IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Multimedia Encryption and Watermarking in Wireless Environment

Multimedia Encryption and Watermarking in Wireless Environment
View Sample PDF
Author(s): Shiguo Lian (France Telecom R&D Beijing, China)
Copyright: 2008
Pages: 20
Source title: Handbook of Research on Wireless Security
Source Author(s)/Editor(s): Yan Zhang (Simula Research Laboratory, Norway), Jun Zheng (City University of New York, USA) and Miao Ma (National Institute of Information & Communications Tech, Singapore)
DOI: 10.4018/978-1-59904-899-4.ch016

Purchase

View Multimedia Encryption and Watermarking in Wireless Environment on the publisher's website for pricing and purchasing information.

Abstract

In a wireless environment, multimedia transmission is often affected by the error rate; delaying; terminal’s power or bandwidth; and so forth, which brings difficulties to multimedia content protection. In the past decade, wireless multimedia protection technologies have been attracting more and more researchers. Among them, wireless multimedia encryption and watermarking are two typical topics. Wireless multimedia encryption protects multimedia content’s confidentiality in wireless networks, which emphasizes on improving the encryption efficiency and channel friendliness. Some means have been proposed, such as the format-independent encryption algorithms that are time efficient compared with traditional ciphers; the partial encryption algorithms that reduce the encrypted data volumes by leaving some information unchanged; the hardware-implemented algorithms that are more efficient than software based ones; the scalable encryption algorithms that are compliant with bandwidth changes; and the robust encryption algorithms that are compliant with error channels. Compared with wireless multimedia encryption, wireless multimedia watermarking is widely used in ownership protection, traitor tracing, content authentication, and so forth. To keep low cost, a mobile agent is used to partitioning some of the watermarking tasks. To counter transmission errors, some channel encoding methods are proposed to encode the watermark. To keep robust, some means are proposed to embed a watermark into media data of low bit rate. Based on both watermarking and encryption algorithms, some applications arise, such as secure multimedia sharing or secure multimedia distribution. In this chapter, the existing wireless multimedia encryption and watermarking algorithms are summarized according to the functionality and multimedia type; their performances are analyzed and compared; the related applications are presented; and some open issues are proposed.

Related Content

Modeling Processes and Outcomes From Cybersecurity Talent Gaps in Global Labor Markets
Shalin Hai-Jew. © 2019. 18 pages.
View Details View Details PDF Full Text View Sample PDF
The Business Transformation Framework and Enterprise Architecture Framework for Managers in Business Innovation: The Role of Cyber and Information Technology Security in Automated Business Environments
Antoine Trad, Damir Kalpić. © 2019. 19 pages.
View Details View Details PDF Full Text View Sample PDF
Cyber Risk Management in Banks: Cyber Risk Insurance
İsmail Yıldırım. © 2019. 13 pages.
View Details View Details PDF Full Text View Sample PDF
Access Control Challenges in Enterprise Ecosystems: Blockchain-Based Technologies as an Opportunity for Enhanced Access Control
Hugo Santos Martins, Sérgio Luís Guerreiro. © 2019. 26 pages.
View Details View Details PDF Full Text View Sample PDF
Developing the Social, Political, Economic, and Criminological Awareness of Cybersecurity Experts: A Proposal and Discussion of Non-Technical Topics for Inclusion in Cybersecurity Education
Marcus Leaning, Udo Richard Averweg. © 2019. 17 pages.
View Details View Details PDF Full Text View Sample PDF
Cyber Security Competency Model Based on Learning Theories and Learning Continuum Hierarchy
Winfred Yaokumah. © 2019. 17 pages.
View Details View Details PDF Full Text View Sample PDF
How Can a Cybersecurity Student Become a Cybersecurity Professional and Succeed in a Cybersecurity Career?
Sandra Blanke, Paul Christian Nielsen, Brian Wrozek. © 2019. 18 pages.
View Details View Details PDF Full Text View Sample PDF
Body Bottom