Guia docent Escola Tècnica Superior d'Enginyeria |
català |
Eng. de la Seguretat Informàtica i Intel·ligència Artificial (2016) - Virtual |
Assignatures |
SEGURETAT MULTIMÈDIA |
Continguts |
DADES IDENTIFICATIVES | 2017_18 |
Assignatura | SEGURETAT MULTIMÈDIA | Codi | 17685207 | |||||
Ensenyament |
|
Cicle | 2n | |||||
Descriptors | Crèd. | Tipus | Curs | Període | ||||
3 | Optativa | 2Q |
Competències | Resultats d'aprenentage | Continguts |
Planificació | Metodologies | Atenció personalitzada |
Avaluació | Fonts d'informació | Recomanacions |
Tema | Subtema |
Introduction | 1-Definition 2-Multimedia contents 3-Multimedia industry 4-Devices and systems 5-Threats |
Copyright | 1-Definition 2-History 3-Protection 4-Works protected 5-Rights 6-Infringiment 7-Copyleft 8-Creative Commons 9-Software licenses 10-Laws 11-Technologies |
Digital Rights Management (DRM) | 1-Definition 2-Basic structure of a DRM system 3-Copy prevention 4-Copy detection 5-Examples of DRM |
Copy prevention | 1-Multimedia encryption 1.1-Confidentiality of multimedia content 1.2-Access control 1.3-Cryptographic toolbox 1.4-The multimedia encryption paradigm 1.5-Multimedia encryption schemes 2-Key management for multimedia access and distribution 2.1-Conditional access systems: satellite, cable and terrestrial distribution 2.2-Examples 2.2.1-DVB 2.2.2-VoIP 2.2.3-Skype 3-Broadcast encryption 3.1-Introduction 3.2-Toy example 3.3-Practical examples |
Copy detection | 1-Introduction 2-Steganography 2.1-Introduction 2.2-Properties of steganography schemes 2.3-Types of steganographic protocols 2.4-Steganography methods 2.4.1-Preliminary methods 2.4.2-Substitution systems and bitplane tools 2.4.3-Transform domain techniques 2.4.4-Spread spectrum and information hiding 2.4.5-Statistical steganography 2.4.6-Distortion techniques 2.4.7-Cover generation techniques 3-Steganalysis 4-Watermarking 4.1-Introduction 4.2-History 4.3-Watermarking terminology 4.4-Properties of watermarking schemes 4.5-Classification of watermarking applications 4.6-Watermarking applications 4.7-Methods 5-Fingerprinting 5.1-Introduction 5.2-Terminology 5.3-Examples of fingerprinting 5.4-Properties 5.5-Fingerprinting schemes 5.5.1-Collusion secure fingerprinting 5.5.2-Traitor tracing |