Handbook of research on secure multimedia distribution
"This handbook is for both secure multimedia distribution researchers and also decision makers in obtaining a greater understanding of the concepts, issues, problems, trends, challenges and opportunities related to secure multimedia distribution"--Provided by publisher.
Corporate Author: | |
---|---|
Other Authors: | , |
Format: | Electronic |
Language: | English |
Published: |
Hershey, Pa. :
IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),
c2009.
|
Subjects: | |
Online Access: | View fulltext via EzAccess |
Table of Contents:
- Part 1. Secure Distribution Systems
- 1. Rights Expression Languages
- 2. Digital Rights Management for Streaming Media
- 3. Rethinking DRM Using Exception Management
- 4. Overview of OMA Digital Rights Management
- 5. Discovering the Core Security Requirements of DRM Systems by Means of Objective Trees
- 6. Digital Rights Management for Untrusted Peer-to-peer Networks
- 7. Pervasive Video-Surveillance Systems over TCP/IP Networks
- 8. P2PTunes: A Peer-to-Peer Digital Rights Management System
- 9. Secure Distributed Access Control: a Hardware Approach
- Part 2. Core Techniques
- 10. A summary of recent and old results on the security of the Diffie-Hellman key exchange protocol in finite groups
- 11. Design of a Secret Sharing Scheme with a Generic k-Dimensional Access Structure
- 12. Wireless Video Transmission
- 13. A Survey of Information Hiding
- 14. Digital Watermarking Capacity and Detection Error Rate
- 15. Digital Watermarking
- 16. Digital Video Authentication: System properties, design issues and techniques
- 17. Flexible Multimedia Stream Authentication
- 18. Scalable Distribution of Watermarked Media
- 19. Critical Analysis of Digital Steganography
- Part 3. Typical Applications
- 20. Secure Content Distribution in Pure Peer-to-Peer Networks
- 21. Trust in the Value-Creation Chain of Multimedia Goods
- 22. Copyright Protection of A/V Codec for Mobile Multimedia Devices
- 23. Digital Steganography Based on Genetic Algorithm
- 24. Adaptive Image Steganography Based on Structural Similarity Metric
- 25. A Survey on Video Watermarking
- 26. Multiple Description Coding with Application in Multimedia Watermarking
- 27. Fractal-based Secured Multiple-Image Compression and Distribution.