I have reviewed this document as part of the security directorate's ongoing effort to review all IETF documents being processed by the IESG. These comments were written primarily for the benefit of the security area directors. Document editors and WG chairs should treat these comments just like any other last call comments. This document describes the overview of internet Video codec applications and the corresponding requirements. However, it doesn't cover any security requirement. Section 5 on Security Consideration description doesn't make sense to me. It stats that not covering worst case of computational complexity/memory bandwidth can be considered as security vulnerability and lead to denial of services (DoS) in the case of attacks. why ? what are "the worst case of computational complexity/memory bandwidth"? why covering them can eliminate the "security vulnerability"? Linda Dunbar