Title :
Video Streaming Security: Window-Based Hash Chain Signature Combines with Redundancy Code - YouTube Scenario as an Internet Case Study
Author :
Abd-Elrahman, Emad ; Abid, Mohamed ; Afifi, Hossam
Author_Institution :
CNRS, Telecom SudParis, Evry, France
Abstract :
This paper provides a performance study for securing media streaming based on hash chain methodology. We introduce a new technique that combines the signature of window-based hash chain with redundancy codes for achieving high reliability and robustness against many attacks. Also, the Window technique integrates the Time-Stamped which strongly eliminates the anti-replay attack. It will also control the management of many users accessing the same video in different instant times. The Window-Based algorithm with redundancy code will be compared against Packet-Based or just Block-Based video streaming security. The analytical and simulation results indicate that, the Window-Based Hash Chain Signature combine with Redundancy Code (WB & RC) is a good solution for video streaming security in terms of reliability and robustness. The times of signature creation and verification are accepted under the standard delay recommendations of real time applications. Our case study provides You Tube as a successful scenario over Internet. The privacy of You Tube will relay on a secure email in user access which represents an efficient way in mobility issue.
Keywords :
Internet; cryptography; multimedia communication; redundancy; social networking (online); telecommunication security; video streaming; Internet case study; YouTube scenario; hash chain methodology; media streaming; redundancy code; video streaming security; window-based hash chain signature; Digital Signature; Hash Chain; Redundancy Codes; Robustness; Video Streaming;
Conference_Titel :
Multimedia (ISM), 2010 IEEE International Symposium on
Conference_Location :
Taichung
Print_ISBN :
978-1-4244-8672-4
Electronic_ISBN :
978-0-7695-4217-1
DOI :
10.1109/ISM.2010.15