Publication: Secure transmission of video on an end system multicast using public key cryptography
dc.contributor.department | N/A | |
dc.contributor.department | Department of Computer Engineering | |
dc.contributor.department | Department of Electrical and Electronics Engineering | |
dc.contributor.kuauthor | Akkuş, İstemi Ekin | |
dc.contributor.kuauthor | Özkasap, Öznur | |
dc.contributor.kuauthor | Civanlar, Mehmet Reha | |
dc.contributor.kuprofile | Master Student | |
dc.contributor.kuprofile | Faculty Member | |
dc.contributor.kuprofile | Faculty Member | |
dc.contributor.other | Department of Computer Engineering | |
dc.contributor.other | Department of Electrical and Electronics Engineering | |
dc.contributor.schoolcollegeinstitute | Graduate School of Sciences and Engineering | |
dc.contributor.schoolcollegeinstitute | College of Engineering | |
dc.contributor.schoolcollegeinstitute | College of Engineering | |
dc.contributor.yokid | N/A | |
dc.contributor.yokid | 113507 | |
dc.contributor.yokid | 16372 | |
dc.date.accessioned | 2024-11-09T23:38:32Z | |
dc.date.issued | 2006 | |
dc.description.abstract | An approach for securing video transmission on an end system multicast session is described. Existing solutions use encryption techniques that require the use of a shared key. Although they can achieve efficient encryption/decryption and meet the demands of realtime video, a publicly available service needing only the integrity and lion-repudiation of the message is not considered. In this study, we offer such a method using public key cryptography. This method can be used in an end system multicast infrastructure where video originates from one source, but spreads with the help of receiving peers. Two different methods are described and compared: 1) Encryption of the entire packet. 2) Encryption of the unique digest value of the transmitted packet (i.e. digitally signing). The receivers then check the integrity of the received packets using the public key provided by the sender. Also, this way the non-repudiation of the transmitted video is provided. | |
dc.description.indexedby | WoS | |
dc.description.indexedby | Scopus | |
dc.description.openaccess | NO | |
dc.description.volume | 4105 | |
dc.identifier.doi | N/A | |
dc.identifier.isbn | 3-540-39392-7 | |
dc.identifier.issn | 0302-9743 | |
dc.identifier.scopus | 2-s2.0-33750977841 | |
dc.identifier.uri | https://hdl.handle.net/20.500.14288/12966 | |
dc.identifier.wos | 241429800077 | |
dc.keywords | Encryption Time | |
dc.keywords | Chunk Size | |
dc.keywords | Secure Transmission | |
dc.keywords | Decryption Time | |
dc.keywords | Source Authentication | |
dc.language | English | |
dc.publisher | Springer-Verlag Berlin | |
dc.source | Multimedia Content Representation, Classification and Security | |
dc.subject | Computer science | |
dc.subject | Information systems | |
dc.subject | Theory methods | |
dc.title | Secure transmission of video on an end system multicast using public key cryptography | |
dc.type | Conference proceeding | |
dspace.entity.type | Publication | |
local.contributor.authorid | 0000-0002-6922-5684 | |
local.contributor.authorid | 0000-0003-4343-0986 | |
local.contributor.authorid | 0000-0002-6171-5814 | |
local.contributor.kuauthor | Akkuş, İstemi Ekin | |
local.contributor.kuauthor | Özkasap, Öznur | |
local.contributor.kuauthor | Civanlar, Mehmet Reha | |
relation.isOrgUnitOfPublication | 89352e43-bf09-4ef4-82f6-6f9d0174ebae | |
relation.isOrgUnitOfPublication | 21598063-a7c5-420d-91ba-0cc9b2db0ea0 | |
relation.isOrgUnitOfPublication.latestForDiscovery | 21598063-a7c5-420d-91ba-0cc9b2db0ea0 |