and Steganalysis / Merrill Warkentin, Mark B. Schmidt, and Ernest Bekkering 374
Chapter XX
Intellectual Property Protection in Multimedia Grids / Irene Kafeza and Eleanna Kafeza 381
Chapter XXI
Secure Image Archiving Using Novel Digital Watermarking Techniques /
Ruo Ando and Yoshiyasu Takefuji 399
Compilation of References 413

About the Contributors 448
Index 453
Detailed Table of Contents
Preface xv
Acknowledgment xix
Section I
Frameworks
Chapter I
Digital Library Protection Using Patent of Retrieval Process /
Hideyasu Sasaki and Yasushi Kiyoki 1
In this chapter, we present a formulation for protecting digital library as intellectual property, especially
image digital library. The entire content of digital library assembled by database designers is to be differ-
entiated from its individual contents. The digital library community demands an innovative approach for
protecting digital library associated with content-based retrieval that dynamically generates indexes to its
contents. The entire content with dynamically assigned indexes goes beyond the scope of the conventional
copyright protection of the database with statically assigned indexes. The proposed formulation uses the
patent of content based retrieval process, and protects its object digital library in the specied domain
without any excessively exclusive protection in general domains. That formulation determines whether the
problem retrieval process identies a classication of the entire content stored in its object digital library
as a single and unique collection or its equivalents within the scope of its specied domain. The similar
collection realized in other digital libraries evidences unauthorized use of the problem retrieval process
or its equivalents as far as it is patented. The patent of content-based retrieval process works as a catalyst
of digital library protection, and restricts any other assembling of equivalent digital libraries in the scope
of its specied domain. We provide mathematical foundation and reasoning of the proposed formulation,
and conrm its feasibility and accountability in several case studies.
Chapter II
Intellectual Property Rights: From Theory to Practical Implementation /
Richard A. Spinello and Herman T. Tavani 25
This chapter presents some foundational concepts and issues in intellectual property. We begin by dening
intellectual objects, which we contrast with physical objects or tangible goods. We then turn to some of the

normative justications that have been advanced to defend the granting of property rights in general, and
we ask whether those rationales can be extended to the realm of intellectual objects. Theories of property
introduced by Locke and Hegel, as well as utilitarian philosophers, are summarized and critiqued. This
sets the stage for reviewing the case against intellectual property. We reject that case and claim instead that
policy makers should aim for balanced property rights that avoid the extremes of overprotection and under-
protection. Next we examine four different kinds of protection schemes for intellectual property that have
been provided by our legal system: copyright laws, patents, trademarks, and trade secrets. This discussion
is supplemented with a concise review of recent U.S. legislation involving copyright and digital media and
an analysis of technological schemes of property protection known as digital rights management. Finally,
we consider a number of recent controversial court cases, including the Napster case and the Microsoft
antitrust suit. Many of the issues and controversies introduced in this chapter are explored and analyzed
in greater detail in the subsequent chapters of this book.
Chapter III
Multimedia Encryption Technology for Content Protection / Shiguo Lian 70
The principal concern of this chapter is to provide those in the multimedia or content protection com-
munity with an overview of multimedia content encryption technology. Multimedia (image, audio, or
video) content encryption technologies are reviewed, from the background, brief history, performance
requirement, to research progress. Additionally, the general encryption algorithms are classied, and
their performances are analyzed and compared. Furthermore, some special encryption algorithms are
introduced. Finally, some open issues and potential research topics are presented, followed by some
conclusions. The author hopes that the chapter will not only inform researchers of the progress of mul-
timedia content encryption, but also guide the design of practical applications in the industry eld.
Chapter IV
Masking Models and Watermarking: A Disussion on Methods and Effectiveness /
Mirko Luca Lobina, Luigi Atzori, and Davide Mula 93
Many audio watermarking techniques presented in the last years make use of masking and psychologi-
cal models derived from signal processing. Such a basic idea is winning because it guarantees a high
level of robustness and bandwidth of the watermark as well as delity of the watermarked signal. This
chapter rst describes the relationship between digital right management, intellectual property, and use
of watermarking techniques. Then, the crossing use of watermarking and masking models is detailed,

providing schemes, examples, and references. Finally, the authors present two strategies that make use
of a masking model, applied to a classic watermarking technique. The joint use of classic frameworks
and masking models seems to be one of the trends for the future of research in watermarking. Several
tests on the proposed strategies with the state of the art are also offered to give an idea of how to assess
the effectiveness of a watermarking technique.
Chapter V
Damageless Watermark Extraction Using Nonlinear Feature Extraction Scheme Trained
on Frequency Domain / Kensuke Naoe and Yoshiyasu Takefuji 117
In this chapter, we propose a new information hiding and extracting method without embedding any
information into the target content by using a nonlinear feature extraction scheme trained on frequency
domain.The proposed method can detect hidden bit patterns from the content by processing the coef-
cients of the selected feature subblocks to the trained neural network. The coefcients are taken from the
frequency domain of the decomposed target content by frequency transform. The bit patterns are retrieved
from the network only with the proper extraction keys provided. The extraction keys, in the proposed
method, are the coordinates of the selected feature subblocks and the neural network weights generated
by the supervised learning of the neural network. The supervised learning uses the coefcients of the
selected feature subblocks as the set of input values, and the hidden bit patterns are used as the teacher
signal values of the neural network, which is the watermark signal in the proposed method.With our
proposed method, we are able to introduce a watermark scheme with no damage to the target content.
Chapter VI
Perceptual Data Hiding in Still Images / Mauro Barni, Franco Bartolini, and Alessia De Rosa 143
The idea of embedding some information within a digital media, in such a way that the inserted data are
intrinsically part of the media itself, has aroused a considerable interest in different elds. One of the
more examined issues is the possibility of hiding the highest possible amount of information without
affecting the visual quality of the host data. For such a purpose, the understanding of the mechanisms
underlying Human Vision is a mandatory requirement. Hence, the main phenomena regulating the Hu-
man Visual System will be rstly discussed and their exploitation in a data hiding system will be then
considered.
Section II
Solutions

