SECURITY

Subdecks (1)

Cards (27)

  • Multimedia
    Image,video,audio
  • Multimedia security
    The protection of digital multimedia data (such as image, audio, video) from unauthorized access, manipulation, or disclosure during the storage, transmission and processing. Aims to ensure the confidentiality, integrity, and authenticity.
  • Purposes of multimedia security
    • Confidentiality
    • Copyright protection
    • Integrity
    • Authentication
    • Temper detection
    • Access control
    • Non repudiation
  • Data hiding
    Cryptography techniques used to protect multimedia content, including watermarking and steganography
  • Watermarking
    A method to hide secret information in multimedia content by embedding a digital code or image, which might be visible or covert, to assert ownership, verify authenticity, or convey metadata.
  • Steganography
    The practice of concealing information within another message or physical object to avoid detection, enabling secure communication.
  • Multimedia content needs to be protected to ensure the security of sensitive information, protect intellectual property rights, and maintain trust
  • Digital Rights Management (DRM)
    Technology and systems used to control access to digital content and protect it from piracy and unauthorized use
  • DRM techniques
    • Encryption
    • Access control
    • Copy protection
    • Digital watermarking
    • Licensing system
    • Authentication mechanism
  • Database
    An organized collection of structured information or data
  • Databases need to be protected to prevent unauthorized disclosure of sensitive information, manipulation of records, disruption of services, and financial losses
  • Threats to databases
    • Unauthorized access
    • Data breaches
    • SQL injection attacks
    • Malware infections
    • Insider threats
  • Online payment security
    Techniques to reduce the risk of data leakage and financial loss, including encryption and tokenization, to protect the communication between the customer and the payment gateway
  • Online payment security threats
    • Eavesdropping
    • Data manipulation
  • Encryption
    1. Transforming data into a secret code that only authorized parties can access and decipher
    2. Converting plain text into scrambled ciphertext using encryption keys
  • Tokenization
    Replacing sensitive payment information with unique tokens to keep the data safe during transactions, as the tokens are useless to hackers without the associated decryption key
  • Steganography
    The practice of concealing information within another message or physical object, such as an image, to avoid detection and enable secure communication
  • Steganalysis
    Analyzing media files to detect the presence of hidden information by understanding normal file properties, extracting features, and comparing them to identify anomalies
  • Least Significant Bit (LSB)

    A method of embedding secret data in the least significant bits of the cover media, often resulting in visually identical files
  • Other techniques for multimedia security
    • Forensic analysis
    • Virtual private network