Filters








24,891 Hits in 5.6 sec

Optimal Coding for Streaming Authentication and Interactive Communication [chapter]

Matthew Franklin, Ran Gelles, Rafail Ostrovsky, Leonard J. Schulman
2013 Lecture Notes in Computer Science  
recoverable fraction of the stream is tight, and our scheme is optimal.  ...  Trivial solutions for error-correcting and authenticating data streams either suffer from a long delay at the receiver's end or cannot perform well when the communication channel is noisy.  ...  Our Results In this work we construct optimal encoding schemes for both interactive and noninteractive (streaming) communication, and show a dramatic difference between these two cases in the following  ... 
doi:10.1007/978-3-642-40084-1_15 fatcat:ednvxg7lbvdmzgehrbgvbwxeye

Optimal Coding for Streaming Authentication and Interactive Communication

Matthew Franklin, Ran Gelles, Rafail Ostrovsky, Leonard J. Schulman
2015 IEEE Transactions on Information Theory  
fraction of the stream is tight, and our scheme is optimal.  ...  Trivial solutions for error-correcting and authenticating data streams either suffer from a long delay at the receiver's end or cannot perform well when the communication channel is noisy.  ...  Our Results In this work we construct optimal encoding schemes for both interactive and non-interactive (streaming) communication, and show a dramatic difference between these two cases in the following  ... 
doi:10.1109/tit.2014.2367094 fatcat:4gj4f5vk6fb4pbvve3s5wfo6uu

An Optimized Content-Aware Authentication Scheme for Streaming JPEG-2000 Images Over Lossy Networks

Zhishou Zhang, Q. Sun, Wai-Choong Wong, J. Apostolopoulos, S. Wee
2007 IEEE transactions on multimedia  
This paper proposes an optimized content-aware authentication scheme for JPEG-2000 streams over lossy networks, where a received packet is consumed only when it is both decodable and authenticated.  ...  In a JPEG-2000 codestream, some packets are more important than others in terms of coding dependency and image quality.  ...  In this paper, we propose an optimized content-aware stream authentication scheme for various media streams over lossy networks.  ... 
doi:10.1109/tmm.2006.886281 fatcat:4j3g3z5flfaipc445phoo6gf6i

Special Issue on Recent Advances in Distributed Multimedia Communications

Chang Wen Chen, Wenjun Zeng, Ralf Steinmetz
2008 Proceedings of the IEEE  
This issue introduces recent developments in areas of distributed multimedia communications with theoretical and practical papers spanning a number of emerging and interdependent networking and communication  ...  The end-to-end quality of the authenticated media is optimized by allocating the authentication resources unequally across streamed packets based on their relative importance, thereby providing unequal  ...  The article BQuality-Optimized and Secure End-to-End Authentication for Media Delivery[ by Qibin Sun, John Apostolopoulos, Chang Wen Chen, and Shih-Fu Chang first demonstrates the needs for new approach  ... 
doi:10.1109/jproc.2007.910474 fatcat:cqcqvt3wnffkflezrwbqt5b5ye

Enhancing QoS in Mobile Learning Multimedia in Resource Constrained Environments

Nazir Ahmad
2016 International Journal of Computer Applications  
The paper achieved the goal by using optimization technique on both communication network and multimedia contents to reduce information loss, latency, and jitter with improved audiovisual quality among  ...  However, the streaming media must be compressed (coded) before process of streaming begins as such files are heavy.  ...  code [14] .  ... 
doi:10.5120/ijca2016908949 fatcat:jhmwvateb5bf7ee36oyiuzesie

Connecting the worlds: Multipoint videoconferencing integrating H.323 and IPv4, SIP and IPv6 with autonomous sender authentication

Hans L. Cycon, Gabriel Hege, Detlev Marpe, Mark Palkow, Thomas C. Schmidt, Matthias Wahlisch
2009 2009 IEEE 13th International Symposium on Consumer Electronics  
Its core components combine an advanced, highly efficient H.264/AVC video coding system. Session signaling follows the SIP standard and simultaneously supports IPv4 and IPv6.  ...  Built upon an underlying peer-to-peer communication scheme, it further supports advanced integration with legacy MCUs and thereby enables hybrid sessions that extend into the H.323 world.  ...  MEMBER AND STREAM AUTHENTICATION A.  ... 
doi:10.1109/isce.2009.5157038 fatcat:rlqjt7jpcfagdaqcaeulvg4lku

A Method for Efficient and Minimal Utilization of Mobile Resources for Multimedia Based on Interactive Streaming

Muhsina Muhammed, Hafsath C. A
2014 IOSR Journal of Computer Engineering  
Here, a method is being proposed to tackle efficient and minimal usage of mobile resources through interactive streaming where network and device parameters are collected and analyzed to enhance the multimedia  ...  experience, and thereby using the collected data for multimedia transcoding thus avoiding any wastage of bandwidth and mobile resources.  ...  Acknowledgement The authors wish to thank the Management, Principal and Head of the department (CSE) of Ilahia College of Engineering and Technology for their support and help in completing this work.  ... 
doi:10.9790/0661-16570812 fatcat:ha4wvgyt6fgllkkk5eqx2if5pm

