HOME    »    PROGRAMS/ACTIVITIES    »    Annual Thematic Program
IMA Workshop 6A
Digital Libraries : Digital Asset Management
February 12-16, 2001


with partial support by The Office of Naval Research

Organizers:

Michael Barnsley
Department of Mathematics & Statistics
University of Melbourne
mbarnsley@aol.com

George Cybenko
Thayer School of Engineering
Dartmouth College
george.cybenko@dartmouth.edu

David Du
Department of Computer Science
University of Minnesota
du@cs.umn.edu

IMA Public Lecture: Bruce Schneier (Counterpane Internet Security)
Natural Laws of Digital Content: the Folly of Copy Protection on the Internet
 Slides (pdf)   Audio  MP3  24k (15.5mb)  64k (41mb)  128k (82mb)
Monday, February 12, 2001, 7:00 pm
2650 Moos Tower


The Internet offers unprecedented capabilities as a distribution channel for digital assets. Digital asset management over the internet today requires technologies for:

        - asserting intellectual property rights;
        - protecting intellectual property;

        - managing the intellectual property value chain;

        - efficient storage and retrieval of digital assets;

        - verifying the source of the assets (authentication);

        - secure distribution of digital assets to end users;

        - effective distribution of digital assets to end users.

The goals of this workshop are to formulate and begin to solve these and related challenges. The workshop will bring together, in an intense mathematical environment, mathematical scientists, engineers and computer scientists, including software architects, who are involved theoretically or practically with designing and building digital asset management systems.

In more detail, the challenges are:

Asserting intellectual property rights - Because digital assets are easy to copy and redistribute, ownership information must be embedded into content in a way that can tolerate tampering, editing and other forms of modification.  Digital watermarking of audio, images and video is a technology that addresses these problems.

Protecting intellectual property - Techniques for efficient encryption of digital content is one technique for ensuring that assets are available to the appropriate end users.   Many advanced mathematical methods are using to encrypt digital assets.

Managing the intellectual property value chain - Authoring and distributing digital content, such as video and audio, are only two stages in the value chain. Rights negotiations are a time consuming and complex part of digital asset management.  Software agents can be used to implement bargaining strategies and mathematical theory is currently being developed to automate bidding.

Efficient storage and retrieval of digital assets - Digital assets must be compressed, indexed, retrieved and uncompressed efficiently.  These are often conflicting goals and new mathematical ideas are needed to index and retrieve compressed content. Efficient translation between formats is an important issue.

Verifying the source of the assets (authentication) -  Digital signatures, public key encryption and digital steganography can be used to authenticate the origin of digital content.

Secure distribution of digital assets to end users - Digital assets must be securely delivered to end users, requiring session oriented crypographic techniques and session keys for efficient encoding and decoding.

Efficient distribution of digital assets to end users - The owners of digital assets are typically not the owners or operators of the networks over which the content is distributed.  In fact, the internet is a highly decentralized, international telecommunications infrastructure that is increasingly being targeted by criminals, hackers and terrorists. Mathematical models for distributed communication, management, monitoring and control of large networks will be discussed.

WORKSHOP SCHEDULE

Monday Tuesday
MONDAY, FEBRUARY 12
All talks are in Lind Hall 409 unless otherwise noted.
8:30 am Coffee and Registration

 Lind Hall 400

9:10 am Willard Miller, Fred Dulles Welcome and Introduction
9:30 am George Cybenko
Dartmouth College
Workshop Introduction and Plans
10:00 am Hal R. Varian
University of California-Berkeley

Buying, Renting, and Sharing Information Goods

Slides (pdf)

11:00 am Break Lind Hall 400
11:30 am-12:30 pm Sharon Flank
eMotion, Inc.

Metadata Issues

Slides   pdf    html

2:00 pm James P. Hughes
Storage Technology Corporation

The Secure Distribution of Information in a Corporate Environment

Slides  (pdf)

3:00 pm Break Lind Hall 400
3:30-4:30 pm C. Lee Giles
The Pennsylvania State University
Web Search: The Role for Niche Search Engines
4:30 pm Discussion and wrapup  
5:00-6:30 pm Reception for Public Lecture 400 Lind Hall

7:00 pm


7:05 pm

 

Paul Garrett
University of Minnesota

Public Lecture: Bruce Schneier Counterpane Internet Security
2650 Moos Tower

Introduction of Bruce Schneier


Natural Laws of Digital Content: the Folly of Copy Protection on the Internet

Slides (pdf)   Audio
MP3  24k (15.5mb)  64k (41mb)  128k (82mb)

TUESDAY, FEBRUARY 13
All talks are in Lind Hall 409 unless otherwise noted.
8:45 am Coffee  Lind Hall 400
9:00 am Edward J. Delp
Purdue University

Multimedia Security: Is there Hope in Securing our "Digital Future?"

Slides (pdf)

10:00 am Avni Rambhia
e-Vue Inc.

