Skip to main content

Parallel Security Video Streaming in Cloud Server Environment

  • Conference paper
  • First Online:
Intelligent Computing Theories and Application (ICIC 2021)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 12836))

Included in the following conference series:

  • 1598 Accesses

Abstract

With the rapid development of various multimedia, an increasing volume of multimedia data are being generated. Such data may include sensitive medical, commercial, and military imaging information. As the technology used to provide image information in a cloud based web system is being developed, important images that require protection are provided through internal intra networks without using the cloud server; the demand for the service is increasing. In terms of video security, several encryption algorithms have been applied to secure transmissions in recent years. A large number of multimedia encryption schemes are also used in real products. However, there is a problem where a third party can acquire an image by exploiting a security vulnerability in a cloud-based image transmission. We have focused our research on a cloud server environment that provides real-time service to transmit secure video with desirable encryption speed. However, security levels and video streaming quality should also be considered. Real-time streaming technology that provides secure real-time service for encrypted and unencrypted video without image degradation has not yet been reported. We obtained satisfactory results in the parallel security streaming development environment. The results of this study are evaluated and analyzed in the manuscript.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Disclosure Policy

The author(s) declare(s) that there is no conflict of interests regarding the publication of this article.

References

  1. George Amalarethinam, D.I.., Sai geetha, J.: Enhancing security level for public key cryptosystem using MRGA. In: World Congress on Computing and Communication Technologies (WCCCT), pp. 98–102 (2014). ISBN: 978-1-4799-2876-7

    Google Scholar 

  2. Ganapathy, G., Mani, K.: Add-on security model for public key cryptosystem based on magic square implementation. In: Proceedings of the world congress on Engineering and Computer Science , San Fransisco, USA, vol. 1 (2009 ). ISBN 978-988-7012-6-8

    Google Scholar 

  3. Rathod, H., Sisodia, M.S., Sharma, S.K.: Design and implementation of image encryption algorithm by using block based symmetric transformation algorithm (hyper image encryption algorithm). Int. J. Comput. Technol. Electron. Eng. (IJCTEE) 1(3) (2011). ISSN 2249–6343

    Google Scholar 

  4. Younes, M.A.B., Jantan, A.: Image encryption using block-based transformation algorithm. IAENG Int. J. Comput. Sci. 35(1), IJCS_35_1_03 (2008)

    Google Scholar 

  5. Kester, Q.-A.: Image encryption based on the RGB PIXEL transposition and shuffling. Int. J. Comput. Netw. Inf. Secur. 7, 43–50 (2013)

    Google Scholar 

  6. Gutub, A., Ankeer, M., Abu-Ghalioun, M., Shaheen, A., Alvi, A.: Pixel indicator high capacity technique for RGB Applications(WoSPA 2008). University of Sharjah, Sharjah (2008)

    Google Scholar 

  7. Slaggel, A.J.: Known-Plaintext Attack Against a Permutation Based VideoEncryption Algorithm (2004). http://eprint.iacr.org.

  8. Tang, L.: For encrypting and derypting MPEG video data efficiently. In: Proceedings of the Forth ACM International Multimedia Conference, pp. 219–230 (1996)

    Google Scholar 

  9. Shi, C., Bhargava, B..: Light weight MEPG video encryption algorithm. In: Proceeding of the International Conference on Multimedia, pp. 55–61 (1998)

    Google Scholar 

  10. Wang, H., Xu, C.: A new lightweight and scalable encryption algorithm for streaming video over wireless networks. In: International Conference on Wireless Network, pp. 180–185 (2007)

    Google Scholar 

  11. Meyer, J., Gadegast, F.: Security Mechanisms for Multimedia Data with the Example MPEG-1 video. Technical University of Berlin, Project Description of SECMPEG (1995)

    Google Scholar 

  12. “Draft ITU-T Recommendation and Final Draft International Standard of Joint Video Specification (ITU-T Rec. H.264/ISO/IEC 14496–10 AVC),” Joint Video Team(JVT), Doc. JVT-G050, Technical Report (2003)

    Google Scholar 

  13. Daemen, J., Rijmen, V.: AES proposal: the rijndael block cipher. Protom World Int.l, Katholieke Universiteit Leuven, ESAT-COSIC, Belgium, Technical Report (2002)

    Google Scholar 

  14. Abomhara, M., Zakaria, O., Khalifa, O.O.: An overview of video encryption techniques. Int. J. Comput. Theory Eng. 2(1), 1793–8201 (2010)

    Google Scholar 

  15. Shah, J., Saxena, V.: Video encryption: a survey. IJCSI Int. J. Comput. Sci. Issues 8(2) (2011). ISSN(Online): 1694–0814

    Google Scholar 

  16. Dongare, A.S., Alvi, A.S., Tarbani, N.M.: An efficient technique for image encryption and decryption for secured multimedia application. Int. Res. J. Eng. Technol. (IRJET) 04 (2017)

    Google Scholar 

  17. Merlyne Sandra Christina, C., Karthika, M., Vasanthi, M., Vinotha, B.: Video encryption and decryption using RSA algorithm. IJETT 33(7), 328–332 (2016)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mi-Young Kang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kang, MY. (2021). Parallel Security Video Streaming in Cloud Server Environment. In: Huang, DS., Jo, KH., Li, J., Gribova, V., Bevilacqua, V. (eds) Intelligent Computing Theories and Application. ICIC 2021. Lecture Notes in Computer Science(), vol 12836. Springer, Cham. https://doi.org/10.1007/978-3-030-84522-3_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-84522-3_28

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-84521-6

  • Online ISBN: 978-3-030-84522-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics