![]() ![]() ![]() In the first part of the book, the author builds the foundations, with sections that cover the rationale for protecting digital video content video piracy current toolboxes that employ cryptography, watermarking, tamper resistance, and rights expression languages different ways to model video content protection and DRM. This book describes the key aspects of content protection and DRM systems, the objective being to demystify the technology and techniques. DRM technologies have a poor reputation and are not yet trusted. Content protection and digital rights management (DRM) are fields that receive a lot of attention: content owners require systems that protect and maximize their revenues consumers want backwards compatibility, while they fear that content owners will spy on their viewing habits and academics are afraid that DRM may be a barrier to knowledge sharing.
0 Comments
Leave a Reply. |