Description
Multimedia Encryption and Authentication Techniques and Applications
Internet and Communications Series
Authors: Furht Borko, Kirovski Darko
Language: EnglishSubjects for Multimedia Encryption and Authentication Techniques and...:
Keywords
DCT Coefficient; Image Encryption Schemes; streaming media encryption; MPEG Video; authentication techniques; AC Coefficient; chaotic video encryption; SC; multimedia applications; DVD Player; multimedia encryption; Watermarking Scheme; Selective Encryption; DRM System; DC Coefficient; Watermarking Techniques; Watermarked Image; VEA; Playback; Public Key Cryptography; RTP Header; Motion Vectors; Huffman Tables; Encryption Algorithm; Video Encryption Schemes; Chosen Plaintext Attacks; Streaming Media; Watermarked Signal; Integrity Authentication; ECC Scheme
Publication date: 11-2019
· 15.6x23.4 cm · Paperback
Approximative price 148.11 €
Subject to availability at the publisher.
Add to cart the book of Furht Borko, Kirovski DarkoPublication date: 05-2006
400 p. · 15.6x23.4 cm · Hardback
Description
/li>Contents
/li>Readership
/li>Biography
/li>
Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of piracy looms as a major problem with digital distribution and storage technologies.
Multimedia Encryption and Authentication Techniques and Applications covers current and future trends in the design of modern systems that use encryption and authentication to protect multimedia content. Containing the works of contributing authors who are worldwide experts in their fields, this volume is intended for researchers and practitioners, as well as for those who want a broad understanding of multimedia security. In the wake of the explosive growth of digital entertainment and Internet applications, this book is a definitive resource for scientists, researchers, programmers, engineers, business managers, entrepreneurs, and investors.
Features