Chapter VII
Online Personal Data Licensing: Regulating Abuse of Personal Data in Cyberspace /
Yuh-Jzer Joung and Shi-Cho Cha 162
We propose a new technical and legal approach, called online personal data licensing (OPDL), for respond-
ing to concerns about the privacy of personal data. Unlike traditional privacy-enhancing technologies
that typically aim to hide personal data, OPDL enables individuals to concretize their consent to allow
others to use their personal data as licenses. Service providers must obtain licenses before legally col-
lecting, processing, or using a person’s data. By allowing individuals to issue their own licenses and to
determine the content of the licenses, OPDL brings the control of personal data back to their owner, and
ensures that the use of the data is strictly under the owner’s consent. In contrast, most Web-based service
providers today use passive consent, which usually results in situations in which users have inadvertently
given the providers the authorization to use their personal data. Besides, users generally do not have
information on who still owns a copy of their data, and how their data have been, or will be, used.
Chapter VIII
Property Protection and User Authentication in IP Networks Through Challenge-Response
Mechanisms: Present, Past, and Future Trends /
Giaime Ginesu, Mirko Luca Lobina, and Daniele D. Giusto 186
Authentication is the way of identifying an individual. The techniques used to accomplish such prac-
tice strongly depend on the involved parties, their interconnection, and the required level of security.
In all cases, authentication is used to enforce property protection, and may be specically intended for
the copyright protection of digital contents published on the Internet. This chapter introduces the basic
concepts of authentication, explaining their relationship with property protection. The basic functional-
ities of challenge-response frameworks are presented, together with several applications and the future
trends.
Chapter IX
Q-R Code Combined with Designed Mark / Jun Sasaki, Hiroaki Shimomukai,
and Yutaka Funyu 206
The mobile Internet has been used widely in Japan. If we use a cellular phone with the Q-R (Quick Re-
sponse) code reader function (a two-dimensional code developed by Denso-Wave Corporation), we can
very easily access a Web site. However, though the existence of Q-R code reader function in the cellular

phone is well-known, not many people use the function. The reason is that the Q-R code is not intuitive
because it was developed to be read by machines. Our idea to solve the problem is to combine the Q-R
code with a designed particular picture or graphic. We propose a method to produce the designed Q-R
code and we develop its production system. This chapter describes the proposed method, the production
system, and evaluation results using some designed Q-R codes produced by the system.
Chapter X
Visual Environment for DOM-Based Wrapping and Client-Side Linkage of Web Applications /
Kimihito Ito and Yuzuru Tanaka 219
Web applications, which are computer programs ported to the Web, allow end-users to use various re-
mote services and tools through their Web browsers. There are an enormous number of Web applications
on the Web, and they are becoming the basic infrastructure of everyday life. In spite of the remarkable
development of Web-based infrastructure, it is still difcult for end-users to compose new integrated
tools of both existing Web applications and legacy local applications, such as spreadsheets, chart tools,
and database. In this chapter, the authors propose a new framework where end-users can wrap remote
Web applications into visual components, called pads, and functionally combine them together through
drag-and-drop operations. The authors use, as the basis, a meme media architecture IntelligentPad that
was proposed by the second author. In the IntelligentPad architecture, each visual component, called a
pad, has slots as data I/O ports. By pasting a pad onto another pad, users can integrate their functional-
ities. The framework presented in this chapter allows users to visually create a wrapper pad for any Web
application by dening HTML nodes within the Web application to work as slots. Examples of such a
node include input-forms and text strings on Web pages. Users can directly manipulate both wrapped
Web applications and wrapped local legacy tools on their desktop screen to dene application linkages
among them. Since no programming expertise is required to wrap Web applications or to functionally
combine them together, end-users can build new integrated tools of both wrapped Web applications and
local legacy applications.
Chapter XI
Symbolic Computation for DS-CDMA Code Acquisition Using First Order Logic /
Ruo Ando and Yoshiyasu Takefuji 241
CDMA (code division multiple access) is widely used because of its effectiveness to send multiple signal
and condentiality of career signal. We present a formulation of state-space problem of which solution

