DocumentCode
2018266
Title
Architecture and secure implementation for video conferencing technique
Author
Mishra, Manoj K. ; Mukhopadhyay, Susanta ; Biswas, G.P.
Author_Institution
Dept. of Comput. Sci. & Eng., Indian Sch. of Mines, Dhanbad, India
fYear
2015
fDate
7-8 Feb. 2015
Firstpage
1
Lastpage
6
Abstract
With rapid development of various multimedia technologies, ample amount of multimedia data are generated and transmitted for different usage incliding commercial, medical, military etc, and if they are not well protected, the data may be accessed by opponents or unauthorized users. Thus, security and privacy protection of the important messages have become important issues, and a number of techniques based on selective, entropy-based and/or complete encryption are developed. In this paper, we consider some existing cryptographic techniques namely trusted third-party, RSA, GDH.2, RC4 etc. and integrated themselves in such a way that an overall securiy protection to the video conferencing is achieved. Both the required block diagrams and the protools of the proposed scheme are provided, and a security and performance analysis show that it is well secured, computation-efficient and applicable for real life operations.
Keywords
cryptographic protocols; data protection; public key cryptography; teleconferencing; video communication; GDH.2; RC4; RSA; cryptographic protocol; data privacy protection; data security; entropy-based encryption; group Diffie Hellman key agreement; multimedia technology; trusted third-party; video conferencing technique secure implementation; Ciphers; Encryption; Standards; Streaming media; Video coding; GDH.2; H.264/AVC; RC4; group public key; video conference; video encryption;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer, Communication, Control and Information Technology (C3IT), 2015 Third International Conference on
Conference_Location
Hooghly
Print_ISBN
978-1-4799-4446-0
Type
conf
DOI
10.1109/C3IT.2015.7060168
Filename
7060168
Link To Document