A Dual Channel Technique for Content Protection in IPTV
|
|
- Emory Golden
- 6 years ago
- Views:
Transcription
1 International Journal of Electronics and Computer Science Engineering 370 Available Online at ISSN A Dual Channel Technique for Content Protection in IPTV Ashish Kumar 1 Jaishree Tanwar 2 Chandresh Bakliwal 3 Arya Institute of Engineering and Technology, Kukas, Jaipur. #1 aishshub@gmail.com #2 jaishreetanwar86@gmail.com #3 chandresh.2410@gmail.com Abstract- With the introduction of IPTV (Internet Protocol Television), traditional wireline content providers and service providers are entering a new era of delivering broadcast and Video on demand(vod) services to their customers. The Content Protection has becoming an extremely important issue as the use of IPTV services are increasing over the Internet. In this paper, we are proposing a new method for improving the performances of the settop box (STB) for video on demand(vod) feature for IPTV. Here we are replacing the traditional complete encryption, partial encryption and selective encryption by a dual channel based encryption scheme, which can resist the content leakage or avoid illegal copying and playing of video. Keywords:IPTV, VOD, Content Protection, STB, Dual channel encryption scheme. I. INTRODUCTION IPTV) is a system that delivers digital television services over the internet by using Internet Protocol suite[1]. The video channels and programs are delivered to the television sets through a broadband connection, instead of being delivered through conventional terrestrial, satellite signal, and cable television formats. The video streams are encoded as a series of IP packets and then carried out by the public internet means which can be received by customer by having a set-top box and service subscription. IPTV services are classified into three main groups i.e., time-shifted television, live television and video on demand (VOD). The time-shifted television that replays a TV show that was broadcast hours or days ago. Live television uses Internet Group Management Protocol (IGMP) [2] to connect to a multicast stream, with or without interactivity related to the current TV show; while video on demand (VOD) uses the Real Time Streaming Protocol (RTSP) to browse a catalog of videos, not related to TV programming and to transmit media stream. IPTV can be bundled with other internet protocol services, including VoIP and high-speed Internet access which is referred as Triple Play service. So the services provided by IPTV is a complete package that allows customers to watch TV, browser the internet and making a long distance calls using the VoIP. In order to receive the IPTV signals a computer or a television set with a set-top box is required[2]. In IPTV related services, such as cable TV, terrestrial TV and VOD, content security is an important issue. Generally, there are 2 main types of technological solutions to current Content Protection in IPTV systems. The one is IP CAS(IP Conditional Access System), which is similar to the conventional Conditional Access (CA) system applied in digital television (DTV). The other one is IP DRM, whose solutions are often intended to be cross-platform to work on PCs, PDAs and mobile phones as well.[3] Generally, Conditional Access (CA) technique [4][5][6] which is similar to IP CAS, is used to control the TV program view. It is implemented by Set- top box which decrypts the program that is encrypted at the head-end. Two kinds of CA systems have been reported till now, i.e., smartcard based system and PC-card based system. The former one is widely used in TV set that is popular in families. The Digital Rights Management (DRM) systems [7][8] are proposed to protect multimedia services from illegal users, but they not capable in solving the problems in IPTV. Park et al. [9] proposed the content
2 IJECSE, Volume2, Number 1 Ashish Kumar et al. 371 distribution system based on MPEG-4 ISMACryp protocol in IP set-top box environments, which implements the secure DRM client in set-top box. Wang et al. [10] invented a software for IPTV STB, which makes IPSTB able to protect itself from failure updating. Lin and Chen [11] proposed a method to control the Set-Top Box by mobile devices. Shiguo Lian[12] proposed the lightweight packet encryption instead of traditional complete encryption in order to reduce the time cost. This paper is arranged as follows. In Section 2, basic IPTV architecture and functional block IP STB are dicussed. In Section 3, the works related to STB, media encryption are introduced. The proposed scheme is presented in Section 4. Finally, in Section 5, conclusions are drawn and future work is presented. II. IPTV Architecture A. General view A sample IPTV system is shown in figure 1. This diagram depicts the IPTV system gathering content from various sources including stored media, network feeds, live studio sources and communication links. Figure.1: Basic IPTV Architecture The head end of IPTV(where the TV program is encrypted) is converting the media sources into a new form, which is easier to be managed and distributed. The content management system is designed to manage media at scheduled times i.e. to store, move and send out the media.the users who are connected to the IPTV system get multiple channels simultaneously by distribution system. The user can view IPTV programs on analog televisions converted by an adapter box known as IP set top box, on a computer or on IP televisions[13]. B.Viewing devices (STB) The functional block diagram of an IP STB is shown in figure 2. This diagram shows that the IP packets that are encapsulated in Ethernet packets are received by IP STB. Then the IP STB extracts the IP packets and obtain the transport stream. For detection and correction of errors, channel decoder is used which provides the transport stream to descrambler. The key information is received by descrambler assembly either from a smart card or from an external conditional access system.
3 A Dual Channel Technique for Content Protection in IPTV 372 Figure.2: Architecture of a generic IPTV Set-Top Box By using the keys, the IP STB can easily decode the transport stream and the specific program stream which is encapsulated in the IP packet, is extracted by the program selector that the user has selected. Then to obtain the program information, the IP STB then demultiplexes the transport stream. The program table let the IP STB to know which streams are for audio, video and any other media for that specific program. Finally, the program stream is divided into its elementary streams (audio, video and control) which is then supplied to a compositor that creates the video signal that will be displayed by the television[13]. III. RELATED WORK A. Set-Top Box Importance in IPTV The set-top box in IPTV realizes the receiving and conversion of the TV program or content [9][10], as shown in figure.3. We have discussed that the STB decodes the IP data packets and decompress the TV contents. Simultaneously some CA related operations are also performed by STB, including content decryption, key authentication, key decryption, etc for security. We will focus only on the operations on the TV content, taking the scheme of content distribution in [9]. Figure.3: Set-Top Box In IPTV
4 IJECSE, Volume2, Number 1 Ashish Kumar et al. 373 At IPTV head-end, the TV contents are compressed with MPEG-4, then encrypted using ISMACryp, and at last, encoded with streaming protocols. The TV streaming in STB, is firstly decoded using streaming protocols, then decrypted using ISMACryp, and lastly, decompressed with MPEG-4. In the existing IPTV scheme, there exists challenging problem, i.e., content leakage between the IPTV sever and STB. Thus, the content can be accessed by the unauthorized or illegal customers. B. Multimedia Encryption One of the key techniques in CA or DRM systems is Multimedia encryption, which convert multimedia content into an unintelligible form under the control of the key. The method encrypts the compressed media content with traditional cipher directly and completely [9][14]. This method is known as complete encryption, having high computing complexity as it encrypts the whole data stream. Alternative method, i.e. partial encryption [15] is proposed to reduce the encrypted data volumes. This kind of method for encryption selects sensitive parameters from media data, that depends on the multimedia data format. Another method, called as compression-combined encryption [16], combines encryption with compression and keep file format unchanged. IV. PROPOSED DUAL CHANNEL SCHEME A clear need for a security mechanism is required which can act between the video on demand server and the customer set top box. Both should run a secure protocol which not only encrypt the video data but also avoid illegal copying and playing. Here we propose a novel technique for encryption of videos demanded by digital TV subscribers. As the name suggests the scheme converts the original video into dual channel data. Each of the channel does not have complete information about the original video. The video data is divided into two files which have the video frames to be played in a scrambled sequence. This dual channel division is unique for every video and for every subscriber. So to access the video only a genuine subscriber is authenticated. All the secret keys required to generate and scramble the dual channel frames are seeded over the subscriber id. The proposed architecture for video on demand feature for IPTV comprises of several modules. These modules interact with each other at different levels to generate a better and secure strategy. The vaious modules are VOD server, Encoding server, transmission channel and set top box (STB). Each of them serve a particular purpose for the system. Several permanent and temporary storages are also used. Permanent storage is at VOD server where all the videos are kept. These are properly indexed for efficient searching. V.CONCLUSIONS AND FUTURE WORK This paper proposed a dual channel scheme to improve the existing set-top box based secure multimedia distribution schemes. That will restrict the unauthorized or illegal access of the digital TV content as well as the various services offered by IPTV. To implement this scheme in various platforms is our future work. References [1] ITU-T IPTV Focus Group (FG IPTV). [2] Engineers Garage inspiring Creations. page=2 [3] ZHANG Hua, CHEN Chunxiao, ZHAO Li, YANG Shiqiang, ZHOU Lizhu, Content Protection for IPTV-current state of the art and challenges, IMACS Multiconference on "Computational Engineering in Systems applications "(CESA), October 4-6, 2006, Beijing,
5 374 A Dual Channel Technique for Content Protection in IPTV China. [4] T. Jiang, Y. Hou and S. Zheng, "Secure Communication between Settop Box and Smart Card in DTV Broadcasting," IEEE Transactions on Consumer Electronics, Vol. 50, No. 3, AUGUST 2004, pp [5] F. Tu, et al., "On key distribution management for conditional access system on Pay-TV system," IEEE Trans. on Consumer Electronics, Vol.45. Feb 1999, pp [6] T. Jiang et al., "Key distribution based on hierarchical access control for Conditional Access System in DTV broadcast," IEEE Trans. On Consumer Electronics, Vol. 50. Feb 2004, pp [7] Open Mobile Alliance (OMA). [8] Internet Streaming Media Alliance (ISMA). [9] S. Park, J. Jeong, and T. Kwon, "Contents Distribution System Based on MPEG-4 ISMACryp in IP Set-top Box Environments," IEEE Transactions on Consumer Electronics, Vol. 52, No. 2, MAY [10] Q. Wang, Q. Du, G. Lin, "IPTV STB Software Update Scheme Based on SNMP," 2006 IEEE International Conference on Electro/information Technology, May 2006, page(s): [11] C.-C. Lin and M.-S. Chen, "On Controlling Digital TV Set-Top-Box by Mobile Devices via IP Network," Proceedings of the Seventh IEEE International Symposium on Multimedia (ISM 05), [12] Shiguo Lian, Member, IEEE, Zhongxuan Liu, Member, IEEE, Secure Media Content Distribution Based on the Improved Set-Top Box in IPTV, IEEE Transactions on Consumer Electronics, Vol. 54, No. 2, MAY 2008 [13] Radu ARSINTE, an experimental architecture for basic iptv concepts implementation and testing, acta technica napocensis Volume 49, Number 4, [14] R. A. Mollin. An Introduction to Cryptography, 2nd edition. CRC Press,2006. [15] S. Lian, Z. Liu, Z. Ren, H. Wang, "Secure Advanced Video Coding Based on Selective Encryption Algorithms," IEEE Transactions on Consumer Electronics, Vol. 52, No. 2, pp , May [16] B. Furht, D. Kirovski. Multimedia encryption and authentication techniques and applications. Boca Raton, Fla.: Auerbach Publications, 2006.
