Video streaming security: reliable hash chain mechanism using redundancy codes

  • Authors:
  • Emad Abd-Elrahman;Mohammed Boutabia;Hossam Afifi

  • Affiliations:
  • Telecom SudParis, Evry Cedex, France;Telecom SudParis, Evry Cedex, France;Telecom SudParis, Evry Cedex, France

  • Venue:
  • Proceedings of the 8th International Conference on Advances in Mobile Computing and Multimedia
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

The prospection of video streaming security has been changed considerably during the last years. With the new generation of hand healed devices and the delivery rate up to 2 Mb/s, the new prospection searched for fast security measures that have no great effects on the streaming fluidity. The hash chain has been largely used for such applications. The benefits from this deployment are the fast and the light calculations. But, the hash chain still suffers from some drawbacks related to chain link and robustness. This work studies different methods for achieving resynchronisation state for hash chain link. It also proposes a hybrid algorithm based on redundancy codes and windows flow which called Redundancy Code Synchronization Recovery State (RC-SRS). This technique merges the pros of all methods and avoids the cons of them. In the end, analytical and simulation results for the hybrid algorithm have been made. The results indicate that, that proposal has a good overall performance in terms of complexity and calculation time.