Content-Based Image Retrieval at the End of the Early Years
IEEE Transactions on Pattern Analysis and Machine Intelligence
JPEG 2000: Image Compression Fundamentals, Standards and Practice
JPEG 2000: Image Compression Fundamentals, Standards and Practice
JPEG2000: the upcoming still image compression standard
Pattern Recognition Letters
Ontology-Based Photo Annotation
IEEE Intelligent Systems
The automatic generation of formal annotations in a multimedia indexing and searching environment
HLTKM '01 Proceedings of the workshop on Human Language Technology and Knowledge Management - Volume 2001
Proceedings of the 2009 conference on Law, Ontologies and the Semantic Web: Channelling the Legal Information Flood
Proceedings of the 2009 conference on Law, Ontologies and the Semantic Web: Channelling the Legal Information Flood
Enabling multimedia metadata interoperability by defining formal semantics of MPEG-7 profiles
SAMT'06 Proceedings of the First international conference on Semantic and Digital Media Technologies
IEEE Transactions on Circuits and Systems for Video Technology
Overview of the MPEG-7 standard
IEEE Transactions on Circuits and Systems for Video Technology
The MPEG-7 visual standard for content description-an overview
IEEE Transactions on Circuits and Systems for Video Technology
Hi-index | 0.00 |
In the judicial domain, the multimedia contents have become an important source of data, producing severe storage requirements. Nevertheless, there is no protocol establishing how to obtain and store these legal multimedia files. JPEG2000 is one of the latest standards developed by the JPEG committee. It is composed by 13 different parts addressing the encoding, transmission and manipulation of still images and video. In this work, we discuss the suitability of some parts of the standard to deal with legal multimedia contents. We also propose a centralized database scheme where all the multimedia contents are stored. Furthermore, taking advantage of the features provided by the JPEG2000 framework, these files could be compressed and transmitted over the network, ensuring the access control and the data integrity, among other security tools.