Educational guide School of Engineering |
english |
Computer Security Engineering and Artificial Intelligence (2016) - Online |
Subjects |
MULTIMEDIA SECURITY |
Contents |
IDENTIFYING DATA | 2017_18 |
Subject | MULTIMEDIA SECURITY | Code | 17685207 | |||||
Study programme |
|
Cycle | 2nd | |||||
Descriptors | Credits | Type | Year | Period | ||||
3 | Optional | 2Q |
Competences | Learning outcomes | Contents |
Planning | Methodologies | Personalized attention |
Assessment | Sources of information | Recommendations |
Topic | Sub-topic |
Introduction | 1-Definition 2-Multimedia contents 3-Multimedia industry 4-Devices and systems 5-Threats |
Copyright | 1-Definition 2-History 3-Protection 4-Works protected 5-Rights 6-Infringiment 7-Copyleft 8-Creative Commons 9-Software licenses 10-Laws 11-Technologies |
Digital Rights Management (DRM) | 1-Definition 2-Basic structure of a DRM system 3-Copy prevention 4-Copy detection 5-Examples of DRM |
Copy prevention | 1-Multimedia encryption 1.1-Confidentiality of multimedia content 1.2-Access control 1.3-Cryptographic toolbox 1.4-The multimedia encryption paradigm 1.5-Multimedia encryption schemes 2-Key management for multimedia access and distribution 2.1-Conditional access systems: satellite, cable and terrestrial distribution 2.2-Examples 2.2.1-DVB 2.2.2-VoIP 2.2.3-Skype 3-Broadcast encryption 3.1-Introduction 3.2-Toy example 3.3-Practical examples |
Copy detection | 1-Introduction 2-Steganography 2.1-Introduction 2.2-Properties of steganography schemes 2.3-Types of steganographic protocols 2.4-Steganography methods 2.4.1-Preliminary methods 2.4.2-Substitution systems and bitplane tools 2.4.3-Transform domain techniques 2.4.4-Spread spectrum and information hiding 2.4.5-Statistical steganography 2.4.6-Distortion techniques 2.4.7-Cover generation techniques 3-Steganalysis 4-Watermarking 4.1-Introduction 4.2-History 4.3-Watermarking terminology 4.4-Properties of watermarking schemes 4.5-Classification of watermarking applications 4.6-Watermarking applications 4.7-Methods 5-Fingerprinting 5.1-Introduction 5.2-Terminology 5.3-Examples of fingerprinting 5.4-Properties 5.5-Fingerprinting schemes 5.5.1-Collusion secure fingerprinting 5.5.2-Traitor tracing |