The Analysis and Research of IPTV Set-top Box System. Fangyan Bai 1, Qi Sun 2
Applied Mechanics and Materials Online: 2012-12-13 ISSN: 1662-7482, Vols. 256-259, pp 2898-2901 doi:10.4028/www.scientific.net/amm.256-259.2898 2013 Trans Tech Publications, Switzerland The Analysis and
More informationSecure Communication in Digital TV Broadcasting
IJN International Journal of omputer cience and Network ecurity, VOL.8 No.9, eptember 2008 ecure ommunication in Digital TV Broadcasting Hyo Kim Division of Digital Media, Ajou University, Korea ummary
More informationThe Functional User Requirement Analysis of a Web Broadcasting Management System
The Functional User Requirement Analysis of a Web Broadcasting Management System Gyeyoung Lee, Jaegeol Yim Dept. of Computer Engineering, Dongguk University at Gyeongju Korea {lky, yim}@dongguk.ac.kr Abstract.
More informationReducing IPTV Channel Zapping Time for Scrambled Services
Reducing IPTV Channel Zapping Time for Scrambled Services Y.S. Hong and T.G.Kim Dongguk University Department of Computer Engineering Seoul Korea {hongys, ashes}@dgu.edu Abstract In general, IPTV is defined
More informationIPTV Explained. Part 1 in a BSF Series.
IPTV Explained Part 1 in a BSF Series www.aucklandsatellitetv.co.nz I N T R O D U C T I O N As a result of broadband service providers moving from offering connectivity to services, the discussion surrounding
More informationITU-T. FS-VDSL White Paper. Full-Service VDSL. Focus Group White Paper. FS-VDSL Service Scenarios INTERNATIONAL TELECOMMUNICATION UNION
INTERNATIONAL TELECOMMUNICATION UNION ITU-T TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU FS-VDSL White Paper Full-Service VDSL Focus Group White Paper FS-VDSL Service Scenarios Version 1.00 29 November
More informationAnalysis of quality parameters influence to translation of IPTV service
Analysis of quality parameters influence to translation of IPTV service RASA BRŪZGIENĖ, LINA NARBUTAITĖ, TOMAS ADOMKUS Department of Telecommunications Kaunas University of Technology Studentų st. 50-452,
More informationCommon Home use IPTV Examples. YouTube Roku Apple TV Verizon Fios Triple Play (Internet, TV, Phone)
What is IPTV? Internet Protocol television (IPTV) is a system through which television services are delivered using the Internet protocol suite over a packet-switched network such as a LAN or the Internet,
More informationHSTP-IPTV-GUIDE.1 IPTV
I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU Technical Paper (27 October 2017) HSTP-IPTV-GUIDE.1 IPTV service deployment scenarios
More informationCloud Movie: Cloud Based Dynamic Resources Allocation And Parallel Execution On Vod Loading Virtualization
Cloud Movie: Cloud Based Dynamic Resources Allocation And Parallel Execution On Vod Loading Virtualization Akshatha K T #1 #1 M.Tech 4 th sem (CSE), VTU East West Institute of Technology India. Prasad
More informationHands-On Triple Play / IPTV for TeleCommunications
Hands-On for TeleCommunications BICSI CECs This course has been approved for CEC credits by BICSI. Please read below for a breakdown of the credits that we offer for this course. For more information regarding
More informationDesign and Implementation of Remote Push System of Resources Based on Internet
2010 3rd International Conference on Computer and Electrical Engineering (ICCEE 2010) IPCSIT vol. 53 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V53.No.1.16 Design and Implementation
More informationNext-generation IPTV Service
: Recent Trends in IPTV Technologies Next-generation IPTV Service Katsuhiko Kawazoe, Satoshi Hayama, Tatsuo Matsuoka, and Junichi Kishigami Abstract NTT is developing next-generation Internet protocol
More informationSERIES J: CABLE NETWORKS AND TRANSMISSION OF TELEVISION, SOUND PROGRAMME AND OTHER MULTIMEDIA SIGNALS Digital transmission of television signals
International Telecommunication Union ITU-T J.281 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (03/2005) SERIES J: CABLE NETWORKS AND TRANSMISSION OF TELEVISION, SOUND PROGRAMME AND OTHER MULTIMEDIA
More informationThis paper discusses home networks that can deliver video as well as data and their growing sophistication and capacity.
Hybrid Coax/PLC Video Distribution Home Networks This paper discusses home networks that can deliver video as well as data and their growing sophistication and capacity. Hybrid networks are based on existing
More informationEvolving Telecommunications to Triple Play:
Hands-On Evolving Telecommunications to Triple Play: IPTV, VoIP and TV Delivery Systems for System Engineers-DataCom Course Description With the introduction of Next Generation Networks to telecommunications
More informationNetwork Security: Broadcast and Multicast. Tuomas Aura T Network security Aalto University, Nov-Dec 2011
Network Security: Broadcast and Multicast Tuomas Aura T-110.5241 Network security Aalto University, Nov-Dec 2011 Outline 1. Broadcast and multicast 2. Receiver access control (i.e. data confidentiality)
More informationITU/CITEL-PCC.I Seminar on Bridging the Standardization Divide. IPTV Standardisation Activities
ITU/CITEL-PCC.I Seminar on Bridging the Standardization Divide IPTV Standardisation Activities Keith Mainwaring, Technical Leader, Cisco Agenda DVB Digital Video Broadcasting project ETSI TISPAN European
More informationFigure 1. The IP network
Broadband access connections at data rates of 250 Kbits/sec or more will exert a profound impact on society. Broadband access is the key to the convergence of communication, computers, and consumer applications
More informationForensic Audio Watermarking for Digital Video Broadcasting
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Forensic Audio Watermarking for Digital Video Broadcasting by Yuanyuan Sun Supervisor: Dr.D.S.Jarnikov August 2009 Abstract
More informationImage Watermarking by SCHUR Decomposition
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 12 (2014), pp. 1155-1159 International Research Publications House http://www. irphouse.com Image Watermarking
More informationTriple Play Network Analysis with the Viavi J6900A Triple Play Analyzer
Triple Play Network Analysis with the Viavi J6900A Triple Play Analyzer INTRODUCTION........................................................... 2 SCOPE OF THIS DOCUMENT..................................................
More informationIPTV 1
IPTV http://bobek.cz http://nangu.tv 1 IPTV Standardization 2 IETF - Signaling Multicast-based services On-demand services RFC 3376 IGMPv3 However, IGMPv2 is by far the most common signaling protocol used
More information8 th November 2016 Making Content Delivery Work by Adding Application Layer Technologies. Simon Jones Chief IPTV Architect BT
8 th November 2016 Making Content Delivery Work by Adding Application Layer Technologies Simon Jones Chief IPTV Architect BT Delivering BT Sport Dr Simon T Jones, BT Technology, Service and Operations
More informationA Study on Transmission System for Realistic Media Effect Representation
Indian Journal of Science and Technology, Vol 8(S5), 28 32, March 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 DOI : 10.17485/ijst/2015/v8iS5/61461 A Study on Transmission System for Realistic
More information(12) Patent Application Publication (10) Pub. No.: US 2010/ A1
(19) United States US 20100091772A1 (12) Patent Application Publication (10) Pub. No.: US 2010/009 1772 A1 CederVallet al. (43) Pub. Date: Apr. 15, 2010 (54) PROVIDING IPTV MULTICASTS (76) Inventors: Mats
More informationBuilding Multicast Controller for Carrier-grade IPTV Service over Ethernet Passive Optical Network
Building Controller for Carrier-grade Service over Ethernet Passive Optical Network Juan Wu*(1), YaLing Nie(1), Hideya Yoshiuchi(1), Hiroki Ikeda(2) 1. Hitachi (China) Research & Development Corporation,
More informationNetwork Security: Broadcast and Multicast. Tuomas Aura T Network security Aalto University, Nov-Dec 2010
Network Security: Broadcast and Multicast Tuomas Aura T-110.5240 Network security Aalto University, Nov-Dec 2010 Outline 1. Broadcast and multicast 2. Receiver access control (i.e. data confidentiality)
More informationEnabling carrier evolution for triple play services
Obr.: 70-121d Enabling carrier evolution for triple play services EFFECTS OF TRANSMISSION PERFORMANCE ON MULTIMEDIA QoS 17-19 June 2008 - Prague, Czech Republic Roman Osredkar, osredkar@ iskratel.si, Aljaž
More informationDesign and Implementation of unified Identity Authentication System Based on LDAP in Digital Campus
Advanced Materials Research Online: 2014-04-09 ISSN: 1662-8985, Vols. 912-914, pp 1213-1217 doi:10.4028/www.scientific.net/amr.912-914.1213 2014 Trans Tech Publications, Switzerland Design and Implementation
More informationHigh-Performance VLSI Architecture of H.264/AVC CAVLD by Parallel Run_before Estimation Algorithm *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 29, 595-605 (2013) High-Performance VLSI Architecture of H.264/AVC CAVLD by Parallel Run_before Estimation Algorithm * JONGWOO BAE 1 AND JINSOO CHO 2,+ 1
More informationIPTV Distribution Technologies in. Broadband Home Networks
IPTV Distribution Technologies is Broadband Home Nets IPTV Distribution Technologies in Broadband Home Nets The IPTV net Emad Shihab and Lin Cai Wireless and Neting (WAN) Research Group University of Victoria
More informationThe Design and Implementation of Electronic Program Guide In Digital TV Set-Top-Box
