| http://www.w3.org/ns/prov#value | - th the contents data by applying the verifying values which are independently generated per category of contents data, whereby higher efficiency is realized in the process of probing the act of tampering with the contents data.Recently, there has been a further growth of distribution of so-called contents data via a wide variety of software data including music data, game programs, picture data,
|