Multimedia Encryption and Authentication Techniques and Applications
Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of piracy looms as a major problem with digital distribution and storage technologies. Multimedia Encryption and Authentication Techniques and Application...
Đã lưu trong:
Những tác giả chính: | , |
---|---|
Định dạng: | Sách |
Ngôn ngữ: | English |
Được phát hành: |
CRC Press
2009
|
Truy cập trực tuyến: | https://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1523 |
Các nhãn: |
Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
|
Thư viện lưu trữ: | Thư viện Trường Đại học Đà Lạt |
---|
id |
oai:scholar.dlu.edu.vn:DLU123456789-1523 |
---|---|
record_format |
dspace |
spelling |
oai:scholar.dlu.edu.vn:DLU123456789-15232009-12-03T09:35:59Z Multimedia Encryption and Authentication Techniques and Applications Furht, Borko Kirovski, Darko Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of piracy looms as a major problem with digital distribution and storage technologies. Multimedia Encryption and Authentication Techniques and Applications covers all current and future trends in the design of modern systems that use encryption and authentication to protect multimedia content. Containing the works of contributing authors who are worldwide experts in the field of multimedia encryption and authentication, this volume is intended for researchers and practitioners, as well as for those who want a broad understanding of multimedia security. In the wake of the explosive growth of digital entertainment and Internet applications, this book is the definitive resource on the subject for scientists, researchers, programmers, engineers, business managers, entrepreneurs, and investors. Protection of Multimedia Content in Distribution Networks Ahmet M. Eskicioglu and Edward J. Delp Vulnerabilities of Multimedia Protection Schemes Mohamed F. Mansour and Ahmed H. Tewfik Fundamentals of Multimedia Encryption Techniques Borko Furht, Daniel Socek, and Ahmet M. Eskicioglu Chaos-Based Encryption for Digital Image and Video Shujun Li, Guanrong Chen, and Xuan Zheng Key Management and Protection for IP Multimedia Rolf Blom, Elisabetta Carrara, Fredrik Lindholm, Karl Norrman, and Mats Näslund Streaming Media Encryption Heather Yu Digital Media Fingerprinting: Techniques and Trends William Luh and Deepa Kundur Scalable Image and Video Authentication Dimitrios Skraparlis Signature-Based Media Authentication Qibin Sun and Shih-Fu Chang Digital Rights Management for Consumer Devices Jeffrey Lotspiech Adult Image Filtering for Internet Safety Huicheng Zheng, Mohamed Daoudi, Christophe Tombelle, and Chabane Djeraba Digital Rights Management Issues for Video Sabu Emmanuel and Mohan S. Kankanhalli 2009-12-03T09:35:59Z 2009-12-03T09:35:59Z 2006 Book https://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1523 en application/rar CRC Press |
institution |
Thư viện Trường Đại học Đà Lạt |
collection |
Thư viện số |
language |
English |
description |
Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of piracy looms as a major problem with digital distribution and storage technologies.
Multimedia Encryption and Authentication Techniques and Applications covers all current and future trends in the design of modern systems that use encryption and authentication to protect multimedia content. Containing the works of contributing authors who are worldwide experts in the field of multimedia encryption and authentication, this volume is intended for researchers and practitioners, as well as for those who want a broad understanding of multimedia security. In the wake of the explosive growth of digital entertainment and Internet applications, this book is the definitive resource on the subject for scientists, researchers, programmers, engineers, business managers, entrepreneurs, and investors. |
format |
Book |
author |
Furht, Borko Kirovski, Darko |
spellingShingle |
Furht, Borko Kirovski, Darko Multimedia Encryption and Authentication Techniques and Applications |
author_facet |
Furht, Borko Kirovski, Darko |
author_sort |
Furht, Borko |
title |
Multimedia Encryption and Authentication Techniques and Applications |
title_short |
Multimedia Encryption and Authentication Techniques and Applications |
title_full |
Multimedia Encryption and Authentication Techniques and Applications |
title_fullStr |
Multimedia Encryption and Authentication Techniques and Applications |
title_full_unstemmed |
Multimedia Encryption and Authentication Techniques and Applications |
title_sort |
multimedia encryption and authentication techniques and applications |
publisher |
CRC Press |
publishDate |
2009 |
url |
https://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1523 |
_version_ |
1819846386957418496 |