Cover image for Multimedia Security Technologies for Digital Rights Management.
Multimedia Security Technologies for Digital Rights Management.
Title:
Multimedia Security Technologies for Digital Rights Management.
Author:
Zeng, Wenjun.
ISBN:
9780080463896
Personal Author:
Edition:
1st ed.
Physical Description:
1 online resource (520 pages)
Contents:
Front Cover -- MULTIMEDIA SECURITY TECHNOLOGIES FOR DIGITAL RIGHTS MANAGEMENT -- Copyright Page -- Table of Contents -- ABOUT THE EDITORS -- ABOUT THE CONTRIBUTORS -- PREFACE -- Part A - OVERVIEW -- Chapter 1 - Introduction-Digital Rights Management -- 1.1 PROPERTY AND VALUE -- 1.2 "ORIGINALWORK" -- 1.3 LOOKING BACK AT THE COPYRIGHT ACT OF 1976 -- 1.4 COMMUNICATION THEORY-WHO SCREAMS LOUDEST? -- 1.5 CRYPTOGRAPHY-MUCH TO DO -- 1.6 DIGITAL RIGHTS MANAGEMENT-WRAPPING AND EMBEDDING -- 1.7 NOW, THE FUTURE -- ACKNOWLEDGMENTS -- REFERENCES -- Chapter 2 - Digital Rights Management Systems -- 2.1 INTRODUCTION-WHAT IS DIGITAL RIGHTS MANAGEMENT? -- 2.2 THE BASIC STRUCTURE OF A DRM SYSTEM -- 2.3 EXAMPLE: THE DVD CONTENT SCRAMBLING SYSTEM -- 2.4 EXAMPLE: THE OMA DRM -- 2.5 THE MPEG LA® DRM REFERENCE MODEL -- 2.6 MAPPING AN APPLICATION ONTO THE MPEG LA® DRM RM -- 2.7 CONCLUSION -- REFERENCES -- Chapter 3 - Putting Digital Rights Management In Context -- 3.1 INTRODUCTION -- 3.2 VALUE-CHAINS -- 3.3 DIGITAL TECHNOLOGIES -- 3.4 WORKING WITH DIGITAL MEDIA -- 3.5 DIGITAL RIGHTS MANAGEMENT -- 3.6 MAKING DRM INTEROPERABLE -- 3.7 THE DMP RESULTS SO FAR -- 3.8 THE DMP SPECIFICATIONS PHASE I -- 3.9 BEYOND TECHNICAL SPECIFICATIONS -- 3.10 ADAPTING TO THE NEW ENVIRONMENT -- 3.11 INTEROPERABLE DRM PLATFORM, PHASE II -- 3.12 CONCLUSION -- REFERENCES -- Part B - FUNDAMENTALS OF MULTIMEDIA SECURITY -- Chapter 4 - Multimedia Encryption -- 4.1 INTRODUCTION -- 4.2 FUNDAMENTALS OF MODERN ENCRYPTION -- 4.3 THE MULTIMEDIA ENCRYPTION PARADIGM -- 4.4 MULTIMEDIA ENCRYPTION SCHEMES -- 4.5 CONCLUSION -- REFERENCES -- Chapter 5 - Multimedia Authentication -- 5.1 INTRODUCTION -- 5.2 IMAGE AUTHENTICATION -- 5.3 VIDEO AUTHENTICATION -- 5.4 AUDIO AUTHENTICATION -- 5.5 SUMMARY -- REFERENCES -- Chapter 6 - Key Management for Multimedia Access and Distribution -- 6.1 INTRODUCTION.

6.2 SECURITY OF MULTIMEDIA IN DISTRIBUTION -- 6.3 SUMMARY OF CA, DRM, AND CP SYSTEMS -- REFERENCES -- Chapter 7 An Overview of Digital Watermarking -- 7.1 INTRODUCTION -- 7.2 CLASSIFICATION OFWATERMARKING SCHEMES -- 7.3 TOOLS AND MATHEMATICAL BACKGROUND -- 7.4 DATA HIDING WITH SIDE INFORMATION -- 7.5 QUANTIZATION-BASED DATA HIDING -- 7.6 LOSSLESSWATERMARKING -- 7.7 FREQUENCY DOMAINWATERMARKING -- 7.8 SECURITY AND ROBUSTNESS -- 7.9 SUMMARY -- REFERENCES -- Chapter 8 - Biometrics in Digital Rights Management -- 8.1 INTRODUCTION -- 8.2 BIOMETRICS -- 8.3 INTEGRATING BIOMETRICS WITH DRM SYSTEMS -- 8.4 CONCLUSION -- REFERENCES -- Part C - ADVANCED TOPICS -- Chapter 9 - Format-Compliant Content Protection -- 9.1 INTRODUCTION -- 9.2 SECURITY ARCHITECTURES FOR CONTENT PROTECTION -- 9.3 RATIONALES FOR FORMAT-COMPLIANT CONTENT PROTECTION -- 9.4 FORMAT-COMPLIANT CONTENT ENCRYPTION -- 9.5 FORMAT-AGNOSTIC CONTENT PROTECTION -- 9.6 SEMI-FORMAT-COMPLIANT CONTENT PROTECTION -- 9.7 CONCLUSION -- REFERENCES -- Chapter 10 - Secure Media Streaming and Secure Transcoding -- 10.1 INTRODUCTION -- 10.2 SECURE STREAMING AND SECURE TRANSCODING FOR SCALABLE CODERS -- 10.3 SECURE STREAMING AND ADAPTATION FOR NON-SCALABLE CODERS -- 10.4 SECURE MEDIA SYSTEMS -- 10.5 SUMMARY -- REFERENCES -- Chapter 11 - Scalable Encryption and Multi- Access Control for Multimedia -- 11.1 INTRODUCTION -- 11.2 SCALABLE CODING -- 11.3 SCALABLE ENCRYPTION -- 11.4 MULTI-ACCESS ENCRYPTION AND KEY SCHEMES -- 11.5 CONCLUSION -- REFERENCES -- Chapter 12 - Broadcast Encryption -- 12.1 INTRODUCTION -- 12.2 PUBLIC KEY CRYPTOGRAPHY VERSUS BROADCAST ENCRYPTION -- 12.3 A TUTORIAL EXAMPLE -- 12.4 SOME PRACTICAL SYSTEMS -- 12.5 SOME EXTENSIONS TO BROADCAST ENCRYPTION -- 12.6 CONCLUSION -- REFERENCES -- Chapter 13 - Practical "Traitor Tracing" -- 13.1 INTRODUCTION -- 13.2 PROBLEM: OVERHEAD.

