Skip to main content

Distribution of Cultural Content through Exploitation of Cryptographic Algorithms and Hardware Identification

  • Conference paper
Digital Heritage. Progress in Cultural Heritage: Documentation, Preservation, and Protection (EuroMed 2014)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8740))

Included in the following conference series:

  • 5370 Accesses

Abstract

An influential effect of IT to museums and other Cultural Content owners organizations is the digitization of collections and in general their content. In this paper, a framework for distribution and commercialization of cultural content is proposed extending an earlier work of the authors. In this work, the framework has been upgraded to include features that protect the cultural content purchased online, to be freely distributed among users through p2p networks or file transfer or copy/paste, etc. The framework utilizes cryptographic algorithms, hash functions, block ciphers and computer’s static and unique parameters/properties. The first are used for continuous hashing and digest matching of the database’s contents for quality assurance. The block ciphers are used to enable on-line selling, through encryption of digital objects. The computer’s static and unique parameters are used to ensure the customer identity and content-distribution legibility. The system’s architecture that implements the above framework is presented and explained. This work illustrates a novel approach that utilize cryptographic and security techniques for secure distribution of Cultural Content.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Athanasiou, G.S., Michail, H.E., Gregoriades, A., Ioannides, M.: Evolution of the e-Museum Concept through Exploitation of Cryptographic Algorithms. In: Ioannides, M., Fritsch, D., Leissner, J., Davies, R., Remondino, F., Caffo, R. (eds.) EuroMed 2012. LNCS, vol. 7616, pp. 291–300. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  2. Thaller, M.: From national Cultural Heritages in the digital World to a Digital European Cultural Heritage. Archivi Informatici per il Patrimonio Culturale, Rome, Italy (2004)

    Google Scholar 

  3. Johnson, P., Thomas, B.: The Economics of Museums: A research perspective. J. Cultural Economics 22, 75–85 (1998)

    Article  Google Scholar 

  4. Bailey, J., Falconer, P.: Charging For Admission to Museums and Galleries. J. Cultural Economics 22, 166–177 (1995)

    Google Scholar 

  5. Hughes, L.: Digitizing collections: strategic issues for the information manager. Facet Publishing, London (2004)

    Google Scholar 

  6. White, M., Mourkoussis, N., Darcy, J., Petridis, P., Liarokapis, F., Lister, P., Walczak, K., Wojciechowski, K., Cellary, W., Chmielewski, J., Stawniak, M., Wiza, W., Patel, M., Stevenson, J., Manley, J., Giorgini, F., Sayd, P., Gaspard, F.: ARCO - an architecture for digitization, management and presentation of virtual exhibitions. In: International Conference on Computer Graphics International, Crete, Greece, pp. 622–625 (2004)

    Google Scholar 

  7. Thorsby, D.: Determining the Value of Cultural Goods: How Much (or How Little) Does Contingent Valuation Tell Us? J. Cultural Economics 27, 275–285 (2003)

    Article  Google Scholar 

  8. Poor, P., Smith, J.: Travel Cost Analysis of a Cultural Heritage Site: The Case of Historic St. Mary’s City of Maryland. J. Cultural Economics 28, 217–229 (2004)

    Article  Google Scholar 

  9. Hanappi-Egger, E.: Cultural Heritage: The Conflict between Commercialization and Public Ownership. Working Paper. Vienna Technical University, Vienna, http://www.oeaw.ac.at/ita/access/hanappi_egger_txt.pdf

  10. NIST: Secure Hash Standard. FIPs-180-3 Publication. US Department of Commerce (2008)

    Google Scholar 

  11. NIST: Advanced Encryption Standard. FIPS-197. US Department of Commerce (2001)

    Google Scholar 

  12. Michail, H.: Cryptography in the Dawn of IPv6. IEEE GOLDrush Newsletter 43, 72–80 (2010)

    Google Scholar 

  13. Microsoft: Microsoft MSDN libraries, http://msdn.microsoft.com/library

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Michail, H.E., Louca, C., Gavrilis, D., Gregoriades, A., Anastasiou, L., Ioannides, M. (2014). Distribution of Cultural Content through Exploitation of Cryptographic Algorithms and Hardware Identification. In: Ioannides, M., Magnenat-Thalmann, N., Fink, E., Žarnić, R., Yen, AY., Quak, E. (eds) Digital Heritage. Progress in Cultural Heritage: Documentation, Preservation, and Protection. EuroMed 2014. Lecture Notes in Computer Science, vol 8740. Springer, Cham. https://doi.org/10.1007/978-3-319-13695-0_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-13695-0_15

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-13694-3

  • Online ISBN: 978-3-319-13695-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics