IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Multimedia Encryption and Watermarking in Wireless Environment

Multimedia Encryption and Watermarking in Wireless Environment
View Sample PDF
Author(s): Shiguo Lian (France Telecom R&D Beijing, China)
Copyright: 2008
Pages: 20
Source title: Handbook of Research on Wireless Security
Source Author(s)/Editor(s): Yan Zhang (Simula Research Laboratory, Norway), Jun Zheng (City University of New York, USA) and Miao Ma (National Institute of Information & Communications Tech, Singapore)
DOI: 10.4018/978-1-59904-899-4.ch016

Purchase

View Multimedia Encryption and Watermarking in Wireless Environment on the publisher's website for pricing and purchasing information.

Abstract

In a wireless environment, multimedia transmission is often affected by the error rate; delaying; terminal’s power or bandwidth; and so forth, which brings difficulties to multimedia content protection. In the past decade, wireless multimedia protection technologies have been attracting more and more researchers. Among them, wireless multimedia encryption and watermarking are two typical topics. Wireless multimedia encryption protects multimedia content’s confidentiality in wireless networks, which emphasizes on improving the encryption efficiency and channel friendliness. Some means have been proposed, such as the format-independent encryption algorithms that are time efficient compared with traditional ciphers; the partial encryption algorithms that reduce the encrypted data volumes by leaving some information unchanged; the hardware-implemented algorithms that are more efficient than software based ones; the scalable encryption algorithms that are compliant with bandwidth changes; and the robust encryption algorithms that are compliant with error channels. Compared with wireless multimedia encryption, wireless multimedia watermarking is widely used in ownership protection, traitor tracing, content authentication, and so forth. To keep low cost, a mobile agent is used to partitioning some of the watermarking tasks. To counter transmission errors, some channel encoding methods are proposed to encode the watermark. To keep robust, some means are proposed to embed a watermark into media data of low bit rate. Based on both watermarking and encryption algorithms, some applications arise, such as secure multimedia sharing or secure multimedia distribution. In this chapter, the existing wireless multimedia encryption and watermarking algorithms are summarized according to the functionality and multimedia type; their performances are analyzed and compared; the related applications are presented; and some open issues are proposed.

Related Content

An Analytical Study of Methodologies and Tools for Enterprise Information Security Risk Management
Jaya Bhattacharjee, Anirban Sengupta, Mridul Sankar Barik, Chandan Mazumdar. © 2018. 20 pages.
View Details View Details PDF Full Text View Sample PDF
A Step-by-Step Procedural Methodology for Improving an Organization's IT Risk Management System
Shanmugapriya Loganathan. © 2018. 27 pages.
View Details View Details PDF Full Text View Sample PDF
Strengthening IT Governance With COBIT 5
Gaurav Chaudhari, Pavankumar Mulgund. © 2018. 22 pages.
View Details View Details PDF Full Text View Sample PDF
Implications of HIPAA and Subsequent Regulations on Information Technology
Payod Soni. © 2018. 28 pages.
View Details View Details PDF Full Text View Sample PDF
Navigating Through Choppy Waters of PCI DSS Compliance
Amrita Nanda, Priyal Popat, Deepak Vimalkumar. © 2018. 42 pages.
View Details View Details PDF Full Text View Sample PDF
Fortifying Corporate Human Wall: A Literature Review of Security Awareness and Training
Anandharaman Pattabiraman, Sridhar Srinivasan, Kaushik Swaminathan, Manish Gupta. © 2018. 34 pages.
View Details View Details PDF Full Text View Sample PDF
A Tale of Policies and Breaches: Analytical Approach to Construct Social Media Policy
Neha Singh, Tanya Mittal, Manish Gupta. © 2018. 37 pages.
View Details View Details PDF Full Text View Sample PDF
Body Bottom