| Peer-Reviewed

Hybrid Copyright Protection Model for Secured Multimedia and Digital Resource Utilization

Received: 27 August 2016     Accepted: 10 September 2016     Published: 10 October 2017
Views:       Downloads:
Abstract

Copyright protection is a mechanism to secure the rights of ownership of original work so that no one can use the rights-protected work in any way without seeking permission for the use. It became imperative that user may pay the right owners a royalty for utilizing such resource. Copyright Society of Nigeria(COSON) is the regulatory body over intellectual properties but it lacks provision for encrypting digital content like videos, images and graphics. Hence, rampart illicit reproduction of developed graphics, movies, images and music by internet mafias and thereby deprive legitimate owners their due proceeds. This anomaly led to development of copyright protection suite to competently secure copyrighted infrastructures and create a viable interface between COSON and content owners. All original digital contents are encrypted, interested user are made to pay royalty before access is allowed. Structured system analysis and design approach is deployed in developing the system – which provides clear cut steps in navigating process-to-process. The implementation used server side scripting language with its associated embedded resources and Standard Query Language(MySQL)to achieve the desired input-output robustness and buoyant security fittings.

Published in International Journal of Science and Qualitative Analysis (Volume 3, Issue 2)
DOI 10.11648/j.ijsqa.20170302.11
Page(s) 10-14
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2017. Published by Science Publishing Group

Keywords

Copyright, COSON, Repositories, Encryption, Digital Contents, Royalty

References
[1] Australian Copyright Council (2001). ‘Remuneration for Private Copying in Australia, A Discussion Paper’ Australian Mechanical Copyright Owners Society (AMCOS) & Screenrights (2001). ‘The Case for a Private Copying Levy’.
[2] Boyer, M. (2007). The Economics of Copyright and Fair Dealing. Scientific Series, December, Centre Interuniversitaire de Recherche en Analyses des Organizations (CIRANO).
[3] Einhora, M. A., and Rosenblatt, B. (2005). Peer-to-Peer Networking and Digital Rights Management: How market tools can solve copyright problems. Carto Institute Policy Analsis no. 534.
[4] Frattolillo, F., and Landolfi, F. (2008). “Designing a DRM System”, in Proceeding of the Fourth International Symposium on Information Assurance and Security, IEEE Computer Society - Los Alamitos, CA. pp 221.
[5] Gowers, A. (2006). The Gowers Review of Intellectual Property. Report for the UK Treasury, http://www.hm-treasury.gov.uk/independent_reviews/
[6] Peitz, M., and Waelbroeck, P. (2004). ‘The Effect of Internet Piracy on CD Sales: Cross-Section Evidence’. CESifo Working Paper No. 1122.
[7] Rogers, and Thomas, (2007). ‘Fair Use in the US Economy, Economic Contribution of Industries Relying on Fair Use.’ Computer & Communications Industry Association.
[8] Swanson, J (1998). ‘Integrating Consumer Rights into Copyright Law From a European Perspective.’ Journal of Consumer Policy, vol. 31, no. 4. The Printing Group (2006) ‘Statement on Copyright Levies on Multifunctional Printers and Printers.’
[9] Trowbridge, R (1995). ‘Why has Cultural Economics Ignored Copyright?’ The Journal of Cultural Economics 32 243-259. Towse, R., C. Handke and P. Stepan (2008). ‘The Economics of Copyright Law: A Stocktake of the Literature.’
[10] Weatherall, K (2005). ‘A Comment on the Copyright Exceptions Review and Private Copying.’ Intellectual Property Research Institute of Australia, Working Paper No. 14/05.
Cite This Article
  • APA Style

    Igboji Kingsley O. (2017). Hybrid Copyright Protection Model for Secured Multimedia and Digital Resource Utilization. International Journal of Science and Qualitative Analysis, 3(2), 10-14. https://doi.org/10.11648/j.ijsqa.20170302.11

    Copy | Download

    ACS Style

    Igboji Kingsley O. Hybrid Copyright Protection Model for Secured Multimedia and Digital Resource Utilization. Int. J. Sci. Qual. Anal. 2017, 3(2), 10-14. doi: 10.11648/j.ijsqa.20170302.11

    Copy | Download

    AMA Style

    Igboji Kingsley O. Hybrid Copyright Protection Model for Secured Multimedia and Digital Resource Utilization. Int J Sci Qual Anal. 2017;3(2):10-14. doi: 10.11648/j.ijsqa.20170302.11

    Copy | Download

  • @article{10.11648/j.ijsqa.20170302.11,
      author = {Igboji Kingsley O.},
      title = {Hybrid Copyright Protection Model for Secured Multimedia and Digital Resource Utilization},
      journal = {International Journal of Science and Qualitative Analysis},
      volume = {3},
      number = {2},
      pages = {10-14},
      doi = {10.11648/j.ijsqa.20170302.11},
      url = {https://doi.org/10.11648/j.ijsqa.20170302.11},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ijsqa.20170302.11},
      abstract = {Copyright protection is a mechanism to secure the rights of ownership of original work so that no one can use the rights-protected work in any way without seeking permission for the use. It became imperative that user may pay the right owners a royalty for utilizing such resource. Copyright Society of Nigeria(COSON) is the regulatory body over intellectual properties but it lacks provision for encrypting digital content like videos, images and graphics. Hence, rampart illicit reproduction of developed graphics, movies, images and music by internet mafias and thereby deprive legitimate owners their due proceeds. This anomaly led to development of copyright protection suite to competently secure copyrighted infrastructures and create a viable interface between COSON and content owners. All original digital contents are encrypted, interested user are made to pay royalty before access is allowed. Structured system analysis and design approach is deployed in developing the system – which provides clear cut steps in navigating process-to-process. The implementation used server side scripting language with its associated embedded resources and Standard Query Language(MySQL)to achieve the desired input-output robustness and buoyant security fittings.},
     year = {2017}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Hybrid Copyright Protection Model for Secured Multimedia and Digital Resource Utilization
    AU  - Igboji Kingsley O.
    Y1  - 2017/10/10
    PY  - 2017
    N1  - https://doi.org/10.11648/j.ijsqa.20170302.11
    DO  - 10.11648/j.ijsqa.20170302.11
    T2  - International Journal of Science and Qualitative Analysis
    JF  - International Journal of Science and Qualitative Analysis
    JO  - International Journal of Science and Qualitative Analysis
    SP  - 10
    EP  - 14
    PB  - Science Publishing Group
    SN  - 2469-8164
    UR  - https://doi.org/10.11648/j.ijsqa.20170302.11
    AB  - Copyright protection is a mechanism to secure the rights of ownership of original work so that no one can use the rights-protected work in any way without seeking permission for the use. It became imperative that user may pay the right owners a royalty for utilizing such resource. Copyright Society of Nigeria(COSON) is the regulatory body over intellectual properties but it lacks provision for encrypting digital content like videos, images and graphics. Hence, rampart illicit reproduction of developed graphics, movies, images and music by internet mafias and thereby deprive legitimate owners their due proceeds. This anomaly led to development of copyright protection suite to competently secure copyrighted infrastructures and create a viable interface between COSON and content owners. All original digital contents are encrypted, interested user are made to pay royalty before access is allowed. Structured system analysis and design approach is deployed in developing the system – which provides clear cut steps in navigating process-to-process. The implementation used server side scripting language with its associated embedded resources and Standard Query Language(MySQL)to achieve the desired input-output robustness and buoyant security fittings.
    VL  - 3
    IS  - 2
    ER  - 

    Copy | Download

Author Information
  • Department of Computer Science, Ebonyi State University, Abakaliki, Nigeria

  • Sections