Fishpond Gift Vouchers - Let them choose!

Shop over a million Toys in our Huge New Range

Multimedia Encryption and Authentication Techniques and Applications
By

Rating
Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of piracy looms as a major problem with digital distribution and storage technologies. Multimedia Encryption and Authentication Techniques and Applications covers current and future trends in the design of modern systems that use encryption and authentication to protect multimedia content. Containing the works of contributing authors who are worldwide experts in their fields, this volume is intended for researchers and practitioners, as well as for those who want a broad understanding of multimedia security. In the wake of the explosive growth of digital entertainment and Internet applications, this book is a definitive resource for scientists, researchers, programmers, engineers, business managers, entrepreneurs, and investors. Features * Describes and evaluates the state of the art in multimedia encryption and authentication techniques and related technologies, architectures, standards, and applications * Includes advanced topics, such as chaotic encryption techniques for digital images and video, as well as streaming media encryption * Focuses on digital rights management issues for video and for consumer devices * Covers key management and protection for IP multimedia, digital media fingerprinting, and signature-based media authentication
Product Details

Table of Contents

Protection of Multimedia Content in Distribution Networks, Ahmet M. Eskicioglu and Edward J. Delp Vulnerabilities of Multimedia Protection Schemes, Mohamed F. Mansour and Ahmed H. Tewfik Fundamentals of Multimedia Encryption Techniques, Borko Furht, Daniel Socek, and Ahmet M. Eskicioglu Chaos-Based Encryption for Digital Image and Video, Shujun Li, Guanrong Chen, and Xuan Zheng Key Management and Protection for IP Multimedia, Rolf Blom, Elisabetta Carrara, Fredrik Lindholm, Karl Norrman, and Mats Naslund Streaming Media Encryption, Heather Yu Digital Media Fingerprinting: Techniques and Trends, William Luh and Deepa Kundur Scalable Image and Video Authentication, Dimitrios Skraparlis Signature-Based Media Authentication, Qibin Sun and Shih-Fu Chang Digital Rights Management for Consumer Devices, Jeffrey Lotspiech Adult Image Filtering for Internet Safety, Huicheng Zheng, Mohamed Daoudi,Christophe Tombelle, and Chabane Djeraba Digital Rights Management Issues for Video, Sabu Emmanuel and Mohan S. Kankanhalli

Look for similar items by category
People also searched for
How Fishpond Works
Fishpond works with suppliers all over the world to bring you a huge selection of products, really great prices, and delivery included on over 25 million products that we sell. We do our best every day to make Fishpond an awesome place for customers to shop and get what they want — all at the best prices online.
Webmasters, Bloggers & Website Owners
You can earn a 5% commission by selling Multimedia Encryption and Authentication Techniques and Applications (Internet and Communications) on your website. It's easy to get started - we will give you example code. After you're set-up, your website can earn you money while you work, play or even sleep! You should start right now!
Authors / Publishers
Are you the Author or Publisher of a book? Or the manufacturer of one of the millions of products that we sell. You can improve sales and grow your revenue by submitting additional information on this title. The better the information we have about a product, the more we will sell!
Item ships from and is sold by Fishpond World Ltd.
Back to top