Educational guide School of Engineering |
english |
Computer Engineering: Computer Security and Intelligent Systems (2013) |
Subjects |
MULTIMEDIA SECURITY |
Sources of information |
IDENTIFYING DATA | 2016_17 |
Subject | MULTIMEDIA SECURITY | Code | 17665211 | |||||
Study programme |
|
Cycle | 2nd | |||||
Descriptors | Credits | Type | Year | Period | ||||
4.5 | Optional | 2Q |
Competences | Learning outcomes | Contents |
Planning | Methodologies | Personalized attention |
Assessment | Sources of information | Recommendations |
Basic |
William Rosenblatt, Digital Rights Management: Business and Technology, Hungry Minds Inc,U.S., 2002 Jessica Litman, Digital Copyright: Protecting Intellectual Property on the Internet, Prometheus Books , 2000 Stefan Katzenbeisser, Fabien A. P. Petitcolas, Information Hiding techniques for steganography and digital watermarking, Artech House , 2000 Ingemar Cox, Matthew Miller, Jeffrey Bloom and Jessica Fridrich, Digital Watermarking and Steganographt, Morgan Kaufmann, 2007 Mauro Barni and Franco Bartolini, Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications, Dekker, 2007 James F. Ransome and John R. Rittinghouse, Voice over Internet Protocol (VoIP) Security, Digital Press, 2004 Rainer Böhme, Advanced Statistical Steganalysis , Springer, 2010 Anjan Kumar Payra, Steganology for the Computer Forensics Examiners: Steganography,Steganalysis,Sterilization techniques for security issues, LAP LAMBERT Academic Publishing, 2013 |
Complementary | |