Study on a Self-Adapt Streaming Media Data Transmission Package Based on RTCP

2013 ◽  
Vol 791-793 ◽  
pp. 2058-2061
Author(s):  
Jian Xia Feng ◽  
Zhi Hua Hu

This paper analyzes the transmission loss of streaming media and presents a adaptive algorithm which can Intelligently adjust itself to the size of the network packet stream when network resources are adequate for the situation,. The algorithm calculates the best data packet based on RTCP protocol by controlling the change of the server-side data packet size to dynamically adjust the sending rate, so that it can achieve the best multimedia data streams transmission in a limited time and under limited network resources to improve QoS of stream media of network.

2014 ◽  
Vol 701-702 ◽  
pp. 943-946
Author(s):  
Nian Fang Hong

In the wireless network environment, a large number of applications based on cell phone have emerged. But it has appeared some problems such as large amount of data and limited bandwidth and higher quality transmission in the mobile streaming media data transmission. To solve these problems, this paper designs a bandwidth adaptive streaming media real-time synchronization algorithm. Algorithm firstly analysis the state of the network, and then through real-time increase or decrease the factor method to effectively adjust the code flow rate, thus improve the QoS of streaming in transmission; to meet the learners' online learning, for subsequent teaching and interaction provides a good technical support.


2013 ◽  
Vol 756-759 ◽  
pp. 1748-1752 ◽  
Author(s):  
Hao Zeng ◽  
Yuan Fang

As the increasing applications of streaming media, using the streaming media server to provide high-quality video service for people becomes a trend. Streaming media server for video format requirements has become the bottleneck of its development, In this paper, we give a kind of transcoding method, through compiling FFmpeg source code under the windows OS, adding the x264 video codec and FAAC audio library, we can get ffmpeg.exe which can run directly, and we use MFC to design the the operation interface, which used to convert other video formats into stream media server supported formats.


2015 ◽  
Vol 2015 ◽  
pp. 1-13 ◽  
Author(s):  
Yuan Ding ◽  
Yunhua Zhang ◽  
Vincent Fusco

A 10 GHz Fourier Rotman lens enabled dynamic directional modulation (DM) transmitter is experimentally evaluated. Bit error rate (BER) performance is obtained via real-time data transmission. It is shown that Fourier Rotman DM functionality enhances system security performance in terms of narrower decodable low BER region and higher BER values associated with BER sidelobes especially under high signal to noise ratio (SNR) scenarios. This enhancement is achieved by controlled corruption of constellation diagrams in IQ space by orthogonal injection of interference. Furthermore, the paper gives the first report of a functional dual-beam DM transmitter, which has the capability of simultaneously projecting two independent data streams into two different spatial directions while simultaneously scrambling the information signals along all other directions.


2012 ◽  
Vol 19 (2) ◽  
pp. 5-17
Author(s):  
Bartosz Czaplewski ◽  
Krzysztof Czaplewski

Abstract Vessel traffic systems provide a high level of safety on coastal waters due to coastal radar stations and industrial cameras transmitting information to traffic supervision centers, as well. To improve a vessel traffic services is very important to ensure the speed and secrecy for the transmission of video images. The paper presents the basic issues of the multimedia data protection by digital watermarking and fingerprinting methods. Main applications for such digital marking were described in the paper as well as its requirements. Furthermore, the importance of multicast transmission for fingerprinting methods was presented by comparing the scalability of methods using only unicast transmissions and methods using multicast transmissions. The paper also presents the greatest threat to fingerprinting methods, which are attacks performed by more than one pirate. These attacks are called collusion attacks. The criteria that should be followed during identifying rogue users taking part in the collusion attack on the security systems has been presented. The paper also contains description of the extended Hillcast method, which belongs to the group of JFD (Joint Fingerprinting and Decryption) methods. The method provides a cryptographic security and digital fingerprinting of multimedia content, while maintaining high scalability. Main purpose of this method is VoD (Video on Demand) service, but it can also be used in vessel traffic supervision systems, such as VTS and AIS. In the last part of paper, there are results of studies which indicate high resistance to most common collusion attacks. Method proposed by authors can enhance the security of visual data transmission in vessel traffic systems.


IEEE Network ◽  
2018 ◽  
Vol 32 (5) ◽  
pp. 118-123 ◽  
Author(s):  
Jiajie Zhang ◽  
Jian Weng ◽  
Weiqi Luo ◽  
Jia-Nan Liu ◽  
Anjia Yang ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document