13.3 PROBLEM: INEFFICIENT TRACING -- 13.4 PROBLEM: REDUCE THE NUMBER OF KEYS STORED IN THE DEVICE -- 13.5 PROBLEM: LACK OF FLEXIBILITY -- 13.6 PROBLEM: TRACING TO MODELS INSTEAD OF TO INDIVIDUAL DEVICES -- 13.7 PROBLEM: EVIL MANUFACTURERS -- 13.8 PROBLEM: WHAT TO DO AFTER YOU TRACE -- 13.9 PROBLEM: WHEN TO APPLY THE TRACING TECHNOLOGY -- 13.10 CONCLUSION -- REFERENCES -- Chapter 14 - Steganalysis -- 14.1 BASIC CONCEPTS -- 14.2 STEGANOGRAPHY-HISTORICAL PERSPECTIVE -- 14.3 TARGETED STEGANALYSIS -- 14.4 BLIND STEGANALYSIS -- 14.5 THE FUTURE -- REFERENCES -- Chapter 15 - Passive-blind Image Forensics -- 15.1 INTRODUCTION -- 15.2 OVERVIEW OF PBIF -- 15.3 FORGERY DETECTION AND SOURCE IDENTIFICATION -- 15.4 CHALLENGES AND RESOURCES FOR PBIF -- 15.5 SUMMARY AND CONCLUSION -- 15.6 FORGERY CREATION TECHNIQUES -- REFERENCES -- Chapter 16 - Security in Digital Cinema -- 16.1 INTRODUCTION -- 16.2 DIGITAL CINEMA STANDARDIZATION EFFORTS -- 16.3 GOALS OF THE DIGITAL CINEMA SECURITY SYSTEM -- 16.4 TOOLS OF DIGITAL CINEMA CONTENT SECURITY -- 16.5 DCI DIGITAL CINEMA SPECIFICATION -- 16.6 SUMMARY -- REFERENCES -- Part D - STANDARDS AND LEGAL ISSUES -- Chapter 17 - DRM Standard Activities -- 17.1 INTRODUCTION -- 17.2 MPEG -- 17.3 OMA -- 17.4 CORAL -- 17.5 DMP -- 17.6 ISMA -- 17.7 AACS -- 17.8 LIST OF DRM STANDARD ORGANIZATIONS AND CONSORTIUMS -- REFERENCES -- Chapter 18 - The Digital Millennium Copyright Act -- 18.1 DIGITAL MEDIA AND SIX-TOED CATS -- 18.2 SPECIAL INTEREST GROUPS, A TREATY, AND THE DIGITAL MILLENNIUM COPYRIGHT ACT IS BORN -- 18.3 THE DIGITAL MILLENNIUM COPYRIGHT ACT IN A NUTSHELL -- 18.4 CIRCUMVENTING A TECHNOLOGICAL MEASURE-A DMCA VIOLATION OF THE FIRST KIND -- 18.5 OVERSEEING THE PROCESS SHALL BE TWO COMPETING GOVERNMENT AGENCIES -- 18.6 LOOPHOLES ONLY A LAWYER COULD LOVE -- 18.7 A COLLECTION OF SAFETY VALVES.

18.8 A CHILLING EFFECT UPON REVERSE ENGINEERING -- 18.9 REMOVING COPYRIGHT MANAGEMENT INFORMATION-A DMCA VIOLATION OF THE SECOND KIND -- 18.10 MORE LOOPHOLES -- 18.11 CONCLUSION-THE SIX-TOED CATS ARE PROBABLY WINNING -- INDEX.
Abstract:
Security is a major concern in an increasingly multimedia-defined universe where the Internet serves as an indispensable resource for information and entertainment. Digital Rights Management (DRM) is the technology by which network systems protect and provide access to critical and time-sensitive copyrighted material and/or personal information. This book equips savvy technology professionals and their aspiring collegiate protégés with the latest technologies, strategies and methodologies needed to successfully thwart off those who thrive on security holes and weaknesses. Filled with sample application scenarios and algorithms, this book provides an in-depth examination of present and future field technologies including encryption, authentication, copy control, tagging, tracing, conditional access and media identification. The authors present a diversified blend of theory and practice and focus on the constantly changing developments in multimedia applications thus providing an admirably comprehensive book. * Discusses state-of-the-art multimedia authentication and fingerprinting techniques * Presents several practical methodologies from industry, including broadcast encryption, digital media forensics and 3D mesh watermarking * Focuses on the need for security in multimedia applications found on computer networks, cell phones and emerging mobile computing devices.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: