Security and Trust in Mobile Multimedia

2008 ◽  
pp. 1812-1827
Author(s):  
Edgar R. Weippl

While security in general is increasingly well addressed, both mobile security and multimedia security are still areas of research undergoing major changes. Mobile security is characterized by small devices that, for instance, make it difficult to enter long passwords and that cannot perform complex cryptographic operations due to power constraints. Multimedia security has focused on digital rights management and watermarks; as we all know, there are yet no good solutions to prevent illegal copying of audio and video files.

Author(s):  
Edgar R. Weippl

While security in general is increasingly well addressed, both mobile security and multimedia security are still areas of research undergoing major changes. Mobile security is characterized by small devices that, for instance, make it difficult to enter long passwords and that cannot perform complex cryptographic operations due to power constraints. Multimedia security has focused on digital rights management and watermarks; as we all know, there are yet no good solutions to prevent illegal copying of audio and video files.


Author(s):  
Sai Ho Kwok

In the future, intellectual property protection will be a need for distributed media in mobile multimedia. With the constraints of mobile commerce and mobile technologies such as limited bandwidth and computing capability, new schemes of rights management emerge. Digital rights management (DRM) operations in these schemes differ from those in existing DRM solutions for electronic commerce. This chapter presents a general DRM framework for mobile multimedia based on current DRM, mobile network, mobile device, and payment technologies. The framework is partially referenced to the NTT DoCoMo i-mode model, which centralizes payment and maintains user information within the service center. This chapter also presents the basic operations of the general framework and illustrates how rights insertion, rights enforcement, and music sharing are realized under the framework.


Author(s):  
Eduardo Fernandez-Medina ◽  
Sabrina De Capitani di Vimercati ◽  
Ernesto Damiani ◽  
Mario Piattini ◽  
Pierangela Samarati

Multimedia content delivery applications are becoming widespread thanks to increasingly cheaper access to high bandwidth networks. Also, the pervasiveness of XML as a data interchange format has given origin to a number of standard formats for multimedia, such as SMIL for multimedia presentations, SVG for vector graphics, VoiceXML for dialog, and MPEG-21 and MPEG-7 for video. Innovative programming paradigms (such as the one of web services) rely on the availability of XML-based markup and metadata in the multimedia flow in order to customize and add value to multimedia content distributed via the Net. In such a context, a number of security issues around multimedia data management need to be addressed. First of all, it is important to identify the parties allowed to use the multimedia resources, the rights available to the parties, and the terms and conditions under which those rights may be executed: this is fulfilled by the Digital Rights Management (DRM) technology. Secondly, a new generation of security and privacy models and languages is needed, capable of expressing complex filtering conditions on a wide range of properties of multimedia data. In this chapter, we analyze the general problem of multimedia security. We summarize the most important XML-based formats for representing multimedia data, and we present languages for expressing access control policies. Finally, we introduce the most important concepts of the DRM technology.


Cyber Crime ◽  
2013 ◽  
pp. 228-244
Author(s):  
Edgar R. Weippl ◽  
Bernhard Riedl

While security in general is increasingly well addressed, both mobile security and multimedia security are still areas of research undergoing major changes. Mobile security is characterized by small devices that, for instance, make it difficult to enter long passwords and that cannot perform complex cryptographic operations due to power constraints. Multimedia security has focused on watermarks and the creation of digital evidences; as we all know, there are yet no good solutions to prevent illegal copying of audio and video files. In this chapter we focus on addressing the attributes of security, trust, and privacy on mobile devices and multimedia applications.


2008 ◽  
pp. 1288-1320
Author(s):  
Eduardo Fernandez-Medina ◽  
Sabrina De Capitani di Vimercati ◽  
Ernesto Damiani ◽  
Mario Piattini ◽  
Perangela Samarati

Multimedia content delivery applications are becoming widespread thanks to increasingly cheaper access to high bandwidth networks. Also, the pervasiveness of XML as a data interchange format has given origin to a number of standard formats for multimedia, such as SMIL for multimedia presentations, SVG for vector graphics, VoiceXML for dialog, and MPEG-21 and MPEG-7 for video. Innovative programming paradigms (such as the one of web services) rely on the availability of XML-based markup and metadata in the multimedia flow in order to customize and add value to multimedia content distributed via the Net. In such a context, a number of security issues around multimedia data management need to be addressed. First of all, it is important to identify the parties allowed to use the multimedia resources, the rights available to the parties, and the terms and conditions under which those rights may be executed: this is fulfilled by the Digital Rights Management (DRM) technology. Secondly, a new generation of security and privacy models and languages is needed, capable of expressing complex filtering conditions on a wide range of properties of multimedia data. In this chapter, we analyze the general problem of multimedia security. We summarize the most important XML-based formats for representing multimedia data, and we present languages for expressing access control policies. Finally, we introduce the most important concepts of the DRM technology.


Author(s):  
Edgar R. Weippl

While security in general is increasingly well addressed, both mobile security and multimedia security are still areas of research undergoing major changes. Mobile security is characterized by small devices that, for instance, make it difficult to enter long passwords and that cannot perform complex cryptographic operations due to power constraints. Multimedia security has focused on watermarks and the creation of digital evidences; as we all know, there are yet no good solutions to prevent illegal copying of audio and video files. In this chapter we focus on addressing the attributes of security, trust, and privacy on mobile devices and multimedia applications.


Sign in / Sign up

Export Citation Format

Share Document