Abstract
An influential effect of IT to museums and other Cultural Content owners organizations is the digitization of collections and in general their content. In this paper, a framework for distribution and commercialization of cultural content is proposed extending an earlier work of the authors. In this work, the framework has been upgraded to include features that protect the cultural content purchased online, to be freely distributed among users through p2p networks or file transfer or copy/paste, etc. The framework utilizes cryptographic algorithms, hash functions, block ciphers and computer’s static and unique parameters/properties. The first are used for continuous hashing and digest matching of the database’s contents for quality assurance. The block ciphers are used to enable on-line selling, through encryption of digital objects. The computer’s static and unique parameters are used to ensure the customer identity and content-distribution legibility. The system’s architecture that implements the above framework is presented and explained. This work illustrates a novel approach that utilize cryptographic and security techniques for secure distribution of Cultural Content.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Athanasiou, G.S., Michail, H.E., Gregoriades, A., Ioannides, M.: Evolution of the e-Museum Concept through Exploitation of Cryptographic Algorithms. In: Ioannides, M., Fritsch, D., Leissner, J., Davies, R., Remondino, F., Caffo, R. (eds.) EuroMed 2012. LNCS, vol. 7616, pp. 291–300. Springer, Heidelberg (2012)
Thaller, M.: From national Cultural Heritages in the digital World to a Digital European Cultural Heritage. Archivi Informatici per il Patrimonio Culturale, Rome, Italy (2004)
Johnson, P., Thomas, B.: The Economics of Museums: A research perspective. J. Cultural Economics 22, 75–85 (1998)
Bailey, J., Falconer, P.: Charging For Admission to Museums and Galleries. J. Cultural Economics 22, 166–177 (1995)
Hughes, L.: Digitizing collections: strategic issues for the information manager. Facet Publishing, London (2004)
White, M., Mourkoussis, N., Darcy, J., Petridis, P., Liarokapis, F., Lister, P., Walczak, K., Wojciechowski, K., Cellary, W., Chmielewski, J., Stawniak, M., Wiza, W., Patel, M., Stevenson, J., Manley, J., Giorgini, F., Sayd, P., Gaspard, F.: ARCO - an architecture for digitization, management and presentation of virtual exhibitions. In: International Conference on Computer Graphics International, Crete, Greece, pp. 622–625 (2004)
Thorsby, D.: Determining the Value of Cultural Goods: How Much (or How Little) Does Contingent Valuation Tell Us? J. Cultural Economics 27, 275–285 (2003)
Poor, P., Smith, J.: Travel Cost Analysis of a Cultural Heritage Site: The Case of Historic St. Mary’s City of Maryland. J. Cultural Economics 28, 217–229 (2004)
Hanappi-Egger, E.: Cultural Heritage: The Conflict between Commercialization and Public Ownership. Working Paper. Vienna Technical University, Vienna, http://www.oeaw.ac.at/ita/access/hanappi_egger_txt.pdf
NIST: Secure Hash Standard. FIPs-180-3 Publication. US Department of Commerce (2008)
NIST: Advanced Encryption Standard. FIPS-197. US Department of Commerce (2001)
Michail, H.: Cryptography in the Dawn of IPv6. IEEE GOLDrush Newsletter 43, 72–80 (2010)
Microsoft: Microsoft MSDN libraries, http://msdn.microsoft.com/library
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Michail, H.E., Louca, C., Gavrilis, D., Gregoriades, A., Anastasiou, L., Ioannides, M. (2014). Distribution of Cultural Content through Exploitation of Cryptographic Algorithms and Hardware Identification. In: Ioannides, M., Magnenat-Thalmann, N., Fink, E., Žarnić, R., Yen, AY., Quak, E. (eds) Digital Heritage. Progress in Cultural Heritage: Documentation, Preservation, and Protection. EuroMed 2014. Lecture Notes in Computer Science, vol 8740. Springer, Cham. https://doi.org/10.1007/978-3-319-13695-0_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-13695-0_15
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-13694-3
Online ISBN: 978-3-319-13695-0
eBook Packages: Computer ScienceComputer Science (R0)