I.J. Education and Management Engineering, 2012, 11, 56-61 Published Online November 2012 in MECS (http://www.mecs-press.net) DOI: 10.5815/ijeme.2012.11.11 Available online at http://www.mecs-press.net/ijeme
More informationAN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS
AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan
More informationA BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD BASED ON HISTOGRAM MODIFICATION AND VISUAL CRYPTOGRAPHY. Hang-Yu Fan and Zhe-Ming Lu
International Journal of Innovative Computing, Information and Control ICIC International c 2016 ISSN 1349-4198 Volume 12, Number 2, April 2016 pp. 395 405 A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD
More informationMPEG-2 and ECC Security in DCT Domain
MPEG-2 and ECC Security in DCT Domain Samia Bouaziz, Ramzi Hadaji and Abdellatif Mtibaa National School of Engineering of Monastir, Skannes 5000, Monastir, Tunisia. Abstract In this paper we give a new
More informationData Hiding on Text Using Big-5 Code
Data Hiding on Text Using Big-5 Code Jun-Chou Chuang 1 and Yu-Chen Hu 2 1 Department of Computer Science and Communication Engineering Providence University 200 Chung-Chi Rd., Shalu, Taichung 43301, Republic
More informationThe Comprehensive IPTV Solution
The Comprehensive IPTV Solution The Comprehensive IPTV Solution ipmerge is breaking price barriers as the first all-in-one IPTV solution starting at under $20,000. The ipmerge is an extremely versatile
More informationCross-Layer Optimized Architecture of MBS over Mobile WiMAX
Cross-Layer Optimized Architecture of MBS over Mobile WiMAX Joohan Lee, Juho Lee, Sungkwon Park* Department of Electronics and Computer Engineering Hanyang University Seoul, Republic of Korea remem2002@hotmail.com,
More informationVector Bank Based Multimedia Codec System-on-a-Chip (SoC) Design
2009 10th International Symposium on Pervasive Systems, Algorithms, and Networks Vector Bank Based Multimedia Codec System-on-a-Chip (SoC) Design Ruei-Xi Chen, Wei Zhao, Jeffrey Fan andasaddavari Computer
More information4 rd class Department of Network College of IT- University of Babylon
1. INTRODUCTION We can divide audio and video services into three broad categories: streaming stored audio/video, streaming live audio/video, and interactive audio/video. Streaming means a user can listen
More informationIPTV System for Enterprise
IPTV System for Enterprise 2005. 2. 22 Dr. Hyunje Park ZooIn Net, Co., Ltd.(www.zooin.net) hjpark@zooin.net 1 CONTENTS! IPTV System for Enterprise " Overview " Services " Application 2 Introduction of
More informationA Novel Information Security Scheme using Cryptic Steganography
A Novel Information Security Scheme using Cryptic Steganography B.RAJA RAO Associate Professor, E.C.E Dept raja_rao_b@ yahoo.com P.ANIL KUMAR Assistant Professor, I.T Dept anilkumar_pallikonda@yahoo.co.in
More informationPUBLICATIONS. Journal Papers
PUBLICATIONS Journal Papers [J1] X. Wu and L.-L. Xie, Asymptotic equipartition property of output when rate is above capacity, submitted to IEEE Transactions on Information Theory, August 2009. [J2] A.
More informationAnalysis of Quality of Service for IPTV in the Republic of Macedonia
Analysis of Quality of Service for IPTV in the Republic of Macedonia Kostandina Veljanovska Department of Intelligent Systems, Faculty of ICT, University St. KlimentOhridski - Bitola ABSTRACT Quality-of-Service
More informationSystem and method for encoding and decoding data files
( 1 of 1 ) United States Patent 7,246,177 Anton, et al. July 17, 2007 System and method for encoding and decoding data files Abstract Distributed compression of a data file can comprise a master server
More informationA Novel Statistical Distortion Model Based on Mixed Laplacian and Uniform Distribution of Mpeg-4 FGS
A Novel Statistical Distortion Model Based on Mixed Laplacian and Uniform Distribution of Mpeg-4 FGS Xie Li and Wenjun Zhang Institute of Image Communication and Information Processing, Shanghai Jiaotong
More informationTechnologies and Standards for IPTV. Paresh Shah Director, Sales Engineering
Technologies and Standards for IPTV Paresh Shah Director, Sales Engineering IPTV Introduction IPTV Standards Requirements Global IPTV standards Coordination Key Benefits What is IPTV? An emerging technology
More informationEncrypting the Auto Detected Face Part of Human in a Image Using RC4 and Hiding the Data in Image
Encrypting the Auto Detected Face Part of Human in a Image Using RC4 and Hiding the Data in Image N.Mahesh Chandra M.Tech Student, Sreenidhi Institute of Science and Technology. Abstract: In this paper,
More informationIPTV-Oriented Service Blending
IPTV-Oriented Service Blending Dr. Sheng-Lin Chou E-mail: slchou@teco.com.tw TECO Group Research Institute TECO Electric & Machinery Co. 2008. 2. 23 IPTV-Blending for WOCC2008 1 Contents IPTV Over NGN
More informationThe Comprehensive IPTV Solution for Onboard Communications
The Comprehensive IPTV Solution for Onboard Communications SPECIALIZED Solutions for Advancing Digital Video The Comprehensive IPTV Solution LuxeVision provides a robust suite of digital video, audio,
More informationCisco 8389DVB MPEG-4 HD Digital Video Recorder
Cisco 8389DVB MPEG-4 HD Digital Video Recorder The Cisco 8389DVB MPEG-4 High-Definition (HD) Digital Video Recorder (DVR) offers subscribers some of the latest enhancements in cable television viewing.
