xxv

Index

16-Quadrature Amplitude Modulation (16-QAM) 515 Basic Service Set (BSS) 179 2D image watermarking 694 Bayh-Dole Act 1212, 1476, 1490 3-D mesh 1559-1560, 1562-1565, 1568, 1579-1581, biodiversity 834-835, 842-844, 1426 1585 biogeneric industry 847 3D watermarking algorithms 693-694 biopharma industry 846-847, 850, 857-858 3rd-Generation (3G) 510 biopiracy 834-835, 839, 842-844 834-835, 842 A biorthogonal wavelets 578 Bit Error Rate (BER) 395, 419, 512, 657, 874, 1514 academic integrity 924 Bit Interleaved Coded Modulation Scheme (BICM) accountability politics 732 515 accuracy index 1234, 1251 BitMAC 752, 775 active steganography 873, 881-882, 891 blanket 1209, 1211-1212, 1214, 1223 Activities, Interests, and Opinions (AlO) 805 blind mesh watermarking 1559-1560, 1562-1563, adaptation rights 1165 1567, 1570, 1573, 1580, 1582 advanced technologies 848, 1474-1475, 1487-1488 blind signal separation 242 agent based restrictions 610 blind source separation 171, 242, 274, 278 Aho-Corasick algorithm 502-503, 506 blind watermarking systems 239 ambiguity problem 402, 411, 423, 426, 433 block codes 877 ambiguous situation 410, 424 block-wise coding scheme 621-622, 647 American Intellectual Law Association B-MAC 753-754, 757, 762-764, 766 (AIPLA) 797 Boyer-Moore algorithm 502 analog media 88 bus encryption 609 ancient cartography 861, 871 business forms 115, 117 Application Programming Interface (API) 1456 Business Process Constraint Language (BPCL) 311 Application Specific Integrated Circuit (ASIC) 153, Business Process Management (BMP) systems 310 176, 561 Byzantine type algorithm 66 Artistic License 27 asymmetric information 1314, 1318, 1320 attribute statement 60 C Audio-Visual Profile with Feedback (AVPF) 484 Carrier Sense Multiple Access (CSMA) 354, 776 audio watermarking 389 Cartesian density distribution function 250 authentication statement 59-60 Cartesian moments 252-255, 257 authorization statement 60 cartographic databases 860-861, 869 Automatic Repeat reQuest (ARQ) 511 cartographic heritage 860-861, 864, 868, 871-872 autonomous WLAN architecture 178-179 CASPAR project 74, 83 centralized WLAN architecture 178-179, 188, 199 B chaotic sequence 272, 418 character displacement and diacritics coding 621, 629 back propagation learning 442, 444-445 chat license 1400 backpropagation neural network 440

Volume I, pp. 1-558; Volume II, pp. 559-1106; Volume III, pp. 1107-1636 Index

Chesbroug, Henry 714 infringement 17, 89, 112, 121, 295, 297-303, Child Pornography Prevention Act (CPPA) 795 305, 308, 344, 738, 743, 780, 785, 795, 811, 814- Civil Law Ontology 41 815, 957, 960, 966, 985, 1012, 1031, 1040, 1050, Coase Theorem 716 1054, 1060, 1083, 1160, 1184, 1201, 1227, 1279, codec adaptation algorithm 513, 516-519, 521, 524, 1281, 1334-1335, 1341-1350, 1352-1353, 1364, 526 1368, 1370, 1375, 1382, 1408, 1493, 1548-1549 collaborative innovation 1204-1216, 1223-1224, 1476 copyright law 13, 15, 23, 34, 39-40, 88, 98-103, collaborative production 1162, 1170, 1172 107-111, 113-114, 290, 293, 295-296, 302-303, collaborative work 474, 1451 305-307, 337, 341, 344-345, 610, 740, 777-783, collective action 724, 729, 733, 736, 1163-1164, 1169- 785-787, 801, 803, 809-811, 844, 918-922, 925, 1170, 1172, 1175-1178, 1214 927-928, 1003, 1006-1010, 1013, 1019-1023, collective licensing 481 1025, 1047, 1051-1054, 1056-1057, 1059, 1063, collective work 1451 1069-1070, 1073, 1076-1077, 1080, 1082, 1165, collision rate and physical error 192 1178-1179, 1182, 1184-1185, 1197, 1199, 1203, Commentz-Walter algorithm 502 1282, 1326-1328, 1332, 1336, 1340-1342, 1344- Common Unified Device Architecture (CUDA) 491, 1345, 1348-1353, 1355-1358, 1360-1361, 1363- 497, 508 1367, 1379-1380, 1383, 1388, 1391, 1408, 1418, Communities of Practice (CoPs) 136 1426-1428, 1430, 1434-1436, 1438, 1441-1442, community of hacking 725 1546-1549, 1551, 1554-1556 complementary assets 1283-1285, 1288, 1295, 1299, copyright law domain 39 1305, 1307 Copyright Ontology 41 complex technologies 1486-1487, 1489 copyright protection 2-5, 7, 12-13, 16, 93, 96, 106, composite transformation 247, 280 148-151, 160, 171, 174, 296, 380, 401, 413-414, computer ethics 958, 965-966, 1391 426, 430, 432, 436, 440, 560, 584-586, 607, 620, computer hackers 794 626, 647, 691, 693-695, 712, 738-740, 743-744, connectivity attack 1585 780, 873-874, 877, 881, 888, 891, 922, 981-982, Constant Bit Rate (CBR) 589 986-987, 990, 992, 998, 1000-1001, 1006, 1046, contact copying 1004, 1008 1051-1053, 1059, 1080, 1082, 1168, 1181-1185, contemporary media environment 1162, 1165, 1169- 1192, 1195, 1200, 1270, 1327, 1341, 1343, 1345, 1171, 1175-1177 1347-1348, 1353, 1357-1359, 1361, 1365, 1438, content authentication 429, 438, 694, 882, 891, 1561- 1440, 1461, 1483, 1516, 1520-1521, 1523, 1557, 1562, 1564, 1570, 1585, 1589, 1593-1594, 1597- 1559, 1562, 1570, 1584 1598, 1603, 1605 23 content preserving operation 1585 information techology 1059 Content Protection and Copy Management (CPCM) 91 open access 1060 Control and Provisioning Wireless Access Protocol Core Competence Theory 716 (CAPWAP) 177, 179 corpus mechanicum 1270-1271, 1357 Controlled Access Period (CAP) 589 corpus mysticum 1270, 1357 convolution codes 880 counterpropagation neural network 440, 458 cooperation commons 1164 creative commons 48, 105, 109, 127, 344, 351, 353, Cooperative Collision Avoidance (CCA) 354-355, 375 780, 924, 926, 933, 944, 1000, 1014-1025, 1028, copybot 1408 1043, 1057-1058, 1062-1066, 1068-1072, 1076, copy control 149-151, 414, 693, 982, 990, 1435, 1562 1085, 1088-1090, 1173, 1365, 1440, 1448, 1459, copyleft 26, 735, 777-778, 780, 786, 1016, 1022, 1028, 1461, 1530, 1542 1168, 1207, 1212, 1214, 1217, 1459 creative commons 109, 780, 1014, 1017-1020, copyleft license 1022 1022-1024, 1043, 1057-1058, 1062-1065, 1068, copyleft scheme 1022 1070, 1072, 1089, 1173, 1365, 1440, 1459, 1530 Copyright Clearing House 637 credible index 1226, 1228, 1236, 1244, 1251 copyright-cultural heritage 817 Cronbach’s alpha 805, 961

xxvi Index

cross-layer optimization 512, 531, 533, 649, 651-652, Digital Millennium Copyright Act (DMCA) 98, 609, 654, 772, 776 795, 919, 1001, 1035, 1272, 1361, 1381, 1383, cross-license 1209, 1212, 1223-1224, 1482 1608 Cross Shape Filter (CSF) 167 digital multimedia signals 376 cryptography 608, 610 digital multimedia technologies 691 crypto-processors 609 digital natives 1396 cultural artefacts 1429-1431 digital piracy 88, 95, 291, 307, 953, 955, 958, 962-965, cultural heritage 818, 1430 968, 1384, 1557, 1606-1607 Cultural Informatics Laboratory (CIL) 817 Digital Preservation Europe (DPE) 80 cybercrime 96, 789-791, 793, 795-800, 915, 1148- Digital Repository Audit Method Based on Risk As- 1149, 1158, 1351 sessment (DRAMBORA) 80 cyberharassment 789 Digital Rights Management (DRM) 39, 41, 83, 87- cyberstalking 789-791, 798 88, 91, 96-98, 122, 149, 607-608, 873, 982, 985, Cyclic Redundancy Check (CRC) 513 1026, 1042, 1356, 1393, 1547, 1558, 1606-1607 economic aspect 1608 D political aspect 1608 social aspect 1609 Database Management System (DBMS) 898 technical aspect 1609 database sui generis protection 1186-1191 Digital Signal Processing (DSP) 560, 562 database sui generis right 1179, 1184-1186, 1188, digital universe 238, 284 1190, 1192, 1194-1195, 1199 Digital Video Broadcasting (DVB) 90-91, 98 Data Frame Preambles (DFPs) 758 digital watermarking algorithms 148-149, 159, 174, data payload 237, 240, 752, 988 379, 559, 586, 1495, 1588 data security, privacy, and trust 50 Digital WaterMarking (DWM) 401, 582, 610, 692, Dedicated Short Range Communication (DSRC) 359 1493-1494 degree of skewness 256 digital watermarking techniques 239, 406, 585, 981- Delaunay tessellation 241 982, 1493, 1521 derivative works 24, 342, 353, 777-780, 782-784, direct copying 339, 1004, 1484 786-787, 1006, 1008, 1014-1016, 1020-1021, Discrete Cosine Transform (DCT) 150, 406, 441, 513, 1051-1052, 1060, 1063-1065, 1076, 1165, 1173- 561, 565, 571, 693, 876, 1495, 1516 1175, 1341 Discrete Fourier Transform (DFT) 150, 406, 441, Differential Pulse Code Modulation (DPCM) 156 692-693, 1495 digital activism 721-722, 724, 726-727, 733-734 discrete orthogonal moment invariants 241, 281 digital business framework 1606 discrete orthogonal polynomials 241-243, 258-260, digital cartography 862, 865 282, 288 digital convergence 134, 143 discrete wavelets 377 digital copyright management 1546 Discrete Wavelet Transform (DWT) 150, 164, 376- Digital (Copy)Rights 1056 377, 380, 395, 406, 441, 578, 580, 583, 1495 digital credentials 315-316, 327 one-dimensional 378 digital cultural heritage 860, 1435 two-dimensional 378-379, 381 Digital Curation Centre (DCC) 80, 86 Discretionary Access Control (DAC) 213, 232, 478, digital evidence 488, 491, 494-495 905 digital fingerprint 89, 1605 display rights 1165 digital forensic analysis 488 Distributed Coordination Function (DCF) 359 digital goods protection 1606 distribution rights 1165, 1439, 1452-1453 digital hole 149 Document-to-Watermark Ratio (DWR) 560 digital images authentication 709 dongles 609 digital libraries 1531 Dossier Medical Personnel (DMP) 896 copyright 1051 down-link delay 191 ethics 1044 dynamic access control 59, 552 P2P 1047 Dynamic Source Routing (DSR) 675 digital media 88

xxvii Index

fingerprinting 151, 167-168, 174, 583, 614, 646, 693, E 957, 982, 986, 999-1000, 1522, 1592, 1601, economic wealth 1129-1139, 1141, 1467 1604, 1609 Educational Project Management Office (EduPMO) Finite State Machine (FSM) 183, 502, 880 136, 140 Finite State Markov Channel (FSMC) 512 EigenRep 1119 flag bit operation 989 eigenvalue decomposition 276 flat reputation 1113-1114 ELATEwiki 929-930, 943-944 font feature coding 621, 626, 639-641, 648 Electronic Communications Privacy Act (ECPA) 794 foreseeability principle 1021 Electronic Copyright Management (ECM) 1607 Forward Error Correction (FEC) 512, 749 Electronic Health Record (EHR) 893, 895 Fourier-Mellin transform domain 241 Electronic Rights Management (ERM) 1607 fragile watermark 440, 457, 643, 1520, 1562, 1564, embedded database system 899 1570-1571, 1575, 1577-1579, 1581 End User License Agreements (EULAs) 123, 1031, Frame Error Rate (FER) 511 1036 freedom of expression 16, 100-102, 106-109, 111, 725, Enhanced Distributed Channel Access (EDCA) 183 778, 786, 1025, 1256, 1272, 1277, 1279, 1355- Enterprise DRM (E-DRM) 608 1357, 1359, 1361, 1363-1367, 1436 Entitlement Control Message (ECM) 91 freedom of information 729, 1325-1326, 1332, 1356 Entitlement Management Message (EMM) 91 Free, Libre and Open Source Software (FLOSS) 721, equity theory 1268 1381 Error Control Coding (ECC) 873 frequency planning 187, 189-190, 193, 199, 207 EU Database Directive 2, 7, 1185, 1199 Fuzzy Logic (FL) 1506 European Office (EPO) 25, 1418 Extended Service Set (ESS) 179 G eXtensible Access Control Markup Language (XAC- ML) 60, 72, 236, 333 game theory 582, 1493, 1523, 1617 eXtensible Markup Language (XML) 52-53, 137, Gaussian-blurred image 249 210-211, 226 Generation Y 1396 security 72, 211, 214, 216-218, 233, 236, 333 geometric attacks 237, 239-240, 242-244, 271, 276- external limitations 1358, 1365, 1554 278, 282-283, 402, 413-414, 422, 457-458, 695, 709 geometric distortion inversion 240 F geometric distortions 240 Factorial Moment Generating Function (FMGF) 519 geometric distortions-invariant watermarking system fair compensation 781, 1013, 1076, 1253-1255, 1257, 237 1259, 1263, 1362, 1380, 1385, 1387, 1389, 1446, geometric manipulation 240 1550 geometry attack 1585 denial of 1257 geowikis 932 false positive problem 410-412 Gibbs phenomena 255 Fast Fourier Transform (FFT) 571 global trust 1113 Fast Walsh Transform (FWT) 559, 571 Google search engine 1448 feature extraction key 437-438, 445-447, 457 Gorodetski’s local approach 419 federal regulation 115, 118 Gramm-Leach-Bliley Act (GLBA) 794 Federal Trade Commission (FTC) 795, 1275, 1400 Graphics Processing Units (GPUs) 488-489 Federation of Personal Networks (Fednet) 534, 536, 558 H feedback control loop 64-65 feedforward synaptic link 442 hacktivism 726, 735 Field Programmable Gate Array (FPGA) 153, 176, hacktivists 724, 726 559, 561, 566 Hahn Moment Invariants (HMI) 271 file carving 492-493, 498-501, 504-506, 508-509 Hahn polynomials 266 weighted 266-269

