• SELECT SITE CURRENCY
Select a currency for use throughout the site
Multimedia Security Technologies for Digital Rights Management
Elsevier Science and Technology, August 2006, Pages: 520
Security is a major concern in an increasingly multimedia-defined universe where the Internet serves as an indispensable resource for information and entertainment. Digital Rights Management (DRM) is the technology by which network systems protect and provide access to critical and time-sensitive copyrighted material and/or personal information. This book equips savvy technology professionals and their aspiring collegiate protégés with the latest technologies, strategies and methodologies needed to successfully thwart off those who thrive on security holes and weaknesses.
Filled with sample application scenarios and algorithms, this book provides an in-depth examination of present and future field technologies including encryption, authentication, copy control, tagging, tracing, conditional access and media identification. The authors present a diversified blend of theory and practice and focus on the constantly changing developments in multimedia applications thus providing an admirably comprehensive book.
Discusses state-of-the-art multimedia authentication and fingerprinting techniques
Presents several practical methodologies from industry, including broadcast encryption, digital media forensics and 3D mesh watermarking
Focuses on the need for security in multimedia applications found on computer networks, cell phones and emerging mobile computing devices
digital rights management
2. Digital rights management systems
3. Putting digital rights management in context
4. Multimedia encryption
5. Multimedia authentication
6. Key management for multimedia access and distribution
7. An overview of digital watermarking
8. Biometrics in digital rights management
9. Format compliant content protection
10. Secure media streaming and secure transcoding
11. Scalable encryption and multi-access control for multimedia
12. Broadcast encryption
13. Practical "traitor tracing"
15. Passive-blind image forensics
16. Security in digital cinema
17. Drm standard activities
18. The digital millennium copyright act
Dr. Wenjun Zeng is an Associate Professor in the Computer Science Department of the University of Missouri, Columbia, MO. He received his B.E., M.S., and Ph.D. degrees from Tsinghua University, China, in 1990, the University of Notre Dame in 1993, and Princeton University in 1997, respectively.
Dr. Heather Yu is a Senior Scientist at Panasonic Information and Networking Technologies Laboratory. She received her B.S. degree from Peking University, her M.A. and Ph.D. degrees from Princeton University each in Electrical Engineering.
Dr. Ching-Yung Lin is a Research Staff Member at the IBM T. J. Watson Research Center, New York. He is currently leading projects on the IBM Large-Scale Multimedia Semantic Filtering and Monitoring in Complex Networks. His Ph.D. is from Columbia University in Electrical Engineering.