Description |
1 online resource (395 pages) : illustrations |
Series |
Internet and Communications |
|
Internet and communications.
|
Contents |
Front Cover; Preface; Editors-in-Chief and Authors; List of Contributors; Contents; 1. Protection of Multimedia Content in Distribution Networks; 2. Vulnerabilities of Multimedia Protection Schemes; 3. Fundamentals of Multimedia Encryption Techniques; 4. Chaos-Based Encryption for Digital Image and Video; 5. Key Management and Protection for IP Multimedia; 6. Streaming Media Encryption; 7. Digital Media Fingerprinting: Techniques and Trends; 8. Scalable Image and Video Authentication*; 9. Signature-Based Media Authentication; 10. Digital Rights Management for Consumer Devices |
|
11. Adult Image Filtering for Internet Safety12. Digital Rights Management Issues for Video; Index |
Summary |
Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of piracy looms as a major problem with digital distribution and storage technologies. Multimedia Encryption and Authentication Techniques and Applications covers current and future trends in the design of modern systems that use encryption and authentication to protect multimedia content. Containing the works of contributing authors who are worldwide experts in their fields, this volume is intended for researchers and practitioners, as well as for thos |
Bibliography |
Includes bibliographical references and index |
Notes |
English |
Subject |
Multimedia systems -- Security measures
|
|
Data encryption (Computer science)
|
|
COMPUTERS -- Interactive & Multimedia.
|
|
COMPUTERS -- Security -- Cryptography.
|
|
Data encryption (Computer science)
|
Form |
Electronic book
|
Author |
Furht, Borivoje
|
|
Kirovski, Darko
|
ISBN |
9781420013450 |
|
1420013459 |
|
1280653736 |
|
9781280653735 |
|
9786610653737 |
|
6610653739 |
|