More informationThe Analysis of the Loss Rate of Information Packet of Double Queue Single Server in Bi-directional Cable TV Network
Applied Mechanics and Materials Submitted: 2014-06-18 ISSN: 1662-7482, Vol. 665, pp 674-678 Accepted: 2014-07-31 doi:10.4028/www.scientific.net/amm.665.674 Online: 2014-10-01 2014 Trans Tech Publications,
More informationROBUST VIDEO DATA HIDING USING FORBIDDEN ZONE DATA HIDING AND SELECTIVE EMBEDDING
ROBUST VIDEO DATA HIDING USING FORBIDDEN ZONE DATA HIDING AND SELECTIVE EMBEDDING ABSTRACT: Video data hiding is still an important research topic due to the design complexities involved. We propose a
More informationWatchiTV Portable: IPTV Expert Analysis Application
Portable: IPTV Expert Analysis Application Key Applications Presentation Session - IPTV client service access and EPG scan. Application Session - H.264, MPEG4 and MPEG-2 transport stream measurement. IP
More informationAN OPTIMIZED TEXT STEGANOGRAPHY APPROACH USING DIFFERENTLY SPELT ENGLISH WORDS
Volume 118 No. 16 2018, 653-666 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu AN OPTIMIZED TEXT STEGANOGRAPHY APPROACH USING DIFFERENTLY SPELT ENGLISH
More informationCisco Media Origination System
Data Sheet Cisco Media Origination System Product Overview The Cisco Videoscape Media Origination System (MOS) is a cloud-based media origination platform that streamlines deployment of advanced services,
More informationDelivering Quadruple Play with IPTV over IMS
Delivering Quadruple Play with IPTV over IMS Bruno Chatras, Mikhaël Saïd France Telecom Research & Development 38-40 rue du Général Leclerc F-92794 Issy Moulineaux Cedex 9 Email: {bruno.chatras,mikhael.said}@orange-ftgroup.com
More informationA Hybrid Architecture for Video Transmission
2017 Asia-Pacific Engineering and Technology Conference (APETC 2017) ISBN: 978-1-60595-443-1 A Hybrid Architecture for Video Transmission Qian Huang, Xiaoqi Wang, Xiaodan Du and Feng Ye ABSTRACT With the
More informationAn Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a
International Symposium on Mechanical Engineering and Material Science (ISMEMS 2016) An Improved DCT Based Color Image Watermarking Scheme Xiangguang Xiong1, a 1 School of Big Data and Computer Science,
More informationProximity-Aware Location Based Collaborative Sensing for Energy-Efficient Mobile Devices
Volume 03 - Issue 10 October 2018 PP. 30-34 Proximity-Aware Location Based Collaborative Sensing for Energy-Efficient Mobile Devices Pranav Nair 1, Hitesh Patil 2, Tukaram Gore 3, Yogesh Jadhav 4 1 (Computer
More informationSTEGANOGRAPHY: THE ART OF COVERT COMMUNICATION
Journal homepage: www.mjret.in STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION Sudhanshi Sharma 1, Umesh Kumar 2 Computer Engineering, Govt. Mahila Engineering College, Ajmer, India 1 sudhanshisharma91@gmail.com,
More informationThe RTP Encapsulation based on Frame Type Method for AVS Video
Applied Mechanics and Materials Online: 2012-12-27 ISSN: 1662-7482, Vols. 263-266, pp 1803-1808 doi:10.4028/www.scientific.net/amm.263-266.1803 2013 Trans Tech Publications, Switzerland The RTP Encapsulation
More informationStory Unit Segmentation with Friendly Acoustic Perception *
Story Unit Segmentation with Friendly Acoustic Perception * Longchuan Yan 1,3, Jun Du 2, Qingming Huang 3, and Shuqiang Jiang 1 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing,
More informationIPTV + VOD: Architectures & Solutions.
