New technologies and concepts are constantly being developed within multimedia distribution. In such an ever-evolving environment, academidans, researchers, and professionals of this discipline need access to the most current information about the concepts, issues, trends, and technologies in this e
Handbook of Research on Secure Multimedia Distribution (Premier Reference Source)
โ Scribed by Shiguo Lian, Yan Zhang, Shiguo Lian, Yan Zhang
- Publisher
- Information Science Reference
- Year
- 2009
- Tongue
- English
- Leaves
- 616
- Series
- Premier Reference Source
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
New technologies and concepts are constantly being developed within multimedia distribution. In such an ever-evolving environment, academidans, researchers, and professionals of this discipline need access to the most current information about the concepts, issues, trends, and technologies in this emerging field.
The Handbook of Research on Secure Multimedia Distribution provides the latest research on secure multimedia content distribution, embracing a wide variety of aspects and providing a scientifically and scholarly sound treatment of state-of-the-art techniques to students, researchers, and academicians interested or involved in the study, research, use, design, and development of techniques related to multimedia distribution. This title offers: 27 authoritative contributions by over 55 of the world's leading experts on secure multimedia distribution from 17 countries; comprehensive coverage of each specific topic, highlighting recent trends and describing the latest advances in the field; more than 960 references to existing literature and research on secure multimedia distribution; a compendium of over 225 key terms with detailed definitions. This title is organized by topic and indexed, making it a convenient method of reference for all IT/IS scholars and professionals. It features cross-referencing of key terms, figures, and information pertinent to secure multimedia distribution and free institution-wide access to the online version with the purchase of the print publication.
โฆ Table of Contents
Title......Page 2
Editorial Advisory Board......Page 4
List of Contributors......Page 6
Table of Contents......Page 8
Detailed Table of Contents......Page 12
Foreword......Page 22
Preface......Page 24
Acknowledgment......Page 28
Rights Expression Languages......Page 30
Digital Rights Management for Streaming Media......Page 51
Rethinking DRM Using Exception Management......Page 68
Overview of OMA Digital Rights Management......Page 84
Discovering the Core Security Requirements of DRM Systems by Means of Objective Trees......Page 100
Digital Rights Management for Untrusted Peer-to-Peer Networks......Page 115
Pervasive Video Surveillance Systems Over TCP/IP Networks......Page 147
P2PTunes:A Peer-to-Peer Digital Rights Management System......Page 166
A Hardware Approach for Trusted Access and Usage Control......Page 186
A Summary of Recent and Old Results on the Security of the Diffie-Hellman Key Exchange Protocol in Finite Groups......Page 210
Secret Sharing with k-Dimensional Access Structure......Page 230
Wireless Video Transmission......Page 240
A Survey of Information Hiding......Page 270
Digital Watermarking Capacity and Detection Error Rate......Page 286
Digital Watermarking......Page 306
Digital Video Authentication......Page 327
Flexible Multimedia Stream Authentication......Page 344
Scalable Distribution of Watermarked Media......Page 364
Critical Analysis of Digital Steganography......Page 381
Secure Content Distribution in Pure P2P......Page 413
Trust in the Value-Creation Chain of Multimedia Goods......Page 432
Copyright Protection ofA/V Codec for Mobile Multimedia Devices......Page 454
Digital Steganography Basedon Genetic Algorithm......Page 468
Adaptive Image Steganography Based on Structural Similarity Metric......Page 483
A Survey on Video Watermarking......Page 501
Multiple Description Coding with Application in Multimedia Watermarking......Page 522
Fractal-Based SecuredMultiple-Image Compressionand Distribution......Page 544
Compilation of References......Page 562
About the Contributors......Page 602
Index......Page 612
๐ SIMILAR VOLUMES
Now established as an effective tool in the instructional process, multimedia has penetrated educational systems at almost every level of study. In their quest to maximize educational outcomes and identify best practices, multimedia researchers are now expanding their examinations to extend towards
Many multimedia music content owners and distributors are converting their archives of music scores from paper into digital images, and to machine readable symbolic notation in order to survive in the business world. Interactive Multimedia Music Technologies discusses relevant state-of-the-art techn