Multimedia Encryption and Authentication Techniques and Applications

Borko Furht, Darko Kirovski

May 3, 2006 by Auerbach Publications
Reference - 408 Pages - 105 B/W Illustrations
ISBN 9780849372124 - CAT# AU7212
Series: Internet and Communications

was $125.95

USD$100.76

SAVE ~$25.19

Add to Wish List
SAVE 25%
When you buy 2 or more products!
See final price in shopping cart.
FREE Standard Shipping!

Features

  • Describes and evaluates the state-of-the-art in multimedia encryption and authentication techniques and related technologies, architectures, standards, and applications
  • Includes advanced topics, such as chaotic encryption techniques for digital images and video, as well as streaming media encryption
  • Focuses on digital rights management issues for video and for consumer devices
  • Covers key management and protection for IP multimedia, digital media fingerprinting, and signature-based media authentication
  • Summary

    Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of piracy looms as a major problem with digital distribution and storage technologies.

    Multimedia Encryption and Authentication Techniques and Applications covers current and future trends in the design of modern systems that use encryption and authentication to protect multimedia content. Containing the works of contributing authors who are worldwide experts in their fields, this volume is intended for researchers and practitioners, as well as for those who want a broad understanding of multimedia security. In the wake of the explosive growth of digital entertainment and Internet applications, this book is a definitive resource for scientists, researchers, programmers, engineers, business managers, entrepreneurs, and investors.

    Features
  • Describes and evaluates the state of the art in multimedia encryption and authentication techniques and related technologies, architectures, standards, and applications
  • Includes advanced topics, such as chaotic encryption techniques for digital images and video, as well as streaming media encryption
  • Focuses on digital rights management issues for video and for consumer devices
  • Covers key management and protection for IP multimedia, digital media fingerprinting, and signature-based media authentication
  • Instructors

    We provide complimentary e-inspection copies of primary textbooks to instructors considering our books for course adoption.

    Request an
    e-inspection copy

    Share this Title