IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Multimedia Encryption and Watermarking in Wireless Environment

Multimedia Encryption and Watermarking in Wireless Environment
View Sample PDF
Author(s): Shiguo Lian (France Telecom R&D Beijing, China)
Copyright: 2008
Pages: 20
Source title: Handbook of Research on Wireless Security
Source Author(s)/Editor(s): Yan Zhang (Simula Research Laboratory, Norway), Jun Zheng (City University of New York, USA) and Miao Ma (National Institute of Information & Communications Tech, Singapore)
DOI: 10.4018/978-1-59904-899-4.ch016

Purchase

View Multimedia Encryption and Watermarking in Wireless Environment on the publisher's website for pricing and purchasing information.

Abstract

In a wireless environment, multimedia transmission is often affected by the error rate; delaying; terminal’s power or bandwidth; and so forth, which brings difficulties to multimedia content protection. In the past decade, wireless multimedia protection technologies have been attracting more and more researchers. Among them, wireless multimedia encryption and watermarking are two typical topics. Wireless multimedia encryption protects multimedia content’s confidentiality in wireless networks, which emphasizes on improving the encryption efficiency and channel friendliness. Some means have been proposed, such as the format-independent encryption algorithms that are time efficient compared with traditional ciphers; the partial encryption algorithms that reduce the encrypted data volumes by leaving some information unchanged; the hardware-implemented algorithms that are more efficient than software based ones; the scalable encryption algorithms that are compliant with bandwidth changes; and the robust encryption algorithms that are compliant with error channels. Compared with wireless multimedia encryption, wireless multimedia watermarking is widely used in ownership protection, traitor tracing, content authentication, and so forth. To keep low cost, a mobile agent is used to partitioning some of the watermarking tasks. To counter transmission errors, some channel encoding methods are proposed to encode the watermark. To keep robust, some means are proposed to embed a watermark into media data of low bit rate. Based on both watermarking and encryption algorithms, some applications arise, such as secure multimedia sharing or secure multimedia distribution. In this chapter, the existing wireless multimedia encryption and watermarking algorithms are summarized according to the functionality and multimedia type; their performances are analyzed and compared; the related applications are presented; and some open issues are proposed.

Related Content

Securing the Cloud for Big Data
Michael Robinson, Kevin Jones. © 2020. 23 pages.
View Details View Details PDF Full Text View Sample PDF
Big Data: Challenges and Solutions
P. Lalitha Surya Kumari. © 2020. 42 pages.
View Details View Details PDF Full Text View Sample PDF
Human Factors in Cybersecurity: Issues and Challenges in Big Data
Xichen Zhang, Ali A. Ghorbani. © 2020. 31 pages.
View Details View Details PDF Full Text View Sample PDF
Security and Privacy Challenges in Big Data
Dharmpal Singh, Ira Nath, Pawan Kumar Singh. © 2020. 28 pages.
View Details View Details PDF Full Text View Sample PDF
Cloud-Centric Blockchain Public Key Infrastructure for Big Data Applications
Brian Tuan Khieu, Melody Moh. © 2020. 16 pages.
View Details View Details PDF Full Text View Sample PDF
Security Vulnerabilities, Threats, and Attacks in IoT and Big Data: Challenges and Solutions
Prabha Selvaraj, Sumathi Doraikannan, Vijay Kumar Burugari. © 2020. 27 pages.
View Details View Details PDF Full Text View Sample PDF
Threat Hunting in Windows Using Big Security Log Data
Mohammad Rasool Fatemi, Ali A. Ghorbani. © 2020. 21 pages.
View Details View Details PDF Full Text View Sample PDF
Body Bottom