Skip to main content

Secure Multimedia Transmission in P2P Using Recurence Relation and Evolutionary Algorithm

  • Conference paper
Security in Computing and Communications (SSCC 2013)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 377))

Included in the following conference series:

Abstract

Distribution and sharing of multimedia contents is extensively higher in number as compared to other applications in Peer-to-Peer network. The prior work in the same issues is conducted to explore that there are comparatively few work done when it comes to ensuring security over transmitting multimedia contents over highly vulnerable P2P network. Therefore, this paper introduces a cost-effective and trivial model using recurrence relation of degree 2 and evolutionary algorithm for performing multimedia content encryption. A novel technique of performing encryption using a simple partitioning technique is used to ensure the security of the transmitted frames over any types of network. The novelty of the proposed system is that evolutionary algorithm is used for strengthening the encryption process further and final results were evaluated with respect to maximized entropy of frames, minimized Pearson Product Moment Correlation Coefficient (PPMCC) among the adjacent pixels and key analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Do, T., Hua, K.A., Tantaoui, M.: P2VoD: Providing Fault Tolerant Video-on-Demand Streaming in Peer-to-Peer Environment. Proceedings of the IEEE, 20–24

    Google Scholar 

  2. Ciullo, D., Garcia, M.A., Horvath, A., Leonardi, E., Mellia, M., Rossi, D., Telek, M., Veglia, P.: Dissecting PPLive, SopCast, TVAnts. ACM (2008)

    Google Scholar 

  3. http://zeenews.india.com/news/net-news/cyber-criminals-targeting-social-networking-sites-to-steal-money_827996.html

  4. Graffi, K., Mukherjee, P., Menges, B., Hartung, D., Kovacevic, A., Steinmetz, R.: Practical Security in P2P-based Social Networks. IEEE (2009)

    Google Scholar 

  5. Saroliya, A., Mishra, U., Rana, A.: A pragmatic analysis of peer to peer networks and protocols for security and confidentiality. International Journal of Computing and Corporate Research 2(6) (2012)

    Google Scholar 

  6. http://ntrg.cs.tcd.ie/undergrad/4ba2.02-03/p10.html

  7. Muller, W., Eisenhardt, M., Henrich, A.: Efficient content-based P2P image retrieval using peer content descriptions. SPIE Electronic Imaging (2004)

    Google Scholar 

  8. Jung, E.H., Cho, S.Y.: A Robust Digital Watermarking System Adopting 2D Barcode against Digital Piracy on P2P network. International Journal of Computer Science and Network Security 6(10) (2006)

    Google Scholar 

  9. Chu, C.C., Su, X., Prabhu, B.S., Gadh, R., Kurup, S., Sridhar, G., Sridhar, V.: Mobile DRM for Multimedia Content Commerce in P2P Networks. IEEE (2006)

    Google Scholar 

  10. Kumar, S., Sivaprakasam, P.: A New Approach for Encrypting and Decrypting Data in Images among users in Ad hoc Network. European Journal of Scientific Research 92(3), 425–430 (2012)

    Google Scholar 

  11. Mathieu, B., Guelvouit, G.L., Desoubeaux, M.: Mitigating illegal contents via watermarking in video streaming P2P network. In: Proceedings of IEEE Advanced Networks and Telecommunication Systems (2010)

    Google Scholar 

  12. Meddour, D.E., Mushtaq, M., Ahmed, T.: Open Issues in P2P Multimedia Streaming. MULTICOMM (2006)

    Google Scholar 

  13. Berson, T.: Skype security evaluation. Anagram Laboratories (2005)

    Google Scholar 

  14. Tang, Y., Luo, J.G., Zhang, Q., Zhang, M., Yang, S.-H.: Deploying P2P Networks for Large-Scale Live Video-Streaming Service. IEEE Communications Magazine (2007)

    Google Scholar 

  15. Hughes, D., Walkerdine, J.: Distributed video encoding over a peer-to-peer network. PREP (2005)

    Google Scholar 

  16. Reforgiato, D., Lombardo, A., Schembra, G.: A P2P Platform based on Rate-Controlled FGS encoding for Broadcast Video Transmission to Heterogeneous Terminals with Heterogeneous Network Access. GTTI (2009)

    Google Scholar 

  17. Hagemeister, P.: Censorship-resistant Collaboration with a Hybrid DTN/P2P Network. Masters Thesis (2012)

    Google Scholar 

  18. http://en.wikipedia.org/wiki/Recurrence_relation

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Shahabadkar, R., V.Pujeri, R. (2013). Secure Multimedia Transmission in P2P Using Recurence Relation and Evolutionary Algorithm. In: Thampi, S.M., Atrey, P.K., Fan, CI., Perez, G.M. (eds) Security in Computing and Communications. SSCC 2013. Communications in Computer and Information Science, vol 377. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40576-1_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-40576-1_28

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-40575-4

  • Online ISBN: 978-3-642-40576-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics