In contrast to what is happening in the Internet-based scenario, the music market in the mobile scenario is far from being considered a large success. Several studies state that excessive downloading time and high cost are the main burdens. Motivated by the growth of social and mobile applications, in this paper we propose an approach that aims at reducing both the downloading time and the cost to get digital music when acquired in the mobile scenario. The proposed architecture exploits the usage of personal communication technologies embedded in cellphones (e.g., Bluetooth and Wi-Fi) to couple the current distribution model (mainly based on 3G networks), so as to provide a multichannel distribution model where users are free to redistribute digital music. The architecture includes a license-based security mechanism that prevents unauthorized usage of digital music, and makes use of an incentive mechanism to stimulate and reward the music distribution among customers. By analyzing pros and cons of the music distribution chain, results show that the proposed architecture might help in reducing both the downloading time and the cost to get digital music when acquired in the mobile scenario. Therefore, it might be helpful to the success of the mobile music scenario. 1. Introduction The presence of several online music stores, as well as the capability of several devices (e.g., iPods, cellphones, and in-car and home entertainment systems) to play digital music, is an index of the popularity and of the success of digital music. Today, customers can acquire and download digital music with few clicks, and research reports estimate that the digital music market accounted for 29 percent of record companies’ trade revenues in 2010 [1]. Several studies in economic, social, and technological fields investigated the reason of this success: low prices, high-speed residential Net access (e.g., DSL) with flat rate plans, large availability of attractive and cool portable music devices, and an access to an (almost) unlimited music catalog are commonly seen as the key factors that set the success of digital music. Long time has passed since record labels were reluctant, for piracy reasons, to the idea of releasing music for the download scenario. Today, record labels, along with mobile phone producers and cellphone network operators, are attempting to create a ubiquitous and mobile e-music market, with the goal of creating an additional source of income (mobile phone producers hope to refill the market with new cellphones equipped with features more suitable to digital
References
[1]
IFPI, “The digital music report 2011. Research report,” International Federation of the Phonographic Industry, 2011, http://www.ifpi.org/content/section_resources/dmr2011.html.
[2]
E. Furregoni, A. Rangone, F. M. Renga, and M. Valsecchi, “The mobile digital contents distribution scenario,” in Proceedings of the 6th IEEE International Conference on the Management of Mobile Business (ICMB '07), IEEE Computer Society, Toronto, Canada, 2007.
[3]
A. Kaikkonen, “Full or tailored mobile web—where and how do people browse on their mobiles?” in Proceedings of the International Conference on Mobile Technology, Applications, and Systems, ACM Press, Yilan, Taiwan, September 2008.
[4]
V. Roto, R. Geisler, A. Kaikkonen, A. Popescu, and E. Vartiainen, “Data traffic costs and mobile browsing user experience,” in Proceedings of the 4th MobEA Workshop on Empowering the Mobile Web, pp. 1–6, May 2006.
[5]
P. Vlachos, A. Vrechopoulos, and G. Doukidis, “Exploring consumer attitudes towards mobile music services,” International Journal on Media Management, vol. 5, no. 2, pp. 138–148, 2003.
[6]
C. W. Chu and H. P. Lu, “Factors influencing online music purchase intention in Taiwan,” Internet Research, vol. 17, no. 2, pp. 139–155, 2007.
[7]
S. Grech and S. Luukkainen, “Towards music download and radio broadcast convergence in mobile communications networks,” in Proceedings of the, vol. 2005, pp. 218–224, Pomona, Calif, USA, 2005.
[8]
M. R. Ebling and R. Caceres, “Gaming and augmented reality come to location-based services,” IEEE Pervasive Computing, vol. 9, no. 1, pp. 5–6, 2010.
[9]
V. Ghini, P. Salomoni, and G. Pau, “Always-best-served music distribution for nomadic users over heterogeneous networks,” IEEE Communications Magazine, vol. 43, no. 5, pp. 69–74, 2005.
[10]
M. Roccetti, P. Salomoni, V. Ghini, S. Ferretti, and S. Cacciaguerra, “Delivering music over the wireless internet: from song distribution to interactive karaoke on UMTS devices,” in Wireless Internet Handbook: Technologies, Standards, and Application, pp. 537–565, 2003.
[11]
A. Tanaka, “Mobile music making,” in Proceedings of the 2004 International Conference on New Interfaces for Musical Expression (NIME '04), pp. 154–156, National University of Singapore, Hamamatsu, Japan, 2004.
