{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T06:50:52Z","timestamp":1777704652973,"version":"3.51.4"},"reference-count":17,"publisher":"SAGE Publications","issue":"6","license":[{"start":{"date-parts":[[2018,8,1]],"date-time":"2018-08-01T00:00:00Z","timestamp":1533081600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2018,12,24]]},"abstract":"<jats:p>Personal content creation has become a significant part of the media industry, and sales are not necessarily the main objective of such creators. Individual creators have a greater need for privacy protection; therefore, the novel active content (AC) approach is proposed to address this need. The Intention Markup Language (InML) markup language is also introduced to express the content owner\u2019s intentions systematically and precisely, and then to implement these as an executable code. To overcome the incompatibility and inconvenience of the existing digital rights management (DRM) systems, the novel AC format is proposed. This is based on the Portable Executable (PE) format and consists of a PE header and sections, followed by an AC header, the content, and the intention code. The proposed content virtualization technique protects the content against a variety of attacks by treating content in main memory as if it were stored on the user\u2019s storage. Since external players, beyond the AC control boundary, may potentially expose the content, these are controlled by hooking code included in the intention engine while the AC is in use. Finally, example use cases are presented to show how intentions can be expressed in InML documents and the creation and use of an AC file on Windows is demonstrated.<\/jats:p>","DOI":"10.3233\/jifs-169857","type":"journal-article","created":{"date-parts":[[2018,8,5]],"date-time":"2018-08-05T06:38:51Z","timestamp":1533451131000},"page":"6173-6180","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":0,"title":["The structure of novel active content embedding personal intention codes for digital images"],"prefix":"10.1177","volume":"35","author":[{"given":"Hyunmin","family":"Lee","sequence":"first","affiliation":[{"name":"Department of Computer Science, Sangmyung University, Seoul, South Korea"}]},{"given":"Sang-ug","family":"Kang","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Sangmyung University, Seoul, South Korea"}]}],"member":"179","published-online":{"date-parts":[[2018,8]]},"reference":[{"key":"e_1_3_2_2_2","first-page":"79","article-title":"Digital Rights Management, Business and Technology","author":"Rosenblatt B.","year":"2002","unstructured":"RosenblattB., TrippeB. and MooneyS., Digital Rights Management, Business and Technology, M&T Books, 2002, pp. 79\u2013102.","journal-title":"M&T Books"},{"key":"e_1_3_2_3_2","volume-title":"IFIP\/GI workshop on virtual goods","author":"Schmidt A.","year":"2004","unstructured":"SchmidtA., TafreschiO., WolfR., Interoperability challenges for DRM systems. In IFIP\/GI workshop on virtual goods, Ilmenau, Germany, 2004."},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2005.847137"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.79"},{"issue":"1","key":"e_1_3_2_6_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.emj.2013.12.001","article-title":"Challenges and solutions for marketing in a digital era","volume":"32","author":"Peter Leeflang S.","year":"2014","unstructured":"PeterLeeflang S., PeterVerhoef C. and Dahlstr, Challenges and solutions for marketing in a digital era, European Management Journal32(1) (2014), 1\u201312.","journal-title":"European Management Journal"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-15746"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2004.827357"},{"key":"e_1_3_2_9_2","author":"World Wide Web Consortium","year":"2006","unstructured":"World Wide Web Consortium. (2006). Extensible markup language (XML) 1.1.","journal-title":"Extensible markup language (XML) 1.1"},{"key":"e_1_3_2_10_2","unstructured":"http:\/\/www.XrML.org."},{"key":"e_1_3_2_11_2","unstructured":"https:\/\/www.w3.org\/community\/odrl\/."},{"key":"e_1_3_2_12_2","unstructured":"Jogand-CoulombE. and ChangT. Memory device and method for content virtualization U.S. Patent No. 9 514 141 2016."},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7045396"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.10.017"},{"issue":"2","key":"e_1_3_2_15_2","article-title":"Virtualization in cloud computing","volume":"4","author":"Malhotra L.","year":"2014","unstructured":"MalhotraL., AgarwalD. and JaiswalA., Virtualization in cloud computing, Journal of Information Technology and Software Engineering4(2) (2014).","journal-title":"Journal of Information Technology and Software Engineering"},{"key":"e_1_3_2_16_2","unstructured":"RichterJ. NasarreC. Windows via C\/C++. Microsoft Press 2011."},{"key":"e_1_3_2_17_2","doi-asserted-by":"crossref","unstructured":"Mayer-Sch\u00f6nbergerV. Delete: The virtue of forgetting in the digital age. Princeton University Press 2011.","DOI":"10.1515\/9781400838455"},{"key":"e_1_3_2_18_2","unstructured":"http:\/\/www.microsoft.com\/whdc\/system\/platform\/firmware\/PECOFF.mspx."}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-169857","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-169857","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-169857","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:41:42Z","timestamp":1777455702000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-169857"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8]]},"references-count":17,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2018,12,24]]}},"alternative-id":["10.3233\/JIFS-169857"],"URL":"https:\/\/doi.org\/10.3233\/jifs-169857","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,8]]}}}