Multimedia Content Encryption
Title | Multimedia Content Encryption PDF eBook |
Author | Shiguo Lian |
Publisher | CRC Press |
Total Pages | 238 |
Release | 2008-09-17 |
Genre | Computers |
ISBN | 1420065289 |
The widespread use of image, audio, and video data makes media content protection increasingly necessary and urgent. For maximum safety, it is no longer sufficient to merely control access rights. In order to fully protect multimedia data from piracy or unauthorized use, it must be secured through encryption prior to its transmission or distributio
Multimedia Encryption and Watermarking
Title | Multimedia Encryption and Watermarking PDF eBook |
Author | Borko Furht |
Publisher | Springer Science & Business Media |
Total Pages | 331 |
Release | 2006-10-03 |
Genre | Computers |
ISBN | 0387260900 |
Multimedia Encryption and Watermarking presents a comprehensive survey of contemporary multimedia encryption and watermarking techniques, which enable a secure exchange of multimedia intellectual property. Part I, Digital Rights Management (DRM) for Multimedia, introduces DRM concepts and models for multimedia content protection, and presents the key players. Part II, Multimedia Cryptography, provides an overview of modern cryptography, with the focus on modern image, video, speech, and audio encryption techniques. This book also provides an advanced concept of visual and audio sharing techniques. Part III, Digital Watermarking, introduces the concept of watermarking for multimedia, classifies watermarking applications, and evaluates various multimedia watermarking concepts and techniques, including digital watermarking techniques for binary images. Multimedia Encryption and Watermarking is designed for researchers and practitioners, as well as scientists and engineers who design and develop systems for the protection of digital multimedia content. This volume is also suitable as a textbook for graduate courses on multimedia security.
Multimedia Encryption and Authentication Techniques and Applications
Title | Multimedia Encryption and Authentication Techniques and Applications PDF eBook |
Author | Borko Furht |
Publisher | CRC Press |
Total Pages | 289 |
Release | 2006-05-03 |
Genre | Computers |
ISBN | 1000654737 |
Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of piracy looms as a major problem with digital distribution and storage technologies. Multimedia Encryption and Authentication Techniques and Applications covers current and future trends in the des
Multimedia Security Handbook
Title | Multimedia Security Handbook PDF eBook |
Author | Borko Furht |
Publisher | CRC Press |
Total Pages | 832 |
Release | 2004-12-28 |
Genre | Computers |
ISBN | 1420038265 |
Intellectual property owners who exploit new ways of reproducing, distributing, and marketing their creations digitally must also protect them from piracy. Multimedia Security Handbook addresses multiple issues related to the protection of digital media, including audio, image, and video content. This volume examines leading-edge multimedia securit
Cryptanalyzing Some Multimedia Encryption Schemes
Title | Cryptanalyzing Some Multimedia Encryption Schemes PDF eBook |
Author | Chengqing Li |
Publisher | LAP Lambert Academic Publishing |
Total Pages | 168 |
Release | 2012-07 |
Genre | Cryptography |
ISBN | 9783659172694 |
Low efficiency of the traditional text encryption schemes to protect the multimedia data makes designing secure and efficient multimedia encryption schemes become urgent. Many specific multimedia encryption schemes were designed by adopting some related nonlinear theories. However, shortage of security scrutiny of multimedia encryption schemes frustrated progress of their security level. As a digital image is a typical form of multimedia data and it can show performance of an encryption scheme effectively, many multimedia (chaos-based) encryption schemes adopt images as the encryption object. This book focuses on evaluating the security of six image schemes against some common attack methods, such as brute-force attack, known/chosen-plaintext attack and differential attack. Both rigorous theoretical analyses and detailed experimental results are provided to support the security defects. In addition, some general recommendations for designing secure multimedia encryption scheme are concluded. The cryptanalysis work presented in this book will help cryptanalysts and designers of multimedia encryption schemes understand how to analyze the security of an encryption scheme.
Embedded Multimedia Security Systems
Title | Embedded Multimedia Security Systems PDF eBook |
Author | Amit Pande |
Publisher | Springer Science & Business Media |
Total Pages | 153 |
Release | 2012-09-12 |
Genre | Computers |
ISBN | 1447144589 |
Opening with a detailed review of existing techniques for selective encryption, this text then examines algorithms that combine both encryption and compression. The book also presents a selection of specific examples of the design and implementation of secure embedded multimedia systems. Features: reviews the historical developments and latest techniques in multimedia compression and encryption; discusses an approach to reduce the computational cost of multimedia encryption, while preserving the properties of compressed video; introduces a polymorphic wavelet architecture that can make dynamic resource allocation decisions according to the application requirements; proposes a light-weight multimedia encryption strategy based on a modified discrete wavelet transform; describes a reconfigurable hardware implementation of a chaotic filter bank scheme with enhanced security features; presents an encryption scheme for image and video data based on chaotic arithmetic coding.
Multimedia Security 2
Title | Multimedia Security 2 PDF eBook |
Author | William Puech |
Publisher | John Wiley & Sons |
Total Pages | 322 |
Release | 2022-06-21 |
Genre | Computers |
ISBN | 1394150393 |
Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data – images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and include computer-aided design, video surveillance and biometrics. It is becoming increasingly urgent to secure this data, not only during transmission and archiving, but also during its retrieval and use. Indeed, in today’s "all-digital" world, it is becoming ever-easier to copy data, view it unrightfully, steal it or falsify it. Multimedia Security 2 analyzes issues relating to biometrics, protection, integrity and encryption of multimedia data. It also covers aspects such as crypto-compression of images and videos, homomorphic encryption, data hiding in the encrypted domain and secret sharing.