Ing. de la Seguridad Informática e Inteligencia Artificial (2016) - Virtual |
Asignaturas |
SEGURIDAD MULTIMEDIA |
Contenidos |
DATOS IDENTIFICATIVOS | 2019_20 |
Asignatura | SEGURIDAD MULTIMEDIA | Código | 17685207 | |||||
Titulación |
|
Ciclo | 2º | |||||
Descriptores | Cr.totales | Tipo | Curso | Periodo | ||||
3 | Optativa | 2Q |
Competencias | Resultados de aprendizaje | Contenidos |
Planificación | Metodologías | Atención personalizada |
Evaluación | Fuentes de información | Recomendaciones |
tema | Subtema |
Introduction | 1-Definition 2-Multimedia contents 3-Multimedia industry 4-Devices and systems 5-Threats |
Copyright | 1-Definition 2-History 3-Protection 4-Works protected 5-Rights 6-Infringiment 7-Copyleft 8-Creative Commons 9-Software licenses 10-Laws 11-Technologies |
Digital Rights Management (DRM) | 1-Definition 2-Basic structure of a DRM system 3-Copy prevention 4-Copy detection 5-Examples of DRM |
Copy prevention | 1-Multimedia encryption 1.1-Confidentiality of multimedia content 1.2-Access control 1.3-Cryptographic toolbox 1.4-The multimedia encryption paradigm 1.5-Multimedia encryption schemes 2-Key management for multimedia access and distribution 2.1-Conditional access systems: satellite, cable and terrestrial distribution 2.2-Examples 2.2.1-DVB 2.2.2-VoIP 2.2.3-Skype 3-Broadcast encryption 3.1-Introduction 3.2-Toy example 3.3-Practical examples |
Copy detection | 1-Introduction 2-Steganography 2.1-Introduction 2.2-Properties of steganography schemes 2.3-Types of steganographic protocols 2.4-Steganography methods 2.4.1-Preliminary methods 2.4.2-Substitution systems and bitplane tools 2.4.3-Transform domain techniques 2.4.4-Spread spectrum and information hiding 2.4.5-Statistical steganography 2.4.6-Distortion techniques 2.4.7-Cover generation techniques 3-Steganalysis 4-Watermarking 4.1-Introduction 4.2-History 4.3-Watermarking terminology 4.4-Properties of watermarking schemes 4.5-Classification of watermarking applications 4.6-Watermarking applications 4.7-Methods 5-Fingerprinting 5.1-Introduction 5.2-Terminology 5.3-Examples of fingerprinting 5.4-Properties 5.5-Fingerprinting schemes 5.5.1-Collusion secure fingerprinting 5.5.2-Traitor tracing |