A Tool Box

  • Eric DiehlEmail author


Ideally, content protection should incorporate four complementary types of protection. Physical security should control access to the asset. Encryption should protect the asset itself. Forensics technology should trace the asset. Scouting should limit the illegal use of the asset. This chapter introduces basic technologies to fulfill these protections: cryptography, digital watermarking, hardware and software tamper resistance, as well as compliance and robustness regimes.


Smart Card Advance Encryption Standard Digital Watermark Trust Platform Module Watermark Embedding 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  1. 1.Technicolor, Security & Content Protection LabsRennesFrance

Personalised recommendations