Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Multimedia security technologies for digital rights management
by
Yu, Hong Heather
, Zeng, Wenjun
, Lin, Ching-Yung
in
Computer security
/ Intellectual property
/ Multimedia systems
/ Multimedia systems -- Security measures
2006,2007
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Multimedia security technologies for digital rights management
by
Yu, Hong Heather
, Zeng, Wenjun
, Lin, Ching-Yung
in
Computer security
/ Intellectual property
/ Multimedia systems
/ Multimedia systems -- Security measures
2006,2007
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Multimedia security technologies for digital rights management
eBook
Multimedia security technologies for digital rights management
2006,2007
Request Book From Autostore
and Choose the Collection Method
Overview
Security is a major concern in an increasingly multimedia-defined universe where the Internet serves as an indispensable resource for information and entertainment. Digital Rights Management (DRM) is the technology by which network systems protect and provide access to critical and time-sensitive copyrighted material and/or personal information. This book equips savvy technology professionals and their aspiring collegiate protégés with the latest technologies, strategies and methodologies needed to successfully thwart off those who thrive on security holes and weaknesses. Filled with sample application scenarios and algorithms, this book provides an in-depth examination of present and future field technologies including encryption, authentication, copy control, tagging, tracing, conditional access and media identification. The authors present a diversified blend of theory and practice and focus on the constantly changing developments in multimedia applications thus providing an admirably comprehensive book. * Discusses state-of-the-art multimedia authentication and fingerprinting techniques * Presents several practical methodologies from industry, including broadcast encryption, digital media forensics and 3D mesh watermarking * Focuses on the need for security in multimedia applications found on computer networks, cell phones and emerging mobile computing devices
Publisher
Academic Press is an imprint of Elsevier,Academic Press
Subject
ISBN
9780123694768, 0123694760
This website uses cookies to ensure you get the best experience on our website.