Researcher: Akkuş, İstemi Ekin
Name Variants
Akkuş, İstemi Ekin
Email Address
Birth Date
Search Results
Now showing 1 - 3 of 3
Publication Metadata only Peer-to-peer multipoint video conferencing using layered video(IEEE, 2006) N/A; Department of Electrical and Electronics Engineering; Department of Computer Engineering; Akkuş, İstemi Ekin; Civanlar, Mehmet Reha; Özkasap, Öznur; Master Student; Faculty Member; Faculty Member; Department of Electrical and Electronics Engineering; Department of Computer Engineering; Graduate School of Sciences and Engineering; College of Engineering; College of Engineering; N/A; 16372; 113507A new peer-to-peer architecture for multipoint video conferencing is presented. It targets end points with low bandwidth network connections (single video in and out), Allowing them to create a multipoint conference without any additional networking and computing resources than what is needed for a point-to-point conference. the new architecture is based on use of layered video coding with two layers at the end points. It allows each conference participant to see any other participant at any given time under all multipoint configurations of any number of users with a caveat that some participants may have to receive only the base layer video. Layered encoding approaches usable within this architecture are described. a protocol for implementation of the new approach has been developed and simulated. Its performance is analyzed.Publication Metadata only Secure transmission of video on an end system multicast using public key cryptography(Springer-Verlag Berlin, 2006) N/A; Department of Computer Engineering; Department of Electrical and Electronics Engineering; Akkuş, İstemi Ekin; Özkasap, Öznur; Civanlar, Mehmet Reha; Master Student; Faculty Member; Faculty Member; Department of Computer Engineering; Department of Electrical and Electronics Engineering; Graduate School of Sciences and Engineering; College of Engineering; College of Engineering; N/A; 113507; 16372An approach for securing video transmission on an end system multicast session is described. Existing solutions use encryption techniques that require the use of a shared key. Although they can achieve efficient encryption/decryption and meet the demands of realtime video, a publicly available service needing only the integrity and lion-repudiation of the message is not considered. In this study, we offer such a method using public key cryptography. This method can be used in an end system multicast infrastructure where video originates from one source, but spreads with the help of receiving peers. Two different methods are described and compared: 1) Encryption of the entire packet. 2) Encryption of the unique digest value of the transmitted packet (i.e. digitally signing). The receivers then check the integrity of the received packets using the public key provided by the sender. Also, this way the non-repudiation of the transmitted video is provided.Publication Metadata only Peer-to-peer multipoint video conferencing using layered video(Institute of Electrical and Electronics Engineers (IEEE), 2006) N/A; Department of Computer Engineering; N/A; Department of Electrical and Electronics Engineering; Özkasap, Öznur; Akkuş, İstemi Ekin; Civanlar, Mehmet Reha; Faculty Member; Master Student; Faculty Member; Department of Computer Engineering; Department of Electrical and Electronics Engineering; College of Engineering; Graduate School of Sciences and Engineering; College of Engineering; 113507; N/A; 16372A new peer-to-peer architecture for multipoint video conferencing is presented. It targets end points with low bandwidth network connections (single video in and out), allowing them to create a multipoint conference without any additional networking and computing resources than what is needed for a point-to-point conference. The new architecture is based on use of layered video coding with two layers at the end points. It allows each conference participant to see any other participant at any given time under all multipoint configurations of any number of users with a caveat that some participants may have to receive only the base layer video. Layered encoding approaches usable within this architecture are described. A protocol for implementation of the new approach has been developed and simulated. Its performance is analyzed.