Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 518 trang
THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng
Số trang
518
Dung lượng
3,01 MB
Nội dung
[...]... technical reference book on DRM for researchers, system engineers and algorithm developers Content and Organization MultimediaSecurityTechnologiesforDigitalRightsManagement is one continuous book that has been harmonized to provide the audience with a comprehensive coverage of the fundamentals and the latest development of multimediasecuritytechnologies targeted for the DRM applications It also... solutions For this reason, any resource on DigitalRightsManagement (DRM) should include appropriate context While other chapters of this book focus on technology topics and the development of the burgeoning market for DRM products and services, 3 4 Chapter 1: INTRODUCTION DIGITALRIGHTSMANAGEMENT this chapter covers a number of topics identifying the importance of rightsmanagement technologies. .. OVERVIEW CHAPTER 1 Introduction DigitalRightsManagement (Scott Moskowitz) CHAPTER 2 DigitalRightsManagement Systems (Marina Bosi, MPEG LA, LLC) CHAPTER 3 Putting Digital Rights Management in Context (Leonardo Chiariglione, Digital Media Strategist) This page intentionally left blank 1 Introduction Digital Rights Management Scott Moskowitz 1.1 PROPERTY AND VALUE Real property is familiar to most people... infrastructure The market for DRM products and services is burgeoning and the search for the balance has been on-going Target Audience While DRM has been in the spotlight in recent years, there had not been a single book that addresses all aspects of DRM In particular, no book had provided a comprehensive coverage of the technical aspect of DRM MultimediaSecurityTechnologiesforDigital Rights Management is... Chapter 18 provides an in-depth discussion and analysis of the Digital Millennium Copyright Act and its social and technological implications With the above introduction, we hope you enjoy reading MultimediaSecurityTechnologiesforDigital Rights Management We learned a great deal putting this book together We thank all the contributors for their enthusiasm and hard work that make the timely publication... authentication, and highlights its characteristics as pertained to its application to the digitalrightsmanagement problem Chapter 9 analyzes the security requirements and architectures formultimedia distribution and introduces the general concept of format-compliant content protection to address both content adaptation and end-to-end security Chapter 10 addresses secure scalable streaming and secure transcoding,... PREFACE The explosive combination of digital signal processing, computing devices and digital networks have enabled pervasive digital media distribution that allows flexible and cost-effective multimedia commerce transactions The digital nature of information also allows individuals to access, duplicate or manipulate information beyond the terms and conditions agreed upon For instance, widespread piracy... the music information with some other independent or unrelated information Any such “associated information” may be different for every listening experience, every time for every individual listener We would call this associated information “value added” or “rich” because it can be associated, with other independent information that may have no relationship with the primary communicated information which... potential implications of the recently enacted Digital Millennium Copyright Act in light of the arrest of the Russian programmer who circumvented Adobe Systems’ eBook Reader DRM, this book is for you In particular, this book can be used by graduate or senior undergraduate students who are starting to research in the field of multimediasecurity and digital rights management It also serves perfectly as a comprehensive... Steganalysis, information forensics and security Dr K.P Subbalakshmi is an Assistant Professor at the Electrical and Computer Engineering department at Stevens Institute of Technology, where she co-founded and co-directs the Multimedia Systems, Networking and Communications (MSyNC) Laboratory Her research interests lie in the areas of: Information and Network Security, Wireless and Multimedia Networking . intentionally left blank MULTIMEDIA SECURITY TECHNOLOGIES FOR DIGITAL RIGHTS MANAGEMENT This page intentionally left blank MULTIMEDIA SECURITY TECHNOLOGIES FOR DIGITAL RIGHTS MANAGEMENT Edited by Wenjun. Overview 1 Chapter 1 Introduction Digital Rights Management 3 Scott Moskowitz Chapter 2 Digital Rights Management Systems 23 Marina Bosi Chapter 3 Putting Digital Rights Management in Context 51 Leonardo. “Obtaining Permissions.” Library of Congress Cataloging-in-Publication Data Multimedia security technologies for digital rights management/ edited by Wenjun Zeng, Heather Yu, and Ching-Yung Lin. p. cm. Includes