The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.04 - October-December (2011 vol.18)
pp: 48-61
Anna Carreras , Universitat Politècnica de Catalunya, Spain
Eva Rodriguez , Universitat Politècnica de Catalunya, Spain
Jaime Delgado , Universitat Politècnica de Catalunya, Spain
Safak Dogan , University of Surrey, UK
Hemantha Kodikara Arachchi , University of Surrey, UK
Ahmet M. Kondoz , University of Surrey, UK
Xavier Perramon , Universitat Pompeu Fabra, Spain
ABSTRACT
<p>This article analyzes existing initiatives and proposes new technologies for the governed adaptations of secured content in heterogeneous environments. These technologies are integrated into an architecture for the secure management of multimedia content.</p>
INDEX TERMS
protected content adaptation, digital rights management systems, access control, video surveillance, IEEE MultiMedia, graphics and multimedia
CITATION
Anna Carreras, Eva Rodriguez, Jaime Delgado, Safak Dogan, Hemantha Kodikara Arachchi, Ahmet M. Kondoz, Xavier Perramon, "Architectures and Technologies for Adapting Secured Content in Governed Multimedia Applications", IEEE MultiMedia, vol.18, no. 4, pp. 48-61, October-December 2011, doi:10.1109/MMUL.2011.2
REFERENCES
1. E. Rodríguez, Standardisation of the Protection and Governance of Multimedia Content, doctoral dissertation, Dept. Information and Communication Technologies, Universitat Pompeu Fabra, 2006.
2. F. López, J.M. Martínez, and N. García, "A Model for Preference-Driven Multimedia Adaptation Decision-Making in the MPEG-21 Framework," Multimedia Tools and Applications, March 2010.
3. A. Vetro and C. Timmerer, "Digital Item Adaptation: Overview of Standardization and Research Activities," IEEE Trans. Multimedia, vol. 7, no. 3, 2005, pp.418-426.
4. A. Carreras and J. Delgado, "A New Type of Contextual Information Based on the Adaptation Authorisation," Proc. 9th Int'l Workshop Image Analysis for Multimedia Interactive Services (WIAMIS), IEEE CS Press, 2008, pp. 147-150.
5. S.J. Wee and J.G. Apostolopoulos, "Secure Scalable Streaming and Secure Transcoding With JPEG-2000," Proc. IEEE Int'l Conf. Image Processing, IEEE Press, 2003, doi:10.1109/ICIP.2003. 1246934.
6. D. Engel, T. Stütz, and A. Uhl, "Format-Compliant JPEG2000 Encryption in JPSEC: Security, Applicability and the Impact of Compression Parameters," EURASIP J. Information Security, vol. 2007, no. 8, 2007; http://dx.doi.org/10.1155/2007/94565.
7. C. Bergeron and C. Lamy-Bergot, "Compliant Selective Encryption for H.264/AVC Video Streams," Proc. IEEE 7th Workshop Multimedia Signal Processing, IEEE Press, 2005, doi:10.1109/MMSP.2005. 248641.
8. Z. Shahid, M. Chaumont, and W. Puech, "Fast Protection of H.264/AVC by Selective Encryption of Cabac," Proc. IEEE Int'l Conf. Multimedia and Expo, IEEE Press, 2009, pp. 1038-1041.
9. S. Spinsante, F. Chiaraluce, and E. Gambi, "Masking Video Information by Partial Encryption of H.264/AVC Coding Parameters," Proc. 13th European Signal Processing Conf., European Assoc. Signal Processing, 2005; http://www.eurasip.org/ Proceedings/Eusipco/Eusipco2005/defevent/ papers/cr1338.pdf.
10. M. Grangetto, E. Magli, and G. Olmo, "Conditional Access to H.264/AVC Video by Means of Redundant Slices," Proc. IEEE Int'l Conf. Image Processing, IEEE Press, 2007, doi:10.1109/ICIP. 2007.4379627.
11. T. Stütz and A. Uhl, "Format-Compliant Encryption of H.264/AVC and SVC," Proc. IEEE Int'l Symp. Multimedia, IEEE CS Press, 2008, pp. 446-451.
12. H.K. Arachchi et al., "Adaptation-Aware Encryption of Scalable H.264/AVC Video for Content Security," Elsevier J. Signal Processing: Image Comm., special issue on scalable coded media beyond compression, vol. 24, no. 6, 2009, pp. 468-483.
13. H. Hellwagner et al., "Efficient In-Network Adaptation of Encrypted H.264/SVC Content," Elsevier J. Signal Processing: Image Comm., vol. 24, no. 9, 2009, pp. 740-758.
14. N.M. Thomas, D.R. Bull, and D.W. Redmill, "A Novel H.264 SVC Encryption Scheme for Secure Bit-Rate Transcoding," Proc. IEEE Picture Coding Symp., IEEE Press, 2009, pp. 157-160.
15. D. Mukherjee et al., "Format Independent Encryption of Generalized Scalable Bit-Streams Enabling Arbitrary Secure Adaptations," Proc. IEEE Int'l Conf. Acoustics, Speech, and Signal Processing, IEEE Press, 2005, doi:10.1109/ICASSP.2005. 1415584.
16. V. Torres et al., "An Implementation of a Trusted and Secure DRM Architecture," On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, LNCS 4277. Springer-Verlag, 2006, pp. 312-321.
17. J. Delgado et al., "Rights Management in Architectures for Distributed Multimedia Content Applications," Proc. 21st Tyrrhenian Workshop Digital Communications: Trustworthy Internet, Springer, 2010; http://dmag.ac.upc.edu/downloads/ papers/jdvtslerTWDCTI.pdf.
7 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool