21 March 2005 Security architectures and analysis for content adaptation
Author Affiliations +
Abstract
Content adaptation has been introduced to tailor the same media content to different derived user contexts to allow end users with different access networks, client devices and/or user profiles to access the same information source. However, content adaptation also introduces security implications in a content distribution food chain. In this paper, we conduct an in-depth investigation into the potential security issues involved in content adaptation in multimedia communication systems. We analyze the security requirements in the context of content adaptation. In particular, we address the issue of where to place the security functions and its implications on the security and content adaptation functionality. The general security architectures for the protection of adapted content are categorized and analyzed. Various rationales and implications of some of the most recent multimedia security technologies are investigated under these architectures. We also discuss some open issues and suggest some future directions. The paper provides the readers with an in-depth analysis, a comprehensive overview, and a better understanding of the security issues in a multimedia communication system where content adaptation is a necessity.
© (2005) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Wenjun Zeng, Wenjun Zeng, Junqiang Lan, Junqiang Lan, Xinhua Zhuang, Xinhua Zhuang, } "Security architectures and analysis for content adaptation", Proc. SPIE 5681, Security, Steganography, and Watermarking of Multimedia Contents VII, (21 March 2005); doi: 10.1117/12.584148; https://doi.org/10.1117/12.584148
PROCEEDINGS
12 PAGES


SHARE
RELATED CONTENT

A research of security architecture in grid
Proceedings of SPIE (March 13 2013)
Media rights and media security
Proceedings of SPIE (March 13 2005)
Key distribution for a MLS network architecture
Proceedings of SPIE (November 16 2000)
Using overlays to improve network security
Proceedings of SPIE (July 07 2002)

Back to Top