IPTV + VOD: Architectures & Solutions hamid@ngholdings.net Architectures & Solutions with Key products Design challenges for VoD Challenges Solutions Scale and manage volumes of on-demand content Scalable
More informationBUILDING LARGE VOD LIBRARIES WITH NEXT GENERATION ON DEMAND ARCHITECTURE. Weidong Mao Comcast Fellow Office of the CTO Comcast Cable
BUILDING LARGE VOD LIBRARIES WITH NEXT GENERATION ON DEMAND ARCHITECTURE Weidong Mao Comcast Fellow Office of the CTO Comcast Cable Abstract The paper presents an integrated Video On Demand (VOD) content
More informationAn Efficient P2P-based Mobile Social Media Delivery for Real-time MobileCast
, pp.151-158 http://dx.doi.org/10.14257/ijseia.2014.8.2.15 An Efficient P2P-based Mobile Social Media Delivery for Real-time MobileCast Changhee Cho 1, Ha Tran-Thi-Thu 2, Sanghyun Park 2 and Jinsul Kim
More informationpoint-to-multipoint deep fiber access
point-to-multipoint deep fiber access GPON with ericsson eda 1500 fiber solutions Today s digital life is expanding into all possible areas of society, looking to connect everybody and everything. This
More informationEgyptian Computer Science Journal Vol. 38 No.3 September 2014
Deploying IPTV Services Over Proposed Network for Yemen Universities Khaled O. Basulaim Dept. of Information Technology, Faculty of Engineering University of Aden k.basulaim@ycit-he.org Abstract Recently,
More informationResearch and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen SUN
2016 International Conference on Wireless Communication and Network Engineering (WCNE 2016) ISBN: 978-1-60595-403-5 Research and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen
More informationA Survey On Video On Demand In Mobile Ad Hoc Network
A Survey On Video On Demand In Mobile Ad Hoc Network Keshawanand Singh 1, Keshav Goyal 2, Nidhi Gupta 3, Arun Kumar 4 1,2,3 M.Tech Scholars, 4 Assistant Professor, School of Computer Science & Engineering,
More informationBroadband Networks: Applications and Services
Broadband Networks: Applications and Services Jamel Gafsi, Ph.D. C.E.O. and Founder September 17, 2003 www.castify.net Presentation at INRIA Presentation Overview Evolution of Networks and Services Broadband
More informationPartial Video Encryption Using Random Permutation Based on Modification on Dct Based Transformation
International Refereed Journal of Engineering and Science (IRJES) ISSN (Online) 2319-183X, (Print) 2319-1821 Volume 2, Issue 6 (June 2013), PP. 54-58 Partial Video Encryption Using Random Permutation Based
More informationDesign of Tourism Information System with B/S and C/S Architecture based on Android and Web Platform
with B/S and C/S Architecture based on Android and Web Platform Tianjin University of Science & Technology, Tianjin, China E-mail: douxuechen@mail.tust.edu.cn Yonggang Yang a ; Weibin Zhou 1b ; Zilong
More informationLEIGHTRONIX. The Comprehensive IPTV Solution
The Comprehensive IPTV Solution LEIGHTRONIX The Comprehensive IPTV Solution The ipmerge is breaking price barriers as the first all-in-one IPTV solution starting at under $20,000. This LEIGHTRONIX IPTV
More informationRemote Monitoring System of Ship Running State under Wireless Network
Journal of Shipping and Ocean Engineering 7 (2017) 181-185 doi 10.17265/2159-5879/2017.05.001 D DAVID PUBLISHING Remote Monitoring System of Ship Running State under Wireless Network LI Ning Department
More informationIMS Client Framework for All IP-Based Communication Networks
IMS Client Framework for All IP-Based Communication Networks D. Jayaram, S. Vijay Anand, Vamshi Raghav, Prashanth Kumar, K. Riyaz & K. Kishan Larsen & Toubro InfoTech Limited Research and Development Group,
More informationData Broadcasting Solutions for Broadcasters
Data Broadcasting Solutions for Broadcasters by Brett Jenkins Thomcast Communications, Inc. Southwick, MA SMPTE Technical Conference 2000 Pasadena, CA page 1 Data Broadcasting - What Is It? Multimedia
More informationDesign and Implementation of Aquarium Remote Automation Monitoring and Control System
Design and Implementation of Aquarium Remote Automation Monitoring and Control System Yinchi Ma 1,2,* and Wen Ding 1,2 1 Beijing Fisheries Research Institute, Beijing, 100068, China 2 National Engineering
More informationSubnet Multicast for Delivery of One-to-Many Multicast Applications
Subnet Multicast for Delivery of One-to-Many Multicast Applications We propose a new delivery scheme for one-to-many multicast applications such as webcasting service used for the web-based broadcasting
More informationDTV for Personalized Mobile Access and Unified Home Control
DTV for Personalized Mobile Access and Unified Home Control Jianlin Guo, Fernando Matsubara, Johnas Cukier, Haosong Kong Mitsubishi Electric Research Labs, 558 Central Avenue, Murray Hill, NJ 07974, USA
More informationEfficient Path Finding Method Based Evaluation Function in Large Scene Online Games and Its Application
Journal of Information Hiding and Multimedia Signal Processing c 2017 ISSN 2073-4212 Ubiquitous International Volume 8, Number 3, May 2017 Efficient Path Finding Method Based Evaluation Function in Large
More informationSecurity+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography Objectives Define cryptography Describe hashing List the basic symmetric cryptographic algorithms 2 Objectives
More informationABSTRACT I. INTRODUCTION
2018 IJSRSET Volume 4 Issue 4 Print ISSN: 2395-1990 Online ISSN : 2394-4099 Themed Section : Engineering and Technology An Efficient Search Method over an Encrypted Cloud Data Dipeeka Radke, Nikita Hatwar,
More informationStandard-based approach and experiences outside Brazil -Examples of Japan- Masahito Kawamori NTT
Standard-based approach and experiences outside Brazil -Examples of Japan- Masahito Kawamori NTT NTT Plala and NTT Group Overview In Japan, NTT East and West (Network providers)have over 13 million FTTH
More informationWhat s the Difference?
