scholarly journals SCRAS Server-Based Crosslayer Rate-Adaptive Video Streaming over 4G-LTE for UAV-Based Surveillance Applications

Electronics ◽  
2019 ◽  
Vol 8 (8) ◽  
pp. 910 ◽  
Author(s):  
Muhammad Naveed ◽  
Sameer Qazi ◽  
Syed Muhammad Atif ◽  
Bilal A. Khawaja ◽  
Muhammad Mustaqim

This research focuses on intelligent unmanned aerial vehicle (UAV)-based, real-time video surveillance to ensure better monitoring and security of remote locations over 4G-LTE cellular networks by maximizing end-user quality of experience (QoE). We propose a novel server-based crosslayer rate-adaptive scheme (SCRAS) for real-time video surveillance over 4G-LTE networks using UAVs. Our key contributions are: (1) In SCRAS, mobile UAVs having preprogrammed flight co-ordinates act as servers, streaming real-time video towards a remote client; (2) server-side video rate adaptation occurs in 4G-LTE based on the physical characteristics of the received signal conditions due to variations in the wireless channel and handovers; (3) SCRAS is fully automated and independent of client assistance for rate adaptation, as it is intended for real-time, mission-critical surveillance applications; (4) SCRAS ensures that during rate adaptation, the current video frame should not be damaged by completing the current group of packet (GoP) before adaptation. Our simulations in NS3 provide credible evidence that SCRAS outperforms recently proposed schemes in providing better QoE for real-time, rate-adaptive, video surveillance over 4G-LTE under varying channel quality and frequent handovers that occur during flight by UAVs.

2013 ◽  
Vol 5 (3) ◽  
pp. 1-14 ◽  
Author(s):  
Stefan Auer ◽  
Alexander Bliem ◽  
Dominik Engel ◽  
Andreas Uhl ◽  
Andreas Unterweger

The authors propose a framework to encrypt Baseline JPEG files directly at bitstream level, i.e., without the need to recompress them. The authors’ approach enables encrypting more than 25 pictures per second in VGA resolution, allowing real-time operation in typical video surveillance applications. In addition, their approach preserves the length of the bitstream while being completely format-compliant. Furthermore, the authors show that an attack on the encryption process, which partly relies on AES, is practically infeasible.


2014 ◽  
Author(s):  
Nicolas Hueber ◽  
Christophe Hennequin ◽  
Pierre Raymond ◽  
Jean-Pierre Moeglin

2021 ◽  
Vol 63 ◽  
pp. 103015
Author(s):  
Lin Ding ◽  
Dawu Gu ◽  
Lei Wang ◽  
Chenhui Jin ◽  
Jie Guan

Sign in / Sign up

Export Citation Format

Share Document