Multimedia Security Technologies for Digital Rights ManagementWenjun Zeng, Heather Yu, Ching-Yung Lin Elsevier, 2011. gada 28. jūl. - 520 lappuses Security is a major concern in an increasingly multimedia-defined universe where the Internet serves as an indispensable resource for information and entertainment. Digital Rights Management (DRM) is the technology by which network systems protect and provide access to critical and time-sensitive copyrighted material and/or personal information. This book equips savvy technology professionals and their aspiring collegiate protégés with the latest technologies, strategies and methodologies needed to successfully thwart off those who thrive on security holes and weaknesses. Filled with sample application scenarios and algorithms, this book provides an in-depth examination of present and future field technologies including encryption, authentication, copy control, tagging, tracing, conditional access and media identification. The authors present a diversified blend of theory and practice and focus on the constantly changing developments in multimedia applications thus providing an admirably comprehensive book. * Discusses state-of-the-art multimedia authentication and fingerprinting techniques * Presents several practical methodologies from industry, including broadcast encryption, digital media forensics and 3D mesh watermarking * Focuses on the need for security in multimedia applications found on computer networks, cell phones and emerging mobile computing devices |
No grāmatas satura
1.5. rezultāts no 59.
10. lappuse
... Public key cryptography provides all four of these primitives, in a manner making distribution of codes and ciphers economically feasible for all persons wishing to secure their communications. The landmark failure of the U.S. ...
... Public key cryptography provides all four of these primitives, in a manner making distribution of codes and ciphers economically feasible for all persons wishing to secure their communications. The landmark failure of the U.S. ...
15. lappuse
... key generation algorithm is arranged such that the decrypting key cannot be derived from the public encrypting key. Similar methods are known for using non-reciprocal keys for authentication of a transmission. There are also digital ...
... key generation algorithm is arranged such that the decrypting key cannot be derived from the public encrypting key. Similar methods are known for using non-reciprocal keys for authentication of a transmission. There are also digital ...
27. lappuse
... Key Player Keys Secret Key Region Code &c Bus Bus Key Bus Key Per title Title Key Table of Encrypted Disc Keys ... private key. The process goes through the following steps: Establish trust. The result of this phase is the session key.
... Key Player Keys Secret Key Region Code &c Bus Bus Key Bus Key Per title Title Key Table of Encrypted Disc Keys ... private key. The process goes through the following steps: Establish trust. The result of this phase is the session key.
30. lappuse
... key, signature), and rights information (play, copy, execute, etc.). DCF and RO identify each other by using the information in headers. RO are communicated to the device by using the Rights Object Acquisition Protocol (ROAP). Public key ...
... key, signature), and rights information (play, copy, execute, etc.). DCF and RO identify each other by using the information in headers. RO are communicated to the device by using the Rights Object Acquisition Protocol (ROAP). Public key ...
31. lappuse
... public key to provide cryptographic binding Integrity protection for content and rights Mutual authentication between device and rights issuer Device revocation: rights issuer can identify device revocation status Rights issuer ...
... public key to provide cryptographic binding Integrity protection for content and rights Mutual authentication between device and rights issuer Device revocation: rights issuer can identify device revocation status Rights issuer ...
Citi izdevumi - Skatīt visu
Multimedia Security Technologies for Digital Rights Management Wenjun Zeng,Hong Heather Yu,Ching-Yung Lin Priekšskatījums nav pieejams - 2006 |
Multimedia Security Technologies for Digital Rights Management Wenjun Zeng,Heather Yu,Ching-Yung Lin Priekšskatījums nav pieejams - 2006 |
Bieži izmantoti vārdi un frāzes
AACS adaptation algorithm applications asset attacks audio biometric bitplane bits bitstream block cipher broadcast encryption cipher codestream codeword compression Conf content protection copy protection CPRM cryptographic cryptosystem data hiding DCT coefficients decoder decryption key detection digital cinema digital media Digital Rights Management digital watermarking distortion distribution domain DRM systems embedding encoded encryption schemes example format Fridrich function hash digest HDCP header IEEE IEEE Int IEEE Trans image forgery Image Processing Information Hiding interoperability IPMP JPEG JPSEC key scheme layer media key block movie MPEG multimedia content multimedia data multimedia encryption node OMA DRM P-frames packet parameters pixels Proc protected content public key quantization robust scalable coding secure scalable secure transcoding selective encryption sequence keys Signal Processing signature specific standard steganalysis steganography stream stream cipher techniques technologies tion traitor tracing transcoding unencrypted value-chains
Populāri fragmenti
462. lappuse - In no case does copyright protection for an original work of authorship extend to any idea, procedure, process, system, method of operation, concept, principle, or discovery, regardless of the form in which it is described, explained, illustrated, or embodied in such work.
6. lappuse - Notwithstanding the provisions of section 106, the fair use of a copyrighted work, including such use by reproduction in copies or phonorecords or by any other means specified by that section, for purposes such as criticism, comment, news reporting, teaching, scholarship, or research, is not an infringement of copyright.
6. lappuse - ... (1) the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes; (2) the nature of the copyrighted work; (3) the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and (4) the effect of the use upon the potential market for or value of the copyrighted work.
462. lappuse - Works of authorship include the following categories: (1) literary works; (2) musical works, including any accompanying words; (3) dramatic works, including any accompanying music; (4) pantomimes and choreographic works; (5) pictorial, graphic, and sculptural works; (6) motion pictures and other audiovisual works; (7) sound recordings; and (8) architectural works.
4. lappuse - A work is created" when it is fixed in a copy or phonorecord for the first time; where a work is prepared over a period of time, the portion of it that has been fixed at any particular time constitutes the work as of that time, and where the work has been prepared in different versions, each version constitutes a separate work. A "derivative work...
4. lappuse - DERIVATIVE WORK" is a work based upon one or more preexisting works, such as a translation, musical arrangement, dramatization, fictionalization, motion picture version, sound recording, art reproduction, abridgment, condensation or any other form in which a work may be recast, transformed, or adapted.
5. lappuse - To this end, copyright assures authors the right to their original expression, but encourages others to build freely upon the ideas and information conveyed by a work.
461. lappuse - ... a technological measure that effectively controls access to a work protected under this tile; (B) has only limited commercially significant purpose or use other than to circumvent a technological measure that effectively controls access to a work protected under this title...