xxviii Index

Harris corner detector 241 (IP) 12, 120, 335, 337, 868, 920, HCF Controlled Channel Access (HCCA) 589 1030, 1033, 1151, 1205, 1224, 1283, 1406 Health Information System (HIS) 896 Intellectual 17, 107, 109, 114, 295, Health Insurance Portability and Accountability Act 337, 345, 351, 745, 777-779, 787, 797, 844, (HIPAA) 462 1041, 1043-1045, 1049-1051, 1054, 1059, 1082, Health Passport Project (HPP) 897 1327, 1334-1335, 1340, 1348-1349, 1353, 1392, Hellenic case-law 741 1427, 1547 Heterogeneous Policy Support 62 Intellectual Property Rights (IPRs) 722, 860, 868, 981, hidden terminal problem 355, 361, 372, 375, 650, 655, 1092, 1205, 1217, 1221, 1327, 1474 666-667, 684, 754 Intellectual Protection Rights (IPR) 39 high-performance forensic tools 489, 491 intelligent agents 1456 Hilbert transform 559, 561, 566, 578-581, 583, 586 Interactive Digital Media (IDM) 1462, 1467, 1606 Human Visual System (HVS) 152, 439-440, 1512, interactive Digital TeleVision (iDTV) 135 1517-1518 internal limitations 780, 782, 1358, 1363, 1548, 1554 Hybrid Coordination Function (HCF) 589 International Data Corporation (IDC) 1131 hybrid libraries 1532 Internet Crime Complaint Center (IC3) 791 hybrid watermarking algorithms 377 Internet Service Providers (ISP) 803 hypergeometric series 259, 288 invalidation 1096 invisible robust watermark 691 I invisible watermarking 155 invisible watermarking algorithm 161, 164 Identity-Based Cryptography (IBC) 59 iGeneration 1396 image and video watermarking algorithms 148-149 J image watermarking 380 jitter 192 image watermarking systems 240, 285, 999, 1583 joint license 1224 in-bound open innovation 715 Just Another Watermarking Scheme (JAWS) 561 Independent Component Analysis (ICA) 242, 288 Indian cultural heritage 817-818, 820, 822-823, 831- K 832 indigenous innovation 1092, 1097 knowledge-centric economy 1486 information agents 1127, 1448, 1450, 1456-1457, knowledge commons 1061, 1162-1163, 1168-1169, 1459-1461 1172-1176 informational politics 728 Knowledge Management (KM) 136 Information and Communication Technologies (ICTs) knowledge protection 845, 1205, 1283-1286, 1288- 1321, 1325, 1330-1331, 1475 1295, 1297-1298, 1300, 1304-1306, 1308 information flow security 68, 72 knowledge workers 143, 717, 1252-1256, 1259-1262, information rights 1321-1322, 1324 1264, 1266, 1268 information society 96, 99, 102-103, 108, 110-112, Knuth-Morris-Pratt algorithm 502 138, 557, 735, 739, 781, 866-868, 872, 1012, Krawtchouk polynomials 261 1026-1027, 1055-1056, 1058, 1068, 1070, 1073, normalized 261 1078, 1082-1083, 1085, 1089, 1197, 1199, 1203, weighted 261-262, 269 1272, 1275, 1321, 1323, 1361, 1382, 1435, 1439, 1444-1446, 1448-1449, 1453-1454, 1456-1457, L 1461, 1548, 1557 language-based security 68 innovating ability 1283-1284, 1288, 1304-1305 Least Significant Bits (LSBs) 156 instructional technology 918, 920, 926-927 Legal Knowledge Interchange Format (LKIF) 44 Insurance Case Ontology 38 legal ontologies 35 integrated technologies 1476 leverage politics 731 intellectual creation 3, 5, 24, 741, 1179, 1182, 1184, Lightweight Medium Access protocol (LMAC) 752, 1207 776 intellectual property concept 22

