0
Your cart

Your cart is empty

Books > Computing & IT > Social & legal aspects of computing > Human-computer interaction

Buy Now

Securing Digital Video - Techniques for DRM and Content Protection (Paperback, 2012 ed.) Loot Price: R2,739
Discovery Miles 27 390
Securing Digital Video - Techniques for DRM and Content Protection (Paperback, 2012 ed.): Eric Diehl

Securing Digital Video - Techniques for DRM and Content Protection (Paperback, 2012 ed.)

Eric Diehl

 (sign in to rate)
Loot Price R2,739 Discovery Miles 27 390 | Repayment Terms: R257 pm x 12*

Bookmark and Share

Expected to ship within 10 - 15 working days

Content protection and digital rights management (DRM) are fields that receive a lot of attention: content owners require systems that protect and maximize their revenues; consumers want backwards compatibility, while they fear that content owners will spy on their viewing habits; and academics are afraid that DRM may be a barrier to knowledge sharing. DRM technologies have a poor reputation and are not yet trusted. This book describes the key aspects of content protection and DRM systems, the objective being to demystify the technology and techniques. In the first part of the book, the author builds the foundations, with sections that cover the rationale for protecting digital video content; video piracy; current toolboxes that employ cryptography, watermarking, tamper resistance, and rights expression languages; different ways to model video content protection; and DRM. In the second part, he describes the main existing deployed solutions, including video ecosystems; how video is protected in broadcasting; descriptions of DRM systems, such as Microsoft's DRM and Apple's FairPlay; techniques for protecting prerecorded content distributed using DVDs or Blu-ray; and future methods used to protect content within the home network. The final part of the book looks towards future research topics, and the key problem of interoperability. While the book focuses on protecting video content, the DRM principles and technologies described are also used to protect many other types of content, such as ebooks, documents and games. The book will be of value to industrial researchers and engineers developing related technologies, academics and students in information security, cryptography and media systems, and engaged consumers.

General

Imprint: Springer-Verlag
Country of origin: Germany
Release date: July 2014
First published: 2012
Authors: Eric Diehl
Dimensions: 235 x 155 x 15mm (L x W x T)
Format: Paperback
Pages: 266
Edition: 2012 ed.
ISBN-13: 978-3-642-43488-4
Categories: Books > Computing & IT > General theory of computing > Data structures
Books > Computing & IT > Computer programming > Algorithms & procedures
Books > Computing & IT > Computer software packages > Multimedia
Books > Computing & IT > Social & legal aspects of computing > Human-computer interaction
Books > Professional & Technical > Electronics & communications engineering > Electronics engineering > Circuits & components
LSN: 3-642-43488-6
Barcode: 9783642434884

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

Partners