Ebook420 pages11 hours
Multimedia Security Technologies for Digital Rights Management
By Wenjun Zeng and Heather Yu
Rating: 0 out of 5 stars
()
About this ebook
Security is a major concern in an increasingly multimedia-defined universe where the Internet serves as an indispensable resource for information and entertainment. Digital Rights Management (DRM) is the technology by which network systems protect and provide access to critical and time-sensitive copyrighted material and/or personal information. This book equips savvy technology professionals and their aspiring collegiate protégés with the latest technologies, strategies and methodologies needed to successfully thwart off those who thrive on security holes and weaknesses.
Filled with sample application scenarios and algorithms, this book provides an in-depth examination of present and future field technologies including encryption, authentication, copy control, tagging, tracing, conditional access and media identification. The authors present a diversified blend of theory and practice and focus on the constantly changing developments in multimedia applications thus providing an admirably comprehensive book.
* Discusses state-of-the-art multimedia authentication and fingerprinting techniques
* Presents several practical methodologies from industry, including broadcast encryption, digital media forensics and 3D mesh watermarking
* Focuses on the need for security in multimedia applications found on computer networks, cell phones and emerging mobile computing devices
Filled with sample application scenarios and algorithms, this book provides an in-depth examination of present and future field technologies including encryption, authentication, copy control, tagging, tracing, conditional access and media identification. The authors present a diversified blend of theory and practice and focus on the constantly changing developments in multimedia applications thus providing an admirably comprehensive book.
* Discusses state-of-the-art multimedia authentication and fingerprinting techniques
* Presents several practical methodologies from industry, including broadcast encryption, digital media forensics and 3D mesh watermarking
* Focuses on the need for security in multimedia applications found on computer networks, cell phones and emerging mobile computing devices
Related to Multimedia Security Technologies for Digital Rights Management
Related ebooks
Multimedia over IP and Wireless Networks: Compression, Networking, and Systems Rating: 0 out of 5 stars0 ratingsSecuring the Internet of Things Rating: 5 out of 5 stars5/5Mobile Security and Privacy: Advances, Challenges and Future Research Directions Rating: 5 out of 5 stars5/5Advances in Cyber Security: Technology, Operations, and Experiences Rating: 0 out of 5 stars0 ratingsIndustrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems Rating: 0 out of 5 stars0 ratingsInside Radio: An Attack and Defense Guide Rating: 0 out of 5 stars0 ratingsDefending IoT Infrastructures with the Raspberry Pi: Monitoring and Detecting Nefarious Behavior in Real Time Rating: 0 out of 5 stars0 ratingsCyber Defense and Situational Awareness Rating: 0 out of 5 stars0 ratingsIntegrated Security Systems Design: Concepts, Specifications, and Implementation Rating: 5 out of 5 stars5/5Intelligent Systems for Security Informatics Rating: 0 out of 5 stars0 ratingsAudio Content Security: Attack Analysis on Audio Watermarking Rating: 0 out of 5 stars0 ratingsIntroduction to Cyber-Security Rating: 0 out of 5 stars0 ratingsFortifying Digital Fortress: A Comprehensive Guide to Information Systems Security: GoodMan, #1 Rating: 0 out of 5 stars0 ratingsSafety Aspects of Computer Control Rating: 0 out of 5 stars0 ratingsSecuring the Cloud: Cloud Computer Security Techniques and Tactics Rating: 5 out of 5 stars5/5Cyberwatch 101: The Art Of Cyber Defense And Infrastructure Security Rating: 0 out of 5 stars0 ratingsDeep Biometrics Rating: 0 out of 5 stars0 ratingsThe Mobile Connection: The Cell Phone's Impact on Society Rating: 4 out of 5 stars4/5Implementing Homeland Security for Enterprise IT Rating: 0 out of 5 stars0 ratingsUnified Communications Forensics: Anatomy of Common UC Attacks Rating: 4 out of 5 stars4/5Digital Forensics: Digital Evidence in Criminal Investigations Rating: 4 out of 5 stars4/5Cyber Security Meets Machine Learning Rating: 0 out of 5 stars0 ratingsPenetration Testing with Raspberry Pi Rating: 5 out of 5 stars5/5Wireless and Mobile Network Security Rating: 0 out of 5 stars0 ratingsIn Depth Security Rating: 0 out of 5 stars0 ratingsArtificial Vision: Image Description, Recognition, and Communication Rating: 0 out of 5 stars0 ratingsFundamentals of Network Forensics: A Research Perspective Rating: 0 out of 5 stars0 ratingsMastering Mobile Forensics Rating: 0 out of 5 stars0 ratings
Security For You
Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Hacking For Dummies Rating: 4 out of 5 stars4/5Destination CISSP Rating: 3 out of 5 stars3/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5Cybersecurity All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsCybersecurity For Dummies Rating: 4 out of 5 stars4/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5Ethical Hacking 101 - How to conduct professional pentestings in 21 days or less!: How to hack, #1 Rating: 5 out of 5 stars5/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Codes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Amazon Web Services (AWS) Interview Questions and Answers Rating: 5 out of 5 stars5/5Network+ Study Guide & Practice Exams Rating: 4 out of 5 stars4/5Handbook of Digital Forensics and Investigation Rating: 4 out of 5 stars4/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Ultimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsHow to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5
Reviews for Multimedia Security Technologies for Digital Rights Management
Rating: 0 out of 5 stars
0 ratings
0 ratings0 reviews
Book preview
Multimedia Security Technologies for Digital Rights Management - Wenjun Zeng
Enjoying the preview?
Page 1 of 1