Should You Offer IPTV or Internet TV? What s the Difference? OPASTCO Technical & Marketing Symposium October 22, 2008 Larry Thompson, PE Chief Executive Officer 2211 N. Minnesota Mitchell, SD 57301 (605)
More informationA Survey on open Source Protocols SIP, RTP, RTCP, RTSP, H.264 for Video Conferencing System
Available online at www.ijiere.com International Journal of Innovative and Emerging Research in Engineering e-issn: 2394 3343 p-issn: 2394-5494 A Survey on open Source Protocols SIP, RTP, RTCP, RTSP, H.264
More informationPowering the Next-Generation Video Experience
Powering the Next-Generation Video Experience NEULION DIGITAL PLATFORM Powering the Next-Generation Video Experience The NeuLion Digital Platform provides digital video broadcasting, distribution and monetization
More informationImplementation of Digital Cinema Mastering System
Implementation of Digital Cinema Mastering System Yeonjeong Jeong, Bumho Kim, Dowon Nam, Kisong Yoon Content Distribution Platform Team, ETRI, 218 Gajeong-ro, Yuseong-gu, Daejeon, Korea yjjeong@etri.re.kr,
More informationQoS-Aware IPTV Routing Algorithms
QoS-Aware IPTV Routing Algorithms Patrick McDonagh, Philip Perry, Liam Murphy. School of Computer Science and Informatics, University College Dublin, Belfield, Dublin 4. {patrick.mcdonagh, philip.perry,
More informationMEA: Telephony systems MEB: Voice over IP MED: VoIP systems MEC: C7 signalling systems MEE: Video principles MEF: Video over IP
learntelecoms interactive e-learning suite of courses from PTT: MediaNet v3 Voice and video service delivery MediaNet is a suite of interactive, online e-learning courses that provides training in the
More informationThis handheld IPTV tester is specially designed for xdsl test, LAN test, IPTV test and Modem emulation.
This handheld IPTV tester is specially designed for xdsl test, LAN test, IPTV test and Modem emulation. Overview This handheld IPTV tester is specially designed for xdsl testing, LAN testing, IPTV testing,
More informationVoIP. ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts
VoIP ALLPPT.com _ Free PowerPoint Templates, Diagrams and Charts VoIP System Gatekeeper: A gatekeeper is useful for handling VoIP call connections includes managing terminals, gateways and MCU's (multipoint
More informationKeywords Sosemanuk, VOIP, Android, Encryption, Descryption
Volume 6, Issue 7, July 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Implementation
More informationQoS/QoE Techniques for IPTV Transmissions
MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com QoS/QoE Techniques for IPTV Transmissions Jinyun Zhang, Yige Wang, Bo Rong TR2009-010 August 2009 Abstract Internet Protocol TV (IPTV) has
More informationChapter 3: Network Protocols and Communications
Chapter 3: Network Protocols and Communications Introduction to Networks Intro to Networks v5 Message Delivery Options IPv4 Unicast One-to-One Multicast One-to-Many Broadcast One-to-All IPv6 Unicast One-to-One
More informationMULTI SCREEN ENCODER/TRANSCODER AND
MULTI SCREEN ENCODER/TRANSCODER AND STREAMING APPLIANCES Practical IP Video Solutions for Any Needs and Budgets March 3, 2017 Copyright 2015-20172017 Computer Modules, Inc. All Rights Reserved. DVEO is
More informationA New Approach to Authentication Mechanism in IP Multimedia Subsystem
A New Approach to Authentication Mechanism in IP Multimedia Subsystem Farzad Fekrazad Department of Computer Eng., Islamic Azad University, Tehran Central, Iran E-mail: ffekrazad@gmail;com Abstract. Regarding
More informationMINIMIZATION OF DELAY TIME IN DYNAMIC ENCRYPTION ALGORITHM FOR REAL-TIME APPLICATIONS (DEA-RTA)
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 11, November 2014,
More informationE2-E3: CONSUMER FIXED ACCESS. CHAPTER-3 BROADBAND NETWORK AND SERVICES (Date Of Creation: )
E2-E3: CONSUMER FIXED ACCESS CHAPTER-3 BROADBAND NETWORK AND SERVICES (Date Of Creation: 01-04-2011) Page: 1 Broadband Networks and Services Core of BSNL s Broadband service is National Internet Backbone
More information