An Evaluation of Existing Metadata Compression and Encoding Technologies for MPEG-21 Applications
ISM '05 Proceedings of the Seventh IEEE International Symposium on Multimedia
An analysis of XML compression efficiency
Proceedings of the 2007 workshop on Experimental computer science
Design options and comparison of in-network H.264/SVC adaptation
Journal of Visual Communication and Image Representation
Selective encryption of the MC EZBC bitstream for DRM scenarios
Proceedings of the 11th ACM workshop on Multimedia and security
Efficient in-network adaptation of encrypted H.264/SVC content
Image Communication
Selected Areas in Cryptography
Scalable, Wavelet-Based Video: From Server to Hardware-Accelerated Client
IEEE Transactions on Multimedia
Selective encryption for consumer applications
IEEE Communications Magazine
Streaming video over the Internet: approaches and directions
IEEE Transactions on Circuits and Systems for Video Technology
Bidirectional MC-EZBC with lifting implementation
IEEE Transactions on Circuits and Systems for Video Technology
State-of-the-Art and Trends in Scalable Video Compression With Wavelet-Based Approaches
IEEE Transactions on Circuits and Systems for Video Technology
Hi-index | 0.00 |
Universal Multimedia Access (UMA) calls for solutions where content is created once and subsequently adapted to given requirements. With regard to UMA and scalability, which is required often due to a wide variety of end clients, the best suited codecs are wavelet based (like the MC-EZBC) due to their inherent high number of scaling options. However, most transport technologies for delivering videos to end clients are targeted toward the H.264/AVC standard or, if scalability is required, the H.264/SVC. In this paper we will introduce a mapping of the MC-EZBC bitstream to existing H.264/SVC based streaming and scaling protocols. This enables the use of highly scalable wavelet based codecs on the one hand and the utilization of already existing network technologies without accruing high implementation costs on the other hand. Furthermore, we will evaluate different scaling options in order to choose the best option for given requirements. Additionally, we will evaluate different encryption options based on transport and bitstream encryption for use cases where digital rights management is required.