Algorithms for Secure Multimedia Delivery over Mobile Devices and Mobile Agents

Algorithms for Secure Multimedia Delivery over Mobile Devices and Mobile Agents

Amit Pande, Joseph Zambreno
DOI: 10.4018/978-1-61350-107-8.ch010
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Rapid advances in embedded systems and mobile communications have flooded the market with a large volume of multimedia data. In this chapter, the authors present a summary of multimedia compression and encryption schemes, the way they have evolved over the decades. They first discuss the traditional approach to data encryption and their extension to video encryption. Next, they present the next generation algorithms for secure multimedia delivery, namely the Joint Video Compression and Encryption (JVCE) approach and give the reader an introduction to these approaches, the underlying assumption, advantages and limitations. The authors discuss the implementation of JVCE algorithms in light of requirements of mobile devices and propose how mobile agents can facilitate such an implementation.
Chapter Preview
Top

Introduction

Security is becoming an escalating concern in an increasingly multimedia defined world. The recent emergence of embedded multimedia applications such as mobile-TV, video messaging, and telemedicine have increased the impact of multimedia and its security in our personal lives. For example, a significant increase in the application of distributed video surveillance technology to monitor traffic and public places has raised concerns regarding the privacy and security of the targeted subjects.

Multimedia content encryption has attracted more and more researchers and engineers owing to the challenging nature of the problem and its interdisciplinary nature in light of challenges faced with the requirements of multimedia communications, multimedia retrieval, multimedia compression and hardware resource usage.

With the continuing development of network communications (wired and wireless), ease of capturing videos and rapid advances in Internet technology and embedded computing systems multimedia data (images, videos, audios, etc.) is being used more and more widely, in applications such as video-on-demand, video conferencing, broadcasting, etc. Now, it is closely related to many aspects of daily life, including education, commerce, defense, entertainment and politics. In order to maintain privacy or security, sensitive data needs to be protected before transmission or distribution.

The advancements in ubiquitous network environment, and rapid developments in cloud computing has promoted the rapid delivery of digital multimedia data to the users.

Users are eager to not only enjoy the convenience of real-time video streaming but also share various media information in a rather cheap way without awareness of possibly violating copyrights. In view of these, encryption and watermarking technologies have been recognized as a helpful way in dealing with the copyright protection problem in the past decade. Encryption allows secure end-end communication of data while digital watermarking allows still faces some challenging difficulties for practical uses, there are no other techniques that are ready to substitute it.

Within the signal processing and multimedia communities, many schemes have been proposed for protecting sensitive information while allowing certain legitimate operations to be performed. These schemes typically lack a rigorous model of privacy, and their protection become questionable when scaled to large datasets. The cryptography community has long developed rigorous privacy models and provably secure procedures for data manipulations. However, these procedures are primarily designed for generic data. As a result, they usually lead to a blowup in computational costs and overheads when applied to real-life multimedia applications.

Complete Chapter List

Search this Book:
Reset