Ing. de la Seguridad Informática e Inteligencia Artificial (2016) - Virtual |
Asignaturas |
SEGURIDAD MULTIMEDIA |
Contenidos |
DATOS IDENTIFICATIVOS | 2021_22 |
Asignatura | SEGURIDAD MULTIMEDIA | Código | 17685207 | |||||
Titulación |
|
Ciclo | 2º | |||||
Descriptores | Cr.totales | Tipo | Curso | Periodo | ||||
3 | Optativa | 2Q |
Competencias | Resultados de aprendizaje | Contenidos |
Planificación | Metodologías | Atención personalizada |
Evaluación | Fuentes de información | Recomendaciones |
tema | Subtema |
Introduction | 1-Definitions of Multimedia Content 2-Definitions of Information Security 3-Devices and systems 4-The Multimedia Industry 5-Threats |
Intellectual Property, Copyright and Software Licenses | 1-History of Intellectual Property Rights 2-Industrial Property 3-Copyright 3.1-Moral Rights 3.2-Economic Rights 4-Creative Commons 5-Software Licenses |
Information Security and Digital Rights Management | 1-General concepts of Information Security 2-Risk assessment 3-General protection mechanisms 4-Introduction to Digital Rights Management 4.1-Basic structure of a DRM system 5-Specific security requirements 6-Security tools and techniques used for DRM. 6.1-Copy prevention 6.2-Copy detection |
Copy prevention | 1-Cryptographic background 2-Multimedia encryption 2.1-Confidentiality of multimedia content 2.2-Access control 2.3-Cryptographic toolbox 2.4-The multimedia encryption paradigm 2.5-Multimedia encryption schemes 3-Broadcast encryption 3.1-Introduction 3.2-Toy example 3.3-Practical examples 4-DRM in Software and Videogames 4.1-Types of DRM in software and videogames 4.2-Software protection |
Copy detection | 1-Introduction 2-Multimedia Fingerprinting 3-Steganography 3.1-Introduction 3.2-Properties of steganography schemes 3.3-Types of steganographic protocols 3.4-Steganography methods 3.4.1-Preliminary methods 3.4.2-Substitution systems and bitplane tools 3.4.3-Transform domain techniques 3.4.4-Spread spectrum and information hiding 3.4.5-Statistical steganography 3.4.6-Distortion techniques 3.4.7-Cover generation techniques 3.5-Steganalysis 4-Watermarking 4.1-Introduction 4.2-History 4.3-Watermarking terminology 4.4-Properties of watermarking schemes 4.5-Classification of watermarking applications 4.6-Watermarking applications 4.7-Methods |