Enter your keyword

2-s2.0-84872025381

[vc_empty_space][vc_empty_space]

Secured video streaming development on smartphones with Android platform

Massandy D.T.a, Munir Ir.R.a

a Informatics Engineering, Bandung Institute of Technology, Indonesia

[vc_row][vc_column][vc_row_inner][vc_column_inner][vc_separator css=”.vc_custom_1624529070653{padding-top: 30px !important;padding-bottom: 30px !important;}”][/vc_column_inner][/vc_row_inner][vc_row_inner layout=”boxed”][vc_column_inner width=”3/4″ css=”.vc_custom_1624695412187{border-right-width: 1px !important;border-right-color: #dddddd !important;border-right-style: solid !important;border-radius: 1px !important;}”][vc_empty_space][megatron_heading title=”Abstract” size=”size-sm” text_align=”text-left”][vc_column_text]In this paper, we proposed an application for video streaming on Android smartphones that can capture video from camera smartphone and then send it to the computer in realtime. On the computer, the video is played using a video player such as VideoLAN VLC. The rapid development of information cause the information exchanged is very sensitive and important, as well as the information on the video. With cryptography, information on the video can be secured by selective encryption of critical data in the video. Selective encryption only selects important part of the video which will be encrypted. H.264 video format is most used today in various multimedia applications. In selective encryption on H.264 video format, slice data on slice with type I is selected as part of the I-Frame to be encrypted. On proposed system, selective encryption process is performed on Android smartphones while selective decryption is performed on the computer. Based on the test results, the video can be selectively encrypted by selecting slice data on slice I so that video image become broken and difficult to see. However, in certain circumstances there are images on the video that are not broken or damaged even though all of slice I have been encrypted. © 2012 IEEE.[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Author keywords” size=”size-sm” text_align=”text-left”][vc_column_text]Critical data,H.264 video,I-frame,Multimedia applications,Real time,RTP,Selective encryption,Slice data,Video image,Video players[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Indexed keywords” size=”size-sm” text_align=”text-left”][vc_column_text]Android smartphone,H.264 video,RTP,selective encryption,video streaming[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Funding details” size=”size-sm” text_align=”text-left”][vc_column_text][/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”DOI” size=”size-sm” text_align=”text-left”][vc_column_text]https://doi.org/10.1109/TSSA.2012.6366079[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″][vc_column_text]Widget Plumx[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row][vc_column][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][/vc_column][/vc_row]