Borko Furht, Darko Kirovski
Multimedia Encryption and Authentication Techniques and Applications (eBook, PDF)
59,95 €
59,95 €
inkl. MwSt.
Sofort per Download lieferbar
30 °P sammeln
59,95 €
Als Download kaufen
59,95 €
inkl. MwSt.
Sofort per Download lieferbar
30 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
59,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
30 °P sammeln
Borko Furht, Darko Kirovski
Multimedia Encryption and Authentication Techniques and Applications (eBook, PDF)
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of piracy looms as a major problem with digital distribution and storage technologies. Multimedia Encryption and Authentication Techniques and Applications covers current and future trends in the des
- Geräte: PC
- mit Kopierschutz
- eBook Hilfe
- Größe: 13.33MB
Andere Kunden interessierten sich auch für
- Darko KirovskiMultimedia Watermarking Techniques and Applications (eBook, PDF)59,95 €
- Shiguo LianMultimedia Content Encryption (eBook, PDF)115,95 €
- Harsh Kupwade PatilSecurity for Wireless Sensor Networks using Identity-Based Cryptography (eBook, PDF)47,95 €
- Emerging Security Algorithms and Techniques (eBook, PDF)52,95 €
- Emerging Technologies in Computing (eBook, PDF)49,95 €
- The Fusion of Artificial Intelligence and Soft Computing Techniques for Cybersecurity (eBook, PDF)131,95 €
- Jeff StapletonSecurity without Obscurity (eBook, PDF)45,95 €
-
-
-
Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of piracy looms as a major problem with digital distribution and storage technologies. Multimedia Encryption and Authentication Techniques and Applications covers current and future trends in the des
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis eBooks
- Seitenzahl: 408
- Erscheinungstermin: 3. Mai 2006
- Englisch
- ISBN-13: 9781420013450
- Artikelnr.: 52989464
- Verlag: Taylor & Francis eBooks
- Seitenzahl: 408
- Erscheinungstermin: 3. Mai 2006
- Englisch
- ISBN-13: 9781420013450
- Artikelnr.: 52989464
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Borko Furht is a professor and chairman of the Department of Computer Science and Engineering at Florida Atlantic University (FAU) in Boca Raton, Florida. Before joining FAU, he was a vice president of research and a senior director of development at Modcomp (Ft. Lauderdale), a computer company of Daimler Benz, Germany, and a professor at the University of Miami in Coral Gables, Florida. Professor Furht received Ph.D. degrees in electrical and computer engineering from the University of Belgrade. His current research is in multimedia systems, video coding and compression, video databases, wireless multimedia, and Internet computing. He is currently Principal Investigator and Co-PI of two multiyear, multimillion dollar projects - on Coastline Security Technologies, funded by the Department of Navy, and One Pass to Production, funded by Motorola. He is the author of numerous books and articles in the areas of multimedia, computer architecture, real-time computing, and operating systems. He is a founder and editor-in-chief of The Journal of Multimedia Tools and Applications (Kluwer Academic Publishers). He has received several technical and publishing awards, and has consulted for many high-tech companies, including IBM, Hewlett-Packard, Xerox, General Electric, JPL, NASA, Honeywell and RCA. He has also served as a consultant to various colleges and universities. He has given many invited talks, keynote lectures, seminars, and tutorials., Darko Kirovski received his Ph.D. degree in computer science from the University of California, Los Angeles, in 2001. Since April 2000, he has been a researcher at Microsoft Research. His research interests include certificates of authenticity, system security, multimedia processing, biometric identity authentication, and embedded system design and debugging. He received the 1999 Microsoft Graduate Research Fellowship, the 2000 ACM/IEEE Design Automation Conference Graduate Scholarship, the 2001 ACM Outstanding Ph.D. Dissertation Award in Electronic Design Automation, and the Best Paper Award at ACM Multimedia 2002.
Protection of Multimedia Content in Distribution Networks. Vulnerabilities
of Multimedia Protection Schemes. Fundamentals of Multimedia Encryption
Techniques. Chaos-Based Encryption for Digital Image and Video. Key
Management and Protection for IP Multimedia. Streaming Media Encryption.
Digital Media Fingerprinting: Techniques and Trends. Scalable Image and
Video Authentication. Signature-Based Media Authentication. Digital Rights
Management for Consumer Devices 311. Adult Image Filtering for Internet
Safety. Digital Rights Management Issues for Video.
of Multimedia Protection Schemes. Fundamentals of Multimedia Encryption
Techniques. Chaos-Based Encryption for Digital Image and Video. Key
Management and Protection for IP Multimedia. Streaming Media Encryption.
Digital Media Fingerprinting: Techniques and Trends. Scalable Image and
Video Authentication. Signature-Based Media Authentication. Digital Rights
Management for Consumer Devices 311. Adult Image Filtering for Internet
Safety. Digital Rights Management Issues for Video.
Protection of Multimedia Content in Distribution Networks. Vulnerabilities
of Multimedia Protection Schemes. Fundamentals of Multimedia Encryption
Techniques. Chaos-Based Encryption for Digital Image and Video. Key
Management and Protection for IP Multimedia. Streaming Media Encryption.
Digital Media Fingerprinting: Techniques and Trends. Scalable Image and
Video Authentication. Signature-Based Media Authentication. Digital Rights
Management for Consumer Devices 311. Adult Image Filtering for Internet
Safety. Digital Rights Management Issues for Video.
of Multimedia Protection Schemes. Fundamentals of Multimedia Encryption
Techniques. Chaos-Based Encryption for Digital Image and Video. Key
Management and Protection for IP Multimedia. Streaming Media Encryption.
Digital Media Fingerprinting: Techniques and Trends. Scalable Image and
Video Authentication. Signature-Based Media Authentication. Digital Rights
Management for Consumer Devices 311. Adult Image Filtering for Internet
Safety. Digital Rights Management Issues for Video.