[go: up one dir, main page]

Ridzoň et al., 2009 - Google Patents

Multimedia security and multimedia content protection

Ridzoň et al., 2009

Document ID
13375826607070461841
Author
Ridzoň R
Levický D
Publication year
Publication venue
2009 International Symposium ELMAR

External Links

Snippet

The concept of the digital rights management architecture for multimedia will be presented in this paper. The DRM architecture involves three subjects that are multimedia content creators, multimedia content owners and clients. From point of view multimedia transmission …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communication the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks

Similar Documents

Publication Publication Date Title
US10461930B2 (en) Utilizing data reduction in steganographic and cryptographic systems
US7123718B1 (en) Utilizing data reduction in stegnographic and cryptographic systems
US7127615B2 (en) Security based on subliminal and supraliminal channels for data objects
CN101884195B (en) Cryptographic processing of content
US20020150239A1 (en) Method for personalized encryption in an un-trusted environment
Kavitha et al. Steganography using least significant bit algorithm
Abdel-Nabi et al. Medical imaging security using partial encryption and histogram shifting watermarking
Ridzoň et al. Content protection in grayscale and color images based on robust digital watermarking
Ridzoň et al. Multimedia security and multimedia content protection
JP2000184173A (en) Image processing method, apparatus, image distribution method, system, and computer-readable storage medium
Katzenbeisser et al. Malicious attacks on media authentication schemes based on invertible watermarks
Arsenova Technical aspects of digital rights management
Lim Data security and protection for medical images
Singh Digital image steganography
Rao et al. A novel information security scheme using cryptic steganography
Khairani et al. The Implementation Of Discrete Cosine Transform (DCT) And Blowfish Methods In Digital Video Security
Sherekar et al. Critical Review of Perceptual Models for Data Authentication
Avishek et al. Understanding Multimedia Security
Yuliani et al. Implementation of advanced encryption standard for file security in stego-object
Mukherjee et al. A novel technique for copyright protection of images using hybrid encryption model
Jae-Woo A Policy of Copyright Protection Using Authentication Key Based on Digital Watermarking
Myint et al. DCT Based Digital Image Watermarking System
Kaur et al. DIGITAL IMAGE WATERMARKING AND STEGNOGRAPHY
Pillai et al. Image assisted data security using key encrypted file
Otair Security in Digital Images