Multimedia Encryption and Authentication Techniques and Applications: 1st Edition (Hardback) book cover

Multimedia Encryption and Authentication Techniques and Applications

1st Edition

By Borko Furht, Darko Kirovski

Auerbach Publications

408 pages | 105 B/W Illus.

Purchasing Options:$ = USD
Hardback: 9780849372124
pub: 2006-05-03
Currently out of stock
$140.00
x
eBook (VitalSource) : 9780429190797
pub: 2006-05-03
from $28.98


FREE Standard Shipping!

Description

Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of piracy looms as a major problem with digital distribution and storage technologies.

Multimedia Encryption and Authentication Techniques and Applications covers current and future trends in the design of modern systems that use encryption and authentication to protect multimedia content. Containing the works of contributing authors who are worldwide experts in their fields, this volume is intended for researchers and practitioners, as well as for those who want a broad understanding of multimedia security. In the wake of the explosive growth of digital entertainment and Internet applications, this book is a definitive resource for scientists, researchers, programmers, engineers, business managers, entrepreneurs, and investors.

Features

  • Describes and evaluates the state of the art in multimedia encryption and authentication techniques and related technologies, architectures, standards, and applications

  • Includes advanced topics, such as chaotic encryption techniques for digital images and video, as well as streaming media encryption

  • Focuses on digital rights management issues for video and for consumer devices

  • Covers key management and protection for IP multimedia, digital media fingerprinting, and signature-based media authentication
  • Reviews

    "This book is a concise but informative work that approaches the multi-faceted subject of distributed multimedia database management from an authoritative and knowledgeable perspective. …This book is invaluable to anyone trying to understand how these technologies come together to deliver quality multimedia access to smart space environments. …it is a must read guide on how to design and implement distributed MPEG-7/MPEG-21-compliant MMDBMS for the future."

    -Minaz Parmar, The Computer Journal, Vol. 48, No. 5, 2005

    Table of Contents

    Protection of Multimedia Content in Distribution Networks, Ahmet M. Eskicioglu and Edward J. Delp

    Vulnerabilities of Multimedia Protection Schemes, Mohamed F. Mansour and Ahmed H. Tewfik

    Fundamentals of Multimedia Encryption Techniques, Borko Furht, Daniel Socek, and Ahmet M. Eskicioglu

    Chaos-Based Encryption for Digital Image and Video, Shujun Li, Guanrong Chen, and Xuan Zheng

    Key Management and Protection for IP Multimedia, Rolf Blom, Elisabetta Carrara, Fredrik Lindholm, Karl Norrman, and Mats Näslund

    Streaming Media Encryption, Heather Yu

    Digital Media Fingerprinting: Techniques and Trends, William Luh and Deepa Kundur

    Scalable Image and Video Authentication, Dimitrios Skraparlis

    Signature-Based Media Authentication, Qibin Sun and Shih-Fu Chang

    Digital Rights Management for Consumer Devices, Jeffrey Lotspiech

    Adult Image Filtering for Internet Safety, Huicheng Zheng, Mohamed Daoudi,Christophe Tombelle, and Chabane Djeraba

    Digital Rights Management Issues for Video, Sabu Emmanuel and Mohan S. Kankanhalli

    About the Series

    Internet and Communications

    Learn more…

    Subject Categories

    BISAC Subject Codes/Headings:
    COM053000
    COMPUTERS / Security / General
    COM060000
    COMPUTERS / Internet / General
    TEC007000
    TECHNOLOGY & ENGINEERING / Electrical
    TEC061000
    TECHNOLOGY & ENGINEERING / Mobile & Wireless Communications