Watermarking IICovers advanced topics in watermarking, including resisting scaling and rotations, self-referenced watermarking, and types of attacks.
Media Integrity VerificationExplores media integrity verification, digital signatures, image integrity, watermarking, and forensic analysis.
Conditional Access IExplores the definitions, history, and applications of conditional access in media security, covering user authentication techniques, smart cards, biometrics, and legal aspects.
Conditional Access IICovers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Media Security StandardsExplores the definition of media security standards and the standardization of a framework rather than a specific security tool.
Trust and PrivacyExplores trust, privacy, visual protection, social media models, and blockchain technology.