For the past more than 200 years copyright has been defined and copyright law has been refined. As a draft statement of librarians on lawful uses of copyrighted works stated: "the genius of United States copyright law is that, in conformance with its constitutional foundation, it balances the intellectual property interests of authors, publishers, and copyright owners with society's need for the free exchange of ideas."
In the second half of the 20th century, computer technology has changed how information can be created, stored, distributed, and experienced. Information created, and stored on local computers and computer networks is more easily accessed, reproduced and altered than information based in print technology. Erickson of Dartmouth University outlines the challenges in an article about regarding the future of fair use:
"Computer networks seem to mesh nicely with our founding fathers' vision of information flow. Never before has information been so accessible, with the capacity to promote economic and scholarly growth. But with today's technology, digitally-distributed creative works present serious challenges to copyright compliance. Creative works must be accessible to be of value, but in the digital world today easy access also means vulnerability to unauthorized distribution of perfect reproductions by others. It is just as easy for others to create unauthorized derivative works without proper attribution to the originator or appropriate payment of royalties, or for others to publish unauthorized modifications under the original authors name."
The purpose of this paper is to outline some possible technology-based solutions regarding the control of digital-based copyrighted materials, in particular for digital images. Also, this paper will outline some possible problems and criticisms of technology-based solutions.
"It is important to recognize that access needs of users of the NII have to be considered in context with the needs of copyright owners to ensure that their rights in their works are recognized and protected. One important factor is the extent to which the marketplace will tolerate measures that restrict access to or use of a copyrighted work. Conversely, without providing a secure environment where copyright owners can be assured that there will be some degree of control over who may access, retrieve and use a work, and, perhaps most importantly, how to effectuate limits on subsequent dissemination of that work without the copyright owner's consent, copyright owners will not make those works available through the NII."
For example, the Smithsonian Institute has provided an FTP (file transfer protocol) site on the Internet called PHOTO1 to make a variety of Smithsonian photographs available as electronic image files. The images cover topics ranging from air and space to science, technology, history, and even current events. The Smithsonian provides a document of guidelines for the use of the images basically stating that the images are for non-commercial private use. However, there is no guarantee that users will follow the use guidelines. For some of it's online exhibits, the Smithsonian places a black border around the images with a copyright notice in white text on the border. (An example of this is available) The border with the copyright notice is easily removed by anyone who has a image manipulation software program, such as Adobe Photoshop.
Technology-based solutions may provide part of the answer to the control of copyrighted images. The working group report on Intellectual Property and the NII states:
"Technological solutions exist today and improved means are being developed to better protect digital works through varying combinations of hardware and software. Protection schemes can be implemented at the level of the copyrighted work or at more comprehensive levels such as the operating system, the network or both. For example, technological solutions can be used to prevent or restrict access to a work; limit or control access to the source of a work; limit reproduction, adaptation, distribution, performance or display of the work; identify attribution and ownership of a work; and manage or facilitate copyright licensing."
The report explains: "Data encrypted using a person's public key can only be decrypted using that person's secret, private key. For instance, a copyright owner could encrypt a work using the public key of the intended recipient. Once the recipient receives the encrypted transmission, he could then use his private key to decrypt that transmission. No secret (private) keys need to be exchanged in this transaction."
Other institutions using single technology solutions include:
" Such [technology] security measures must be carefully designed and implemented to ensure that they not only effectively protect the owner's interests in the works but also do not unduly burden use of the work by consumers or compromise their privacy. And measures should be studied to ensure that systems established to serve these functions are not readily defeated."
The report continues:
"To implement these rights management functions, information will likely be included in digital versions of a work (i.e., copyright management information) to inform the user about the authorship and ownership of a work (e.g., attribution information) as well as to indicate authorized uses of the work (e.g., permitted use information). For instance, information may be included in an "electronic envelope" containing a work that provides information regarding authorship, copyright ownership, date of creation or last modification, and terms and conditions of authorized uses. As measures for this purpose become incorporated at lower levels (e.g., at the operating system level), such information may become a fundamental component of a file or information object."
John Perry Barlow in an article on rethinking patents and copyright in the digital age agrees that cryptography-based solutions invite problems with security and rely on a "protection by barricades" rather than on society's conscience. Barlow argues: It has always appeared to me that the more security you hide your goods behind, the more likely you are to turn your sanctuary into a target. Having come from a place where people leave their keys in their cars and don't even have keys to their houses, I remain convinced that the best obstacle to crime is a society with its ethics intact." Barlow also offers a more practical argument against the use of technology: "People are not going to tolerate much that makes computers harder to use than they already are without any benefit to the user."