xxix Index

Likert scale Multi-Constrained Path (MCP) 653 4-point 805 multicore CPUs 488, 493-494, 498-499, 507 5-point 954 multi-cost routing 649-651, 654-660, 662-664, 675- 7-point 805 676, 681, 686 Linear Feedback Shift Register (LFSR) 158-159, 565, multimedia forensics 1588, 1591-1592, 1596, 1604- 569, 583 1605 Linear Temporal Logic (LTL) 331 Multimedia Home Platform (MHP) 90 literature piracy 607 multiple watermarking 694, 711, 881, 982, 989-990, Liu’s global approach 419 1570-1571, 1579-1580, 1585 LKIF-Core 41, 44, 49 Multi-Radio Medium Access Control (MR-MAC) 763 load balancing 177-178, 180, 187, 189-190, 193-194, music downloading 801, 803, 805-811, 813, 967 200, 203, 206, 498, 651, 769-770, 774 music piracy 801-803, 809, 811, 813-815, 957, 966- localized trust 1113 967, 1144, 1558 Local Pixel Adjustment Process (LPAP) 1507 Low Density Parity Check Codes (LDPC) 876, 879 N Low Power Listening (LPL) 748, 776 Low Power Mode 3 (LPM3) 766 nanoelectronics 1477-1478 Luminance Peak Signal-to-Noise Ratio (YPSNR) 523 nanotechnologies 1474-1477, 1485, 1488, 1491 lusory attitude 126 National Cyber Security Partnership (NCSP) 796 National Fraud Information Center (NFIC) 794 National Mission for Manuscripts (NMM) 817 M netnography 1371, 1377-1378 machine learning 438 network externalities 1048, 1485 machinima 783-784, 787-788, 1468 Network Intrusion Detection System (NIDS) 493 machinimists 783-784 NICE framework 1114 MAC Service Data Unit (MSDU) 590 NineStar Technology (NST) Co., Ltd. 1092-1093 Magic Circle, the 126, 1370, 1395, 1404 nodal governance Management of Change (MoC) 134, 136, 146 model 1145, 1156 Mandatory Access Control (MAC) 213, 228, 478, 905 thoretical framework 1147 Massively Multiplayer Online Environments (MMOs) non-blind watermarking system 242, 278, 283 782 non-orthogonal moments 252 Massively Multiplayer Online Role-Playing Games (MMORPGs) 782, 1397 O Media Access Control (MAC) 511 Media Optimization Network Architecture (MONA) OAIS archive 76 592 OAIS Reference Model 74-75, 80, 84 MediaWiki 465 objective trust 1109, 1112 Medium Access Control (MAC) 179, 207, 354-356, online child pornography 795-796 373-375, 589, 605-606, 649, 746, 776 online digital watermarking 156, 172, 585 microelectronics 1474-1478, 1486-1488, 1492 open collaborative innovation 1204-1216, 1224 Micro-Frame Preambles (MFPs) 757-758 open content licenses 1014, 1019, 1070, 1082, 1162- mobility management 178, 187, 201, 688 1163, 1165-1169, 1171-1177 modern cartography 871 open innovation model 715 moment generating function 251-252, 257, 288, 519 open science 1212, 1214, 1221, 1480-1481, 1489, 1491 moral hazard 1207, 1314, 1320 OpenSim Archive Resource (OAR) 1031, 1040, 1042 Motion Picture Association (MPA) 1145-1146, 1160, OpenSim-based grid operator 1035 1608 OpenSim-based virtual worlds 1030, 1032-1033, Moving Picture Experts Group-4 (MPEG-4) 513 1036-1040, 1042 Mozilla Public License (MPL) 27 Open-Simulator (Open-Sim) 1030 multi-cell WLAN 178, 185, 189, 194 open software licenses 1014-1016 Multi-Constrained Optimal Path (MCOP) 653 Open Web Application Security Project (OWASP) 462 opinion-based trust 1112

