Ing. de la Seguridad Informática e Inteligencia Artificial (2016) |
Asignaturas |
SEGURIDAD MULTIMEDIA |
Fuentes de información |
DATOS IDENTIFICATIVOS | 2018_19 |
Asignatura | SEGURIDAD MULTIMEDIA | Código | 17685207 | |||||
Titulación |
|
Ciclo | 2º | |||||
Descriptores | Cr.totales | Tipo | Curso | Periodo | ||||
3 | Optativa | 2Q |
Competencias | Resultados de aprendizaje | Contenidos |
Planificación | Metodologías | Atención personalizada |
Evaluación | Fuentes de información | Recomendaciones |
Básica |
William Rosenblatt, Digital Rights Management: Business and Technology, Hungry Minds Inc,U.S., 2002 Jessica Litman, Digital Copyright: Protecting Intellectual Property on the Internet, Prometheus Books , 2000 Stefan Katzenbeisser, Fabien A. P. Petitcolas, Information Hiding techniques for steganography and digital watermarking, Artech House , 2000 Ingemar Cox, Matthew Miller, Jeffrey Bloom and Jessica Fridrich, Digital Watermarking and Steganographt, Morgan Kaufmann, 2007 Mauro Barni and Franco Bartolini, Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications, Dekker, 2007 James F. Ransome and John R. Rittinghouse, Voice over Internet Protocol (VoIP) Security, Digital Press, 2004 Rainer Böhme, Advanced Statistical Steganalysis , Springer, 2010 Anjan Kumar Payra, Steganology for the Computer Forensics Examiners: Steganography,Steganalysis,Sterilization techniques for security issues, LAP LAMBERT Academic Publishing, 2013 |
Complementaria | |