Study on Classification of Network Streaming Media Encryption

Article Preview

Abstract:

Rapid development of the Internet, to provide streaming media business emergence of soil to grow, with the updated development of streaming media technology, it security problems more and more attention. In view of the breadth of media stream data storage and transfer, and easy features, making it more vulnerable to damage and attack, and the entire process has had to face very large data flows. Therefore, encryption of digital images and video special research is necessary on the issue.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

164-167

Citation:

Online since:

February 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] C. Shi and B. Bhargava, An efficient MPEG video encryption algorithm, in Proceedings Seventeenth IEEE Symposium on Reliable Distributed Systems, 1998, pages 381~386.

DOI: 10.1109/reldis.1998.740527

Google Scholar

[2] T.B. Maples and G.A. Spanos. Performance Study of a Selevtive Encryption Scheme for the Security of Networked, Real-time Video. In Proceedings of The 4th International Conference on Computer Communications and Network, September (2008).

DOI: 10.1109/icccn.1995.540095

Google Scholar

[3] Renato Iannella, Open Digital Rights Language(ODRL)Version 1. 1', IPR Systems, September 19, (2002).

Google Scholar

[4] Martyn Mallich. Mobile and Wireless Design Essentials. Wily Publishing, Inc (2003).

Google Scholar

[5] Hill R, Wang J, Nahrstedt K. Quantifying Non-functional Requirements: A Process Oriented Approach[C]. IEEE International Requirements Engineering Conference, Kyoto, Japan, 2004: 352-353.

DOI: 10.1109/icre.2004.1335697

Google Scholar

[6] WiegandSullivan G. Study of Final Committee Draft of Joint Video Specification (ITU-TRec.H. 264|ISO/IEC 14496-10 AVC), Draft2. JVT-G050d2, Pattaya, Thailand, (2003).

Google Scholar