is directed by redundant reasoning control method for semiheuristic and lightweight DS-CDMA code
acquisition. The reasoning of the state-space problem provides us with the way to nd a K bit synchro-
nized sequence among K dephased sequences with less calculation cost, compared with serial search
and matched lter. In this process, redundancy-restriction method, called weighting strategy, enhances
the searching ability of FOL (rst order logic) reasoning for the faster and lightweight code acquisition.
The combination of weighting strategy and correlator enables us to achieve the peak-detection within
K/3 times of calculating inner products and its measurement. Our system is evaluated by the reduced
cost of proving state-space problem using weighting strategy and its robustness of using the proposal
code acquisition framework. Experiment shows that the proposal method is robust if K/N sequences are
grouped with N ranging from 3 to 5.
Chapter XII
Device Driver Based Computer in Broadband Age /
Yoshiyasu Takefuji, Koichiro Shoji, and Takashi Nozaki 251
In this chapter, we present a device-driver-based computer that realizes the reduction of mode (domain
or vertical) switching overheads between user and kernel mode with innovative attributes, including
shared keyboards and mice, access-controlled les, and timed les. Experimented results show that old
personal computers can revive again with the proposed Driverware technology. The proposed Driverware
can improve the CPU resource utilization by three times.
Section III
Surveys
Chapter XIII
Cultivating Communities Through the Knowledge Commons:
The Case of Open Content Licenses / Natalie Pang 260
In recent years, impacts of information and communication technologies, market enclosures, and the
struggle to retain public goods have had signicant impacts on the nature of interactions of communi-
ties. This chapter examines communities in the context of the knowledge commons–a space by which
“a particular type of freedom” (Benkler, 2004) can be practised. It is also an appropriate concept applied
to the discussion of communities and the ways they work. As Castells (2003) noted, self-knowledge “is
always a construction no matter how much it feels like a discovery,” and this construction is enabled
when people work, or associate themselves with each other. In particular, the chapter is concerned about

the structure of open content licenses operating within such domains. The chapter rst explores the con-
cept of the knowledge commons to understand the types of intellectual property that are distinctive to
communities (public, communal, and private). Thereafter, licenses, as a structure, are examined as they
may apply within such contexts. A signicant inuence on the discussion is the contemporary media
environment operating in today resulting in the breaking down of boundaries, the blurring of distinctions
between an original and a copy, and shifting the nature of production in communities. These debates lead
to a case for open content licenses as appropriate structural mechanisms for communities.
Chapter XIV
E-Commerce and Digital Libraries / Suliman Al-Hawamdeh and Schubert Foo 277
Until recently, digital libraries have provided free access to either limited resources owned by an
organization or information available in the public domain. For digital libraries to provide access to
copyrighted material, an access control and charging mechanism needs to be put in place. Electronic
commerce provides digital libraries with the mechanism to provide access to copyrighted material in
a way that will protect the interest of both the copyright owner and the digital library. In fact, many
organizations, such as the Association for Computing Machinery (ACM) and the Institute of Electrical
and Electronics Engineers (IEEE), have already started to make their collections available online. The
subscription model seems to be the favourable option at this point of time. However, for many ad hoc
users, the subscription model can be expensive and not an option. In order to cater to a wider range of
users, digital libraries need to go beyond the subscription models and explore other possibilities, such
as the use of micro payments, that appear to be an alternative logical solution. But, even before that can
happen, digital libraries will need to foremost address a number of outstanding issues, among which
including access control, content management, information organization, and so on. This chapter dis-
cusses these issues and challenges confronting digital libraries in their adoption of e-commerce, including
e-commerce charging models.
Chapter XV
Intellectual Property Protection and Standardization / Knut Blind and Nikolaus Thumm 291
This chapter presents the rst attempt at analyzing the relationship between strategies to protect intel-
lectual property rights and their impact on the likelihood of joining formal standardization processes,
based on a small sample of European companies. On the one hand, theory suggests that the stronger the
protection of one’s own technological know-how, the higher the likelihood to join formal standardization

processes in order to leverage the value of the technological portfolio. On the other hand, companies
at the leading edge are often in such a strong position that they do not need the support of standards to
market their products successfully. The results of the statistical analysis show that the higher the patent
intensities of companies, the lower their tendency to join standardization processes, supporting the latter
theoretical hypothesis.
Chapter XVI
The Performance of Standard Setting Organizations: Using Patent Data for Evaluation /
Marc Rysman and Tim Simcoe 304
This chapter uses citations to patents disclosed in the standard setting process to measure the technologi-
cal signicance of voluntary standard setting organizations (SSOs). We nd that SSO patents are outliers
in several dimensions and importantly, are cited far more frequently than a set of control patents. More
surprisingly, we nd that SSO patents receive citations for a much longer period of time. Furthermore,
we nd a signicant correlation between citation and the disclosure of a patent to an SSO, which may
imply a marginal impact of disclosure. These results provide the rst empirical look at patents disclosed
to SSO’s, and show that these organizations both select important technologies and play a role in estab-
lishing their signicance.
Chapter XVII
Patents and Standards in the ICT Sector: Are Submarine Patents a Substantive Problem
or a Red Herring? / Aura Soininen 319
Multiple cases have been reported in which patents have posed dilemmas in the context of cooperative
standard setting. Problems have come to the fore with regard to GSM, WCDMA, and CDMA standards,
for example. Furthermore, JPEG and HTML standards, as well as VL-bus and SDRAM technologies,
have faced patent-related difculties. Nevertheless, it could be argued that complications have arisen
in only a small fraction of standardization efforts, and that patents do not therefore constitute a real
quandary. This article assesses the extent and the causes of the patent dilemma in the ICT sector through
a brief analysis of how ICT companies’ patent strategies and technology-licensing practices relate to
standard setting and by exemplifying and quantifying the problem on the basis of relevant articles,
academic research papers, court cases and on-line discussions. Particular attention is paid to so-called
submarine patents, which bear most signicance with respect to the prevailing policy concern regarding
the efcacy of the patent system.

