| 000 | 00911namuu22002658a 4500 | |
| 001 | 000045162185 | |
| 005 | 20050407114112 | |
| 008 | 050407s2004 flua bf 001 0 eng | |
| 020 | ▼a 0849327733 (alk. paper) | |
| 040 | ▼a DLC ▼c DLC ▼d 244002 | |
| 042 | ▼a pcc | |
| 050 | 0 0 | ▼a QA76.9.A25 ▼b M85 2004 |
| 082 | 0 0 | ▼a 005.8 ▼2 22 |
| 090 | ▼a 005.8 ▼b M9612 | |
| 245 | 0 0 | ▼a Multimedia security handbook / edited by Borko Fuhrt, Darko Kirovski. |
| 260 | ▼a Boca Raton, Fla. : ▼b CRC Press , ▼c 2004. | |
| 263 | ▼a 0409 | |
| 300 | ▼a xv, 815 p. : ▼b ill. ; ▼c 25 cm. | |
| 440 | 0 | ▼a Internet and communications |
| 504 | ▼a Includes bibliographical references and index. | |
| 650 | 0 | ▼a Multimedia systems ▼x Security measures ▼v Handbooks, manuals, etc. |
| 650 | 0 | ▼a Intellectual property ▼v Handbooks, manuals, etc. |
| 700 | 1 | ▼a Furht, Borivoje. |
| 700 | 1 | ▼a Kirovski, Darko. |
소장정보
| No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
|---|---|---|---|---|---|---|---|
| No. 1 | 소장처 과학도서관/Sci-Info(2층서고)/ | 청구기호 005.8 M9612 | 등록번호 121140035 (1회 대출) | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
| No. 2 | 소장처 세종학술정보원/과학기술실(5층)/ | 청구기호 005.8 M9612 | 등록번호 151177189 (2회 대출) | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
| No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
|---|---|---|---|---|---|---|---|
| No. 1 | 소장처 과학도서관/Sci-Info(2층서고)/ | 청구기호 005.8 M9612 | 등록번호 121140035 (1회 대출) | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
| No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
|---|---|---|---|---|---|---|---|
| No. 1 | 소장처 세종학술정보원/과학기술실(5층)/ | 청구기호 005.8 M9612 | 등록번호 151177189 (2회 대출) | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
컨텐츠정보
책소개
Intellectual property owners who exploit new ways of reproducing, distributing, and marketing their creations digitally must also protect them from piracy. Multimedia Security Handbook addresses multiple issues related to the protection of digital media, including audio, image, and video content. This volume examines leading-edge multimedia security concepts including protection architectures, encryption, watermarking, fingerprinting, authentication, and various applications.
Comprinsing 26 chapters, the Handbook begins by introducing security fundamentals and discussing the vulnerabilities of individual protection schemes. Part II focuses on multimedia encryption, detailing audio, image, and video encryption techniques. Part III examines watermarking techniques, reviewing current and future trends and discussing multidimensional, fragile, and robust watermarks. Part IV covers multimedia data hiding, fingerprinting, and authentication. The text concludes with chapters describing applications of multimedia protection schemes, presenting topics such as application taxonomy, digital rights management, and techniques for adult image filtering.
The Handbook offers comprehensive reference material on advanced topics in the field. It delivers invaluable insight for researchers, practitioners, and engineers involved in designing and developing systems that protect digital multimedia content.
Intellectual property owners who exploit new ways of reproducing, distributing, and marketing their creations digitally must also protect them from piracy. This handbook addresses issues related to protecting digital media. It begins by introducing security fundamentals and discussing the vulnerabilities of individual protection schemes. Part two f
정보제공 :
목차
GENERAL ISSUESProtection of Multimedia Content in Distribution Networks A. M. Eskicioglu and E.J. DelpVulnerability of Multimedia Protection SchemesM. F. Mansour and A.H. Tewfik MULTIMEDIA ENCRYPTION Fundamentals of Multimedia Encryption Techniques B. Furht, D. Socek, and A. M. Eskicioglu Chaos-Based Encryption for Digital Image and Video S. Li, G. Chen, and X. ZhengKey Management and Protection for IP MultimediaR. Blom, E. Carrara, F. Lindholm, K. Norrman, and M. NaslundStreaming Media EncryptionH. YuMULTIMEDIA WATERMARKING Survey of Multimedia Watermarking Techniques E. Muharemagic and B. FurhtRobust Identification of Audio Using Watermarking and FingerprintingJ. Haitsma and T. KalkerHigh Capacity Real-Time Audio Watermarking with Perfect Correlation Sequence and Repeated Insertion S-C Pei, Y-F Hsu, and Y-W LuMultidimensional Watermark for Still Image: Parallel Embedding and Detection Bo HuImage Watermarking Method Resistant to Geometric DistortionsH. Kim Fragile Watermarking for Image AuthenticationE. IzquierdoNew Trends and Challenges in Digital Watermark Technologies: Applications for Printed MaterialsZ. Liu Robust Watermark Detection from Quantized MPEG Video Data D. Simitopoulos, A. Briassouli, and M. G. StrintzisImage Watermarking Robust to Both Geometric Distortion and JPEG CompressionX. Kang, J. Huang, and Y. Q. ShiReversible Watermarks Using a Difference ExpansionA.M. AlattarMULTIMEDIA DATA HIDING, FINGERPRINTING, AND AUTHENTICATIONLossless Data Hiding: Fundamentals, Algorithms and ApplicationsY. Q. Shi, G. Xuan, and W. SuAttacking Multimedia Protection Systems via Blind Pattern MatchingD. Kirovski and J-L DugelayDigital Media Fingerprinting: Techniques and TrendsW. Luh and D. Kundur Scalable Image and Video AuthenticationD. Skraparlis Signature-Based Media AuthenticationQ. Sun and S-F ChangAPPLICATIONSDigital Watermarking Framework: Applications, Parameters and RequirementsK. Levy and T. Rodriguez Digital Rights Management for Consumer DevicesJ. LotspiechAdult Image Filtering for Internet Safety H. Zheng, M. Daudi, C. Tombelle, and C. DjerabaCombined Indexing and Watermarking of 3D Models Using the Generalized 3D Radon Transforms P. Daras, D. Zarpalas, D. Tzovaras, D. Simitopoulos, and M. G.StrintzisDigital Rights Management Issues for Video S. Emmanuel and M. S. Kankanhalli
정보제공 :
