Video streaming security: Reliable hash chainmechanism using redundancy codes

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The prospection of video streaming security has been changed considerably during the last years. With the new generation of hand healed devices and the delivery rate up to 2 Mb/s, the new prospection searched for fast security measures that have no great effects on the streaming fluidity. The hash chain has been largely used for such applications. The benefits from this deployment are the fast and the light calculations. But, the hash chain still suffers from some drawbacks related to chain link and robustness. This work studies different methods for achieving resynchronization state for hash chain link. It also proposes a hybrid algorithm based on redundancy codes and windows flow which called Redundancy Code Synchronization Recovery State (RC-SRS). This technique merges the pros of all methods and avoids the cons of them. In the end, analytical and simulation results for the hybrid lgorithm have been made. The results indicate that, that proposal has a good overall performance in terms of complexity and calculation time.

Original languageEnglish
Title of host publicationMoMM2010 - 8th International Conference on Advances in Mobile Computing and Multimedia
Pages69-76
Number of pages8
DOIs
Publication statusPublished - 1 Dec 2010
Event8th International Conference on Advances in Mobile Computing and Multimedia, MoMM2010 - Paris, France
Duration: 8 Nov 201010 Nov 2010

Publication series

NameMoMM2010 - 8th International Conference on Advances in Mobile Computing and Multimedia

Conference

Conference8th International Conference on Advances in Mobile Computing and Multimedia, MoMM2010
Country/TerritoryFrance
CityParis
Period8/11/1010/11/10

Keywords

  • Hash chain
  • Redundancy code
  • Resynchronisation
  • Streaming

Fingerprint

Dive into the research topics of 'Video streaming security: Reliable hash chainmechanism using redundancy codes'. Together they form a unique fingerprint.

Cite this