没有合适的资源?快使用搜索试试~ 我知道了~
IPTV终端开发工程借鉴.pdf
1.该资源内容由用户上传,如若侵权请联系客服进行举报
2.虚拟产品一经售出概不退款(资源遇到问题,请及时私信上传者)
2.虚拟产品一经售出概不退款(资源遇到问题,请及时私信上传者)
版权申诉
0 下载量 168 浏览量
2021-12-25
20:11:26
上传
评论
收藏 319KB PDF 举报
温馨提示
试读
32页
IPTV终端开发工程借鉴.pdf
资源推荐
资源详情
资源评论
6 articles found for: pub-date > 2008 and tak( (IPTV or (soft terminal) or products or (Mobile terminal)
or (PC terminal) or (Media Center) or (technical advance) or research or (development team) or C
or "C++" or programming or (OS based programming) or Linux or Windows or VxWorks or TCP/IP
or RTSP/RTP or "MPEG2-TS" or (HTTP standards) or (Familiar with) or (ISO standard of TS) or
MPEG2 or MPEG4 or "H.264") and ((web browser) or technology or network or architecture or
multi-threaded) )
Wireless link state-aware H.264 MGS coding-based mobile IPTV system over
WiMAX network
Original Research Article
Journal of Visual Communication and Image Representation
This paper presents a simple but effective architecture for the transmission of H.264 MGS coding-based
IPTV stream over WiMAX network. The proposed system is implemented to provide more subscribers
with an enhanced mobile IPTV service considering their wireless link states. In the proposed system, the
base layer of the IPTV stream is transmitted with the sparsest modulation scheme and the lowest coding
rate to provide IPTV service of minimum quality to as many subscribers as possible. And some parts of
the enhancement layer are transmitted with the modulation scheme and the coding rate adaptive to
wireless link states of subscribers. Basically, we pursue an efficient tradeoff between the number of
subscribers that receive the enhancement layer stream and their IPTV service quality. Finally,
experimental results are provided to show the performance of the proposed system.
Article Outline
1. Introduction
2. Review of WiMAX network
2.1. Physical layer
2.2. MAC layer
3. Proposed mobile IPTV system architecture over WiMAX network
3.1. H.264. MGS coding-based IPTV stream
3.2. Problem description
3.3. Determining Process of mc
EL
and R
Tr_EL
4. Experimental results
4.1. Performance of the proposed algorithm with respect to α
4.2. Performance comparison according to subscriber mobility
5. Conclusions
Acknowledgements
References
Efficient in-network adaptation of encrypted H.264/SVC content Original Research
Article
Signal Processing: Image Communication
This paper addresses the efficient adaptation of encrypted scalable video content (H.264/SVC).
RTP-based in-network adaptation schemes on a media aware network element (MANE) in an IPTV and
VoD scenario are considered.
Two basic alternatives to implement encryption and adaptation of H.264/SVC content are investigated: (i)
full, format-independent encryption making use of Secure RTP (SRTP); (ii) SVC-specific encryption that
leaves the metadata relevant for adaptation (NAL unit headers) unencrypted.
The SRTP-based scheme (i) is straightforward to deploy, but requires the MANE to be in the security
context of the delivery, i.e., to be a trusted node. For adaptation, the content needs to be decrypted,
scaled, and re-encrypted. The SVC-specific approach (ii) enables both full and selective encryption, e.g.,
of the base layer only. SVC-specific encryption is based on own previous work, which is substantially
extended and detailed in this paper. The adaptation MANE can now be an untrusted node; adaptation
becomes a low-complexity process, avoiding full decryption and re-encryption of the content.
This paper presents the first experimental comparison of these two approaches and evaluates whether
multimedia-specific encryption can lead to performance and application benefits. Potential security
threats and security properties of the two approaches in the IPTV and VoD scenario are elementarily
analyzed. In terms of runtime performance on the MANE our SVC-specific encryption scheme
significantly outperforms the SRTP-based approach. SVC-specific encryption is also superior in terms of
induced end-to-end delays. The performance can even be improved by selective application of the
SVC-specific encryption scheme. The results indicate that the efficient adaptation of SVC-encrypted
content on low-end, untrusted network devices is feasible.
Article Outline
1. Introduction
1.1. Motivation
1.1.1. Application scenario: IPTV and VoD
1.1.2. In-network adaptation
1.1.3. Multimedia encryption
1.1.4. Format compliance
1.2. Contributions
1.3. Paper organization
2. H.264/SVC content adaptation
2.1. SVC adaptation
2.2. In-network SVC content adaptation
3. Encryption of H.264/SVC
3.1. SVC-specific encryption
3.1.1. Format-compliant payload encryption
3.1.2. Initial vector construction
3.1.3. Selective/partial encryption
3.2. Secure Real-time Transport Protocol (SRTP)
4. In-network adaptation of encrypted H.264/SVC content
4.1. SVC-specific adaptation system
4.2. SRTP-based adaptation system
4.3. Comparison of SVC-specific and SRTP-based encryption and adaptation
5. Security analysis and evaluation
5.1. Test content
5.2. Similarity between packet traces
5.3. Evaluation
6. Compression evaluation
7. Performance evaluation
7.1. Prototype implementations
7.2. Test setup and methodology
7.3. Test video streams
7.4. Evaluation results
8. Related work
9. Conclusions
Acknowledgements
Survey of network security systems to counter SIP-based denial-of-service
attacks Original Research Article
Computers & Security
Session Initiation Protocol is a core protocol for coming real time communication networks, including
VoIP, IMS and IPTV networks. Based on the open IP stack, it is similarly susceptible to Denial-of-Service
Attacks launched against SIP servers. More than 20 different research works have been published to
address SIP-related DoS problems. In this survey we explain three different types of DoS attacks on SIP
networks, called SIP message payload tampering, SIP message flow tampering and SIP message
flooding. We survey different approaches to counter these three types of attacks. We show that there are
possible solutions for both payload and flow tampering attacks, and partial solutions for message flooding
attacks. We conclude by giving hints how open flooding attacks issues could be addressed.
Article Outline
1. Introduction
1.1. Target audience
1.2. Article structure
2. Background information
2.1. Real time communication with Session Initiation Protocol
2.2. Denial-of-Service attacks in the Internet
3. Classification of SIP-based DoS attacks
3.1. SIP message payload tampering
3.2. SIP message flow tampering
3.3. SIP message flooding
3.3.1. Bandwidth
3.3.2. CPU
3.3.3. Memory
3.4. Further SIP vulnerabilities and attacks
4. Evaluation criteria for SIP DoS defence systems
4.1. Algorithm-related evaluation criteria
4.1.1. Algorithm principle
4.1.2. Attack classes
4.1.3. Victim
4.1.4. Protocol
4.1.5. Reaction
4.1.6. Detection strategy
4.2. Framework-related evaluation criteria
4.2.1. Setup
4.2.2. Implementation
4.2.3. Placement
4.2.4. Reactive measure
4.2.5. Performance test results
4.2.6. Scalability
5. Survey of proposed SIP DoS countermeasure solutions
5.1. Iancu03
5.1.1. Algorithm
5.1.2. Framework
5.2. Reynolds03
5.2.1. Algorithm
5.2.2. Framework
5.3. Wu04
5.3.1. Algorithm
5.3.2. Framework
剩余31页未读,继续阅读
资源评论
wxj15659998286
- 粉丝: 1
- 资源: 10万+
下载权益
C知道特权
VIP文章
课程特权
开通VIP
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功