Abstract
Video has been an important media for entertainment and communication for many years. Initially video was captured and transmitted in analog form. The digitization of video was done due to the development of computers and digital integrated circuits. The digital video enabled a revolution in the compression and communication of video. With the growth of the multimedia technology video streaming technology is gaining importance. Streaming is simply a technique for transferring data such that it can be processed as a steady and continuous stream. The file is sent to the end user in a (more or less) constant stream. With streaming, the end user can start watching the file almost as soon as it begins downloading. Security becomes a key problem to be handled when valuable multimedia data are travelling over the network. As security of data over the network is a burning issue and dominates the communication systems today, in this paper we present a real time video monitoring security system, named as Secure Video Monitoring System (SVMS) with authentication and selective encryption to securely transfer the valuable multimedia video streams over the un-trusted network. The process of authentication is done by allowing the network access to only authenticated users, data is compressed and decompressed using compression technology. This system provides security by selectively encrypting the streaming data which is send over the network. It also provides video on demand (VOD).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Apostolopoulos JG et al. (2002) Introduction. In: Video streaming: concepts, algorithms, and systems. Mobile and Media Systems Laboratory, HP Laboratories, Palo Alto. HPL-2002-260, 18th Sept 2002
Liu Y et al. (2010) Research on real-time remote video monitoring system. In: The 2nd international conference on computer and automation engineering, Singapore, pp 484–487
Calvert KL, Donahoo MJ (2008) Basic sockets. In: TCP/IP sockets in Java: practical guide for programmer, 2nd edn. MKP, Burlington, pp 15–26
Harte L (2012) IPTV basics. http://www.scribd.com/doc/48288310/94/Motion-JPEG-MJPEG
Rob H (2010) Vitamin D. http://www.vitamindinc.com/features_smart.html
M Lundvall (2012) Yawcam. http://www.yawcam.com
CSWL labs basic streaming technology and RTSP protocol. http://www.cswl.com
Ibrahim AAK (1991) Cryptography and data security: cryptographic properties of arabic. In: Proceedings of the third Saudi engineering conference, Riyadh, Saudi Arabia, vol 2, pp 910–921, 24–27 Nov 1991
Churchhouse RF (2002) Introduction. In: Codes and ciphers Julius Caeser, the Enigma and the internet, 1st edn. CUP, Cambridge, pp 5–6
Bohoris C (1998) Simulation and optimization of JPEG and motion JPEG. MSc Telematics (Telecommunications and Computer Engineering), Project report, University of Surrey, UK
Turk M (1999) The Apache Software Foundation. http://www.apache.org/
Singh G (2006) Secure video conferencing for web based security surveillance system. MS Thesis, Dept. Comp Sci. and Eng., IIT, Kanpur, July 2006
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media New York
About this paper
Cite this paper
Gavankar, D.C., Chatterjee, M. (2013). Secure Real Time Remote Video Monitoring System. In: Chaki, N., Meghanathan, N., Nagamalai, D. (eds) Computer Networks & Communications (NetCom). Lecture Notes in Electrical Engineering, vol 131. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-6154-8_37
Download citation
DOI: https://doi.org/10.1007/978-1-4614-6154-8_37
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-6153-1
Online ISBN: 978-1-4614-6154-8
eBook Packages: EngineeringEngineering (R0)