Handbook Of Research On Secure Multimedia Distribution

Handbook Of Research On Secure Multimedia Distribution

by Shiguo Lian, Yan Zhang
     
 

New technologies and concepts are constantly being developed within multimedia distribution. In such an ever-evolving environment, academicians, researchers, and professionals of this discipline need access to the most current information about the concepts, issues, trends, and technologies in this emerging field. The Handbook of Research on Secure Multimedia

See more details below

Overview

New technologies and concepts are constantly being developed within multimedia distribution. In such an ever-evolving environment, academicians, researchers, and professionals of this discipline need access to the most current information about the concepts, issues, trends, and technologies in this emerging field. The Handbook of Research on Secure Multimedia Distribution provides the latest research on secure multimedia content distribution, embracing a wide variety of aspects and providing a scientifically and scholarly sound treatment of state-of-the-art techniques to students, researchers, and academicians interested or involved in the study, research, use, design, and development of techniques related to multimedia distribution.

Product Details

ISBN-13:
9781605662626
Publisher:
IGI Global
Publication date:
05/05/2011
Pages:
616
Product dimensions:
8.80(w) x 11.30(h) x 1.70(d)

Related Subjects

Table of Contents

Sect. I Secure Distribution Systems

Ch. I Rights Expression Languages Pramod A. Jamkhedkar Jamkhedkar, Pramod A. Gregory L. Heileman Heileman, Gregory L. 1

Ch. II Digital Rights Management for Streaming Media Deepali Brahmbhatt Brahmbhatt, Deepali Mark Stamp Stamp, Mark 22

Ch. III Rethinking DRM Using Exception Management Jean-Henry Morin Morin, Jean-Henry 39

Ch. IV Overview of OMA Digital Rights Management Merce Serra Joan Joan, Merce Serra Bert Greevenbosch Greevenbosch, Bert Anja Becker Becker, Anja Harald Fuchs Fuchs, Harald Stefan Krageloh Krageloh, Stefan 55

Ch. V Discovering the Core Security Requirements of DRM Systems by Means of Objective Trees Hugo Jonker Jonker, Hugo Sjouke Mauw Mauw, Sjouke 71

Ch. VI Digital Rights Management for Untrusted Peer-to-Peer Networks Pallavi Priyadarshini Priyadarshini, Pallavi Mark Stamp Stamp, Mark 86

Ch. VII Pervasive Video Surveillance Systems Over TCP/IP Networks L. Badia Badia, L. A. Erta Erta, A. U. Malesci Malesci, U. 118

Ch. VIII P2PTunes: A Peer-to-Peer Digital Rights Management System Ramya Venkataramu Venkataramu, Ramya Mark Stamp Stamp, Mark 137

Ch. IX A Hardware Approach for Trusted Access and Usage Control Nicolas Anciaux Anciaux, Nicolas Luc Bouganim Bouganim, Luc Philippe Pucheral Pucheral, Philippe 157

Sect. II Core Techniques

Ch. X A Summary of Recent and Old Results on the Security of the Diffie-Hellman Key Exchange Protocol in Finite Groups Ionu? Florescu Florescu, Ionu? 181

Ch. XI Secret Sharing with k-Dimensional Access Structure Guojun Wang Wang, Guojun Yirong Wu Wu, Yirong Geyong Min Min, Geyong Ronghua Shi Shi, Ronghua 201

Ch. XII Wireless Video Transmission Supavadee Aramvith Aramvith,Supavadee Rhandley D. Cajote Cajote, Rhandley D. 211

Ch. XIII A Survey of Information Hiding M. Hassan Shirali-Shahreza Shirali-Shahreza, M. Hassan Mohammad Shirali-Shahreza Shirali-Shahreza, Mohammad 241

Ch. XIV Digital Watermarking Capacity and Detection Error Rate Fan Zhang Fan, Zhang 257

Ch. XV Digital Watermarking Aidan Mooney Mooney, Aidan 277

Ch. XVI Digital Video Authentication Pradeep K. Atrey Atrey, Pradeep K. Abdulmotaleb El Saddik Saddik, Abdulmotaleb El Mohan Kankanhalli Kankanhalli, Mohan 298

Ch. XVII Flexible Multimedia Stream Authentication Tieyan Li Li, Tieyan 315

Ch. XVIII Scalable Distribution of Watermarked Media K-G Stenborg Stenborg, K-G 335

Ch. XIX Critical Analysis of Digital Steganography Hafiz Malik Malik, Hafiz 352

Sect. III Typical Applications

Ch. XX Secure Content Distribution in Pure P2P. Esther Palomar Palomar, Esther Juan M. E. Tapiador Tapiador, Juan M. E. Julio C. Hernandez-Castro Hernandez-Castro, Julio C. Arturo Ribagorda Ribagorda, Arturo 384

Ch. XXI Trust in the Value-Creation Chain of Multimedia Goods Andreas U. Schmidt Schmidt, Andreas U. Nicolai Kuntze Kuntze, Nicolai 403

Ch. XXII Copyright Protection of A/V Codec for Mobile Multimedia Devices Goo-Rak Kwon Kwon, Goo-Rak Sung-Jea Ko Ko, Sung-Jea 425

Ch. XXIII Digital Steganography Based on Genetic Algorithm Frank Y. Shih Shih, Frank Y. Yi-Ta Wu Wu, Yi-Ta 439

Ch. XXIV Adaptive Image Steganography Based on Structural Similarity Metric Guangjie Liu Liu, Guangjie Shiguo Lian Lian, Shiguo Yuewei Dai Dai, Yuewei Zhiquan Wang Wang, Zhiquan 454

Ch. XXV A Survey on Video Watermarking Shiguo Lian Lian, Shiguo 472

Ch. XXVI Multiple Description Coding with Application in Multimedia Watermarking Minglei Liu Liu, Minglei Ce Zhu Ce, Zhu 493

Ch. XXVII Fractal-Based Secured Multiple-Image Compression and Distribution Hsuan T. Chang Hsuan, T. Chang Chih-Chung Hsu Hsu, Chih-Chung 515

Compilation of References 533

Index 583

Read More

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >