The widespread use of image, audio, and video data makes media content protection increasingly necessary and urgent. For maximum safety, it is no longer sufficient to merely control access rights. In order to fully protect multimedia data from piracy or unauthorized use, it must be secured through encryption prior to its transmission or distribution. Multimedia Content Encryption: Techniques and Applications presents the latest research results in this dynamic field.
The book begins with the history of multimedia encryption and then examines general performance...
The widespread use of image, audio, and video data makes media content protection increasingly necessary and urgent. For maximum safety, it is no l...
New technologies and concepts are constantly being developed within multimedia distribution. In such an ever-evolving environment, academicians, researchers, and professionals of this discipline need access to the most current information about the concepts, issues, trends, and technologies in this emerging field. The Handbook of Research on Secure Multimedia Distribution provides the latest research on secure multimedia content distribution, embracing a wide variety of aspects and providing a scientifically and scholarly sound treatment of state-of-the-art techniques to students,...
New technologies and concepts are constantly being developed within multimedia distribution. In such an ever-evolving environment, academicians, resea...
This book explores aspects of multimedia data, including fundamental knowledge and the latest key techniques, and also typical applications and open issues. Coverage includes present and future video coding standards, free-viewpoint TV techniques, and more.
This book explores aspects of multimedia data, including fundamental knowledge and the latest key techniques, and also typical applications and open i...
Chaos-based cryptography, attracting many researchers in the past decade, is a research field across two fields, i.e., chaos (nonlinear dynamic system) and cryptography (computer and data security). It Chaos' properties, such as randomness and ergodicity, have been proved to be suitable for designing the means for data protection.
The book gives a thorough description of chaos-based cryptography, which consists of chaos basic theory, chaos properties suitable for cryptography, chaos-based cryptographic techniques, and various secure applications based on chaos. Additionally, it covers...
Chaos-based cryptography, attracting many researchers in the past decade, is a research field across two fields, i.e., chaos (nonlinear dynamic sys...
Multimedia data are used more and more widely in human being's life, e.g., videoconferencing, visual telephone, IPTV, etc. Nearly most of the applications need multimedia transmission techniques that send multimedia data from one side to another side and keep the properties of efficiency, robustness and security. Here, the efficiency denotes the time cost of transmission operations, the robustness denotes the ability to survive transmission errors or noises, and the security denotes the protection of the transmitted media content. Recently, various intelligent or innovative techniques are...
Multimedia data are used more and more widely in human being's life, e.g., videoconferencing, visual telephone, IPTV, etc. Nearly most of the appli...
Chaos-based cryptography has attracted great interest in the past decade. This book gives a thorough description of chaos-based cryptography. Written by leading experts, it covers the basic theories, algorithms and applications of chaos-based cryptography.
Chaos-based cryptography has attracted great interest in the past decade. This book gives a thorough description of chaos-based cryptography. Written ...