Opening with a detailed review of techniques for selective encryption, this book examines algorithms that combine encryption and compression. Presents a selection of specific examples of the design and implementation of secure embedded multimedia systems.