Securing Digital Video Techniques for DRM and Content Protection /

Content protection and digital rights management (DRM) are fields that receive a lot of attention: content owners require systems that protect and maximize their revenues; consumers want backwards compatibility, while they fear that content owners will spy on their viewing habits; and academics are...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριος συγγραφέας: Diehl, Eric (Συγγραφέας)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2012.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 03787nam a22005175i 4500
001 978-3-642-17345-5
003 DE-He213
005 20151125193118.0
007 cr nn 008mamaa
008 120625s2012 gw | s |||| 0|eng d
020 |a 9783642173455  |9 978-3-642-17345-5 
024 7 |a 10.1007/978-3-642-17345-5  |2 doi 
040 |d GrThAP 
050 4 |a QA76.9.D35 
072 7 |a UMB  |2 bicssc 
072 7 |a URY  |2 bicssc 
072 7 |a COM031000  |2 bisacsh 
082 0 4 |a 005.74  |2 23 
100 1 |a Diehl, Eric.  |e author. 
245 1 0 |a Securing Digital Video  |h [electronic resource] :  |b Techniques for DRM and Content Protection /  |c by Eric Diehl. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2012. 
300 |a X, 266 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Introduction -- Why Protect Video? -- A Toolbox -- A Useful Model -- Current Video Ecosystems -- Protecting Broadcasts -- Protecting IP -- Protecting Prerecorded and Recordable Media -- Next Frontier – Interoperability -- Some Trends and Challenges -- Conclusions. 
520 |a Content protection and digital rights management (DRM) are fields that receive a lot of attention: content owners require systems that protect and maximize their revenues; consumers want backwards compatibility, while they fear that content owners will spy on their viewing habits; and academics are afraid that DRM may be a barrier to knowledge sharing. DRM technologies have a poor reputation and are not yet trusted.  This book describes the key aspects of content protection and DRM systems, the objective being to demystify the technology and techniques. In the first part of the book, the author builds the foundations, with sections that cover the rationale for protecting digital video content; video piracy; current toolboxes that employ cryptography, watermarking, tamper resistance, and rights expression languages; different ways to model video content protection; and DRM. In the second part, he describes the main existing deployed solutions, including video ecosystems; how video is protected in broadcasting; descriptions of DRM systems, such as Microsoft's DRM and Apple’s FairPlay; techniques for protecting prerecorded content distributed using DVDs or Blu-ray; and future methods used to protect content within the home network. The final part of the book looks towards future research topics, and the key problem of interoperability.  While the book focuses on protecting video content, the DRM principles and technologies described are also used to protect many other types of content, such as ebooks, documents and games. The book will be of value to industrial researchers and engineers developing related technologies, academics and students in information security, cryptography and media systems, and engaged consumers. 
650 0 |a Computer science. 
650 0 |a Data structures (Computer science). 
650 0 |a Multimedia information systems. 
650 0 |a Management information systems. 
650 0 |a E-commerce. 
650 0 |a Electronic circuits. 
650 1 4 |a Computer Science. 
650 2 4 |a Data Structures, Cryptology and Information Theory. 
650 2 4 |a Circuits and Systems. 
650 2 4 |a Multimedia Information Systems. 
650 2 4 |a e-Commerce/e-business. 
650 2 4 |a Management of Computing and Information Systems. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783642173448 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-17345-5  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
950 |a Computer Science (Springer-11645)