Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Multimedia Security Handbook

Buy
Multimedia Security Handbook, 9780849327735 (0849327733), CRC Press, 2004
Intellectual property owners who exploit new ways of reproducing, distributing, and marketing their creations digitally must also protect them from piracy. The Multimedia Security Handbook addresses issues related to protecting digital media. It begins by introducing security fundamentals and discussing the vulnerabilities of individual protection schemes. Part II focuses on multimedia encryption. Part III examines watermarking techniques, and Part IV covers multimedia data hiding, fingerprinting, and authentication. The text concludes with chapters describing applications, discussing topics such as application taxonomy, digital rights management, and techniques for adult image filtering.

The purpose of the Multimedia Security Handbook is to provide a comprehensive reference on advanced topics in this field. The handbook is intended both for researchers and practitioners in the field, and for scientists and engineers involved in designing and developing systems for the protection of digital multimedia content. The handbook can also be used as the textbook for graduate courses in the area of multimedia security.

The handbook addresses a variety of issues related to the protection of digital multimedia content, including audio, image, and video protection. The state-of-the art multimedia security technologies are presented, including protection architectures, multimedia encryption, watermarking, fingerprinting and authentication techniques, and various applications.

This handbook is comprised of 26 chapters divided into 6 parts. Part I, General Issues, introduces fundamental concepts applied in the protection of multimedia content and discusses the vulnerability of various protection schemes. Part II, Multimedia Encryption, includes chapters on audio, image, and video encryption techniques. These techniques deal with selective video encryption, which meet real-time requirements, chaos-based encryption, and techniques for protection of streaming media. Part III, Multimedia Watermarking, consists of chapters dealing with various watermarking techniques, including audio, image, and video watermarking. Current state-of-the art and future trends are addressed, including multidimensional, fragile, and robust watermarks. Part IV, Multimedia Data Hiding, Fingerprinting, and Authentication, includes chapters on various issues related to these techniques. The topics include fundamentals on lossless data hiding, digital media fingerprinting techniques, scalable and signature-based media authentication, and attacking such media protections schemes. Part V, Applications, includes chapters that describe applications of multimedia protection schemes. The topics, such as application taxonomy, digital rights management, and techniques for adult image filtering, are covered in this part.
(HTML tags aren't allowed.)

Visual Complex Analysis
Visual Complex Analysis

This radical first course on complex analysis brings a beautiful and powerful subject to life by consistently using geometry (not calculation) as the means of explanation. Aimed at undergraduate students in mathematics, physics, and engineering, the book's intuitive explanations, lack of advanced prerequisites, and consciously...

Mac OS X in a Nutshell
Mac OS X in a Nutshell
Mac OS X is a stunning technical achievement--a virtually crash-proof Unix core paired with the sleek Aqua interface, bringing style, usability, and stability to a new level. It has almost everything that Macintosh fans have been waiting for: protected memory, crash resistance, and the ability to run the 18,000 existing Mac programs and an...
Advanced Imaging of the Abdomen
Advanced Imaging of the Abdomen
This book is an attempt to bridge the interface between referring clinicians and radiologists when faced with a patient suspected of having a complex or unusual abdominal condition. The emphasis is on the choice of imaging procedures, expected diagnostic yield, a discussion of pertinent imaging findings, and the possible differential...

Remaking Global Order: The Evolution of Europe-China Relations and its Implications for East Asia and the United States
Remaking Global Order: The Evolution of Europe-China Relations and its Implications for East Asia and the United States

Relations between the European Union and China have grown at a sustained pace across the board in recent times, transforming the relationship from one of previous neglect into a matter of global strategic significance. This book offers an examination of the evolution of contemporary EU-China relations in the economic, technological and high...

Enterprise Information Management in Practice: Managing Data and Leveraging Profits in Today's Complex Business Environment
Enterprise Information Management in Practice: Managing Data and Leveraging Profits in Today's Complex Business Environment

Learn how to form and execute an enterprise information strategy: topics include data governance strategy, data architecture strategy, information security strategy, big data strategy, and cloud strategy. Manage information like a pro, to achieve much better financial results for the enterprise, more efficient processes, and multiple...

Coping with Uncertainty: Modeling and Policy Issues
Coping with Uncertainty: Modeling and Policy Issues
Uncertainties and risks have always been, and will remain, present; both in everybody’s life and in policy making. This presence is not always recognized because humans tend to perceive the world in a deterministic way, and in most cases succeed in somehow dealing with uncertainties. However, ignoring uncertainties often results in serious...
©2018 LearnIT (support@pdfchm.net) - Privacy Policy