The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Multimedia Encryption and Watermarking in Wireless Environment
|
Author(s): Shiguo Lian (France Telecom R&D Beijing, China)
Copyright: 2008
Pages: 20
Source title:
Handbook of Research on Wireless Security
Source Author(s)/Editor(s): Yan Zhang (Simula Research Laboratory, Norway), Jun Zheng (City University of New York, USA) and Miao Ma (National Institute of Information & Communications Tech, Singapore)
DOI: 10.4018/978-1-59904-899-4.ch016
Purchase
|
Abstract
In a wireless environment, multimedia transmission is often affected by the error rate; delaying; terminal’s power or bandwidth; and so forth, which brings difficulties to multimedia content protection. In the past decade, wireless multimedia protection technologies have been attracting more and more researchers. Among them, wireless multimedia encryption and watermarking are two typical topics. Wireless multimedia encryption protects multimedia content’s confidentiality in wireless networks, which emphasizes on improving the encryption efficiency and channel friendliness. Some means have been proposed, such as the format-independent encryption algorithms that are time efficient compared with traditional ciphers; the partial encryption algorithms that reduce the encrypted data volumes by leaving some information unchanged; the hardware-implemented algorithms that are more efficient than software based ones; the scalable encryption algorithms that are compliant with bandwidth changes; and the robust encryption algorithms that are compliant with error channels. Compared with wireless multimedia encryption, wireless multimedia watermarking is widely used in ownership protection, traitor tracing, content authentication, and so forth. To keep low cost, a mobile agent is used to partitioning some of the watermarking tasks. To counter transmission errors, some channel encoding methods are proposed to encode the watermark. To keep robust, some means are proposed to embed a watermark into media data of low bit rate. Based on both watermarking and encryption algorithms, some applications arise, such as secure multimedia sharing or secure multimedia distribution. In this chapter, the existing wireless multimedia encryption and watermarking algorithms are summarized according to the functionality and multimedia type; their performances are analyzed and compared; the related applications are presented; and some open issues are proposed.
Related Content
An Analytical Study of Methodologies and Tools for Enterprise Information Security Risk Management
Jaya Bhattacharjee, Anirban Sengupta, Mridul Sankar Barik, Chandan Mazumdar.
© 2018.
20 pages.
View Details
View Sample PDF
|
A Step-by-Step Procedural Methodology for Improving an Organization's IT Risk Management System
Shanmugapriya Loganathan.
© 2018.
27 pages.
View Details
View Sample PDF
|
Strengthening IT Governance With COBIT 5
Gaurav Chaudhari, Pavankumar Mulgund.
© 2018.
22 pages.
View Details
View Sample PDF
|
Implications of HIPAA and Subsequent Regulations on Information Technology
Payod Soni.
© 2018.
28 pages.
View Details
View Sample PDF
|
Navigating Through Choppy Waters of PCI DSS Compliance
Amrita Nanda, Priyal Popat, Deepak Vimalkumar.
© 2018.
42 pages.
View Details
View Sample PDF
|
Fortifying Corporate Human Wall: A Literature Review of Security Awareness and Training
Anandharaman Pattabiraman, Sridhar Srinivasan, Kaushik Swaminathan, Manish Gupta.
© 2018.
34 pages.
View Details
View Sample PDF
|
A Tale of Policies and Breaches: Analytical Approach to Construct Social Media Policy
Neha Singh, Tanya Mittal, Manish Gupta.
© 2018.
37 pages.
View Details
View Sample PDF
|
|
|