Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Multimedia Security Technologies for Digital Rights Management

Buy
A timely reference in the innovative and cutting-edge field of multimedia security!

Digital Rights Management (DRM) defines a set of tools that manage the secured use of digital media content found on static and mobile electronic devices, ranging from personal computers and PDAs to digital video recorders and MP3 players. While it's true that some antiquated techniques still work well, various state-of-the-art multimedia security technologies have emerged to wage a more adaptive and efficient battle on behalf of 21st century intellectual property owners.

The editors of this contributed volume have created a groundbreaking resource, meticulously assembled for maximum utility. Enriched by sample application scenarios and algorithms, this book provides an in-depth examination of present and future field technologies including encryption, authentication, copy control, tagging, tracing, conditional access, and media identification. Contributors include technological visionaries and leading researchers in the field, many of whom are active DRM standards contributors, industrial practitioners, and copyright lawyers.

This comprehensive book is perfect for engineers or project managers working on the development of a DRM system or those who plan to offer tutorials on multimedia security. Systems engineers and researchers in industry and academia will find this technical reference book invaluable.

KEY FEATURES
*Discusses state-of-the-art multimedia authentication and fingerprinting techniques
*Presents several practical methodologies from industry, including broadcast encryption, digital media forensics, and 3D mesh watermarking
*Focuses on the need for a complete DRM approach to security in multimedia applications found on computer networks, cell phones, and emerging mobile computing devices

About the Authors

Dr. Wenjun Zeng is an Associate Professor in the Computer Science Department of the University of Missouri, Columbia, MO. He received his B.E., M.S., and Ph.D. degrees from Tsinghua University, China, in 1990, the University of Notre Dame in 1993, and Princeton University in 1997, respectively.
Dr. Heather Yu is a Senior Scientist at Panasonic Information and Networking Technologies Laboratory. She received her B.S. degree from Peking University, her M.A. and Ph.D. degrees from Princeton University each in Electrical Engineering.
Dr. Ching-Yung Lin is a Research Staff Member at the IBM T. J. Watson Research Center, New York. He is currently leading projects on the IBM Large-Scale Multimedia Semantic Filtering and Monitoring in Complex Networks. His Ph.D. is from Columbia University in Electrical Engineering.
(HTML tags aren't allowed.)

Cervical Cancer: A Guide for Nurses
Cervical Cancer: A Guide for Nurses

This is a comprehensive guide to cervical cancer for nurses. It is a practically-based text for clinical nurses who wish to consolidate and update their knowledge of cervical cancer. It is concise, containing comprehensive information for general practice together with useful references to facilitate more in-depth study. Thus it provides an...

Getting Started with Zurb Foundation 4
Getting Started with Zurb Foundation 4

For today's web designers, fluidity and responsiveness is everything. That's why this introduction to Zurb Foundation is so valuable. It teaches you to use the mobile-first framework to create fantastic web pages, intuitively and expressively.

Overview

  • Get up to speed quickly with Foundation's...
Data Structures and Problem Solving Using C++ (2nd Edition)
Data Structures and Problem Solving Using C++ (2nd Edition)

Data Structures and Problem Solving Using C++ provides a practical introduction to data structures and algorithms from the viewpoint of abstract thinking and problem solving, as well as the use of C++. It is a complete revision of Weissi successful CS2 book Algorithms, Data Structures, and Problem Solving with C++.

The most unique...


Teach Yourself VISUALLY Mac OS X Tiger
Teach Yourself VISUALLY Mac OS X Tiger
Richly colored illustrations, and clear step-by-step instructions guide users new to Mac OS X Tiger through the basics of this powerful operating system. Covering all aspects of Tiger, this book shows visual learners how to work with files, customize their computers, and maximize the versatility of iLife '05 applications. Also explores how to...
Design for Kids: Digital Products for Playing and Learning
Design for Kids: Digital Products for Playing and Learning

Emotion. Ego. Impatience. Stubbornness. Characteristics like these make creating sites and apps for kids a daunting proposition. However, with a bit of knowledge, you can design experiences that help children think, play, and learn. With Design for Kids, you'll learn how to create digital products for today's connected...

Email Security with Cisco IronPort (Networking Technology: Security)
Email Security with Cisco IronPort (Networking Technology: Security)

The Cisco IronPort Email Security Appliances (ESA) have been deployed in thousands of networks to accept, filter, and deliver email messages. The ESA is easy to deploy and its security-filtering settings are effective right out of the box. However, many organizations are looking for more from their messaging environment...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy