Video streaming security: Window-Based Hash Chain Signature combines with Redundancy Code: Youtube scenario as an Internet case study

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

This paper provides a performance study for securing media streaming based on hash chain methodology. We introduce a new technique that combines the signature of window-based hash chain with redundancy codes for achieving high reliability and robustness against many attacks. Also, the Window technique integrates the Time-Stamped which strongly eliminates the anti-replay attack. It will also control the management of many users accessing the same video in different instant times. The Window-Based algorithm with redundancy code will be compared against Packet-Based or just Block-Based video streaming security. The analytical and simulation results indicate that, the Window-Based Hash Chain Signature combine with Redundancy Code (WB & RC) is a good solution for video streaming security in terms of reliability and robustness. The times of signature creation and verification are accepted under the standard delay recommendations of real time applications. Our case study provides YouTube as a successful scenario over Internet. The privacy of YouTube will relay on a secure email in user access which represents an efficient way in mobility issue.

Original languageEnglish
Title of host publicationProceedings - 2010 IEEE International Symposium on Multimedia, ISM 2010
Pages33-40
Number of pages8
DOIs
Publication statusPublished - 1 Dec 2010
Event2010 IEEE International Symposium on Multimedia, ISM 2010 - Taichung, Taiwan, Province of China
Duration: 13 Dec 201015 Dec 2010

Publication series

NameProceedings - 2010 IEEE International Symposium on Multimedia, ISM 2010

Conference

Conference2010 IEEE International Symposium on Multimedia, ISM 2010
Country/TerritoryTaiwan, Province of China
CityTaichung
Period13/12/1015/12/10

Keywords

  • Component
  • Digital signature
  • Hash chain
  • Redundancy codes
  • Robustness
  • Video streaming

Fingerprint

Dive into the research topics of 'Video streaming security: Window-Based Hash Chain Signature combines with Redundancy Code: Youtube scenario as an Internet case study'. Together they form a unique fingerprint.

Cite this