1,448 research outputs found

    Algorithms for advance bandwidth reservation in media production networks

    Get PDF
    Media production generally requires many geographically distributed actors (e.g., production houses, broadcasters, advertisers) to exchange huge amounts of raw video and audio data. Traditional distribution techniques, such as dedicated point-to-point optical links, are highly inefficient in terms of installation time and cost. To improve efficiency, shared media production networks that connect all involved actors over a large geographical area, are currently being deployed. The traffic in such networks is often predictable, as the timing and bandwidth requirements of data transfers are generally known hours or even days in advance. As such, the use of advance bandwidth reservation (AR) can greatly increase resource utilization and cost efficiency. In this paper, we propose an Integer Linear Programming formulation of the bandwidth scheduling problem, which takes into account the specific characteristics of media production networks, is presented. Two novel optimization algorithms based on this model are thoroughly evaluated and compared by means of in-depth simulation results

    Compress-store on blockchain: a decentralized data processing and immutable storage for multimedia streaming

    Get PDF
    Decentralization for data storage is a challenging problem for blockchain-based solutions as the blocksize plays a key role for scalability. In addition, specific requirements of multimedia data call for various changes in the blockchain technology internals. Considering one of the most popular applications of secure multimedia streaming, i.e., video surveillance, it is not clear how to judiciously encode incentivization, immutability, and compression into a viable ecosystem. In this study, we provide a genuine scheme that achieves this encoding for a video surveillance application. The proposed scheme provides a novel integration of data compression, immutable off-chain data storage using a new consensus protocol namely, Proof-of-WorkStore (PoWS) in order to enable fully useful work to be performed by the miner nodes of the network. The proposed idea is the first step towards achieving greener application of a blockchain-based environment to the video storage business that utilizes system resources efficiently.WOS:000773171200001Scopus - Affiliation ID: 60105072Science Citation Index ExpandedQ2 - Q4Article; Early AccessUluslararası işbirliği ile yapılan - EVETNisan2022YÖK - 2021-22Mar

    Use of a virtualization in the transition of a telecommunication networks toward 5G

    Get PDF
    We are in the front of the next big step of a new generation of the telecommunications networks, called 5G. The 5G in still in the preparation, but the actual wide spread use is nearby. The move toward 5G is not possible without use of a cloud and a virtualization. In the paper we are dealing with the issues how to incorporate existing fixed networks to the mobile 5G network and how to use a virtualization technology when moving to 5G. From the example of a real telecommunication system we defined issues, dilemmas and suggestions when moving toward 5G networks using virtualization

    Using physical unclonable functions for internet-of-thing security cameras

    Get PDF
    This paper proposes a low-cost solution to develop IoT security cameras. Integrity and confidentiality of the image data are achieved by cryptographic modules that implement symmetric key-based techniques which are usually available in the hardware of the IoT cameras. The novelty of this proposal is that the secret key required is not stored but reconstructed from the start-up values of a SRAM in the camera hardware acting as a PUF (Physical Unclonable Function), so that the physical authenticity of the camera is also ensured. The start-up values of the SRAM are also exploited to change the IV (Initialization Vector) in the encryption algorithm. All the steps for enrollment and normal operation can be included in a simple firmware to be executed by the camera. There is no need to include specific hardware but only a SRAM is needed which could be powered down and up by firmware.Ministerio de Economía y Competitividad del Gobierno de España y fondos europeos FEDER-TEC2014-57971-RConsejo Superior de Investigaciones Científicas (CSIC)-HW-SEEDS 201750E010V Plan Propio de Investigación de la Universidad de Sevill

    An Approach To Enhance Image Encryption Using Block-Based Trasformation Algorithm.

    Get PDF
    Penyulitan data (data encryption) telah digunakan secara meluas untuk menjamin keselamatan dalam rangkaian terbuka (open network), contohnya internet. Data encryption is widely used to ensure security in open networks such as the internet
    corecore