pickabook books with huge discounts for everyone
pickabook books with huge discounts for everyone
Visit our new collection website www.collectionsforschool.co.uk
     
Email: Subscribe to news & offers:
Need assistance? Log In/Register


Item Details
Title: MULTIMEDIA CONTENT ENCRYPTION
TECHNIQUES AND APPLICATIONS
By: Shiguo Lian
Format: Electronic book text

List price: £76.79


We believe that this item is permanently unavailable, and so we cannot source it.

ISBN 10: 1420065289
ISBN 13: 9781420065282
Publisher: TAYLOR & FRANCIS LTD
Pub. date: 11 August, 2008
Pages: 224
Synopsis: The widespread use of image, audio, and video data makes media content protection increasingly necessary and urgent. For maximum safety, it is no longer sufficient to merely control access rights. In order to fully protect multimedia data from piracy or unauthorized use, it must be secured through encryption prior to its transmission or distribution. Multimedia Content Encryption: Techniques and Applications presents the latest research results in this dynamic field. The book begins with the history of multimedia encryption and then examines general performance requirements of encryption and fundamental encrypting techniques. It discusses common techniques of complete, partial, and compression-combined encryption; as well as the more specialized forms, including perception, scalable, and commutative encryption. In addition, the author reviews watermarking and joint fingerprint embedding and decryption. Later chapters discuss typical attacks on multimedia encryption, as well as the principles for designing secure algorithms and various applications. An exploration of open issues, up-and-coming topics, and areas for further research rounds out the coverage. Shiguo Lian is the author or co-author of more than fifty peer-reviewed journal and conference articles covering topics of network security and multimedia content protection, including cryptography, secure P2P content sharing, digital rights management (DRM), encryption, watermarking, digital fingerprinting, and authentication. By following the techniques outlined in this book, users will be better able to protect the integrity of their multimedia data and develop greater confidence that their data will not be misappropriated.
Illustrations: 90 equations; 37 Halftones, black and white; 30 Tables, black and white;
Publication: UK
Imprint: Auerbach
Returns: Non-returnable
Some other items by this author:

TOP SELLERS IN THIS CATEGORY
Practical Packet Analysis, 3e (Paperback)
No Starch Press,US
Our Price : £35.03
more details
Data Driven Security (Paperback)
John Wiley & Sons Inc
Our Price : £34.19
more details
The Art of Invisibility (Paperback)
Little, Brown & Company
Our Price : £12.74
more details
Official (ISC)2 Guide to the CISSP CBK (Hardback)
Apple Academic Press Inc.
Our Price : £59.39
more details
The Art of Intrusion (Paperback)
John Wiley and Sons Ltd
Our Price : £10.22
more details
BROWSE FOR BOOKS IN RELATED CATEGORIES
 COMPUTING AND INFORMATION TECHNOLOGY
 computer communications & networking
 network security


Information provided by www.pickabook.co.uk
SHOPPING BASKET
  
Your basket is empty
  Total Items: 0
 






Early Learning
Little Worried Caterpillar (PB) Little Green knows she''s about to make a big change - transformingfrom a caterpillar into a beautiful butterfly. Everyone is VERYexcited! But Little Green is VERY worried. What if being a butterflyisn''t as brilliant as everyone says?Join Little Green as she finds her own path ... with just a littlehelp from her friends.
add to basket

Early Learning
add to basket

Picture Book
All the Things We Carry PB What can you carry?A pebble? A teddy? A bright red balloon? A painting you''ve made?A hope or a dream?This gorgeous, reassuring picture book celebrates all the preciousthings we can carry, from toys and treasures to love and hope. With comforting rhymes and fabulous illustrations, this is a warmhug of a picture book.
add to basket