Law Professor Henry Perritt, in a conference paper also suggests that encryption solutions may place an undue burden on the user, and that the user will reject the burden:
" ...But the problem [of encryption] is everyone must pay a higher price to use the material. One of the dramatic lessons of the desktop computer revolution was the clear rejection of copyright protection in personal computer software. The reasons that copy protection did not survive in the market place militate against embracing encryption for content. Encryption interferes with realization of electronic markets, because producer and consumer must have the same encryption and description protocols. Encryption burdens processing of electronic information objects because it adds another layer. Some specific implementations have encryption require additional hardware at appreciable costs."
Another problem is that if technology-based solutions are to work and not place an undue burden on the user, the technology must be standardized and be interoperable across platforms. For example, an article in MacWorld points out there are several security programs for electronic mail available on the Internet, but only one of them, PGP (Pretty Good Security) comes in a Macintosh version. Therefore, one would not be able to send a secure e-mail to a person who uses a different security program.
Some technology-based solutions have been suggested including the use of watermarks and digital embedding of information, encryption, digital signature, and system and file controls. It is probable that institutions will use a combination of these technology solutions, and also in combination with policy- based solutions and licensing agreements. Critics of technology-based solutions state these types of solutions only serve to provide barriers to users and the free flow of information and ideas. Arts, history and cultural institutions who have digitized their photograph collections and wish to make them available on computer networks will have to weigh the costs of technology-based solutions both in hardware and software, and consider whether such solutions will place an undue burden on users of their visual materials.
 "Statement on Lawful Uses of Copyrighted Works, Working Document".
Representatives of the American Association of Law Libraries, American
Library Association, Association of Academic Health Sciences Library
Directors, Association of Research Libraries, Medical Library Association,
Special Libraries Association. January 18, 1995.
 Erickson, John S. "Can Fair Use Survive our Information-based Future?"
Interactive Media Lab Technical Report. Interactive Media Lab, Dartmouth
Medical School and Thayer School of Engineering, Dartmouth College,
Hanover, NH 03755, firstname.lastname@example.org. 1995.
 "Intellectual Property and the National Information Infrastructure: the
report of the working group on Intellectual Property Rights." Bruce A.
Lehman, chair. September 1995. p. 170
 "Welcome To The "Photo1.Si.Edu" Ftp Server," welcome and use
guidelines statement for the Smithsonian Institution's Photo1 ftp site.
URL: http://sunsite.unc.edu:80/pub/multimedia/pictures/smithsonian/smithsonian.ph oto.info.txt
 IPNII Working Group report, p. 178
 ibid, pp. 186-87
 "Upgraded Kodak Software Unlocks Encrypted and Watermarked Photo
CD Images." Eastman Kodak Company, press release. September 27,
 Griswold, Gary N. "Method for Protecting Copyright on Networks."
 IPNII Working Group report, p. 191
 ibid, pp 230-234
 Barlow, John Perry. "A framework for rethinking patents and copyrights
in the Digital Age: (Everything you know about intellectual property is
wrong)." _WIRED_. No. 2.03. March 1994
 Perritt, Henry H. Jr. " Knowbots, Permissions Headers and Contract
Law." Paper for the conference on Technological Strategies for Protecting
Intellectual Property in the Networked Multimedia Environment. April 2-3,
1993 with revisions of 4/30/93. Henry H. Perritt, Jr., Professor of Law,
Villanova Law School, Villanova, PA 19085, (215) 645-7078, FAX (215) 645-
7033, (215) 896-1723, Internet: email@example.com
URL: gopher://ming.law.vill.edu:70/00/.chron/.papers/.files/Protecting.Intellectual.Pro perty.txt
 Schneier, Bruce. " Internet Essentials: Protect Your E-Mail."
_MacWorld_ November 1995.
URL: http://www.macworld.com:80/q/@216212mxmqdq/password/pages/november.9 5/Feature.1210.html
Note: to access this article via the World Wide Web, you will be asked to register with MacWorld Online, if you are not already a subscriber.
More Selected Reading on Electronic Imaging and the Humanties
 Besser, Howard. "The Changing Role of
Photographic Collections With the Advent of Digitization." Discussion
paper for Working Group for Digital Image in Curatorial Practice, George
Eastman House, June 4, 1994.
 Ester, Michael. "Digital Imaging in
the Arts and the Humanities." Conference paper, The Changing Role of
Photographic Collections With the Advent of Digitization Discussion Paper for
Working Group for Digital Image in Curatorial Practice, George Eastman
House, June 4, 1994
 RSA's Frequently Asked Questions about Today's Cryptography home page.
 Crypto Stuff and Pretty Good Privacy home page by Phil Zimmerman.