Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Secure Real Time Remote Video Monitoring System

  • Conference paper
  • First Online:
Computer Networks & Communications (NetCom)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 131))

  • 1783 Accesses

Abstract

Video has been an important media for entertainment and communication for many years. Initially video was captured and transmitted in analog form. The digitization of video was done due to the development of computers and digital integrated circuits. The digital video enabled a revolution in the compression and communication of video. With the growth of the multimedia technology video streaming technology is gaining importance. Streaming is simply a technique for transferring data such that it can be processed as a steady and continuous stream. The file is sent to the end user in a (more or less) constant stream. With streaming, the end user can start watching the file almost as soon as it begins downloading. Security becomes a key problem to be handled when valuable multimedia data are travelling over the network. As security of data over the network is a burning issue and dominates the communication systems today, in this paper we present a real time video monitoring security system, named as Secure Video Monitoring System (SVMS) with authentication and selective encryption to securely transfer the valuable multimedia video streams over the un-trusted network. The process of authentication is done by allowing the network access to only authenticated users, data is compressed and decompressed using compression technology. This system provides security by selectively encrypting the streaming data which is send over the network. It also provides video on demand (VOD).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 379.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 379.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Apostolopoulos JG et al. (2002) Introduction. In: Video streaming: concepts, algorithms, and systems. Mobile and Media Systems Laboratory, HP Laboratories, Palo Alto. HPL-2002-260, 18th Sept 2002

    Google Scholar 

  2. Liu Y et al. (2010) Research on real-time remote video monitoring system. In: The 2nd international conference on computer and automation engineering, Singapore, pp 484–487

    Google Scholar 

  3. Calvert KL, Donahoo MJ (2008) Basic sockets. In: TCP/IP sockets in Java: practical guide for programmer, 2nd edn. MKP, Burlington, pp 15–26

    Google Scholar 

  4. Harte L (2012) IPTV basics. http://www.scribd.com/doc/48288310/94/Motion-JPEG-MJPEG

  5. Rob H (2010) Vitamin D. http://www.vitamindinc.com/features_smart.html

  6. M Lundvall (2012) Yawcam. http://www.yawcam.com

  7. CSWL labs basic streaming technology and RTSP protocol. http://www.cswl.com

  8. Ibrahim AAK (1991) Cryptography and data security: cryptographic properties of arabic. In: Proceedings of the third Saudi engineering conference, Riyadh, Saudi Arabia, vol 2, pp 910–921, 24–27 Nov 1991

    Google Scholar 

  9. Churchhouse RF (2002) Introduction. In: Codes and ciphers Julius Caeser, the Enigma and the internet, 1st edn. CUP, Cambridge, pp 5–6

    Google Scholar 

  10. Bohoris C (1998) Simulation and optimization of JPEG and motion JPEG. MSc Telematics (Telecommunications and Computer Engineering), Project report, University of Surrey, UK

    Google Scholar 

  11. Turk M (1999) The Apache Software Foundation. http://www.apache.org/

  12. Singh G (2006) Secure video conferencing for web based security surveillance system. MS Thesis, Dept. Comp Sci. and Eng., IIT, Kanpur, July 2006

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Deepti C. Gavankar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this paper

Cite this paper

Gavankar, D.C., Chatterjee, M. (2013). Secure Real Time Remote Video Monitoring System. In: Chaki, N., Meghanathan, N., Nagamalai, D. (eds) Computer Networks & Communications (NetCom). Lecture Notes in Electrical Engineering, vol 131. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-6154-8_37

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-6154-8_37

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-6153-1

  • Online ISBN: 978-1-4614-6154-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics