Abstract
With the rapid development of various multimedia, an increasing volume of multimedia data are being generated. Such data may include sensitive medical, commercial, and military imaging information. As the technology used to provide image information in a cloud based web system is being developed, important images that require protection are provided through internal intra networks without using the cloud server; the demand for the service is increasing. In terms of video security, several encryption algorithms have been applied to secure transmissions in recent years. A large number of multimedia encryption schemes are also used in real products. However, there is a problem where a third party can acquire an image by exploiting a security vulnerability in a cloud-based image transmission. We have focused our research on a cloud server environment that provides real-time service to transmit secure video with desirable encryption speed. However, security levels and video streaming quality should also be considered. Real-time streaming technology that provides secure real-time service for encrypted and unencrypted video without image degradation has not yet been reported. We obtained satisfactory results in the parallel security streaming development environment. The results of this study are evaluated and analyzed in the manuscript.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Disclosure Policy
The author(s) declare(s) that there is no conflict of interests regarding the publication of this article.
References
George Amalarethinam, D.I.., Sai geetha, J.: Enhancing security level for public key cryptosystem using MRGA. In: World Congress on Computing and Communication Technologies (WCCCT), pp. 98–102 (2014). ISBN: 978-1-4799-2876-7
Ganapathy, G., Mani, K.: Add-on security model for public key cryptosystem based on magic square implementation. In: Proceedings of the world congress on Engineering and Computer Science , San Fransisco, USA, vol. 1 (2009 ). ISBN 978-988-7012-6-8
Rathod, H., Sisodia, M.S., Sharma, S.K.: Design and implementation of image encryption algorithm by using block based symmetric transformation algorithm (hyper image encryption algorithm). Int. J. Comput. Technol. Electron. Eng. (IJCTEE) 1(3) (2011). ISSN 2249–6343
Younes, M.A.B., Jantan, A.: Image encryption using block-based transformation algorithm. IAENG Int. J. Comput. Sci. 35(1), IJCS_35_1_03 (2008)
Kester, Q.-A.: Image encryption based on the RGB PIXEL transposition and shuffling. Int. J. Comput. Netw. Inf. Secur. 7, 43–50 (2013)
Gutub, A., Ankeer, M., Abu-Ghalioun, M., Shaheen, A., Alvi, A.: Pixel indicator high capacity technique for RGB Applications(WoSPA 2008). University of Sharjah, Sharjah (2008)
Slaggel, A.J.: Known-Plaintext Attack Against a Permutation Based VideoEncryption Algorithm (2004). http://eprint.iacr.org.
Tang, L.: For encrypting and derypting MPEG video data efficiently. In: Proceedings of the Forth ACM International Multimedia Conference, pp. 219–230 (1996)
Shi, C., Bhargava, B..: Light weight MEPG video encryption algorithm. In: Proceeding of the International Conference on Multimedia, pp. 55–61 (1998)
Wang, H., Xu, C.: A new lightweight and scalable encryption algorithm for streaming video over wireless networks. In: International Conference on Wireless Network, pp. 180–185 (2007)
Meyer, J., Gadegast, F.: Security Mechanisms for Multimedia Data with the Example MPEG-1 video. Technical University of Berlin, Project Description of SECMPEG (1995)
“Draft ITU-T Recommendation and Final Draft International Standard of Joint Video Specification (ITU-T Rec. H.264/ISO/IEC 14496–10 AVC),” Joint Video Team(JVT), Doc. JVT-G050, Technical Report (2003)
Daemen, J., Rijmen, V.: AES proposal: the rijndael block cipher. Protom World Int.l, Katholieke Universiteit Leuven, ESAT-COSIC, Belgium, Technical Report (2002)
Abomhara, M., Zakaria, O., Khalifa, O.O.: An overview of video encryption techniques. Int. J. Comput. Theory Eng. 2(1), 1793–8201 (2010)
Shah, J., Saxena, V.: Video encryption: a survey. IJCSI Int. J. Comput. Sci. Issues 8(2) (2011). ISSN(Online): 1694–0814
Dongare, A.S., Alvi, A.S., Tarbani, N.M.: An efficient technique for image encryption and decryption for secured multimedia application. Int. Res. J. Eng. Technol. (IRJET) 04 (2017)
Merlyne Sandra Christina, C., Karthika, M., Vasanthi, M., Vinotha, B.: Video encryption and decryption using RSA algorithm. IJETT 33(7), 328–332 (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Kang, MY. (2021). Parallel Security Video Streaming in Cloud Server Environment. In: Huang, DS., Jo, KH., Li, J., Gribova, V., Bevilacqua, V. (eds) Intelligent Computing Theories and Application. ICIC 2021. Lecture Notes in Computer Science(), vol 12836. Springer, Cham. https://doi.org/10.1007/978-3-030-84522-3_28
Download citation
DOI: https://doi.org/10.1007/978-3-030-84522-3_28
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-84521-6
Online ISBN: 978-3-030-84522-3
eBook Packages: Computer ScienceComputer Science (R0)