The Community for Technology Leaders
RSS Icon
Issue No.06 - November/December (2010 vol.8)
pp: 76-79
Liam M. Mayron , Harris Corporation
Because multimedia files can be shared with increasing ease and efficiency, the need to ensure their secure transmission and consumption has become acute, particularly in light of multimedia-specific exploits. This article explores a variety of strategies and technologies that address the requirements and implementation elements of secure multimedia communications. To maintain acceptable performance, a security strategy must be aware of multimedia-specific needs and not severely detriment metrics such as jitter and frame rate. The wrong security techniques can burden the data with excessive encoding that reduces its perceptual quality and doesn't achieve the intended security objectives. This article provides an overview of several elements of secure multimedia communications for network practitioners. The wide variety of multimedia formats available provides a range of performance tradeoffs that must be considered before selection and periodically revised.
Multimedia, Security, Communications, Steganography
Liam M. Mayron, "Secure Multimedia Communications", IEEE Security & Privacy, vol.8, no. 6, pp. 76-79, November/December 2010, doi:10.1109/MSP.2010.185
1. W. Stallings, Data and Computer Communications, 8th ed., Prentice Hall, 2006.
2. M. Claypool and J. Tanner, "The Effects of Jitter on the Perceptual Quality of Video," Proc. ACM Multimedia 99, ACM Press, 1999, pp. 115–118.
3. R. Steinmetz, "Human Perception of Jitter and Media Synchronization Human Perception of Jitter and Media Synchronization," IEEE J. Selected Areas in Communications, vol. 14, no. 1, 1996, pp. 61–72.
4. S.E. Palmer, Vision Science: Photons to Phenomenology, MIT Press, 1999.
5. D. Socek et al., "A Permutation-Based Correlation-Preserving En-cryption Method for Digital Videos," Proc. Int'l Conf. Image Analysis and Recognition (ICIAR 06), Springer, 2006, pp. 547–558.
6. N.F. Johnson and S. Jajodia, "Exploring Steganography: Seeing the Unseen," Computer, vol. 31, no. 2, 1998, pp. 26–34.
7. J. Lubacz, W. Mazurczyk, and K. Szczypiorski, "Vice over IP," IEEE Spectrum, vol. 47, no. 2, 2010, pp. 42–47.
8. C.I. Podilchuk and E.J. Delp, "Digital Watermarking: Algorithms and Applications," IEEE Signal Processing Magazine, vol. 18, no. 4, 2001, pp. 33–46.
9. S.-J. Lee and S.-H. Jung, "A Survey of Watermarking Techniques Applied to Multimedia," Proc. Industrial Electronics Int'l Symp., IEEE Press, 2001, pp. 272–277.
20 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool