Multimedia Encryption and Authentication Techniques and Applications
List Price:
$82.99
- Availability: Confirm prior to ordering
- Branding: minimum 50 pieces (add’l costs below)
- Check Freight Rates (branded products only)
Branding Options (v), Availability & Lead Times
- 1-Color Imprint: $2.00 ea.
- Promo-Page Insert: $2.50 ea. (full-color printed, single-sided page)
- Belly-Band Wrap: $2.50 ea. (full-color printed)
- Set-Up Charge: $45 per decoration
- Availability: Product availability changes daily, so please confirm your quantity is available prior to placing an order.
- Branded Products: allow 10 business days from proof approval for production. Branding options may be limited or unavailable based on product design or cover artwork.
- Unbranded Products: allow 3-5 business days for shipping. All Unbranded items receive FREE ground shipping in the US. Inquire for international shipping.
- RETURNS/CANCELLATIONS: All orders, branded or unbranded, are NON-CANCELLABLE and NON-RETURNABLE once a purchase order has been received.
Product Details
Author:
Borko Furht, Darko Kirovski
Format:
Paperback
Pages:
408
Publisher:
CRC Press (November 26, 2019)
Language:
English
ISBN-13:
9780367453633
Weight:
16oz
Dimensions:
6.125" x 9.1875"
File:
TAYLORFRANCIS-TayFran_260406043133783-20260406.xml
Folder:
TAYLORFRANCIS
List Price:
$82.99
Series:
Internet and Communications
As low as:
$78.84
Publisher Identifier:
P-CRC
Discount Code:
H
Audience:
Professional and scholarly
Country of Origin:
United States
Pub Discount:
30
Imprint:
Auerbach Publications
Case Pack:
1
Overview
Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of piracy looms as a major problem with digital distribution and storage technologies.
Multimedia Encryption and Authentication Techniques and Applications covers current and future trends in the design of modern systems that use encryption and authentication to protect multimedia content. Containing the works of contributing authors who are worldwide experts in their fields, this volume is intended for researchers and practitioners, as well as for those who want a broad understanding of multimedia security. In the wake of the explosive growth of digital entertainment and Internet applications, this book is a definitive resource for scientists, researchers, programmers, engineers, business managers, entrepreneurs, and investors.
Features
Describes and evaluates the state of the art in multimedia encryption and authentication techniques and related technologies, architectures, standards, and applications
Includes advanced topics, such as chaotic encryption techniques for digital images and video, as well as streaming media encryption
Focuses on digital rights management issues for video and for consumer devices
Covers key management and protection for IP multimedia, digital media fingerprinting, and signature-based media authentication
Multimedia Encryption and Authentication Techniques and Applications covers current and future trends in the design of modern systems that use encryption and authentication to protect multimedia content. Containing the works of contributing authors who are worldwide experts in their fields, this volume is intended for researchers and practitioners, as well as for those who want a broad understanding of multimedia security. In the wake of the explosive growth of digital entertainment and Internet applications, this book is a definitive resource for scientists, researchers, programmers, engineers, business managers, entrepreneurs, and investors.
Features








