Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Multimedia Security Handbook

Buy
Multimedia Security Handbook, 9780849327735 (0849327733), CRC Press, 2004
Intellectual property owners who exploit new ways of reproducing, distributing, and marketing their creations digitally must also protect them from piracy. The Multimedia Security Handbook addresses issues related to protecting digital media. It begins by introducing security fundamentals and discussing the vulnerabilities of individual protection schemes. Part II focuses on multimedia encryption. Part III examines watermarking techniques, and Part IV covers multimedia data hiding, fingerprinting, and authentication. The text concludes with chapters describing applications, discussing topics such as application taxonomy, digital rights management, and techniques for adult image filtering.

The purpose of the Multimedia Security Handbook is to provide a comprehensive reference on advanced topics in this field. The handbook is intended both for researchers and practitioners in the field, and for scientists and engineers involved in designing and developing systems for the protection of digital multimedia content. The handbook can also be used as the textbook for graduate courses in the area of multimedia security.

The handbook addresses a variety of issues related to the protection of digital multimedia content, including audio, image, and video protection. The state-of-the art multimedia security technologies are presented, including protection architectures, multimedia encryption, watermarking, fingerprinting and authentication techniques, and various applications.

This handbook is comprised of 26 chapters divided into 6 parts. Part I, General Issues, introduces fundamental concepts applied in the protection of multimedia content and discusses the vulnerability of various protection schemes. Part II, Multimedia Encryption, includes chapters on audio, image, and video encryption techniques. These techniques deal with selective video encryption, which meet real-time requirements, chaos-based encryption, and techniques for protection of streaming media. Part III, Multimedia Watermarking, consists of chapters dealing with various watermarking techniques, including audio, image, and video watermarking. Current state-of-the art and future trends are addressed, including multidimensional, fragile, and robust watermarks. Part IV, Multimedia Data Hiding, Fingerprinting, and Authentication, includes chapters on various issues related to these techniques. The topics include fundamentals on lossless data hiding, digital media fingerprinting techniques, scalable and signature-based media authentication, and attacking such media protections schemes. Part V, Applications, includes chapters that describe applications of multimedia protection schemes. The topics, such as application taxonomy, digital rights management, and techniques for adult image filtering, are covered in this part.
(HTML tags aren't allowed.)

Innovation and Technology - Strategies and Policies
Innovation and Technology - Strategies and Policies
Innovation and Technology -- Strategies and Policies contains a selection of outstanding contributions by world experts on how a culture of innovation is able to produce a response to fast global changes affecting society. The book describes major evolutionary directions and foreseen trends in: environment versus industry; technology...
Fiberglass Boat Repairs Illustrated
Fiberglass Boat Repairs Illustrated

Step-by-step color photo guidance for repairing and renewing fiberglass boats

If you don't have the experience of working with fiberglass, any repairs to your boat must be done by high-cost professionals or left undone. This entry-level guide uses full-color, step-by-step photo sequences and line drawings to present you...

Computer Vision Metrics: Survey, Taxonomy, and Analysis
Computer Vision Metrics: Survey, Taxonomy, and Analysis

Computer Vision Metrics provides an extensive survey and analysis of over 100 current and historical feature description and machine vision methods, with a detailed taxonomy for local, regional and global features. This book provides necessary background to develop intuition about why interest point detectors and feature descriptors...


The Findability Formula: The Easy, Non-Technical Approach to Search Engine Marketing
The Findability Formula: The Easy, Non-Technical Approach to Search Engine Marketing
"...shows how to position your business front and centre when prospects are searching online for solutions you can provide." (Globe and Mail, April 2009)

To be successful in business you must be able to attract the right clients and persuade them to buy. However, on the internet, people only see what the search
...
Software Engineering and Testing: An Introduction (Computer Science)
Software Engineering and Testing: An Introduction (Computer Science)
Designed for an introductory software engineering course or as a reference for programmers, this up to date text uses both theory and applications to design reliable, error-free software. Starting with an introduction to the various types of software, the book moves through life-cycle models, software specifications, testing techniques,...
The Art of Deception: Controlling the Human Element of Security
The Art of Deception: Controlling the Human Element of Security

The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy