CFP last date
20 December 2024
Reseach Article

Dynamic Video Conferencing with Fully Secured Encryption Algorithms

by Y.V. Srinivasa Murthy, Dr. S. C. Satapathy, Ch Rajesh, P Tejnadh Reddy
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 34 - Number 8
Year of Publication: 2011
Authors: Y.V. Srinivasa Murthy, Dr. S. C. Satapathy, Ch Rajesh, P Tejnadh Reddy
10.5120/4123-5998

Y.V. Srinivasa Murthy, Dr. S. C. Satapathy, Ch Rajesh, P Tejnadh Reddy . Dynamic Video Conferencing with Fully Secured Encryption Algorithms. International Journal of Computer Applications. 34, 8 ( November 2011), 49-55. DOI=10.5120/4123-5998

@article{ 10.5120/4123-5998,
author = { Y.V. Srinivasa Murthy, Dr. S. C. Satapathy, Ch Rajesh, P Tejnadh Reddy },
title = { Dynamic Video Conferencing with Fully Secured Encryption Algorithms },
journal = { International Journal of Computer Applications },
issue_date = { November 2011 },
volume = { 34 },
number = { 8 },
month = { November },
year = { 2011 },
issn = { 0975-8887 },
pages = { 49-55 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume34/number8/4143-5998/ },
doi = { 10.5120/4123-5998 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:20:35.013852+05:30
%A Y.V. Srinivasa Murthy
%A Dr. S. C. Satapathy
%A Ch Rajesh
%A P Tejnadh Reddy
%T Dynamic Video Conferencing with Fully Secured Encryption Algorithms
%J International Journal of Computer Applications
%@ 0975-8887
%V 34
%N 8
%P 49-55
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper is mainly concerned with the internal details of a runtime platform for teleconferencing and all the study and research work done in improving the runtime platform so as to not to use it as a stand-alone application but to support reuse of its components. The platform designed has three functionalities. Converts the captured video into .x file format, Encrypt the data file and transfer it over the network and Create connections dynamically. The main objective of the paper is to facilitate a single application to handle various scenarios. Code and other resource reuse are possible for development of new applications. This concept is also economical as it reduces the number of connections at a point of time. Owing to the runtime creation of the connections, the unwanted connections are not present. The teleconferencing is networked multimedia application which requires real time audio-video streaming and collaboration among the conference participants. Tele-conference application like tele-tutoring involves many scenarios under single application, requiring an application platform to deal with the dynamic changing scenarios. The main objective of this paper is to develop a runtime platform for fast implementation of the multimedia application with conference character and collaborative feature. Dynamic change of the connection structure among the different scenarios is proposed here.

References
  1. Chris Greenhalgh. 1997. “Analysing movement and world transitions in virtual reality tele-conferencing”. In Proceedings of the fifth conference on European Conference on Computer-Supported Cooperative Work (ECSCW'97), John A. Hughes, Wolfgang Prinz, Tom Rodden, and Kjeld Schmidt (Eds.). Kluwer Academic Publishers, Norwell, MA, USA, 313-328.
  2. Chris Greenhalgh and Steven Benford 1995. “MASSIVE:A Collaborative Virtual Environment for TeleConferencing”. ACM Trans. Comput-Hum. Interact. 2,3 (Sep – 1995), 239 – 261. DOI = 10.1145/210079.210088
  3. H. Schwarz , D. Marpe and T. Wiegand "Overview of the scalable video coding extension of the H.264/AVC standard", IEEE Trans. Circuits Syst. Video Technol., vol. 17, , 2007.
  4. M. Wien , H. Schwarz and T. Oelbaum "Performance analysis of SVC", IEEE Trans. Circuits Syst. Video Technol., vol. 17, p.1194 , 2007.
  5. Lawrence C. Washington and Wade Trappe. 2002. “Introduction to Cryptography: With Coding Theory” (1st ed.). Prentice Hall PTR, Upper Saddle River, NJ, USA.
  6. Johannes B, Martin Otto, and Jean-Pierre Seifert. 2003.“A new CRT - RSA algorithm secure against bellcore attacks.” In Proceedings of the 10th ACM conference on Computer and communications security (CCS '03). ACM, New York, NY, USA, 311-320. DOI=10.1145/948109.948151
  7. Xiao L, Liu Y H and Ni M L “Improving Unstructured peer- to-peer systems by adaptive connection establishment” IEEE Transactions on Computers 2005, 54(9): 1091 – 1103.
  8. BETEUS, “Broadband Exchange For Trans-European Usage”, Technical Annex, Project Number: M1010, 1994.
  9. BETEUS, “Broadband Exchange For Trans-European Usage”, Technical Annex, Project Number: M1010, 1994.
  10. BETEUS Consortium, “BETEUS Application Platform Detailed Specification”, Deliverable D6, November 1994.
  11. BETEUS Consortium, “BETEUS Communication Platform Specification”, Deliverable D5, October 1994.
  12. LIU Xiao-jun(Chinese People's Armed Police Forces Academy, Hebei Langfang 065000, China);”Design and Realization of High Definition Video Capture Card Based on HD-SDI”;Video Engineering;2009-01
  13. Marius Preda, Blagica Jovanova, Ivica Arsov, and Franoise Prteux. 2007. “Optimized MPEG-4 animation encoder for motion capture data”. In Proceedings of the twelfth international conference on 3D web technology (Web3D '07). ACM, New York, NY, USA, 181 - 190. DOI=10.1145/1229390.1229425
  14. K. Brandenburg, G. Stoll, F. Dehery, and J. D. Johnston. “The ISO-MPEG-1 audio: A generic standard for coding of high-quality digital audio”. Journal of the Audio Engineering Society, 42(10): 780–792, October 1994.
  15. K. L. Gong, “Parallel MPEG – 1 Video Encoding”, MS thesis, Department of EECS, University of California at Berkeley, May 1994. Issued as Technical Report 811
  16. L. Qiao and K. Nahrstedt. “A New Algorithm for MPEGVideo Encryption” In Proceedings of the first International Conference on Imaging Science, Systems, and Technology (CISST’97), Pages 21 – 29, Las Vegas, Nevada, July 1997.
  17. W. S. Stallings, "Network security Essentials", Second Edition, Prentice-Hall, 2000.
Index Terms

Computer Science
Information Sciences

Keywords

Tele Conferencing Encryption Video Conferencing Capture Network Security