CFP last date
20 December 2024
Reseach Article

Real time Video Streaming using Novel approach

Published on March 2012 by Mukesh Kumar, Jain Akash, B.A.Khivsara, Magar Padmakar, Baphana Abliasaha
International Conference in Computational Intelligence
Foundation of Computer Science USA
ICCIA - Number 8
March 2012
Authors: Mukesh Kumar, Jain Akash, B.A.Khivsara, Magar Padmakar, Baphana Abliasaha
ba24101f-d325-4397-9607-09ed7321c5e7

Mukesh Kumar, Jain Akash, B.A.Khivsara, Magar Padmakar, Baphana Abliasaha . Real time Video Streaming using Novel approach. International Conference in Computational Intelligence. ICCIA, 8 (March 2012), 16-20.

@article{
author = { Mukesh Kumar, Jain Akash, B.A.Khivsara, Magar Padmakar, Baphana Abliasaha },
title = { Real time Video Streaming using Novel approach },
journal = { International Conference in Computational Intelligence },
issue_date = { March 2012 },
volume = { ICCIA },
number = { 8 },
month = { March },
year = { 2012 },
issn = 0975-8887,
pages = { 16-20 },
numpages = 5,
url = { /proceedings/iccia/number8/5146-1058/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference in Computational Intelligence
%A Mukesh Kumar
%A Jain Akash
%A B.A.Khivsara
%A Magar Padmakar
%A Baphana Abliasaha
%T Real time Video Streaming using Novel approach
%J International Conference in Computational Intelligence
%@ 0975-8887
%V ICCIA
%N 8
%P 16-20
%D 2012
%I International Journal of Computer Applications
Abstract

Recently, multimedia security is becoming more important with the continuous increase in transmission of digital content and also in the digital communications. However, special and reliable security is needed in many digital applications (such as video conferencing ). The classical techniques for data security are not appropriate for the current multimedia usage like images and videos with very large file sizes. As a result, we need to develop new security protocols or adapt the available security protocols to be applicable for securing the multimedia applications. In spite of extensive research in multimedia security, encryption of MPEG video streaming using AES has not been studied. In this paper, the performance of AES in encrypting MPEG video is considered. The performance of AES is compared to two symmetric encryption techniques. Three data types (text, audio and video) are used to test the effectiveness of encrypting MPEG using AES.

References
  1. .X. Liu and A.M. Eskicioglu, "Selective Encryption of Multimedia Content in Distribution Networks: Challenges and New Directions",IASTED International Conference on Communications, Internet and Information Technology (CIIT 2003), Scottsdale, AZ, November 17-19,2003.
  2. . B.Gladman, "A Specification for Rijndael, the AES Algorithm," (http://fp.gladman.plus.coml, 2001).
  3. . Le Gall, Didier, "MPEG: A Video Compression Standard for Multimedia Applications," Communications of the ACM, vol.34, no.4, pp. 46-58, April 1991.
  4. An Overview of Video Encryption Techniques – IJCTE www.ijcte.org/papers/123- G604.pdf.
  5. T. B. Maples and G. A. Spanos. Performance Study of a Selective Encryption Scheme for the Security of Networked, Real- Time Video. In Proc. of Fourth International Workshop on Multimedia Software Development ’96), 1995.
Index Terms

Computer Science
Information Sciences

Keywords

AES algorithm Video conferencing Multimedia security Cryptography Encryption