 |
|
|
|
|
 |  |  Multimedia Security HandbookIntellectual property owners who exploit new ways of reproducing, distributing, and marketing their creations digitally must also protect them from piracy. The Multimedia Security Handbook addresses issues related to protecting digital media. It begins by introducing security fundamentals and discussing the vulnerabilities of individual protection... |  |  |
|
 |  |  Data Hiding Fundamentals and Applications: Content Security in Digital MultimediaMultimedia technologies are becoming more sophisticated, enabling the Internet to accommodate a rapidly growing audience with a full range of services and efficient delivery methods. Although the Internet now puts communication, education, commerce and socialization at our finger tips, its rapid growth has raised some weighty security concerns with... |  |  Intellectual Property Protection in VLSI Design: Theory and PracticeThe development and implementation of intellectual property (IP) protection mechanisms is of crucial importance for the emerging reuse-based system design methodology. Maybe even more importantly, it is such an elegant scientific and engineering challenge that it has drawn a lot of attention from academia and industry in recent years.... |
|
 Information Security for Automatic Speaker Identification
Speaker identification is a widely used technique in several security
systems. In remote access systems, speaker utterances are recoded and
communicated through a communication channel to a receiver that performs the
identification process. Speaker identification is based on characterizing each
speaker with a set of features... |  |  |  |  |
|
|
Result Page: 4 3 2 1 |