Multimedia Encryption and Authentication Techniques and Applications (PDF)
(Sprache: Englisch)
Multimedia Encryption and Authentication Techniques and Applications provides a comprehensive reference on advanced topics in the field. This book addresses a variety of issues related to the protection of digital media content, including audio, image, and...
sofort als Download lieferbar
eBook (pdf)
65.30 €
- Lastschrift, Kreditkarte, Paypal, Rechnung
- Kostenloser tolino webreader
Produktdetails
Produktinformationen zu „Multimedia Encryption and Authentication Techniques and Applications (PDF)“
Multimedia Encryption and Authentication Techniques and Applications provides a comprehensive reference on advanced topics in the field. This book addresses a variety of issues related to the protection of digital media content, including audio, image, and video protection. It presents state-of-the-art multimedia security technologies such as protection architectures, multimedia encryption, watermarking, fingerprinting, authentication techniques, and applications. With contributions from leading experts, this text also covers fundamental concepts in multimedia content, current and future trends in multimedia security, lossless data hiding, applications of media protection schemes, as well as digital rights management.
Autoren-Porträt von Borko Furht, Darko Kirovski
Borko Furht is a professor and chairman of the Department of Computer Science and Engineering at Florida Atlantic University (FAU) in Boca Raton, Florida. Before joining FAU, he was a vice president of research and a senior director of development at Modcomp (Ft. Lauderdale), a computer company of Daimler Benz, Germany, and a professor at the University of Miami in Coral Gables, Florida. Professor Furht received Ph.D. degrees in electrical and computer engineering from the University of Belgrade. His current research is in multimedia systems, video coding and compression, video databases, wireless multimedia, and Internet computing. He is currently Principal Investigator and Co-PI of two multiyear, multimillion dollar projects - on Coastline Security Technologies, funded by the Department of Navy, and One Pass to Production, funded by Motorola. He is the author of numerous books and articles in the areas of multimedia, computer architecture, real-time computing, and operating systems. He is a founder and editor-in-chief of The Journal of Multimedia Tools and Applications (Kluwer Academic Publishers). He has received several technical and publishing awards, and has consulted for many high-tech companies, including IBM, Hewlett-Packard, Xerox, General Electric, JPL, NASA, Honeywell and RCA. He has also served as a consultant to various colleges and universities. He has given many invited talks, keynote lectures, seminars, and tutorials., Darko Kirovski received his Ph.D. degree in computer science from the University of California, Los Angeles, in 2001. Since April 2000, he has been a researcher at Microsoft Research. His research interests include certificates of authenticity, system security, multimedia processing, biometric identity authentication, and embedded system design and debugging. He received the 1999 Microsoft Graduate Research Fellowship, the 2000 ACM/IEEE Design Automation Conference Graduate Scholarship, the 2001 ACM Outstanding Ph.D. Dissertation
... mehr
Award in Electronic Design Automation, and the Best Paper Award at ACM Multimedia 2002.
... weniger
Bibliographische Angaben
- Autoren: Borko Furht , Darko Kirovski
- 2006, 408 Seiten, Englisch
- Verlag: Taylor & Francis
- ISBN-10: 1420013459
- ISBN-13: 9781420013450
- Erscheinungsdatum: 03.05.2006
Abhängig von Bildschirmgröße und eingestellter Schriftgröße kann die Seitenzahl auf Ihrem Lesegerät variieren.
eBook Informationen
- Dateiformat: PDF
- Größe: 13 MB
- Mit Kopierschutz
- Vorlesefunktion
Sprache:
Englisch
Kopierschutz
Dieses eBook können Sie uneingeschränkt auf allen Geräten der tolino Familie lesen. Zum Lesen auf sonstigen eReadern und am PC benötigen Sie eine Adobe ID.
Kommentar zu "Multimedia Encryption and Authentication Techniques and Applications"
Schreiben Sie einen Kommentar zu "Multimedia Encryption and Authentication Techniques and Applications".
Kommentar verfassen