xxx Index

optical copying 1004, 1008 Point Coordination Function (PCF) 185, 591 optimized watermarking 173, 582-583, 1493-1495, Policy-Based Access Control (PBAC) 58 1506-1507, 1512, 1515, 1518, 1520, 1522-1524, policy combiner 62 1528 policy composition 62-63 organizational power 1254 Policy Decision Point (PDP) 60 orthogonal basis functions 241, 253 Policy Enforcement Point (PEP) 60 orthogonal moments 241-243, 257-260, 266-267, Policy Information Point (PIP) 60-61 276, 281-282 Polish Commercial Companies Code 38, 45 out-bound open innovation 715 polygonal meshes 694, 703, 1560-1561, 1567, 1582- Ownership Location and Internalization (OLI) 848 1584 practical watermarking systems 239, 282 P Principle of Severability 115, 124-125, 127 private copy 104, 106, 108, 112, 786-787, 1012-1013, P2P file sharing 801-802, 809-811, 816, 985-986, 1439, 1546, 1548-1549, 1551-1555, 1558 1383, 1554 product activation 609 packet/block license 1224 Project Management (PM) 136 Packet Delivery Ratio (PDR) 354, 375 proprietary licenses 25 paracopyright 785-787, 1272, 1282, 1361, 1365, pseudophotography 1003 1548, 1556 PARSE.Insight project 74, 83 passive steganography 882 Q password reuse 969-972, 976-979 QIM watermarking 1493, 1495, 1522, 1528 patent infringement 1225-1230, 1236, 1244, 1251, QoS Access Point (QAP) 591 1336, 1425, 1481, 1492 Quadrature Carrier Multiplexing (QCM) 561 patent license 1099 Quality of Service (QoS) 511, 605, 649, 651, 653-654, patent litigation 1098, 1226, 1247 686, 1494 patent pool 1093, 1100, 1212, 1224 Quantization-Index-Modulation (QIM) 1495 patent race 1481-1482 quantization mechanisms 424 patents 24 quasiphotography 1003 patent thickets 121, 131, 1205, 1219, 1223-1224, 1481-1482, 1486, 1489-1490, 1492 R Peak Signal-to-Noise Ratio (PSNR) 382, 387, 511 PeerCast 480 Random Access Memory (RAM) 560 Peer-to-Peer (P2P) 479, 802, 981, 984-985 Ravelry 335-336, 341 peer trust 1117 RDF ontologies 210, 212, 216, 221, 223, 230, 232-234 perceptual hash 1588, 1591-1592, 1605 Real Time Control Protocol (RTCP) 484, 525 performance rights 1165, 1381 Real-time Transport Protocol (RTP) 484, 512 permissive licenses 26, 870 Received Signal Strength Indication (RSSI) 511 persistent licenses 26 Recording Industry Association of America (RIAA) Personal Digital Assistants (PDAs) 135, 148 803, 952, 1146, 1382 personalized reputation 1114-1115 Reed Solomon (RS) code 879 Personally Controlled Health Record (PCHR) 906 reflex copying 1004-1005 photocopy policies 1003, 1005 repetition codes 878 PHY/codec settings 511 reproduction rights 781, 1165, 1329, 1361, 1452- Physical Rate-Based Admission Control (PRBAC) 593 1453, 1549 pixel intensity modulation 621-622, 648 res communes 1166 pixel-wise watermarking 157 resolution index 1231-1232, 1236, 1241, 1251 Platform for Enterprise Privacy Practices (E-P3P) 905 Resource Description Framework (RDF) 210, 213, Platform for Privacy Preferences (P3P) 905 1460 platform specific solution 610 res privatæ community 1166 Pochhammer symbol 259, 261, 266, 288 res publicæ community 1166

xxxi Index

robust watermark 150, 440, 691, 1560, 1563, 1571- Singular Value Decomposition (SVD) 376-377, 379- 1575, 1577-1579, 1581 380, 395, 406, 413, 426, 428, 431, 433 robust watermarking system 172, 239, 427 singular values 376-377, 379-380, 391, 402-406, 408, Role-Based Access Control (RBAC) 58-59, 213, 332, 413-415, 419, 421-422, 424, 426, 433-434 463, 905 singular vectors 379, 403-406, 408-410, 412, 414-415, role-playing worlds 1397 417, 419-421, 423, 426, 433-434 Rotation, Scaling, and Translation (RST) invariant 241 Slow Start Power Controlled (SSPC) 664 Rough Set Theory (RST) 1225, 1227 S-MAC 753 Small and Medium-sized Enterprises (SMEs) 1476 S SOAP message transmissions 66 SOA security scalar Costa scheme 889, 1502-1503, 1505, 1525, profiling attack 66-67 1571, 1573, 1575, 1583 replay attack 66, 184 Scale-Invariant Feature Transform (SIFT) 241-242, service composition attack 64 247, 273, 283 service transaction attack 65 secure chip 898 SOA security standards 50-51, 56-57, 67-69 Secure Portable Token (SPT) 894, 898 social bookmarking 936 security actor social enterprise business form 117 film industry 1150 Social Networking Site (SNS) 335 law enforcement 1146, 1148 social welfare 967, 1423, 1480, 1491, 1613, 1617- recording industry 1150 1619, 1623-1624, 1632 security alliances 1153 soft computing 172, 432, 1493-1496, 1506-1507, security guarantees 51, 893, 898 1512, 1515, 1518, 1522, 1525, 1527-1528 Security Markup Assertion Language (SAML) 57 Software as a Service (SaaS) 30 security requirements 51, 56, 62, 68, 184, 210, 214, Software Directive 739-742 217, 219, 227, 230, 233, 313, 401, 463, 1109 software patent directive 29 security stakeholders 1145, 1147, 1153-1155 software patents 19, 24, 29, 33, 121, 721-722, 725, 728, seed vector generation 989 730-732, 736, 1251, 1336, 1484, 1490 Semantic-Aware Authorization Framework (SAAF) software piracy 96, 738-739, 743-744, 814, 953-955, 212 959, 966-967, 1129-1143, 1146, 1158, 1557 semantic integration 216, 218, 223 source authentication 1588, 1605 semantic web space-coordinate transformations 241 security 218 Space Division Multiple Access (SDMA) 357, 373 semi-regular mesh 1559, 1561-1562, 1569-1571, space modulation 621, 633, 647 1573-1574, 1576, 1579-1580, 1585 spatial authentication techniques 691, 709 service composition spatial watermark insertion scheme 691 choreography 63 special interest worlds 1396 orchestration 63 spectrum agility 746-747, 759-760, 763, 772 service compositions 51, 64, 69, 211 Spread Spectrum (SS) watermarking 559-566, 571, Service Oriented Architecture (SOA) 50, 211 578, 581, 583-584, 586, 882, 1493, 1495-1497, Service Oriented Computing (SOC) 984 1512, 1514, 1519-1522, 1526 Service Set Identifier (SSID) 179 Standing Committee on Copyright and Signal-to-Noise Ratio (SNR) 512, 1501 (SSCR) 102 similarity transformation 244, 289, 1564-1566, 1571, state regulation 117, 1357 1578-1581, 1585 steganographic algorithms 89 Simple Object Access Protocol (SOAP) 53, 70, 213 steganographic schemes 407, 421 single-cost routing 653, 657, 663-664 steganographic techniques 89, 405, 407, 419 Single Instruction Multiple Data (SIMD) 492, 495, 509 steganography 89, 96, 98, 285, 396-397, 400-402, 406- Single Instruction Multiple Thread (SIMT) 491, 495, 409, 425-429, 439, 457, 459, 608, 610, 618, 629, 509 645-646, 711, 873, 881-882, 888, 891, 999-1001, 1271, 1358, 1502, 1506, 1517, 1522, 1525-1526, 1528, 1547, 1567, 1580-1582, 1602, 1604 xxxii Index

