Abstract
New kinds of application and the convolution of different media types require a specific approach to fulfill the arising security demands. In principle, the security of a multimedia system can be supplied on the level of the network, the application and the data. This paper concentrates on the security of the application and data level, decribes various requirements and outlines possible solutions to protect multimedia applications.
Chapter PDF
Similar content being viewed by others
Keywords
References
Gehrke, M. and Koch, E. (1995) A security platform for future telecommunication applications and services. In: Proc. of the 6th Joint European Networking Conference (JENC6), Tel Aviv.
Koch, E. and Zhao J. (1995) Towards robust and hidden image copyright labeling. In: Proc. of IEEE Workshop on Nonlinear Signal and Image Processing, Neos Marmaras.
Krannig, A. (1996) PLASMA - Platform for secure multimedia applications. In Communications and Multimedia Security,IFIP Joint Working Conference TC-6 and TC-11, Essen, to be published.
Macq, B. and Quisquater, J.J. (1995) Cryptology for digital TV broadcasting. In: Proc. of the IEEE, vol. 83, no. 6.
RFC 1508, 1509 (1993), Generic Security Service API.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1996 Springer Science+Business Media Dordrecht
About this chapter
Cite this chapter
Koch, E. (1996). How to Protect Multimedia Applications. In: Encarnação, J.L., Rabaey, J.M. (eds) Mobile Communications. IFIP — The International Federation for Information Processing. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-34980-0_32
Download citation
DOI: https://doi.org/10.1007/978-0-387-34980-0_32
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-5857-3
Online ISBN: 978-0-387-34980-0
eBook Packages: Springer Book Archive