Chapter XVIII
Legal Protection of the Web Page as a Database / Davide Mula and Mirko Luca Lobina 357
Nowadays the Web page is one of the most common medium used by people, institutions, and compa-
nies to promote themselves, to share knowledge, and to get through to every body in every part of the
world. In spite of that, the Web page does not entitle one to a specic legal protection and because of
this, every investment of time and money that stays off-stage is not protected by an unlawfully used.
Seeing that no country in the world has a specic legislation on this issue in this chapter, we develop a
theory that wants to give legal protection to Web pages using laws and treatment that are just present. In
particular, we have developed a theory that considers Web pages as a database, so extends a database’s
legal protection to Web pages. We start to analyze each component of a database and to nd them in
a Web page so that we can compare those juridical goods. After that, we analyze present legislation
concerning databases and in particular, World Intellectual Property Organization Copyright Treatments
and European Directive 96/92/CE, which we consider as the better legislation in this eld. In the end,
we line future trends that seem to appreciate and apply our theory.
Chapter XIX
Steganography and Steganalysis / Merrill Warkentin, Mark B. Schmidt, and Ernest Bekkering 373
In the digital environment, steganography has increasingly received attention over the last decade.
Steganography, which literally means “covered writing,” includes any process that conceals data or
information within other data or conceals the fact that a message is being sent. Though the focus on
use of steganography for criminal and terrorist purposes detracts from the potential use for legitimate
purposes, the focus in this chapter is on its role as a security threat. The history of stenography as a
tool for covert purposes is addressed. Recent technical innovations in computerized steganography are
presented, and selected widely available steganography tools are presented. Finally, a brief discussion
of the role of steganalysis is presented.
Chapter XX
Intellectual Property Protection in Multimedia Grids / Irene Kafeza and Eleanna Kafeza 380
The Grid environment is rapidly emerging as the dominant paradigm for wide-area-distributed application
systems. The multimedia applications demand intense problem-solving capabilities, and Grid-comput-
ing makes it possible to share computing resources on an unprecedented scale among geographically
distributed participants. In a Grid environment, virtual organisations are formulated and managed from

a computing resource point of view. The Grid provider allows for the dynamic discovery of computing
resources, the immediate allocation and provision of the resources, and the management and provision
of secure access. Although the security problem in Grid environment is being addressed from the tech-
nological point of view, there is no work to identify the legal issues that are arising in Grid multimedia
transactions.
Chapter XXI
Secure Image Archiving Using Novel Digital Watermarking Techniques /
Ruo Ando and Yoshiyasu Takefuji 398
With the rapid advance in digital network, digital libraries, and particularly WWW (World Wide
Web) services, we can retrieve many kinds of images on personal and mobile computer anytime and
anywhere. At the same time, secure image archiving is becoming a major research area because the
serious concern is raised about copyright protection and authority identication in digital media. A
more sophisticated technique is required for future multimedia copyright protection. In this chapter
we propose a secure image archiving using novel digital-watermarking techniques. Firstly, a nonlinear
adaptive system (neural network) is applied for frequency-based digital watermarking. Secondly, we
discuss application-oriented watermarking method for GIS image archiving. This chapter is divided into
two parts. First section is about the way to apply nonlinear adaptive system for frequency-based image
watermarking. We propose a new asymmetric technique employing nonlinear adaptive system trained
on frequency domain. Our system uses two public keys to prevent removal attack and archive more
fragile watermarking. In embedding, location information of frequency domain, where adaptive system
is trained, is binalized, expressed in hexadecimal number, and encrypted in asymmetric cryptosystem.
Encrypted location information is embedded in several parts of digital host contents. In generating key,
supervised neural networks learn to assign the array of coefcients to teacher signal corresponding to
the message to insert. This is one kind of transform-based method to generate public key from private
key. In extracting, we use key matrix created by one-way signal processing of adaptive system. Proposal
method is tested in still image, and we have empirically obtained the results that the proposal model is
functional in implementing more secure and fragile watermarking compared with previous techniques,
such as correlation and transform-based asymmetric watermarking. Several experiments are reported to
validate the effectiveness of our watermarking method. Second section is about the application of GIS
image archiving using digital watermarking technique. Recently, the utilization of GIS (geographical

