2007
DOI: 10.1117/12.705607
|View full text |Cite
|
Sign up to set email alerts
|

A framework for MPEG-21 DIA based adaptation and perceptual encryption of H.264 video

Abstract: A ubiquitous computing concept permits end users to have access to multimedia and digital content anywhere, anytime and in any way they want. As a consequence, the importance of resource customization according to user preferences and device requirements set the primary challenge towards seamless access. Moreover, once a suitable customization approach has been decided (e.g. adaptation), deploying it in the existing network requires a generic and widely accepted standard applied to the process. With the advanc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2008
2008
2012
2012

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…The solution is good if there is some collaboration between peers before the streaming starts, but it is inconvenient for an isolated peer to initiate the streaming session and to place the video descriptions in different participating nodes. From our own experience in [1] and others' experience in [5], we can draw the conclusion that significant Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee.…”
Section: Related Workmentioning
confidence: 97%
See 2 more Smart Citations
“…The solution is good if there is some collaboration between peers before the streaming starts, but it is inconvenient for an isolated peer to initiate the streaming session and to place the video descriptions in different participating nodes. From our own experience in [1] and others' experience in [5], we can draw the conclusion that significant Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee.…”
Section: Related Workmentioning
confidence: 97%
“…We refer interested readers to [1] and [8] for details on the gBSD-based adaptation. Subsequently, we shall explain the overlay-formation action steps.…”
Section: Overview Of the Designmentioning
confidence: 99%
See 1 more Smart Citation
“…2) Container-Formats: Several proposals [24], [23], [22] employ container formats and encrypt the H.264 bitstream or fractions of the H.264 bitstream with conventional algorithms, e.g., AES in counter mode. The basic setup is illustrated in figure 9.…”
Section: ) Nalu [Encryption]mentioning
confidence: 99%
“…Video adaptation and encryption has been discussed together for encrypting adapted video contents only. The techniques proposed in [5], [6], [7] and [8] assume that either the content is received unencrypted or they are decrypted prior to performing the adaptation operation. Consequently, none of these techniques are fit for endto-end adaptation architectures.…”
Section: Introductionmentioning
confidence: 99%