Stored Communications Act (SCA) 794 trust concepts 1109-1110, 1125 student ethics 958, 962 trust creation 1111 subjective trust 1112 Trusted Third Party (TTP) 902 sub-license 1209, 1224 trust graphs 1107, 1109-1111, 1125 sui generis right 2, 1179, 1184-1188, 1190-1192, 1194- trust management 69, 913, 1109, 1111-1112, 1119, 1196, 1198-1199, 1360, 1448-1449, 1456 1124-1128 Sun Public License (SPL) 27 trust negotiation 1111 symbolic politics 729 synchronization mechanism 240, 1563, 1567, 1573 U synchronization pattern 240 übercopyright 1272, 1548 Universal Description Discovery and Integration T (UDDI) 54, 70, 213 tacit knowledge 140, 931, 1206, 1220, 1262, 1316- Universal Mobile Telecommunication System 1317, 1320 (UMTS) 560 Tax Legal Ontology 38 up-link delay 192 tax-subsidy policy 1628-1632 Tchebichef polynomials 264 V weighted 264-265, 268 TCQ watermarking 1493, 1529 Variable Bit Rate (VBR) 589 Technological Protection Measures (TPM) 785, 1547, Vehicular Ad-Hoc Network (VANET) 354-355, 375 1558 Very Large Scale Integration (VLSI) architecture 561 Technology, Education, and Copyright Harmonization video watermarking 385 (Teach) Act 919, 921 virtual business 1462 Terms of Service (TOS) agreement 1036 virtual currency 1395, 1402, 1404, 1467 text piracy 607 virtual economies 1466 text watermarking 607, 618, 638, 644-647 virtual law 130, 1041, 1368, 1370, 1377, 1406, 1413 Theoretical Research Program (TRP) 790 virtual property 126 theory of self-efficacy 803, 815 virtual property rights 126, 1406 three-strikes approach 722 virtual world platforms 1397 threshold-based trust 1109, 1113 visible watermarking 89, 154-156, 161-164, 169, 172, Time Division Multiple Access (TDMA) 748, 776 174, 561, 584, 587, 694 T-MAC 753 visible watermarking algorithm 161, 164 toral automorphism 271-272, 274 viterbi algorithm 880, 885, 1504-1505, 1525 17, 121-122, 125, 345, 612, 778, 838, 950, 1033-1034, 1101-1104, 1224, 1227, 1289, 1294, W 1335, 1338-1340, 1347, 1350, 1352, 1354, 1371- watermark design 566, 641 1372, 1375-1376, 1398, 1407-1408, 1419, 1523 watermark detection function 240 Trade-Related aspects of Intellectual Property rights watermark detection procedure 273-274, 276, 278 (TRIPS) 1417-1418, 1549 Watermarked Image Memory (WIM) 156 TRAffic adaptive Medium Access protocol (TRAMA) Watermark Embedding (WE) 155, 168-169 751 watermark extraction key 437-438, 445, 447-448, 457 Traffic Aware MAC (TrawMAC) 757 watermarking algorithms 89-90, 148-150, 152-154, tragedy of anti-commons 1479 159-160, 166, 170-171, 173-176, 240, 376-377, tragedy of commons 1177, 1317, 1320, 1479, 1484, 379-381, 385, 390, 394-396, 402, 424, 559, 561, 1489 565-566, 577, 581-584, 586, 621, 641, 643, 691, transaction-based trust 1109, 1112, 1114, 1117 693-694, 711-712, 983, 987, 994, 1002, 1495, transaction management 65 1560, 1563, 1565-1566, 1569, 1581, 1588, 1594- transmission photocopying 1004 1595, 1601 Trellis Coded Quantization (TCQ) 1495, 1504, 1529 watermarking detectors/decoders 875 triangulation 723 watermarking key detection 982, 998

xxxiii Index

watermarking schemes 155, 241, 243, 276-277, 285, WIPO Performances and Phonograms Treaty (WPPT) 398, 401, 405, 407-409, 412, 414, 416, 418-420, 1203, 1381, 1608 422, 425, 428, 430, 432, 564, 584, 693, 695, 709, Wireless Access in Vehicular Environment (WAVE) 711-712, 873, 888, 994-995, 1000, 1495-1496, 359 1505, 1523-1524, 1560, 1562-1563, 1565, 1567, wireless ad hoc networks 208, 357, 605, 649-656, 659, 1569-1570, 1579-1580, 1584, 1594-1596 686, 688-690, 755 watermarking technologies 873, 890, 981-982, 986, Wireless Local Area Networks (WLANs) 177-178, 998 510, 590 watermark synchronization 240-241, 1563, 1573, 1604 Wireless Termination Point (WTP) 179 wavelet transform 150, 164, 169, 171, 175, 285, 376- WiseMAC 754, 757, 774 377, 380, 395-398, 406, 424, 432, 441, 561, 578- WorkFlow Management (WFM) systems 310 580, 583, 876, 889, 1495, 1518-1519, 1566, 1569, World Intellectual Property Organization (WIPO) 3, 1571, 1580, 1582, 1584-1585, 1594 12, 109, 485, 1096, 1272, 1361, 1418, 1548, 1608 Web Services Business Process Execution Language World International Property Organisation (WIPO) (WSBPEL) 63, 311 102 Web Services Description Language (WSDL) 53, 70, World Trade Organization (WTO) 846, 1327, 1417- 212, 234, 332 1418, 1488 Web Services Inspection Language (WSIL) 54, 70 Worldwide Interoperability for Microwave Access Web Services (WS) 211, 984 (WiMAX) 510 weighted orthonormal polynomials 241 Wu-Manber algorithm 502, 504-505 weighting kernel 250 wiki masters 934 Z Wikisphere 929, 931-932, 934, 947, 949-950 WIPO Copyright Treatment 3-5, 7-9, 11-12 Zernike polynomials 241 WIPO Copyright Treaty (WCT) 1381, 1608 Zernike transform 241 Z-MAC 755, 775

xxxiv