information system) is becoming rapidly pervasive. Consequently, new methodology of archiving and
managing images is a pressing problem for GIS users. It is also expected that as the utilization of GIS
becomes widely spread, protecting copyright and condential images will be more important. In this
chapter, we propose a three-layer image data format that makes it possible to synthesize two kinds of
related images and analysis information in one image data size. To achieve the condentiality of one
hidden image, we apply the private watermarking scheme, where the algorithm is closed to the public.
In the proposal model, encoder netlist embedded in the third layer is generated by FOL prover to achieve
more secure and less information to decode it, compared with one operation of another block cipher
such as RSA. Proposal system users can process two images without the cost of maintaining key and
decoding operation.
Compilation of References 412
About the Contributors 447
Index 452
xv
Preface
INTRODUCTION
Intellectual property protection is a hot issue on the globe in the twenty rst century, because the recent
expansion of network connectivity to the Internet known as ubiquitous allows people to enjoy a number
of contents and software stored in the digital forms which are fragile to unauthorized electric duplication
or copyright and/or patent infringement. Institutional protection against digital infringement of multi-
media intellectual property has been practically supported by technical solutions to digitally maneuver
multimedia contents and software in the Internet. The advent of new solutions in the area of information
technology is to allow easy access to the tools for protection against multimedia intellectual property
infringement that is negative side effect of innovation in the information industry.
Facing the digital infringement of intellectual property of contents and software, those in the elds
of multimedia information engineering and its institutional operations have been aware of a need for
a complete reference of past, current and future trends of multimedia intellectual property protection
from technological elds to institutional aspects. This book, all twenty one chapters of which have been
double-blind reviewed by leading scholars, is to offer a rst reference on multimedia intellectual property
protection with multidisciplinary intellectual property knowledge and analyses which are given by twenty

three leading researchers and practitioners with the technical backgrounds in multimedia information
engineering and the legal or institutional experiences in intellectual property practice.

PURPOSE
The principal concern of this book is to provide those in the multimedia information technology and
its institutional practice including law and policy with a series of concise and thorough references on a
variety of issues of multimedia intellectual property protection and its proper solutions from the technical
and legal aspects. We discuss both technical and institutional solutions to protect copyrighted material
and patentable software for multimedia intellectual property protection.
The rst object of our discussion is digital copyright protection. We study its past, current and future
technology: digital watermark and its innovative idea like steganography on digital copyright, and in-
fringement or misappropriation of digital contents and their protection by peer-to-peer technology. The
second object of our research is the protection of multimedia databases or digital libraries, and their
infringement and counteraction from the point of network security. In the advent of multimedia digital
libraries, the protection of their rights as intellectual properties is an urgent issue to offer an instrument
for recouping investment in their development. A new scheme for the protection of multimedia digital
libraries should be studied. The third object of our research is institutional analysis on multimedia intel-
xvi
lectual property protection. It includes information management issues on intellectual property protection
of multimedia contents, international intellectual property protection and standardization.
We thoroughly discuss those institutional and technical issues, and provide their solutions on multimedia
intellectual property protection from legal to technological analyses. The goal of this book is to design a
complete reference in the area of multimedia intellectual property protection which is demanded by those
in the areas of law and technology. Already published intellectual property law and business books just
discuss institutional analyses without interdisciplinary insights by technical experts. Meanwhile, techni-
cal references only talk about engineering solutions without the social impact to institutional protection
of multimedia digital information. This book should ll in the gap between law and technology, and
to fulll a great mission under which people in the eld of multimedia intellectual property protection
discuss all the related issues and their solutions from both institutional and technical aspects.
AUDIENCE

This book is a rst guidance or introductory reference to graduate students and students in professional
schools, researchers and practitioners in the areas of law and policy, engineering and education, and
provides them with mandatory knowledge bases on intellectual property protection of multimedia in-
formation engineering. This kind of complete reference has not been available in the previous research
publication. The readers may enjoy the brand new aspects of legal analyses of engineering solutions for
multimedia intellectual property protection.
The content of the book is also useful to the academia in which those concerned about intellectual
property management need to acquire sound techniques for intellectual property protection and funda-
mental knowledge on intellectual property rights in the frontiers of IT outbursts. Meanwhile, this book
works as a technical milestone for research trends of multimedia intellectual property protection engi-
neering in the target of the next ten years. Both practitioners with technical agendas and IT engineers of
institutional agendas may appreciate the content of this book with a variety of interdisciplinary topics.
Multimedia information engineering or technology per se has not been discussed from any legal or
technological aspects. In the previous publications, both legal and technical aspects on the multimedia
intellectual property protection have not been analyzed in any single titles in the world.
ORGANIZATION AND OVERVIEW OF THE CHAPTERS
The book is organized three sections into twenty-one reviewed chapters with the following major
themes:
1. Frameworks
2. Solutions
3. Surveys
Section I is concerned with Frameworks on the intellectual property protection.
Chapter I, Digital Library Protection Using Patent of Retrieval Process, presents a technical
formulation for protecting digital library as intellectual property, especially image digital library. The
xvii
chapter identies an innovative approach for protecting digital library associated with content-based
retrieval that dynamically generates indexes to its contents.
Chapter II, Intellectual Property Rights: From Theory to Practical Implementation, presents
foundational concepts and issues in intellectual property, and examines each IP right with a concise review
of recent U.S. legislation and court cases, including the Napster case and the Microsoft antitrust suit.

Chapter III, Multimedia Encryption Technology for Content Protection, presents an overview of
multimedia content encryption technology with the general encryption algorithms, and introduces the
special encryption algorithms.
Chapter IV, Masking Models and Watermarking: A Discussion on Methods and Effectiveness,
describes the relationship between digital right management (DRM) and Intellectual Property on the
watermarking techniques and masking models. The chapter also presents two strategies that make use
of a masking model, applied to a classic watermarking technique.
Chapter V, Damageless Watermark Extraction Using Nonlinear Feature Extraction Scheme
Trained on Frequency Domain, presents a new information hiding and extracting method without
embedding any information into the target content by using non-linear feature extraction scheme trained
on frequency domain.
Chapter VI, Perceptual Data Hiding in Still Images, presents steganography that embeds some
information within a digital media, in such a way that the inserted data are intrinsically part of the me-
dia itself without affecting the visual quality of the host data, using the mechanisms underlying Human
Vision.
Section II is concerned with Solutions for the intellectual property protection.
Chapter VII, Online Personal Data Licensing: Regulating Abuse of Personal Data in Cyberspace,
presents a new technical and legal approach, called online personal data licensing (OPDL), for respond-
ing to the concerns about the privacy of personal data. The OPDL enables individuals to concretize their
consent to allow others to use their personal data as licenses.
Chapter VII, Property Protection and User Authentication in IP Networks Through Challenge-
Response Mechanisms: Present, Past, and Future Trends, introduces the basic concepts of authentica-
tion explaining their relationship with property protection. The basic functionalities of challenge-response
frameworks are presented, together with several applications and the future trends.
Chapter IX, Q-R Code Combined with Designed Mark, introduces a method to produce the designed
Q-R code and its production system, which allows a cellular phone with the Q-R (Quick Response) code
reader function (a two dimensional code developed) to be easily accessed to web-sites.
Chapter X, Visual Environment for DOM-Based Wrapping and Client-Side Linkage
of Web Applications, introduces a new framework where end-users can wrap remote Web applications
into visual components called pads, and functionally combine them together through drag and drop-paste

operations by using new media architecture, “IntelligentPad”
Chapter XI, Symbolic Computation for DS-CDMA Code Acquisition Using First Order Logic,
introduces a formulation of state-space problem of which solution is directed by redundant reasoning
control method for semi-heuristic and lightweight DS-CDMA code acquisition.
Chapter XII, Device Driver Based Computer in Broadband Age, introduces a device-driver-based
computer, which realizes the reduction of mode (domain or vertical) switching overheads between user
and kernel mode with innovative attributes including shared-keyboards and mice, access controlled
les, and timed les.
xviii
Section III is concerned with Surveys on the intellectual property protection.
Chapter XIII, Cultivating Communities Through the Knowledge Commons: The Case of Open
Content Licenses, surveys the communities in the context of the knowledge commons about the structure
of open content licenses operating within such domains. The chapter explores licenses as a structure
from the concept of the knowledge commons.
Chapter XVI, E-Commerce and Digital Libraries, surveys the access control model and system on
the electronic commerce in digital library service.
Chapter XV, Intellectual Property Protection and Standardization, surveys the standardization
strategies to protect intellectual property rights based on a small sample of European companies.
Chapter XVI, The Performance of Standard Setting Organizations: Using Patent Data for
Evaluation, surveys the technological signicance of voluntary standard setting organizations (SSOs)
using citations to patents disclosed in the standard setting process.
Chapter XVII, Patents and Standards in the ICT Sector: Are Submarine Patents a Substan-
tive Problem or a Red Herring?, surveys the cooperation on standard setting in the Information
Communication Technology sector.
Chapter XVIII, Legal Protection of the Web Page as a Database, surveys legal issues on the institu-
tional protection of intellectual property related to the WebPages from the points of database protection.
The chapter identies each component of database that is found in individual web page, and presents
legislative concerns on databases.
Chapter XIX, Steganography and Steganalysis, surveys steganography in the context of security
threat and discusses steganalysis.

Chapter XX, Intellectual Property Protection in Multimedia Grids, surveys the legal issues on the
Grid computing environments and multimedia content transactions with immense volume of multimedia
content from the point of computing resource.
Chapter XXI, Secure Image Archiving Using Novel Digital Watermarking Techniques, surveys
and introduces secure image archiving techniques using novel digital watermarking techniques.
USE AS A COURSE TEXT
This book is designed to offer a reference in the communities on multimedia information technology and
intellectual property studies. The main target of prospective academic audience is graduate students who
study information studies, management of information technology, library science, computer science,
information engineering, system engineering. Another target is students who work for professional degrees
in business schools, management schools, MOT programs, public policy schools, law schools, or their
equivalents. The book has twenty one chapters, which are materials for assignment in class at junior or
senior engineering of the undergraduate lectures, and master-level graduate schools of management, or
law schools. Lectures may commence with all the chapters in the Section I, and select some chapters
from the Section II and/or III to complete one semester.
The other target is not a small number of practitioners including lawyers who counsel to IT companies
as in-house counsels or at rms, chief information ofcers (CIOs), chief technology ofcers (CTOs) and
chief risk management ofcers (CROs) in enterprises and the consultants in those related elds. Not the
last but an important part of prospective audience is found in a large number of intellectual property related
staff or administrators in universities and librarians. Instructors of business administration programs and
information management curricula may follow the above instructions in their classes.
xix
Acknowledgment
The editor would like to thank all the authors who have submitted chapter proposals, and all accepted
authors and reviewers from a variety of elds for their excellent contributions and insights, without
which this book would not have been possible. I particularly appreciate Professors Drs. Yasushi Kiyoki
and Yoshiyasu Takefuji. Both of them were my doctoral supervisor and advisor at Keio University. I
denitely appreciate Professor Dr. Gregory Silverman at Seattle University School of Law. In his cyberlaw
class of 1999 at the University of Chicago Law School, an idea to publish this kind of book ashed in
my mind. Special thanks go to the excellent staff at IGI Global for the opportunity to publish this book

focusing on the multidisciplinary studies of intellectual property and multimedia information technology.
I am grateful to the Microsoft Research Trust for Intellectual Property Studies, for its generous nancial
grant on my study. I am very happy and proud to have the great chance to publish this book with the
marvelous friends and fellows around me this time.
Again, thank Lord and all of you who have helped and supported me.
I dedicate this book to my best friends, Dr. Terrence C. Bartolini, his wife, Dr. Carol Braun, their
children: Alyssa, Lindsay, and Kyle, and, Jim Wyse, and all the Rotarians of Omiya (Japan) and Oak
Lawn (Illinois) Rotary Clubs, who have helped and supported my stay of happiness and joy in Chicago
with their kindness and gentleness, generosity, and patience.
Hideyasu Sasaki, PhD &Esq.
Attorney-at-law, admitted to practice in NY
Associate Professor of Computer Science, Ritsumeikan University, Kyoto, Japan
November, 2007
Section I
Frameworks
1
Chapter I
Digital Library Protection Using
Patent of Retrieval Process
Hideyasu Sasaki
Attorney-at-Law, New York State Bar, USA & Ritsumeikan University, Japan
Yasushi Kiyoki
Keio University, Japan
Copyright © 2008, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
INTRODUCTION
In this chapter, we present a formulation for
protecting digital library as intellectual property,
especially image digital library (Sasaki & Kiyoki,
2002, 2003). Digital library integrates cultural or
educational, academic or professional knowledge

that takes the various forms of multimedia docu-
ABSTRACT
In this chapter, we present a formulation for protecting digital library as intellectual property, especially
image digital library. The entire content of digital library assembled by database designers is to be
differentiated from its individual contents. The digital library community demands an innovative ap-
proach for protecting digital library associated with content-based retrieval that dynamically generates
indexes to its contents. The entire content with dynamically assigned indexes goes beyond the scope of
the conventional copyright protection of the database with statically assigned indexes. The proposed
formulation uses the patent of content-based retrieval process, and protects its object digital library in
the specied domain without any excessively exclusive protection in general domains. That formulation
determines whether the problem retrieval process identies a classication of the entire content stored
in its object digital library as a single and unique collection, or its equivalents within the scope of its
specied domain. The similar collection realized in other digital libraries evidences unauthorized use
of the problem retrieval process, or its equivalents, as far as it is patented. The patent of content-based
retrieval process works as a catalyst of digital library protection, and restricts any other assembling of
equivalent digital libraries in the scope of its specied domain. We provide mathematical foundation
and reasoning of the proposed formulation, and conrm its feasibility and accountability in several
case studies.
2
Digital Library Protection Using Patent of Retrieval Process
ments including images, pictures, lms, video
streams, and so forth. Content-based retrieval
enables database designers to store and use a
tremendous amount of multimedia contents in
digital libraries.
Its technical advancement, however, grows
with the burden of investment in research and
development by digital library community. Digi-
tal library protection as intellectual property is
indispensable for the successive investment in

collection of multimedia contents, implementation
of retrieval processes, and design of digital librar-
ies (Samuelson, 1996). The Asia-Pacic region is
catching up with the digital library initiative that
originated from the Western countries in the nine-
ties. An innovative approach for protecting digital
library associated with content-based retrieval is to
be its command that promotes knowledge integra-
tion to keep up with the foregoing countries.
The advent of that new retrieval technology
demands a new approach for digital library pro-
tection. A digital library consists of its individual
contents and database. Those contents are copy-
rightable for content creators, as the database is
so for database designers. The essential problem
on copyright is that different people, both content
creators and database designers, have copyrights
over digital libraries. The entire content of digital
library assembled by database designers is to be
differentiated from its individual contents. A
digital library with statically assigned indexes for
keyword-based retrieval is copyrightable for its
database designers. Content-based retrieval, how-
ever, dynamically generates indexes to the entire
content of the digital library that goes beyond the
scope of the conventional copyright protection of
the database with statically assigned indexes.
Digital library protection must be, however,
fair to both the foregoing and the followers in
the digital library community. The proposed

formulation for digital library protection should
not allow any circumvention over a number of
digital libraries just by changing the small portion
of databases or retrieval processes.
The goal of this chapter is to present a formula-
tion that uses the patent of content-based retrieval
process, and protects its object digital library in
the specied domain without any excessively
exclusive protection in general domains. That
formulation determines whether the problem
retrieval process identies a classication of the
entire content stored in its object digital library as
a single and unique collection or its equivalents
within the scope of its specied domain. The
similar collection realized in other digital librar-
ies evidences unauthorized use of the problem
retrieval process, or its equivalents, as far as it is
patented. The patent of content-based retrieval
process works as a catalyst of digital library
protection, and restricts any other assembling
of equivalent digital libraries in the scope of its
specied domain.
In Section 2, we discuss the advent of content-
based retrieval in digital library, and identify
limitations of the conventional copyright protec-
tion of database. We then describe the background
of an innovative approach for protecting digital
library associated with content-based retrieval. In
Section 3, we propose the formulation of digital
library protection. In Section 4, we conrm its

