Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.
You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.
After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.
Presents the DRM principles and technologies applicable to protecting video and also other types of content, such as ebooks, documents and games
Serves as a valuable reference for industrial researchers and engineers developing related technologies, academics in information security, cryptography and media systems, and engaged consumers
Written by an expert with over 20 years of experience developing and analyzing related technologies
Content protection and digital rights management (DRM) are fields that receive a lot of attention: content owners require systems that protect and maximize their revenues; consumers want backwards compatibility, while they fear that content owners will spy on their viewing habits; and academics are afraid that DRM may be a barrier to knowledge sharing. DRM technologies have a poor reputation and are not yet trusted.
This book describes the key aspects of content protection and DRM systems, the objective being to demystify the technology and techniques. In the first part of the book, the author builds the foundations, with sections that cover the rationale for protecting digital video content; video piracy; current toolboxes that employ cryptography, watermarking, tamper resistance, and rights expression languages; different ways to model video content protection; and DRM. In the second part, he describes the main existing deployed solutions, including video ecosystems; how video is protected in broadcasting; descriptions of DRM systems, such as Microsoft's DRM and Apple’s FairPlay; techniques for protecting prerecorded content distributed using DVDs or Blu-ray; and future methods used to protect content within the home network. The final part of the book looks towards future research topics, and the key problem of interoperability.
While the book focuses on protecting video content, the DRM principles and technologies described are also used to protect many other types of content, such as ebooks, documents and games. The book will be of value to industrial researchers and engineers developing related technologies, academics and students in information security, cryptography and media systems, and engaged consumers.
Content Level »Professional/practitioner
Keywords »Audio Watermarking - Broadcasting - Compliance - Content Protection - Copy Protection - Copyright - Cryptography - Digital Rights Management (DRM) - Information Security - Interoperability - Multimedia - Pay TV - Piracy - Protecting IP - Tamper Resistance - Video - Video Fingerprinting - Video Watermarking - Watermarking
Introduction.- Why Protect Video?.- A Toolbox.- A Useful Model.- Current Video Ecosystems.- Protecting Broadcasts.- Protecting IP.- Protecting Prerecorded and Recordable Media.- Next Frontier – Interoperability.- Some Trends and Challenges.- Conclusions.