A Real-Time Stream Authentication Scheme for Video Streams
نویسندگان
چکیده
منابع مشابه
Real Time Video Data Mining for Surveillance Video Streams
We extend our previous work [1] of the general framework for video data mining to further address the issue such as how to mine video data. To extract motions, we use an accumulation of quantized pixel differences among all frames in a video segment. As a result, the accumulated motions of segment are represented as a two dimensional matrix. Further, we develop how to capture the location of mo...
متن کاملReal time human detection in video streams
Detecting humans in films and videos is a challenging problem owing to the motion of the subjects, the camera and the background and to variations in pose, appearance, clothing, illumination and background clutter. We develop a detector for standing and moving people in videos, testing several different motions coding schemes and showing empirically that orientated histograms give the best over...
متن کاملSSVP: A congestion control scheme for real-time video streaming
In this paper, we present a new end-to-end protocol, namely Scalable Streaming Video Protocol (SSVP), which operates on top of UDP and is optimized for unicast video streaming applications. SSVP employs Additive Increase Multiplicative Decrease (AIMD)-based congestion control and adapts the sending rate by properly adjusting the inter-packet-gap (IPG). The smoothness-oriented modulation of AIMD...
متن کاملMotion Vector Recovery for Real-time H.264 Video Streams
Among the various network protocols that can be used to stream the video data, RTP over UDP is the best to do with real time streaming in H.264 based video streams. Videos transmitted over a communication channel are highly prone to errors; it can become critical when UDP is used. In such cases real time error concealment becomes an important aspect. A subclass of the error concealment is the m...
متن کامل1 Authentication Scheme for Distributed , Ubiquitous , Real - Time Protocols
Cryptographic authentication methodology proposed for use in the Internet require substantial resources when very large client populations are involved. Resource provisioning becomes especially important when time-critical services are involved. In the cast of timesynchronization services, a special case exists, since cryptographic keys must enforce valid lifetimes, but validating key lifetimes...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IPSJ Digital Courier
سال: 2006
ISSN: 1349-7456
DOI: 10.2197/ipsjdc.2.70