Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Multimedia Security Technologies for Digital Rights Management

Buy
A timely reference in the innovative and cutting-edge field of multimedia security!

Digital Rights Management (DRM) defines a set of tools that manage the secured use of digital media content found on static and mobile electronic devices, ranging from personal computers and PDAs to digital video recorders and MP3 players. While it's true that some antiquated techniques still work well, various state-of-the-art multimedia security technologies have emerged to wage a more adaptive and efficient battle on behalf of 21st century intellectual property owners.

The editors of this contributed volume have created a groundbreaking resource, meticulously assembled for maximum utility. Enriched by sample application scenarios and algorithms, this book provides an in-depth examination of present and future field technologies including encryption, authentication, copy control, tagging, tracing, conditional access, and media identification. Contributors include technological visionaries and leading researchers in the field, many of whom are active DRM standards contributors, industrial practitioners, and copyright lawyers.

This comprehensive book is perfect for engineers or project managers working on the development of a DRM system or those who plan to offer tutorials on multimedia security. Systems engineers and researchers in industry and academia will find this technical reference book invaluable.

KEY FEATURES
*Discusses state-of-the-art multimedia authentication and fingerprinting techniques
*Presents several practical methodologies from industry, including broadcast encryption, digital media forensics, and 3D mesh watermarking
*Focuses on the need for a complete DRM approach to security in multimedia applications found on computer networks, cell phones, and emerging mobile computing devices

About the Authors

Dr. Wenjun Zeng is an Associate Professor in the Computer Science Department of the University of Missouri, Columbia, MO. He received his B.E., M.S., and Ph.D. degrees from Tsinghua University, China, in 1990, the University of Notre Dame in 1993, and Princeton University in 1997, respectively.
Dr. Heather Yu is a Senior Scientist at Panasonic Information and Networking Technologies Laboratory. She received her B.S. degree from Peking University, her M.A. and Ph.D. degrees from Princeton University each in Electrical Engineering.
Dr. Ching-Yung Lin is a Research Staff Member at the IBM T. J. Watson Research Center, New York. He is currently leading projects on the IBM Large-Scale Multimedia Semantic Filtering and Monitoring in Complex Networks. His Ph.D. is from Columbia University in Electrical Engineering.
(HTML tags aren't allowed.)

Professional Java JDK 6 Edition
Professional Java JDK 6 Edition
Working as an effective professional Java developer requires you to know Java APIs, tools, and techniques to solve a wide variety of Java problems. Building upon Ivor Horton's Beginning Java 2, this resource shows you how to use the core features of the latest JDK as well as powerful open source tools such as Ant, JUnit, and Hibernate. It...
Structural Interfaces and Attachments in Biology
Structural Interfaces and Attachments in Biology

Attachment of dissimilar materials in engineering and surgical practice is a perennial challenge. Bimaterial attachment sites are common locations for injury, repeated injury, and mechanical failure. Nature presents several highly effective solutions to the challenge of bimaterial attachment that differ from those found in engineering...

Oracle PL/SQL Built-ins Pocket Reference
Oracle PL/SQL Built-ins Pocket Reference
This pocket reference provides quick-reference information that will help you use Oracle Corporation's extensive set of built-in functions and packages, including those new to Oracle8.

Oracle's PL/SQL language is a programming language providing procedural extensions to the SQL relational database language and to an ever-growing number of...


Implementing Cisco Unified Communications Manager, Part 1 (CIPT1) (Authorized Self-Study Guide)
Implementing Cisco Unified Communications Manager, Part 1 (CIPT1) (Authorized Self-Study Guide)
Professional certifications have been an important part of the computing industry for many years and will continue to become more important. Many reasons exist for these certifications, but the most popularly cited reason is that of credibility. All other considerations held equal, the certified employee/consultant/job candidate is considered more...
Time and Petri Nets
Time and Petri Nets

At first glance the concepts of time and of Petri nets are quite contrary: while time determines the occurrences of events in a system, classic Petri nets consider their causal relationships and they represent events as concurrent systems. But if we take a closer look at how time and causality are intertwined we realize that there are many...

Survey of Accounting (Available Titles Cengagenow)
Survey of Accounting (Available Titles Cengagenow)
Survey of Accounting, Fifth Edition, is designed for a one-term introductory accounting course. It provides an overview of the basic topics in financial and managerial accounting, without the extraneous accounting principles topics that must be skipped or otherwise modified to fit into a one-term course. Written for students...
©2018 LearnIT (support@pdfchm.net) - Privacy Policy