Multimedia Security Technologies for Digital Rights ManagementWenjun Zeng, Heather Yu, Ching-Yung Lin Elsevier, 2011. gada 28. jūl. - 520 lappuses Security is a major concern in an increasingly multimedia-defined universe where the Internet serves as an indispensable resource for information and entertainment. Digital Rights Management (DRM) is the technology by which network systems protect and provide access to critical and time-sensitive copyrighted material and/or personal information. This book equips savvy technology professionals and their aspiring collegiate protégés with the latest technologies, strategies and methodologies needed to successfully thwart off those who thrive on security holes and weaknesses. Filled with sample application scenarios and algorithms, this book provides an in-depth examination of present and future field technologies including encryption, authentication, copy control, tagging, tracing, conditional access and media identification. The authors present a diversified blend of theory and practice and focus on the constantly changing developments in multimedia applications thus providing an admirably comprehensive book. * Discusses state-of-the-art multimedia authentication and fingerprinting techniques * Presents several practical methodologies from industry, including broadcast encryption, digital media forensics and 3D mesh watermarking * Focuses on the need for security in multimedia applications found on computer networks, cell phones and emerging mobile computing devices |
No grāmatas satura
1.–5. rezultāts no 77.
17. lappuse
... example of such a system is the Serial Copyright Management System (SCMS) included in Digital Audio Tape (DAT) ... examples where copyright holders have yet to eschew traditional distribution channels to achieve economic success solely ...
... example of such a system is the Serial Copyright Management System (SCMS) included in Digital Audio Tape (DAT) ... examples where copyright holders have yet to eschew traditional distribution channels to achieve economic success solely ...
18. lappuse
... example. Instead, meta-data are placed external to the content for operational requirements, and both the meta-data and the media are encrypted. The meta-data, for instance, may provide cryptographic authentication of the media or may ...
... example. Instead, meta-data are placed external to the content for operational requirements, and both the meta-data and the media are encrypted. The meta-data, for instance, may provide cryptographic authentication of the media or may ...
25. lappuse
... may be distributed separately (e.g., with OMA Flexible Preview. FIGURE 2.1: Basic structure of a DRM system [2]. FIGURE 2.4: Example of an architecture context diagram for a. DVD Section 2.2: THE BASIC STRUCTURE OF A DRM SYSTEM 25.
... may be distributed separately (e.g., with OMA Flexible Preview. FIGURE 2.1: Basic structure of a DRM system [2]. FIGURE 2.4: Example of an architecture context diagram for a. DVD Section 2.2: THE BASIC STRUCTURE OF A DRM SYSTEM 25.
26. lappuse
... EXAMPLE: THE DVD CONTENT SCRAMBLING SYSTEM To make the high-level structure described in the prior section more tangible, we will present a particular DRM system and show how its components fit into the described structure. The example ...
... EXAMPLE: THE DVD CONTENT SCRAMBLING SYSTEM To make the high-level structure described in the prior section more tangible, we will present a particular DRM system and show how its components fit into the described structure. The example ...
28. lappuse
... EXAMPLE: THE OMA DRM Before one can download a ring tone, stream a video clip, or read an article on a mobile phone, a secure system of protection for that material (most of which is copyrighted) needs to be put in place. The OMA is a ...
... EXAMPLE: THE OMA DRM Before one can download a ring tone, stream a video clip, or read an article on a mobile phone, a secure system of protection for that material (most of which is copyrighted) needs to be put in place. The OMA is a ...
Citi izdevumi - Skatīt visu
Multimedia Security Technologies for Digital Rights Management Wenjun Zeng,Hong Heather Yu,Ching-Yung Lin Priekšskatījums nav pieejams - 2006 |
Multimedia Security Technologies for Digital Rights Management Wenjun Zeng,Heather Yu,Ching-Yung Lin Priekšskatījums nav pieejams - 2006 |
Bieži izmantoti vārdi un frāzes
AACS adaptation algorithm applications asset attacks audio biometric bitplane bits bitstream block cipher broadcast encryption cipher codestream codeword compression Conf content protection copy protection CPRM cryptographic cryptosystem data hiding DCT coefficients decoder decryption key detection digital cinema digital media Digital Rights Management digital watermarking distortion distribution domain DRM systems embedding encoded encryption schemes example format Fridrich function hash digest HDCP header IEEE IEEE Int IEEE Trans image forgery Image Processing Information Hiding interoperability IPMP JPEG JPSEC key scheme layer media key block movie MPEG multimedia content multimedia data multimedia encryption node OMA DRM P-frames packet parameters pixels Proc protected content public key quantization robust scalable coding secure scalable secure transcoding selective encryption sequence keys Signal Processing signature specific standard steganalysis steganography stream stream cipher techniques technologies tion traitor tracing transcoding unencrypted value-chains
Populāri fragmenti
462. lappuse - In no case does copyright protection for an original work of authorship extend to any idea, procedure, process, system, method of operation, concept, principle, or discovery, regardless of the form in which it is described, explained, illustrated, or embodied in such work.
6. lappuse - Notwithstanding the provisions of section 106, the fair use of a copyrighted work, including such use by reproduction in copies or phonorecords or by any other means specified by that section, for purposes such as criticism, comment, news reporting, teaching, scholarship, or research, is not an infringement of copyright.
6. lappuse - ... (1) the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes; (2) the nature of the copyrighted work; (3) the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and (4) the effect of the use upon the potential market for or value of the copyrighted work.
462. lappuse - Works of authorship include the following categories: (1) literary works; (2) musical works, including any accompanying words; (3) dramatic works, including any accompanying music; (4) pantomimes and choreographic works; (5) pictorial, graphic, and sculptural works; (6) motion pictures and other audiovisual works; (7) sound recordings; and (8) architectural works.
4. lappuse - A work is created" when it is fixed in a copy or phonorecord for the first time; where a work is prepared over a period of time, the portion of it that has been fixed at any particular time constitutes the work as of that time, and where the work has been prepared in different versions, each version constitutes a separate work. A "derivative work...
4. lappuse - DERIVATIVE WORK" is a work based upon one or more preexisting works, such as a translation, musical arrangement, dramatization, fictionalization, motion picture version, sound recording, art reproduction, abridgment, condensation or any other form in which a work may be recast, transformed, or adapted.
5. lappuse - To this end, copyright assures authors the right to their original expression, but encourages others to build freely upon the ideas and information conveyed by a work.
461. lappuse - ... a technological measure that effectively controls access to a work protected under this tile; (B) has only limited commercially significant purpose or use other than to circumvent a technological measure that effectively controls access to a work protected under this title...