Details

Image and Video Encryption


Image and Video Encryption

From Digital Rights Management to Secured Personal Communication
Advances in Information Security, Band 15

von: Andreas Uhl, Andreas Pommer

96,29 €

Verlag: Springer
Format: PDF
Veröffentl.: 28.12.2005
ISBN/EAN: 9780387234038
Sprache: englisch
Anzahl Seiten: 161

Dieses eBook enthält ein Wasserzeichen.

Beschreibungen

<P><STRONG>Image and Video Encryption</STRONG> provides a unified overview&nbsp;of techniques for encryption of images and video data. This ranges from commercial applications like DVD or DVB to more research oriented topics and recently published material. This volume introduces different techniques from unified viewpoint, then evaluates these techniques with respect to their respective properties (e.g., security, speed.....).</P>
<P>The authors experimentally compare different approaches proposed in the literature and include an extensive bibliography of corresponding published material.</P>
Visual Data Formats.- Cryptography Primer.- Application Scenarios for the Encryption of Visual Data.- Image and Video Encryption.- Conclusions.
<P>Image and Video Encryption provides a unified overview&nbsp;of techniques for encryption of images and video data. This ranges from commercial applications like DVD or DVB to more research oriented topics and recently published material. This volume introduces different techniques from unified viewpoint, then evaluates these techniques with respect to their respective properties (e.g., security, speed.....).&nbsp; </P>
<P></P>
<P>Encryption of visual data is an important topic in the area of mutimedia security, applications range from digital rights management (DVD, DVB) ) to secure personal communications.&nbsp; Within this topic area, we face several aims which contradict each other.&nbsp; What we thrive on is&nbsp;good compression, fast compression, high security, fast encryption, bitstream compliance, little power consumption and little memory requirements.&nbsp; </P>
<P></P>
<P>The authors experimentally compare different approaches proposed in the literature and include an extensive bibliography of corresponding published material.</P>
<P>&nbsp;</P>
<P>Image and Video Encryption is designed for&nbsp;a professional audience&nbsp;composed of researchers and practitioners&nbsp;in industry.&nbsp;&nbsp;&nbsp;The&nbsp; book is also suitable for graduate-level students in&nbsp;computer&nbsp;science&nbsp;and electrical engineering.</P>
Provides a unified overview of techniques for encryption of images and video data. This ranges from commercial applications like DVD or DVB to more research oriented topics and recently published material Introduces different techniques from unified viewpoint, then evaluates these techniques with respect to their respective properties (e.g., security, speed.....) Encryption of visual data is an important topic in the area of mutimedia security, applications range from digital rights management (DVD, DVB) ) to secure personal communications. Within this topic area, we face several aims which contradict each other. What we thrive on is good compression, fast compression, high security, fast encryption, bitstream compliance, little power consumption and little memory requirements The authors experimentally compare different approaches proposed in the literature and include an extensive bibliography of corresponding published material Includes supplementary material: sn.pub/extras
<P>Encryption of visual data is an important topic in the area of mutimedia security, applications range from digital rights management to secure personal communications. This volume provides a unified overview of techniques for encryption of images and video data. This ranges from commercial applications like DVD or DVB to more research oriented topics and recently published material. This volume introduces different techniques from unified viewpoint, then evaluates these techniques with respect to their respective properties, such as security and speed. The authors experimentally compare different approaches proposed in the literature and include an extensive bibliography of corresponding published material.</P>