Ridzoň et al., 2009 - Google Patents
Multimedia security and multimedia content protectionRidzoň et al., 2009
- Document ID
- 13375826607070461841
- Author
- Ridzoň R
- Levický D
- Publication year
- Publication venue
- 2009 International Symposium ELMAR
External Links
Snippet
The concept of the digital rights management architecture for multimedia will be presented in this paper. The DRM architecture involves three subjects that are multimedia content creators, multimedia content owners and clients. From point of view multimedia transmission …
- 230000005540 biological transmission 0 abstract description 17
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10461930B2 (en) | Utilizing data reduction in steganographic and cryptographic systems | |
US7123718B1 (en) | Utilizing data reduction in stegnographic and cryptographic systems | |
US7127615B2 (en) | Security based on subliminal and supraliminal channels for data objects | |
CN101884195B (en) | Cryptographic processing of content | |
US20020150239A1 (en) | Method for personalized encryption in an un-trusted environment | |
Kavitha et al. | Steganography using least significant bit algorithm | |
Abdel-Nabi et al. | Medical imaging security using partial encryption and histogram shifting watermarking | |
Ridzoň et al. | Content protection in grayscale and color images based on robust digital watermarking | |
Ridzoň et al. | Multimedia security and multimedia content protection | |
JP2000184173A (en) | Image processing method, apparatus, image distribution method, system, and computer-readable storage medium | |
Katzenbeisser et al. | Malicious attacks on media authentication schemes based on invertible watermarks | |
Arsenova | Technical aspects of digital rights management | |
Lim | Data security and protection for medical images | |
Singh | Digital image steganography | |
Rao et al. | A novel information security scheme using cryptic steganography | |
Khairani et al. | The Implementation Of Discrete Cosine Transform (DCT) And Blowfish Methods In Digital Video Security | |
Sherekar et al. | Critical Review of Perceptual Models for Data Authentication | |
Avishek et al. | Understanding Multimedia Security | |
Yuliani et al. | Implementation of advanced encryption standard for file security in stego-object | |
Mukherjee et al. | A novel technique for copyright protection of images using hybrid encryption model | |
Jae-Woo | A Policy of Copyright Protection Using Authentication Key Based on Digital Watermarking | |
Myint et al. | DCT Based Digital Image Watermarking System | |
Kaur et al. | DIGITAL IMAGE WATERMARKING AND STEGNOGRAPHY | |
Pillai et al. | Image assisted data security using key encrypted file | |
Otair | Security in Digital Images |