IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Multimedia Encryption and Watermarking in Wireless Environment

Multimedia Encryption and Watermarking in Wireless Environment
View Sample PDF
Author(s): Shiguo Lian (France Telecom R&D Beijing, China)
Copyright: 2008
Pages: 20
Source title: Handbook of Research on Wireless Security
Source Author(s)/Editor(s): Yan Zhang (Simula Research Laboratory, Norway), Jun Zheng (City University of New York, USA) and Miao Ma (National Institute of Information & Communications Tech, Singapore)
DOI: 10.4018/978-1-59904-899-4.ch016

Purchase

View Multimedia Encryption and Watermarking in Wireless Environment on the publisher's website for pricing and purchasing information.

Abstract

In a wireless environment, multimedia transmission is often affected by the error rate; delaying; terminal’s power or bandwidth; and so forth, which brings difficulties to multimedia content protection. In the past decade, wireless multimedia protection technologies have been attracting more and more researchers. Among them, wireless multimedia encryption and watermarking are two typical topics. Wireless multimedia encryption protects multimedia content’s confidentiality in wireless networks, which emphasizes on improving the encryption efficiency and channel friendliness. Some means have been proposed, such as the format-independent encryption algorithms that are time efficient compared with traditional ciphers; the partial encryption algorithms that reduce the encrypted data volumes by leaving some information unchanged; the hardware-implemented algorithms that are more efficient than software based ones; the scalable encryption algorithms that are compliant with bandwidth changes; and the robust encryption algorithms that are compliant with error channels. Compared with wireless multimedia encryption, wireless multimedia watermarking is widely used in ownership protection, traitor tracing, content authentication, and so forth. To keep low cost, a mobile agent is used to partitioning some of the watermarking tasks. To counter transmission errors, some channel encoding methods are proposed to encode the watermark. To keep robust, some means are proposed to embed a watermark into media data of low bit rate. Based on both watermarking and encryption algorithms, some applications arise, such as secure multimedia sharing or secure multimedia distribution. In this chapter, the existing wireless multimedia encryption and watermarking algorithms are summarized according to the functionality and multimedia type; their performances are analyzed and compared; the related applications are presented; and some open issues are proposed.

Related Content

Exploring Secure Computing for the Internet of Things, Internet of Everything, Web of Things, and Hyperconnectivity
Maurice Dawson. © 2017. 12 pages.
View Details View Details PDF Full Text View Sample PDF
Internet of Things Research Challenges
Mahmoud Elkhodr, Seyed Shahrestani, Hon Cheung. © 2017. 24 pages.
View Details View Details PDF Full Text View Sample PDF
Security Solutions for Intelligent and Complex Systems
Stuart Armstrong, Roman V. Yampolskiy. © 2017. 52 pages.
View Details View Details PDF Full Text View Sample PDF
Privacy and Security
Mohamed Eltayeb. © 2017. 24 pages.
View Details View Details PDF Full Text View Sample PDF
Enhancing Cyber Security for Financial Industry through Compliance and Regulatory Standards
Derek Mohammed, Marwan Omar, Van Nguyen. © 2017. 17 pages.
View Details View Details PDF Full Text View Sample PDF
Prevention of Blackhole Attack using Certificateless Signature (CLS) Scheme in MANET
Vimal Kumar, Rakesh Kumar. © 2017. 21 pages.
View Details View Details PDF Full Text View Sample PDF
Trust Management in Cloud Computing
Vijay L. Hallappanavar, Mahantesh N. Birje. © 2017. 33 pages.
View Details View Details PDF Full Text View Sample PDF
Body Bottom