10,921 research outputs found

    Space and Planetary Imaging using JPEG2000

    Get PDF
    The raising demand for Digital content Rights Management (DRM), protection and security, enabling effective on-line access, exchange and trading of all types of digital media items (ranging from a simple text file to a large space or planetary image) and, at the same time, supporting global interoperability of customer devices and traded items, can only be met by a good mix of open architectures and proprietary technologies. In this paper, we present a novel integrated architecture that supports the secure handling of large remote sensing ISO JPEG2000 coded images, obtained from satellite. This effort is within the scope of further developments and new extensions for this standard, namely: - Trans-coding of proprietary digital image formats used in satellite imagery, to the new JPEG2000 format; - Inexpensive network clusters for parallel computing to improve the algorithmic process of coding very large digital images obtained from satellites. - Coding of multi-component and multi-spectral images as well as volumetric images (JP3D); - Exploration of interactive on-line image satellite catalogues (JPIP); - Secure transmission, and protection of the image content based in OpenSDRM (JPSEC)

    A mobile Scenario for Electronic Publishing based on the MIPAMS Architecture

    Get PDF
    This paper describes several scenarios for the management of digital media, focusing on electronic publishing from mobile environments. The solution proposed in those scenarios is based on MIPAMS (Multimedia Information Protection And Management System), a service-oriented Digital Rights Management (DRM) platform, which enables the creation, registration and distribution of multimedia content in a secure way, respecting intellectual property rights. The particularity of the mobile scenario with respect to others is the limited capability of mobile devices. A specific use case has been identified for the mobile environment and a new system, based on MIPAMS, has been designed for the electronic publishing environment.Postprint (published version

    A method for protecting and controlling access to JPEG2000 images

    Get PDF
    The image compression standard JPEG2000 brings not only powerful compression performance but also new functionality unavailable in previous standards (such as region of interest, scalability and random access to image data, through flexible code stream description of the image). ISO/IEC JTC1/SC29/WG1, which is the ISO Committee working group for JPEG2000 standardization is currently defining additional parts to the standard that will allow extended functionalities. One of these extensions is Part 8 JPSEC - JPEG2000 security, which deals with the protection and access control of JPEG2000 code-stream. This paper reports the JPSEC activities detailing with the three core experiments which are in progress to supply the JPEG2000 ISO Committee, with the appropriate protection technology. These core experiments are focusing on the protection of the code-stream itself and on the overall security infrastructure that is needed to manage the access rights of users and applications to that protected code-stream. Regarding the encryption/scrambling process, this one deals with the JPEG2000 code stream in such a way that only the packets, which contain image data information are encrypted. All the other code-stream data will be in clear mode. Ibis paper will also advance details of one of the JPSEC proposed solutions for the security infrastructure - OpenSDRM (Open and Secure Digital Rights Management) [16], which provides security and rights management from the content provider to the content final user. A use case where this security infrastructure was successfully used will also be provided.info:eu-repo/semantics/acceptedVersio

    Navigating the Non-Fungible Token

    Get PDF
    91.8million,91.8 million, 69 million, and $52.7 million. These are the amounts associated with the three most sought after Non-Fungible Tokens (NFTs) sold in 2021. Although NFTs were first created in 2014, 2021 saw a massive rise in their global popularity. In fact, Google reported that in 2021, “How to buy an NFT?” was one of its most searched questions. NFTs can alternatively represent a collectible, a financial instrument, or a permanent record associated with a person, physical or digital object, or data—each presenting an entirely distinct set of legal issues. The lack of governmental expertise in emerging technologies accompanied by the shortage of regulatory guidance has created a frustrating environment for innovators. Despite being one of the fastestgrowing industries in the world, there is a remarkable deficit in legal scholarship regarding these devices. NFTs, with their attendant blockchain and smart contract technologies, can create new paradigms around ownership and identification and inspire entirely new business models. In addition to clarifying what NFTs are, this Article seeks to fill the gap in the literature by analyzing how the specific use of an NFT implicates different areas of the law. Examining the way NFTs function in sectors ranging from fine arts to finance, this Article suggests how tokenization law and policy must advance to leverage the incredible opportunities that NFTs present

    R&D Management challenges for the desing and development of an E2E-DRM content business integration platform

    Get PDF
    Current studies on Digital Rights Management (DRM) have focused on controlling access to and copies of contents, centered exclusively on the end of the value chain (end users). This focus has been oriented towards security and encryption as a means of solving the issue of illegal copying by purchasers. In this paper, we propose End-toEnd Digital Rights Management (E2E DRM) that involves the protection of the content throughout the entire value chain. This concept is given form in the new technologies for representing intellectual property (IP) which, in a secure and unequivocal manner, identify the content at each point in the value chain: from the author to the end user, the content is identifiable in any of the transactions and statuses through which it passes. The key concept which E2E DRM must provide is not only the governability of access and copying, but also that of all the processes associated with the content business. We establish an E2E DRM model and architecture, and propose the R&D management of its design and implementation that makes it possible to protect content from content creator to purchaser. Finally, the paper also analyzes their impact from a global perspective. The research was financed by the Autonomous Region of Madrid through the program “Aid to Promote Technological Innovation in the ICT sector

    Design and development challenges for an E2E DRM content business integration platform

    Get PDF
    Current studies on Digital Rights Management (DRM) have focused on controlling access to and copies of contents, centered exclusively on the end of the value chain (end users). This focus has been oriented towards security and encryption as a means of solving the issue of illegal copying by purchasers. In this paper, we propose End-to-End Digital Rights Management (E2E DRM) that involves the protection of the content throughout the entire value chain. This concept is given form in the new technologies for representing intellectual property (IP) which, in a secure and unequivocal manner, identify the content at each point in the value chain: from the author to the end user, the content is identifiable in any of the transactions and statuses through which it passes. The key concept which E2E DRM must provide is not only the governability of access and copying, but also that of all the processes associated with the content business. We establish an E2E DRM model and architecture, and propose the R&D management of its design and implementation that makes it possible to protect content from content creator to purchaser. Finally, the paper also analyzes their impact from a global perspective

    Regulating China\u27s Ecommerce: Harmonizations of Laws

    Get PDF
    Internet commercialization began in China in 1995. Since then, China has seen a digitalization movement, which has become a joint undertaking between industry and government in the age of ubiquitous Internet in China. China’s Premier Li Keqiang announced ‘Internet Plus’ as the national strategy in his Government Work Report presented during the Two Sessions of the year of 2015. Following Premier Li’s vision for the ‘Internet Plus’ Strategy, China is now determined “to integrate mobile Internet, cloud computing, big data, and the Internet of Things with modern manufacturing, to encourage the healthy development of e-commerce, industrial networks, and Internet banking, and to help get Internet-based companies to increase their presence in the international market.” Under the auspices of “Internet Plus,” e-commerce became one of the most important priority areas to promote China’s continuing prosperity

    Advances in the Convergence of Blockchain and Artificial Intelligence

    Get PDF
    Blockchain (BC) and artificial intelligence (AI) are currently two of the hottest computer science topics and their future seems bright. However, their convergence is not straightforward, and more research is needed in both fields. Thus, this book presents some of the latest advances in the convergence of BC and AI, gives useful guidelines for future researchers on how BC can help AI and how AI can become smarter, thanks to the use of BC. This book specifically analyzes the past of BC through the history of Bitcoin and then looks into the future: from massive internet-of-things (IoT) deployments, to the so-called metaverse, and to the next generation of AI-powered BC-based cyber secured applications
    • 

    corecore