Intellectual Property Management and Protection and MPEG-4

Slides  pdf    html

11:00 am Break Lind Hall 400
11:30 am-12:30 pm Lyman Hurd
Iterated Systems, Inc.

Protecting Property: Algorithms to Solutions

Slides   pdf    html

3:00 pm Gerhard O. Michler
Universität Gesamthochschule Essen

A Prototype of a Combined Digital and Retrodigitized Searchable Mathematical Journal

Talk   pdf    postscript

4:00 pm Discussion and wrapup  
WEDNESDAY, FEBRUARY 14
All talks are in Lind Hall 409 unless otherwise noted.
8:45am Coffee  Lind Hall 400
9:00 am Edward J. Delp
Purdue University

Tutorial: An Overview of Cryptography

Slides  pdf    html

10:00 am George Cybenko
Dartmouth College

Monitoring the Web: New Metrics and Measurements

Slides pdf   html

11:00 am Break Lind Hall 400
11:30 am-12:30 pm H. Joel Trussell
North Carolina State University

Color Fidelity in Multimedia

Slides pdf    html

2:00 pm Michiel van der Veen
Philips Research Laboratories
Secure Delivery of Entertainment Content
3:00 pm Break Lind Hall 400
3:30 pm Florian Pestoni
IBM Almaden Research Center

Content Protection for Recordable Media

Slides   pdf    html

4:30 pm Discussion and wrapup  
THURSDAY, FEBRUARY 15
All talks are in Lind Hall 409 unless otherwise noted.
8:45 am Coffee  Lind Hall 400
9:00 am Dhiraj Kacker
Shutterfly

Watermarking Printed Images

Slides   pdf    html

10:00 am Break Lind Hall 400
10:30-11:30 am Richard E. Smith
Secure Computer Corporation
Modeling the Intellectual Property Value Chain Based on Computer Security Incidents
12:00-1:00 pm Michael Barnsley
University of Melbourne
Constructing Dynamical System Representations for Stationary (Discrete Alphabet) Stochastic Processes, Lossless Fractal Compression and the Burrows-Wheeler Transform
1:30 pm Ahmed Tewfik
University of Minnesota
Music In the Early Part of the 21st Century
2:30--3:30 pm Francisco Javier Thayer
MITRE Corporation

Graphical, Algebraic and Probabilistic Models for Protocols

Slides    pdf   postscript

4:30 pm Discussion and wrapup  
FRIDAY, FEBRUARY 16
All talks are in Lind Hall 409 unless otherwise noted.
8:45 am Coffee  Lind Hall 400
9:00 am Michael Barnsley
University of Melbourne
Separation of Image Science, Subjectivity and Mathematics in the Storage, Retrieval and Indexing of Digital Real World Images
10:00 am Break Vincent Hall 502
11:10 am David Du
University of Minnesota
Asset Management Aspects of End-to-End Video Streaming over the Internet
12:10 pm Discussion and wrapup  
Monday Tuesday

LIST OF CONFIRMED PARTICIPANTS
(in addition to postdocs and long term participants)

as of 2/15/2001
Name Department Affiliation
Michael Barnsley Mathematics & Statistics University of Melbourne
Sankar Basu   IBM T.J. Watson Research Center
John Baxter Mathematics University of Minnesota
Jamylle Carter   Institute for Mathematics and its Applications
George Cybenko Thayer Engineering Dartmouth College
Edward Delp Electrical Engineering Purdue University
David Du Computer Science University of Minnesota
Fred Dulles   Institute for Mathematics & its Applications
Sharon Flank   eMotion, Inc.
Paul Garrett Mathematics University of Minnesota
Nathan Georgitis   Minnesota Public Radio
C. Lee Giles Information Sciences & Technology The Pennsylvania State University
Bin Han   Institute for Mathematics and its Applications
James P. Hughes   Storage Technology Corporation
Lyman Hurd MediaBin, Inc.  
Dhiraj Kacker   Shutterfly
Mostafa Kaveh Electrical & Computer Engineering University of Minnesota
Brian Loe   Secure Computing
Gerhard Michler Institut für Experimentelle Mathematik Universität Essen
Willard Miller   Institute for Mathematics & its Applications
Peter Olver Mathematics University of Minnesota
Florian Pestoni   IBM Almaden Research Center
Jianliang Qian   Institute for Mathematics and its Applications
Avni Rambhia Project Manager, Image & DRM e-Vue, Inc.
Bruce Schneier   Counterpane Internet Security, Inc.
Zafar Singhera Research & Development Sapient Corporation
Richard Smith Advanced Technology Division Secure Computing Corporation
Ahmed Tewfik Electrical Engineering University of Minnesota
Francisco Javier Thayer   MITRE Corporation
Joel Trussell Electrical and Computer Engineering North Carolina State University
Michiel Van Der Veen   Philips Research Laboratories
Hal Varian Information Management & Systems University of California Berkeley

 

Material from Talks     Abstracts

2000-2001 Program: Mathematics in Multimedia

Back to top of page

Connect With Us:
Go