• DocumentCode
    2018266
  • Title

    Architecture and secure implementation for video conferencing technique

  • Author

    Mishra, Manoj K. ; Mukhopadhyay, Susanta ; Biswas, G.P.

  • Author_Institution
    Dept. of Comput. Sci. & Eng., Indian Sch. of Mines, Dhanbad, India
  • fYear
    2015
  • fDate
    7-8 Feb. 2015
  • Firstpage
    1
  • Lastpage
    6
  • Abstract
    With rapid development of various multimedia technologies, ample amount of multimedia data are generated and transmitted for different usage incliding commercial, medical, military etc, and if they are not well protected, the data may be accessed by opponents or unauthorized users. Thus, security and privacy protection of the important messages have become important issues, and a number of techniques based on selective, entropy-based and/or complete encryption are developed. In this paper, we consider some existing cryptographic techniques namely trusted third-party, RSA, GDH.2, RC4 etc. and integrated themselves in such a way that an overall securiy protection to the video conferencing is achieved. Both the required block diagrams and the protools of the proposed scheme are provided, and a security and performance analysis show that it is well secured, computation-efficient and applicable for real life operations.
  • Keywords
    cryptographic protocols; data protection; public key cryptography; teleconferencing; video communication; GDH.2; RC4; RSA; cryptographic protocol; data privacy protection; data security; entropy-based encryption; group Diffie Hellman key agreement; multimedia technology; trusted third-party; video conferencing technique secure implementation; Ciphers; Encryption; Standards; Streaming media; Video coding; GDH.2; H.264/AVC; RC4; group public key; video conference; video encryption;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer, Communication, Control and Information Technology (C3IT), 2015 Third International Conference on
  • Conference_Location
    Hooghly
  • Print_ISBN
    978-1-4799-4446-0
  • Type

    conf

  • DOI
    10.1109/C3IT.2015.7060168
  • Filename
    7060168