[12]
M. Kubek and J. Nutzel, “A mobile peer-to-peer application for distributed recommendation and re-sale of music,” in Proceeding of the 2nd International Conference on Automated Production of Cross Media Content for Multi-Channel Distribution (AXMEDIS '06), pp. 93–98, Leeds, UK, 2006.
[13]
G. Stanek, Bluetella: a java application for new mobile phones, Semester thesis, ETH Zurich, Zurich, Switzerland, 2003, TIK-SA-2003.19.
[14]
E. Cervi, C. E. Palazzi, and A. Bujari, “P2P file sharing on mobile phones: design and implementation of a prototype,” in Proceedings of the 2nd IEEE International Conference on Computer Science and Information Technology (ICCSIT '09), pp. 136–140, Beijing, China, August 2009.
[15]
A. U. Schmidt, “On the superdistribution of digital goods,” in Proceedings of the 3rd International Conference on Communications and Networking in China, ChinaCom 2008, pp. 1337–1344, Hangzhou, China, August 2008.
[16]
Q. Liu, R. Safavi-Naini, and N. P. Sheppard, “Digital rights management for content distribution,” in Proceedings of the 1ST Australasian Information Security Workshop Conference on ACSW Frontiers (ACSW Frontiers '03), pp. 49–58, Australian Computer Society, Darlinghurst, Australia, 2003.
[17]
T. S. Messerges and E. A. Dabbish, “Digital rights management in a 3G mobile phone and beyond,” in Proceedings of the 3rd ACM Workshop on Digital Rights Management (DRM '03), pp. 27–38, Association for Computing Machinery, New York, NY, USA, October 2003.
[18]
L. Egidi and M. Furini, “Bringing multimedia contents into MP3 files,” IEEE Communications Magazine, vol. 43, no. 5, pp. 90–97, 2005.
[19]
Z. Yan, Digital Rights Management for Mobile Multimedia book chapter of Multimedia Communication Security: Recent Advances, Nova Science, 2008.
[20]
N. Anderson, Hacking Digital Rights Management, 2006.
[21]
R. MacManus, “Emi music drm-free: what it means for the online music industry,” ReadWriteWeb, 2007.
[22]
Bluetooth Basics, A look at the Basics of Bluetooth Wireless Technology, 2011.
[23]
S. Cheng, H. Yu, and Z. Xiong, “Enhanced spread spectrum watermarking of MPEG-2 AAC audio,” in Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '02), vol. 4, pp. 3728–3731, Orlando, Fla, USA, May 2002.
[24]
R. Dingledine and P. Syverson, “Reliable mix cascade networks through reputation,” in Proceedings of the 6th International Financial Cryptography Conference (FC '02), Southampton, Bermuda, March 2002.
[25]
T. H.-T. Hu, K. Wongrujira, and A. Seneviratne, “Reputation in peer-to-peer networks,” in Proceedings of the IEEE International Conference on Communications (ICC '04), pp. 1411–1415, Paris, France, June 2004.
[26]
P. Resnick, K. Kuwabara, R. Zeckhauser, and E. Friedman, “Reputation systems,” Communications of the ACM, vol. 43, no. 12, pp. 45–48, 2000.
[27]
K. C. Almeroth and A. Garyfalos, “Coupons: wide scale information distribution for wireless ad hoc networks,” in Proceedings of the IEEE Global Telecommunications Conference (Globecom) Global Internet and Next Generation Networks Symposium, pp. 1655–1659, Dallas, Tex, USA, December 2004.
[28]
L. Buttyán and J. P. Hubaux, “Stimulating cooperation in self-organizing mobile Ad Hoc networks,” Mobile Networks and Applications, vol. 8, no. 5, pp. 579–592, 2003.
[29]
N. B. Salem, M. Jakobsson, L. Buttyán, and J. P. Hubaux, “A charging and rewarding scheme for packet forwarding in multi-hop cellular networks,” in Proceedings of the 4th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC '03), pp. 13–24, Annapolis, Md, USA, June 2003.
[30]
M. Furini and M. Montangero, “The impact of incentive mechanisms in multi-channel mobile music distribution,” Multimedia Tools and Applications, vol. 37, no. 3, pp. 365–382, 2008.
[31]
H. V. Zhao, W. S. Lin, and K. J. R. Liu, “Behavior modeling and forensics for multimedia social networks: a case study in multimedia fingerprinting,” IEEE Signal Processing Magazine, vol. 26, no. 1, pp. 118–139, 2009.
[32]
Digital rights management (drm), http://msdn.microsoft.com/en-us/library/cc838192(v=vs.95).aspx.
[33]
G. Tardos, “Capacity of collusion secure fingerprinting: a tradeoff between rate and efficiency,” in Proceedings of the 12th international conference on Information hiding (IH '10), pp. 81–85, Springer-Verlag, Alberta, Canada, 2010.
[34]
D. Schonberg and D. Kirovski, “Fingerprinting and forensic analysis of multimedia,” in Proceedings of the 12th annual ACM international conference on Multimedia (MULTIMEDIA '04), pp. 788–795, ACM Press, New York, NY, USA, 2004.
[35]
S. He and M. Hu, “Performance study of ecc-based collusion-resistant multimedia fingerprinting,” in Proceedings of the 38th Conferences on Information Sciences and Systems, pp. 827–832, Princeton, NJ, USA, March 2004.
[36]
I. Cox, M. Miller, and J. Bloom, In Digital Watermarking, Morgan Kaufmann, San Fransisco, Calif, USA, 2001.
[37]
X. Luo, J. Zhang, R. Perdisci, and W. Lee, “On the secrecy of spread-spectrum ow watermarks,” in Proceedings of the 15th European Conference on Research in computer security (ESORICS '10), pp. 232–248, Springer-Verlag, Athens, Greece, 2010.
[38]
X. Li and H. H. Yu, “Transparent and robust audio data hiding in subband domain,” in Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC '00), p. 74, IEEE Computer Society, Washington, DC, USA, 2000.
[39]
X. Li and H. Yu, “Transparent and robust audio data hiding in cepstrum domain,” in Proceedings of the IEEE International Conference on Multimedia and Expo (ICME '00), pp. 397–402, Piscataway, NJ, USA, 2000.
[40]
J. Seok, J. Hong, and J. Kim, “A novel audio watermarking algorithm for copyright protection of digital audio,” ETRI Journal, vol. 24, no. 3, pp. 181–189, 2002.
[41]
S. Ravi, A. Raghunathan, P. Kocher, and S. Hattangady, “Security in embedded systems: design challenges,” ACM Transactions on Embedded Computing Systems, vol. 3, no. 3, pp. 461–491, 2004.
[42]
C. Mclvor, M. McLoone, and J. V. McCanny, “Fast montgomery modular multiplication and rsa cryptographic processor architectures,” in Proceedings of the 37th Asilomar Conference on Signals, Systems and Computers, pp. 379–384, Pacific Grove, Calif, USA, November 2003.
[43]
R. Karri and P. Mishra, “Minimizing energy consumption of secure wireless session with QoS constraints,” in Proceedings of the International Conference On Communication, pp. 2053–2057, IEEE Computer Society, Washington, DC, USA, 2002.
[44]
A. Raghunathan, N. R. Potlapally, S. Ravi, and N. K. Jha, “Analyzing the energy consumption of security protocols,” in Proceedings of the ACM International Symposium on Low Power Electronics and Design (ISLPED '03), ACM Press, 2003.
EveryiPod.com. Apple ipod 3rd gen (15/20/40) 15, 20, 40 gb specs, http://www.everymac.com/systems/apple/ipod/specs/ipod-touch-3g-specs.html.
[47]
S. Schlott, F. Kargl, S. Ribhegge, and M. Weber, “Bluetooth-based ad-hoc networks for voice trasmission,” in Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS'03), IEEE Press, Big Island, Hawaii, USA, 2002.
[48]
International Data Corporation, “Worldwide mobile phone market grew nearly 20% in the first quarter; smartphones and vendors outside the top 5 keys to growth,” http://www.idc.com/getdoc.jsp?containerId=prUS22808211.
[49]
CISCO, “Cisco visual networking index: Global mobile data traffic forecast update, 2010–2015,” http://www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/white_paper_c11-520862.html.
[50]
C. J. Cobb and W. D. Hoyer, “Planned versus impulse purchase behavior,” Journal of Retailing, vol. 62, no. 4, pp. 384–409, 1986.
[51]
D. Rook, “The buying impulse,” Journal of Consumer research, vol. 14, no. 2, pp. 189–199, 1987.