Security in collaborative multimedia web-based art projects

被引:9
作者
Koukopoulos D.K. [1 ]
Styliaras G.D. [1 ]
机构
[1] University of Ioannina/Department of Cultural Heritage Management and New Technologies, Agrinio
关键词
Collaborative environments; Digital certificates; Intellectual property rights; Multimedia security; Role-based access control; Watermarking; Web-based digital art projects;
D O I
10.4304/jmm.5.5.404-416
中图分类号
学科分类号
摘要
We propose a web-based system for organizing the creation and the interaction in multimedia web-based environments that permit the collaboration among artists, audience, curators and publishers. This system uses a threelevel approach for handling security issues in multimedia projects. Especially, it applies authorization, digital certification and watermarking mechanisms on multimedia content. Authorization mechanism controls users operations in multimedia files based on a set of actions imposed on reallife scenarios. Digital certification mechanism ensures the secure content transfers among users and multimedia content server through Web. Digital watermarking mechanism handles copyright-protection and authentication issues that appear in multimedia systems applying a semantically secure watermark. The strength of our system considers multimedia content not as an atomic digital entity, but as a part of a project with a specific workflow that applies watermarking techniques in all its parts. © 2010 ACADEMY PUBLISHER.
引用
收藏
页码:404 / 416
页数:12
相关论文
共 29 条
[1]  
Bouna A.B., Chbeir R., Multimedia-basedauthorization and access control policy specification, Proc. of the 3rd ACM Workshop on Secure Web Services, pp. 61-68, (2006)
[2]  
Bouna A.B., Chbeir R., Marrara S., A multimedia access control language for virtual and ambient intelligence environments, Proc. of the 2007 ACM Workshop on Secure Web Services, pp. 111-120, (2007)
[3]  
Armeni S., Christodoulakis D., Kostopoulos I., Stamatiou Y.C., Xenos M., Proving copyright ownership using hard instances of computationally intractable problems, Proc. of the 8th Panhellenic Conference on Informatics, pp. 22-23, (2001)
[4]  
Cheeseman P., Kanefsky B., Taylor W., Where the really hard problems are, Int. Joint Conference On Artificial Intelligence, 1, pp. 331-337, (1991)
[5]  
Chen S., Shyu M., Zhao N., SMARXO: Towards secured multimedia applications by adopting RBAC, XML and object-relational database, Proc. of the 12th Annual ACM international Conference on Multimedia, pp. 432-435, (2004)
[6]  
Coyle K., Rights expression languages, Technical Report, the Library of Congress, (2004)
[7]  
Foo S.W., Xue F., Li M., A blind audio watermarking scheme using peak point extraction, IEEE Int. Symp. On Circuits and Systems, pp. 4409-4412, (2005)
[8]  
Garcia R., Gil R., Content Value Chains Modeling Using a Copyright Ontology, (2009)
[9]  
Garey M., Johnson D., Computers and Intractability, a Guide to The Theory of NP-completeness, (1979)
[10]  
Hartung F., Girod B., Watermarking of uncompressed and compressed video, J. Sig. Process, 66, 3, pp. 283-301, (1998)