skip to main content
10.1145/2818567.2818669acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccctConference Proceedingsconference-collections
research-article

A Generic Approach to Security Evaluation For Multimedia Data

Published: 25 September 2015 Publication History

Abstract

Beginning with a critical analysis of existing multimedia metrics, this paper builds upon their drawbacks in streaming media by the introduction of alternate metrics, backed by analytical correctness proofs of accuracy and comparative simulation with earlier metrics to justify the improvements made in security judgement techniques.

References

[1]
Takao Arai, T Noguchi, Masaharu Kobayashi, N Amada, Y Yumde, and K Miura. A study on the digitization of audio signals for video tape recorder. In Acoustics, Speech, and Signal Processing, IEEE International Conference on ICASSP'86., volume 11, pages 29--32. IEEE, 1986.
[2]
Wikipedia contributors.
[3]
Michael Gehrke, Andreas Pfitzmann, and Kai Rannenberg. Information technology security evaluation criteria (itsec)-a contribution to vulnerability? In IFIP Congress (2), pages 579--587, 1992.
[4]
Shuang Li, Raghu Neelisetti, Cong Liu, and Alvin Lim. Delay-constrained high throughput protocol for multi-path transmission over wireless multimedia sensor networks. In World of Wireless, Mobile and Multimedia Networks, 2008. WoWMoM 2008. 2008 International Symposium on a, pages 1--8. IEEE, 2008.
[5]
Pik Jian Low, MSS Mohd Shahrom, MF Ahmad Fauzi, MY Alias, MHL Abdullah, K Anuar, AT Samsudin, M Amil, and SN Yahya. Design and implementation of adaptive scalable streaming system over heterogeneous network. In Signal and Image Processing Applications (ICSIPA), 2009 IEEE International Conference on, pages 84--89. IEEE, 2009.
[6]
Yinian Mao and Min Wu. Security evaluation for communication-friendly encryption of multimedia. In Image Processing, 2004. ICIP'04. 2004 International Conference on, volume 1, pages 569--572. IEEE, 2004.
[7]
Syed Naqvi and Michel Riguidel. Quantifiable security metrics for large scale heterogeneous systems. In Carnahan Conferences Security Technology, Proceedings 2006 40th Annual IEEE International, pages 209--215. IEEE, 2006.
[8]
Shirley C Payne. A guide to security metrics. SANS Institute Information Security Reading Room, 2006.
[9]
science media network. Youtube bitrates --- science media network, 2015. {Online; accessed 12-March-2015}.
[10]
Anoop Singhal and Xinming Ou. Security risk analysis of enterprise networks using probabilistic attack graphs. Citeseer, 2011.
[11]
Marianne Swanson. Security metrics guide for information technology systems. National Institute of Standards and Technology, Technology Administration, US Department of Commerce, 2003.
[12]
John Watkinson. The art of digital audio. Taylor & Francis, 2001.
[13]
Wang Xin-Gong. Research on multimedia data stream in network. In Intelligent Systems Design and Engineering Applications, 2013 Fourth International Conference on, pages 498--502. IEEE, 2013.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICCCT '15: Proceedings of the Sixth International Conference on Computer and Communication Technology 2015
September 2015
481 pages
ISBN:9781450335522
DOI:10.1145/2818567
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 September 2015

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Luminance Similarity Score
  2. Multimedia
  3. Multimedia security metrics
  4. Security Metrics
  5. Security evaluation metrics

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICCCT '15

Acceptance Rates

Overall Acceptance Rate 33 of 124 submissions, 27%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 46
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 02 Mar 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media