libri scuola books Fumetti ebook dvd top ten sconti 0 Carrello


Torna Indietro

lian shiguo - multimedia content encryption

Multimedia Content Encryption Techniques and Applications




Disponibilità: Normalmente disponibile in 20 giorni
A causa di problematiche nell'approvvigionamento legate alla Brexit sono possibili ritardi nelle consegne.


PREZZO
149,98 €
NICEPRICE
142,48 €
SCONTO
5%



Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.


Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente


Facebook Twitter Aggiungi commento


Spese Gratis

Dettagli

Genere:Libro
Lingua: Inglese
Pubblicazione: 09/2008
Edizione: 1° edizione





Note Editore

The widespread use of image, audio, and video data makes media content protection increasingly necessary and urgent. For maximum safety, it is no longer sufficient to merely control access rights. In order to fully protect multimedia data from piracy or unauthorized use, it must be secured through encryption prior to its transmission or distribution. Multimedia Content Encryption: Techniques and Applications presents the latest research results in this dynamic field. The book begins with the history of multimedia encryption and then examines general performance requirements of encryption and fundamental encrypting techniques. It discusses common techniques of complete, partial, and compression-combined encryption; as well as the more specialized forms, including perception, scalable, and commutative encryption. In addition, the author reviews watermarking and joint fingerprint embedding and decryption. Later chapters discuss typical attacks on multimedia encryption, as well as the principles for designing secure algorithms and various applications. An exploration of open issues, up-and-coming topics, and areas for further research rounds out the coverage. Shiguo Lian is the author or co-author of more than fifty peer-reviewed journal and conference articles covering topics of network security and multimedia content protection, including cryptography, secure P2P content sharing, digital rights management (DRM), encryption, watermarking, digital fingerprinting, and authentication. By following the techniques outlined in this book, users will be better able to protect the integrity of their multimedia data and develop greater confidence that their data will not be misappropriated.




Sommario

Introduction Background Definition History Classification Book Organization References Performance Requirement of Multimedia Content Encryption Introduction Security Requirement Cryptographic Security Key Sensitivity Plaintext Sensitivity Ciphertext Randomness Perceptual Security Subjective Metric Objective Metric Security Level Compression Efficiency Encryption Efficiency Format Compliance Application Suitability Summary References Fundamental Techniques Introduction Cryptography Cipher Symmetric Cipher or Asymmetric Cipher Block Cipher or Stream Cipher Encryption Mode of Block Cipher ECB Mode CBC Mode CFB Mode OFB Mode CTR Mode Cryptanalysis Multimedia Compression Audio Compression Image Compression Video Compression Scalable Coding Multimedia Communication Transmission Network Application Scenarios Digital Watermarking Summary References Complete Encryption Definition of Complete Encryption Classification of Complete Encryption Encryption Algorithms for Raw Data or Compressed Data Raw Data Encryption Compressed Data Encryption Typical Encryption Algorithms Permutation Random Pixel Permutation Random Line Permutation Chaotic Map-Based Permutation Random Modulation Confusion-Diffusion Algorithm Partial DES Security and Efficiency Hardware Implementation Lightweight Encryption Performance Comparison Summary References Partial Encryption Definition of Partial Encryption Data Partitioning Part Selection Classification of Partial Encryption Partial Image Encryption Raw Image Encryption Partial Image Encryption during Compression Partial Encryption in Run-Length Coding Partial Encryption in Wavelet-Based Codec Partial Encryption of the Compressed Image Partial Audio Encryption Partial Video Encryption Encryption after Compression Encryption during Compression MPEG2 Video Encryption MPEG4 AVC/H.264 Video Encryption Performance Comparison Summary References Compression-Combined Encryption Definition of Compression-Combined Encryption Secure Huffman Coding Based on Random Huffman-Tree Permutation Secure Arithmetic Coding Based on Interval Permutation Secure Coding Based on Index Encryption Secure Fixed-Length Coding (FLC) Based on Index Encryption Secure Variable-Length Coding (VLC) Based on Index Encryption Secure Coding Based on Exp-Golomb Code Secure Coding Based on Huffman Code Random Coefficient Scanning Random Scanning in Wavelet Domain Random Scanning in DCT Domain Performance Comparison Summary References Perceptual Encryption Definition of Perceptual Encryption Perceptual Encryption Based on Bit-Plane Selection Bit-Plane Encryption in the Spatial Domain Bit-Plane Encryption in the DCT Domain Bit-Plane Encryption in the Wavelet Domain Perceptual Encryption Based on Frequency Band Selection Frequency Band Encryption in a DCT Block Frequency Band Encryption in the Wavelet Domain Performance Comparison Summary References Scalable Encryption Definition of Scalable Encryption Scalable Media Coding Layered Coding Layered and Progressive Coding Progressive Coding Scalable Coding Scalable Encryption Algorithms Scalable Encryption for Layered Coding Scalable Encryption for Layered and Progressive Coding Scalable Encryption for Progressive Coding Scalable Encryption for Scalable Coding Performance Comparison Summary References Commutative Watermarking and Encryption Definition of Commutative Watermarking and Encryption CWE Based on Partial Encryption The General Architecture The Improved Scheme Selection of the Encryption Part and Watermarking Part CWE Based on Homomorphic Operations The CWE Scheme Based on XOR Operation The CWE Scheme Based on Module Addition Performance Comparison Summary References Joint Fingerprint Embedding and Decryption Definition of Joint Fingerprint Embedding and Decryption Typical JFD Schemes The JFD Scheme Based on Broadcast Encryption The JFD Scheme Based on Codeword Modification The JFD Scheme Based on Partial Decryption The JFD Scheme Based on Index Modification The JFD Scheme Based on Homomorphic Operations Performance Comparison Summary References Typical Attacks on Multimedia Encryption Security Requirement of Multimedia Encryption Cryptographic Attacks Flaws in Perceptual Security Level Encryption in Run-Level Coding Statistical Model-Based Attack on Sign Encryption Replacement Attack Replacement Attack on Bit-Plane Encryption Replacement Attack on Frequency Band Encryption Replacement Attack on Intra-Prediction Mode Encryption Summary References Some Principles for Secure Multimedia Encryption Shannon’s Information Theory of Secrecy System Principles for Secure Complete Encryption General Models of Complete Encryption Encryption Before or After Compression Example of Secure Complete Encryption Random Packet Partitioning Packet Encryption Decryption Encryption Efficiency Principles for Secure Partial Encryption Model of Partial Encryption Principles for Secure Encryption Cryptographic Security Parameter Independence Perceptual Security Summary of the Principles and Means Example Based on JPEG2000 Image Encryption Parameter Sensitivity Parameter Independence Selection of the Cipher The Partial Encryption Scheme Performance Evaluation Principles for Secure Compression-Combined Encryption Model of Compression-Combined Encryption Scheme Relation between Compression Ratio and Security Equivalent Compression-Encryption Independent Scheme Analysis on Existing Compression-Combined Encryption Schemes Tradeoff between Compression Ratio and Security The Equivalent Compression-Encryption Independent Scheme Summary References Multimedia Encryption in Typical Applications Secure Media Player Secure Media Streaming Secure Media Preview Secure Media Transcoding Secure Media Distribution Digital Rights Management References Open Issues Perceptual Security Lightweight Implementation Contradiction between Format Compliance and Upgrade Ability to Support Direct Operations Key Management Combination between Encryption and Other Means Summary




I LIBRI CHE INTERESSANO A CHI HA I TUOI GUSTI

Risc-v assembly language programming
Edge intelligent computing systems in different domains
Simulation of power electronics circuits with matlab®/simulink®



I LIBRI ACQUISTATI DA CHI HA I TUOI GUSTI

Manuale di estimo
Manuale di elettrotecnica elettronica e automazione
L'arte della gioia
Manuale di agricoltura
Manuale del geometra



Altre Informazioni

ISBN:

9781420065275

Condizione: Nuovo
Dimensioni: 9.2 x 6.1428571 in Ø 1.20 lb
Formato: Copertina rigida
Illustration Notes:137 b/w images, 30 tables, 37 halftones and 90 equations
Pagine Arabe: 224


Dicono di noi





Per noi la tua privacy è importante


Il sito utilizza cookie ed altri strumenti di tracciamento che raccolgono informazioni dal dispositivo dell’utente. Oltre ai cookie tecnici ed analitici aggregati, strettamente necessari per il funzionamento di questo sito web, previo consenso dell’utente possono essere installati cookie di profilazione e marketing e cookie dei social media. Cliccando su “Accetto tutti i cookie” saranno attivate tutte le categorie di cookie. Per accettare solo deterninate categorie di cookie, cliccare invece su “Impostazioni cookie”. Chiudendo il banner o continuando a navigare saranno installati solo cookie tecnici. Per maggiori dettagli, consultare la Cookie Policy.

Impostazioni cookie
Rifiuta Tutti i cookie
Accetto tutti i cookie
X