feasibility and accountability in several case stud-
ies of image retrieval systems. In Section 5, we
provide mathematical foundation and reasoning
of the proposed formulation. In Sections 6 and 7,
we conclude with discussion on the scope of the
proposed formulation.
BACKGROUND
In this section, we discuss the limitations of copy-
right protection in the advent of content-based
retrieval in digital library, and then describe the
background of an innovative approach for protect-
ing digital libraries.
3
Digital Library Protection Using Patent of Retrieval Process
Copyright Protection and Digital
Library
As the referent of copyright protection, we should
have a component that identies the entire content
of digital library that is differentiated from its
individual content.
Keyword-based retrieval approach is a well-
known technique of document and image retrieval
in Web search engines, for example, Google (Brin
& Page, 1998). In assembling a digital library with
keyword-based retrieval operations, database
designers assign static indexes to its individual
contents as retrieval objects stored in databases.
Those indexes integrate and identify the entire
content of digital library as is different from its
individual contents.

An assembling or compilation of individual
contents, that is, preexisting materials or data, is
to be a copyrightable entity as an original work
of authorship xed in tangible form (Gorman
& Ginsburg, 1993; Nimmer, Marcus, Myers, &
Nimmer, 1991; U.S. Copyright Act, 1976). Figure
1 outlines that the collection of static indexes and
individual contents constitutes a component of
“contents-plus-indexes” that identies the entire
content of digital library as a referent of copy-
right protection, that is, the copyrightable static
compilation in digital library.
After elaboration in keyword-based retrieval,
content-based retrieval was introduced, and
has been receiving more attention as the latest
promising technology. The component of con-
tents-plus-indexes no longer identies the entire
content of digital library that is associated with
content-based retrieval.
Content-based retrieval systems classify
contents, for example, images using automatic
solutions of feature extraction and indexing based
on their structural or color similarity. Figure 2
outlines its retrieval operations in the case of
content-based image retrieval (CBIR): Every time
sample images are requested for retrieval, the
feature extraction process extracts visual features,
for example, shape, color out of the sample, and
candidate images stored in a database; The index-
ing process groups the extracted features and then

dynamically generates indexes to those images;
nally, the classication process determines which
class of candidate images is structurally similar
to the requested sample images.
In the application of content-based retrieval,
copyright has two limitations on digital library
protection, as outlined in Figure 3: First, a compo-
nent of contents-plus-indexes, that is, a collection
of individual contents with dynamic indexes does
not identify the entire content of any digital library.
Figure 1. A digital library associated with keyword-based retrieval
CONTENTS
CONTENT CREATOR
INDEXES
+
DICE 4
DICE 6
DATABASE
DESIGNER
DL
CREATE
INTEGRATE
(STATIC COMPILATION)
KEYWORD-BASED RETRIEVAL
4
Digital Library Protection Using Patent of Retrieval Process
Every time new sample images are requested as
queries, the order of similarity-rate changes in the
collection of respectively rated and displayed indi-
vidual contents. That collection is a copyrightable

static compilation, but not to identify the entire
content of digital library with dynamically as-
signed indexes. Second, any proposed frameworks
do not remedy that problem at the present. The
European Union legislated the sui generis right
of database protection in the case of commercial
databases (Reinbothe, 1999). That framework does
not protect the digital library with content-based
retrieval because its protection is based on the
property of copyrightable compilation.
An only remaining resort is the retrieval
process that is to identify the entire content of
digital library.
Parameter Setting Component and
Digital Library
We should nd a component in retrieval process
that is to identify the entire content of digital
library as is different from its individual con-
tents. That component is to be discovered from
consulting the technical property of content-based
retrieval.
Content-based retrieval, especially, CBIR has
two types of approach regarding its object domain:
the domain-general approach and the domain-
specic approach (Rui, Huang, & Chang 1999).
The domain general approach deals with various
kinds of visual features in broad domains, for
example, Virage Image Retrieval (Bach, Fuller,
Gupta, Hampapur, Horowitz, Jain, & Shu, 1996)
and QBIC (Flickner, Sawhney, Niblack, Ashley,

Huang, Dom, Gorkani, Hafner, Lee, Petkovic,
Steele, & Yanker, 1995). The domain-specic
approach focuses in the narrower or specied
domains, for example, the eld of brain images. As
different from broad domains, specied domains
restrict the variability on type of extracted features
in the limited and predictable scope (Smeulders,
Worring, Santini, Gupta, & Jain, 2000; Yoshitaka
& Ichikawa, 1999).
Its operation is almost the same with the data
processing of the domain-general approach out-
lined in Figure 2. A signicant difference is found
in its classication where representative classes
of mutually similar images are identied in its
object domain. A component for thresholding
Figure 2. Content-based retrieval operations
SAMPLE

IMAGE OR
SKETCH OF STARFISH

REQUESTED AS QUERY
DL
CANDIDATE IMAGES
FEATURE
EXTRACTION
INDEXING
CLASSIFICATION
1001
0101

0011
1011
0100
0101
1000
0000
EXTRACTED
FEATURES
1001
0101
0001
1001
± 0001
± 0011
± 0111
± 0011
PREDEFINED
RANGES OF VALUES
(on parameter setting)
09050311
INDEXE
S
09050109
±12
5
04050800
RETRIEVA
L
RESU
LT

×