Educational guide School of Engineering |
english |
Computer Security Engineering and Artificial Intelligence (2016) - Online |
Subjects |
MULTIMEDIA SECURITY |
Contents |
IDENTIFYING DATA | 2020_21 |
Subject | MULTIMEDIA SECURITY | Code | 17685207 | |||||
Study programme |
|
Cycle | 2nd | |||||
Descriptors | Credits | Type | Year | Period | ||||
3 | Optional | 2Q |
Competences | Learning outcomes | Contents |
Planning | Methodologies | Personalized attention |
Assessment | Sources of information | Recommendations |
Topic | Sub-topic |
Introduction | 1-Definitions of Multimedia Content 2-Definitions of Information Security 3-Devices and systems 4-The Multimedia Industry 5-Threats |
Intellectual Property, Copyright and Software Licenses | 1-History of Intellectual Property Rights 2-Industrial Property 3-Copyright 3.1-Moral Rights 3.2-Economic Rights 4-Creative Commons 5-Software Licenses |
Information Security and Digital Rights Management | 1-General concepts of Information Security 2-Risk assessment 3-General protection mechanisms 4-Introduction to Digital Rights Management 4.1-Basic structure of a DRM system 5-Specific security requirements 6-Security tools and techniques used for DRM. 6.1-Copy prevention 6.2-Copy detection |
Copy prevention | 1-Cryptographic background 2-Multimedia encryption 2.1-Confidentiality of multimedia content 2.2-Access control 2.3-Cryptographic toolbox 2.4-The multimedia encryption paradigm 2.5-Multimedia encryption schemes 3-Broadcast encryption 3.1-Introduction 3.2-Toy example 3.3-Practical examples 4-DRM in Software and Videogames 4.1-Types of DRM in software and videogames 4.2-Software protection |
Copy detection | 1-Introduction 2-Multimedia Fingerprinting 3-Steganography 3.1-Introduction 3.2-Properties of steganography schemes 3.3-Types of steganographic protocols 3.4-Steganography methods 3.4.1-Preliminary methods 3.4.2-Substitution systems and bitplane tools 3.4.3-Transform domain techniques 3.4.4-Spread spectrum and information hiding 3.4.5-Statistical steganography 3.4.6-Distortion techniques 3.4.7-Cover generation techniques 3.5-Steganalysis 4-Watermarking 4.1-Introduction 4.2-History 4.3-Watermarking terminology 4.4-Properties of watermarking schemes 4.5-Classification of watermarking applications 4.6-Watermarking applications 4.7-Methods |