libri scuola books Fumetti ebook dvd top ten sconti 0 Carrello


Torna Indietro

furht borko; kirovski darko - multimedia encryption and authentication techniques and applications
Zoom

Multimedia Encryption and Authentication Techniques and Applications

;




Disponibilità: Normalmente disponibile in 20 giorni
A causa di problematiche nell'approvvigionamento legate alla Brexit sono possibili ritardi nelle consegne.


PREZZO
136,98 €
NICEPRICE
130,13 €
SCONTO
5%



Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.


Pagabile anche con Carta della cultura giovani e del merito, Carta della Cultura e Carta del Docente


Facebook Twitter Aggiungi commento


Spese Gratis

Dettagli

Genere:Libro
Lingua: Inglese
Pubblicazione: 05/2006
Edizione: 1° edizione





Trama

Multimedia Encryption and Authentication Techniques and Applications provides a comprehensive reference on advanced topics in the field. This book addresses a variety of issues related to the protection of digital media content, including audio, image, and video protection. It presents state-of-the-art multimedia security technologies such as protection architectures, multimedia encryption, watermarking, fingerprinting, authentication techniques, and applications. With contributions from leading experts, this text also covers fundamental concepts in multimedia content, current and future trends in multimedia security, lossless data hiding, applications of media protection schemes, as well as digital rights management.




Note Editore

Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of piracy looms as a major problem with digital distribution and storage technologies. Multimedia Encryption and Authentication Techniques and Applications covers current and future trends in the design of modern systems that use encryption and authentication to protect multimedia content. Containing the works of contributing authors who are worldwide experts in their fields, this volume is intended for researchers and practitioners, as well as for those who want a broad understanding of multimedia security. In the wake of the explosive growth of digital entertainment and Internet applications, this book is a definitive resource for scientists, researchers, programmers, engineers, business managers, entrepreneurs, and investors.FeaturesDescribes and evaluates the state of the art in multimedia encryption and authentication techniques and related technologies, architectures, standards, and applicationsIncludes advanced topics, such as chaotic encryption techniques for digital images and video, as well as streaming media encryptionFocuses on digital rights management issues for video and for consumer devices Covers key management and protection for IP multimedia, digital media fingerprinting, and signature-based media authentication




Sommario

Protection of Multimedia Content in Distribution Networks. Vulnerabilities of Multimedia Protection Schemes. Fundamentals of Multimedia Encryption Techniques. Chaos-Based Encryption for Digital Image and Video. Key Management and Protection for IP Multimedia. Streaming Media Encryption. Digital Media Fingerprinting: Techniques and Trends. Scalable Image and Video Authentication. Signature-Based Media Authentication. Digital Rights Management for Consumer Devices 311. Adult Image Filtering for Internet Safety. Digital Rights Management Issues for Video.




Autore

Borko Furht is a professor and chairman of the Department of Computer Science and Engineering at Florida Atlantic University (FAU) in Boca Raton, Florida. Before joining FAU, he was a vice president of research and a senior director of development at Modcomp (Ft. Lauderdale), a computer company of Daimler Benz, Germany, and a professor at the University of Miami in Coral Gables, Florida. Professor Furht received Ph.D. degrees in electrical and computer engineering from the University of Belgrade. His current research is in multimedia systems, video coding and compression, video databases, wireless multimedia, and Internet computing. He is currently Principal Investigator and Co-PI of two multiyear, multimillion dollar projects - on Coastline Security Technologies, funded by the Department of Navy, and One Pass to Production, funded by Motorola. He is the author of numerous books and articles in the areas of multimedia, computer architecture, real-time computing, and operating systems. He is a founder and editor-in-chief of The Journal of Multimedia Tools and Applications (Kluwer Academic Publishers). He has received several technical and publishing awards, and has consulted for many high-tech companies, including IBM, Hewlett-Packard, Xerox, General Electric, JPL, NASA, Honeywell and RCA. He has also served as a consultant to various colleges and universities. He has given many invited talks, keynote lectures, seminars, and tutorials., Darko Kirovski received his Ph.D. degree in computer science from the University of California, Los Angeles, in 2001. Since April 2000, he has been a researcher at Microsoft Research. His research interests include certificates of authenticity, system security, multimedia processing, biometric identity authentication, and embedded system design and debugging. He received the 1999 Microsoft Graduate Research Fellowship, the 2000 ACM/IEEE Design Automation Conference Graduate Scholarship, the 2001 ACM Outstanding Ph.D. Dissertation Awar










Altre Informazioni

ISBN:

9780849372124

Condizione: Nuovo
Collana: Internet and Communications
Dimensioni: 9.2 x 6.1428571 in Ø 1.55 lb
Formato: Copertina rigida
Illustration Notes:105 b/w images and 10 tables
Pagine Arabe: 408


Dicono di noi