Share Email Print

Proceedings Paper

Security architectures and analysis for content adaptation
Author(s): Wenjun Zeng; Junqiang Lan; Xinhua Zhuang
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

Content adaptation has been introduced to tailor the same media content to different derived user contexts to allow end users with different access networks, client devices and/or user profiles to access the same information source. However, content adaptation also introduces security implications in a content distribution food chain. In this paper, we conduct an in-depth investigation into the potential security issues involved in content adaptation in multimedia communication systems. We analyze the security requirements in the context of content adaptation. In particular, we address the issue of where to place the security functions and its implications on the security and content adaptation functionality. The general security architectures for the protection of adapted content are categorized and analyzed. Various rationales and implications of some of the most recent multimedia security technologies are investigated under these architectures. We also discuss some open issues and suggest some future directions. The paper provides the readers with an in-depth analysis, a comprehensive overview, and a better understanding of the security issues in a multimedia communication system where content adaptation is a necessity.

Paper Details

Date Published: 21 March 2005
PDF: 12 pages
Proc. SPIE 5681, Security, Steganography, and Watermarking of Multimedia Contents VII, (21 March 2005); doi: 10.1117/12.584148
Show Author Affiliations
Wenjun Zeng, Univ. of Missouri/Columbia (United States)
Junqiang Lan, Univ. of Missouri/Columbia (United States)
Xinhua Zhuang, Univ. of Missouri/Columbia (United States)

Published in SPIE Proceedings Vol. 5681:
Security, Steganography, and Watermarking of Multimedia Contents VII
Edward J. Delp III; Ping W. Wong, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?