Multimedia Security Technologies for Digital Rights Management

Edited by

  • Wenjun Zeng, Professor, University of Missouri, Columbia, MO, USA
  • Heather Yu, Huawei Technologies
  • Ching-Yung Lin, IBM T.J. Watson Research Center, Hawthorne, NY, USA

Security is a major concern in an increasingly multimedia-defined universe where the Internet serves as an indispensable resource for information and entertainment. Digital Rights Management (DRM) is the technology by which network systems protect and provide access to critical and time-sensitive copyrighted material and/or personal information. This book equips savvy technology professionals and their aspiring collegiate protégés with the latest technologies, strategies and methodologies needed to successfully thwart off those who thrive on security holes and weaknesses. Filled with sample application scenarios and algorithms, this book provides an in-depth examination of present and future field technologies including encryption, authentication, copy control, tagging, tracing, conditional access and media identification. The authors present a diversified blend of theory and practice and focus on the constantly changing developments in multimedia applications thus providing an admirably comprehensive book.
View full description

Audience

Computer software and hardware designers; multimedia engineers; industry researchers; graduate students

 

Book information

  • Published: July 2006
  • Imprint: ACADEMIC PRESS
  • ISBN: 978-1-4933-0077-8


Table of Contents

1. Introduction - digital rights management2. Digital rights management systems3. Putting digital rights management in context4. Multimedia encryption5. Multimedia authentication6. Key management for multimedia access and distribution7. An overview of digital watermarking8. Biometrics in digital rights management9. Format compliant content protection10. Secure media streaming and secure transcoding11. Scalable encryption and multi-access control for multimedia12. Broadcast encryption13. Practical "traitor tracing"14. Steganalysis15. Passive-blind image forensics16. Security in digital cinema17. Drm standard activities18. The digital millennium copyright act