Skip to main content

End-to-End Security for Multimedia Adaptation

  • Reference work entry
  • 83 Accesses

Synonyms

Content adaptation during distribution over the Internet

Definition

Security for multimedia adaptation is media security technologies designed with explicit consideration of potential content adaptation during distribution over the Internet.

Introduction

Recent advances in networking and digital media technologies have created a large number of distributed networked multimedia applications and services that are vulnerable to piracy and malicious attacks. The unique properties of multimedia data and its distribution mechanisms impose special challenges to the design of security tool for multimedia. These unique properties include the following: the data rate is high; the processing is power hungry; real-time communication is delay constrained; different component has difference importance so certain loss is tolerable; and the data can be adapted in many ways. Therefore, traditional cryptographic techniques such as encryption, authentication, integrity check and key management...

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   449.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Han, J. Smith, Transcoding of the Internet's Multimedia Content for Universal Access, “Multimedia Communications: Directions and Innovations,” Academic Press, 2000.

    Google Scholar 

  2. W. Zeng, J. Lan, and X. Zhuang, “Network friendly media security: rationales, solutions, and open issues,” Proceedings of the IEEE International Conference on Image Processing, Singapore, October 2004.

    Google Scholar 

  3. J. Wen, M. Severa, W. Zeng, M. Luttrell, and W. Jin, “A Format Compliant Configurable Encryption Framework for Access Control Of Video,” IEEE Transactions on Circuits Systems for Video Technology, Vol. 12, No. 6, June 2002, pp. 545–557.

    Article  Google Scholar 

  4. S. Wee and J. Apostolopoulos, “Secure Scalable Streaming Enabling Transcoding Without Decryption,” IEEE International Conference on Image Processing, Vol. 1, 2001, pp. 437–440.

    Google Scholar 

  5. L. Tang, “Methods for Encrypting and Decrypting Mpeg Video Data Efficiently,” Proceedings of the ACM International Multimedia Conference, pp. 219–229, 1996.

    Google Scholar 

  6. W. Zeng and S. Lei, “Efficient Frequency Domain Selective Scrambling of Digital Video,” IEEE Transaction on Multimedia, Vol. 5, No. 1, March 2003, pp. 118–129.

    Article  Google Scholar 

  7. MPEG4 IPMP FPDAM, ISO/IEC 14496–1:2001/AMD3, ISO/IEC JTC 1/SC 29/WG11 N4701, March 2002.

    Google Scholar 

  8. M.P. Queluz, “Towards Robust, Content Based Techniques for Image Authentication,” IEEE Workshop on Multimedia Signal Processing, Los Angeles, CA, December 1998.

    Google Scholar 

  9. C. Lin and S. Chang, “Semi Fragile Watermarking for Authentication of Jpeg Visual Content,” Proceedings of SPIE International Conference on Security and Watermarking of Multimedia Contents, Vol. 3971, January 2000.

    Google Scholar 

  10. “JPSEC Commission Draft – Version 2.0,” ISO/IEC/JTC1/SC29/WG1/N3397.

    Google Scholar 

  11. Y. Chang, R. Han, C. Li, and J. Smith, “Secure Transcoding of Internet Content,” International Workshop on Intelligent Multimedia Computing and Networking (IMMCN), Durham, North Carolina, 2002.

    Google Scholar 

  12. C. Yuan, B. Zhu, M. Su, S. Li, X. Wang, and Y. Zhong, “Layered Access Control for MPEG-4 FGS Video,” Proceedings of IEEE International Conference on Image Processing, Barcelona, Spain, 2003.

    Google Scholar 

  13. J.D. Gibson, et al., “Selective Encryption and Scalable Speech Coding for Voice Communications Over Multi-Hop Wireless Links,” Proceeding of IEEE Military Communications Conference, Monterey, CA, October 31—November 3, 2004.

    Google Scholar 

  14. B.B. Zhu, S. Li, M. Feng, “A Framework of Scalable Layered Access Control for Multimedia,” IEEE International Symposium on Circuits and Systems, Vol. 3, 2005, pp. 2703–2706.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag

About this entry

Cite this entry

Zeng, W., Dong, L. (2008). End-to-End Security for Multimedia Adaptation. In: Furht, B. (eds) Encyclopedia of Multimedia. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-78414-4_19

Download citation

Publish with us

Policies and ethics