Abstract: The tremendous sharing of multimedia objects on the web shed the light on several privacy concerns related in essence to the safe publishing of end users ’ personal data. Providing techniques to protect multimedia objects faces several difficulties due to multimedia objects ’ heterogeneous and complex structure on one hand, and on the other hand, the wide range of information that could be used to describe their content. In this paper, we present a flexible security rule specification toolkit for multimedia objects. Our toolkit is based on a security model and a core ontology in which we populate the model’s related information and multimedia objects data. To specify security rules, we use the SWRL language in order to address bot...
Abstract: "Miró is a set of languages and tools that support visual specification of file system s...
Abstract—We propose a web-based system for organizing the creation and the interaction in multimedia...
In this paper we describe the most important security requirements, which must be fulfilled by today...
International audienceThe tremendous sharing of multimedia objects on the web shed the light on seve...
International audienceThe tremendous sharing of multimedia objects on the web shed the light on seve...
A message can be communicated to other people using a combination of pictures, sounds, and actions. ...
In this paper, we address the problem of representing domain knowledge for situation awareness in a ...
In this paper a novel "Smart Media" concept for semantic-based multimedia security and management is...
Abstract — In this paper, we address the problem of repre-senting domain knowledge for situation awa...
International audienceSharing and publishing images and photos have become the trend of nowadays (so...
structure and complexity, security mechanisms for multimedia data should be specific for each purpos...
In this Digital/Internet Age, digital multimedia holds an unlimited potential, and virtually all for...
Abstract. When sensitive information is exchanged with the user of a computer system, the security o...
Multimedia Security: Watermarking, Steganography, and Forensics outlines essential principles, techn...
Recently ubiquitous technology has invaded almost every aspect of the modern life. Several applicati...
Abstract: "Miró is a set of languages and tools that support visual specification of file system s...
Abstract—We propose a web-based system for organizing the creation and the interaction in multimedia...
In this paper we describe the most important security requirements, which must be fulfilled by today...
International audienceThe tremendous sharing of multimedia objects on the web shed the light on seve...
International audienceThe tremendous sharing of multimedia objects on the web shed the light on seve...
A message can be communicated to other people using a combination of pictures, sounds, and actions. ...
In this paper, we address the problem of representing domain knowledge for situation awareness in a ...
In this paper a novel "Smart Media" concept for semantic-based multimedia security and management is...
Abstract — In this paper, we address the problem of repre-senting domain knowledge for situation awa...
International audienceSharing and publishing images and photos have become the trend of nowadays (so...
structure and complexity, security mechanisms for multimedia data should be specific for each purpos...
In this Digital/Internet Age, digital multimedia holds an unlimited potential, and virtually all for...
Abstract. When sensitive information is exchanged with the user of a computer system, the security o...
Multimedia Security: Watermarking, Steganography, and Forensics outlines essential principles, techn...
Recently ubiquitous technology has invaded almost every aspect of the modern life. Several applicati...
Abstract: "Miró is a set of languages and tools that support visual specification of file system s...
Abstract—We propose a web-based system for organizing the creation and the interaction in multimedia...
In this paper we describe the most important security requirements, which must be fulfilled by today...