Authentication of lossy data in body-sensor networks for healthcare monitoring

Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry
2012 2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON)  
(b) We develop a framework for optimising placement of network coding within the tree to maximise data verifiability for a given overhead and loss environment.  ...  In this paper we propose, analyse, and validate a practical, lightweight robust authentication scheme suitable for health-monitoring.  ...  If still better performance is desired, the optimization needs to be run for (1 − p ≈ 3%) to locate optimal placement for coding and provision more recovery overhead. VI.  ... 
doi:10.1109/secon.2012.6275814 dblp:conf/secon/AliSO12 fatcat:qgcigybbhjaqtcufavigq665sa

Joint Source-Channel-Authentication Resource Allocation and Unequal Authenticity Protection for Multimedia Over Wireless Networks

Z. Li, Q. Sun, Y. Lian, C.W. Chen
2007 IEEE transactions on multimedia  
In this work, we describe a framework for jointly coding and authenticating multimedia to be delivered over heterogeneous wireless networks.  ...  We then consider integrating UAP with specific source and channel-coding models, to obtain optimal end-to-end quality by the means of joint sourcechannel-authentication analysis.  ...  ., RSA, DSA) for stream authentication are expensive in terms of computation and communication overhead.  ... 
doi:10.1109/tmm.2007.893338 fatcat:cz4mj7gfargghdr53axujzfcpm

AMRITA remote triggered wireless sensor network laboratory framework

Maneesha Vinodini Ramesh, Preeja Pradeep, P. Divya, R. D. Arya Devi, P. Rekha, K. Sangeeth, Y. V. Rayudu
2013 Proceedings of the 11th ACM Conference on Embedded Networked Sensor Systems - SenSys '13  
The lab is accessible for all the students in the world through internet and it will provide an intuitive web-based interface, where registered users can access the code and do code editing.  ...  Central and local authentication agents serve a two level security mechanism which makes the system robust to security threats.  ...  which shows a live streaming video of the deployed sensor nodes and a Code editing panel for students to edit the programming codes for each experiment.  ... 
doi:10.1145/2517351.2517377 dblp:conf/sensys/RameshPDDRSR13 fatcat:jxjoypk5dffstchsxioxhj5taq

Kaleidoscope: A Cloud-Based Platform for Real-Time Video-Based Interaction

Diego Serrano, Hu Zhang, Eleni Stroulia
2016 2016 IEEE World Congress on Services (SERVICES)  
In this thesis, we develop a platform for multimedia streaming on mobile devices, enhanced with textual and touch-display interactions for a rich user experience.  ...  Mobile video streaming becomes increasingly useful in a variety of contexts (social interaction, education and entertainment) and increasingly feasible with the rapid development of wireless networks and  ...  Communication and Behavior In this section, we discuss communications and behaviors of social interactions and video streaming.  ... 
doi:10.1109/services.2016.22 dblp:conf/services/SerranoZS16 fatcat:jcy5t7q6sfdvbe5yrsfg4eqmne

Authentication of lossy data in body-sensor networks for cloud-based healthcare monitoring

Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry
2014 Future generations computer systems  
(b) We design a framework for optimising placement of network coding within the tree to maximise data verifiability for a given overhead and loss environment.  ...  In this paper we propose, analyse, and validate a practical, lightweight robust authentication scheme suitable for healthmonitoring.  ...  If still better performance is desired, the optimization needs to be run for (1 − p ≈ 3%) to locate optimal placement for coding and provision more recovery overhead.  ... 
doi:10.1016/j.future.2013.09.007 fatcat:2wevxgeyezatnijlnffhy7ca24

SMOCK: A Scalable Method of Cryptographic Key Management for Mission-Critical Wireless Ad-Hoc Networks

Wenbo He, Ying Huang, R. Sathyam, K. Nahrstedt, W.C. Lee
2009 IEEE Transactions on Information Forensics and Security  
Designed a WiFi-based content distribution community infrastructure for vehicular networks with erasure-coded cache at wireless access points (APs).  ...  '10]. • Constructing a testbed of Android phones and WiFi gateways for real-time monitoring applications, streaming multimedia and sensor reading in particular. • Development: Matlab, C++ (4,000 lines)  ... 
doi:10.1109/tifs.2008.2009601 fatcat:w3lvdr6ha5h5tbdarbuykdeeny

Smart and interactive ubiquitous multimedia services

Min Chen, Victor C. M. Leung, Rune Hjelsvold, Xu Huang
2012 Computer Communications  
Acknowledgements We would like to thank all the reviewers for their efforts and constructive comments.  ...  We would in particular like to thank Professor Marco Conti, the Editor-in-Chief, for his support and helpful suggestions during the very delicate stages of concluding the special issue.  ...  The authors show that this approach can be applied to support interactive video streaming with tight delay constraints, VCR controls, and new types of exploratory online interactive videos and video clickthrough  ... 
doi:10.1016/j.comcom.2012.07.012 fatcat:pmnvtfmnpraczak242zvabmmzy

Multicast deflector

Antonio Pinto, Manuel Ricardo
2008 Telecommunications Systems  
A possible mechanism for broadcasting multiple video channels over IP is to use IP multicast, and let each client decide about the reception of a channel.  ...  The secure IP multicast specified by the IETF MSEC working group is a candidate solution for securing these broadcast services.  ...  The adaptation of the solution proposed to different types of last mile media, simultaneously or not, arises also as interesting, particularly when considering group management and key distribution.  ... 
doi:10.1007/s11235-008-9108-y fatcat:glk6ivu7enehjcbllk7dy446qa
« Previous Showing results 1 — 15 out of 24,891 results