|
|
Showing 1 - 3 of
3 matches in All Departments
Multimedia technologies are becoming more sophisticated, enabling
the Internet to accommodate a rapidly growing audience with a full
range of services and efficient delivery methods. Although the
Internet now puts communication, education, commerce and
socialization at our finger tips, its rapid growth has raised some
weighty security concerns with respect to multimedia content. The
owners of this content face enormous challenges in safeguarding
their intellectual property, while still exploiting the Internet as
an important resource for commerce.
Data Hiding Fundamentals and Applications focuses on the theory and
state-of-the-art applications of content security and data hiding
in digital multimedia. One of the pillars of content security
solutions is the imperceptible insertion of information into
multimedia data for security purposes; the idea is that this
inserted information will allow detection of unauthorized usage.
* Provides a theoretical framework for data hiding, in a signal
processing context;
* Realistic applications in secure, multimedia delivery;
* Compression robust data hiding;
* Data hiding for proof of ownership--WATERMARKING;
* Data hiding algorithms for image and video watermarking.
This book focuseson protocols and constructions that make good use
of the building blocks for symmetric cryptography. The book brings
under one roof, several esoteric strategies of utilizing symmetric
cryptographic blocks. The specific topics addressed by the book
include various key distribution strategies for unicast, broadcast
and multicast security and strategies for constructing efficient
digests of dynamic databases using binary hash trees."
This book focusesĀ on protocols and constructions that make
good use of the building blocks for symmetric cryptography. The
book brings under one roof, several esoteric strategies of
utilizing symmetric cryptographic blocks. The specific topics
addressed by the book include various key distribution strategies
for unicast, broadcast and multicast security and strategies for
constructing efficient digests of dynamic databases using binary
hash trees.
|
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.