{"id":684,"date":"2018-12-03T08:09:51","date_gmt":"2018-12-03T08:09:51","guid":{"rendered":"http:\/\/www.gyanvihar.org\/journals\/?p=684"},"modified":"2019-05-22T10:47:10","modified_gmt":"2019-05-22T10:47:10","slug":"development-of-new-framework-for-secure-live-video-streaming-over-p2p-network-using-randomize-algorithm","status":"publish","type":"post","link":"https:\/\/www.gyanvihar.org\/journals\/development-of-new-framework-for-secure-live-video-streaming-over-p2p-network-using-randomize-algorithm\/","title":{"rendered":"Development of new framework for secure live video streaming over p2p network using randomize algorithm"},"content":{"rendered":"<p>pp 8-12<\/p>\n<p style=\"text-align: center;\"><strong>Richa Singh<sup>1<\/sup> Gajanand Sharma<sup>2<\/sup><\/strong><br \/>\n<sup>1<\/sup>Research Scholar, Dept.of Computer Science &amp; IT ,SGVU,jaipur<br \/>\n<sup>2\u00a0<\/sup>Assistant Professor,Dept.of Computer Science &amp; IT,SGVU,Jaipur<\/p>\n<p style=\"text-align: justify;\">Abstract-An important concern in multimedia technology is security and privacy issue of the transmitted data. The encryption of information helps to secure the data from any attack so, there is a need of developing a video encryption algorithm which can provide a confidentiality, integrity and authentication in video. This paper mainly focuses on security for the transmission of data through the encryption technique and the digital signature. For the video encryption, AES-128 is used and then digital signature is used for the watermarking. AES has been adopted by the U.S. Govt. and now widely used.<br \/>\nKeywords: AES-128, digital signature, Encryption, security, confidential<\/p>\n<p style=\"text-align: justify;\"><strong>INTRODUCTION<\/strong><br \/>\nModern era is fully dependent on the network. We are using the internet for many purposes. With the increase of multimedia data are transmitted in the various fields like business, video conferencing, medical images system and military communication etc. which include some sensitive data. Video- on \u2013demand, video broadcast, multimedia mail and video conferencing are the most promising distributed multimedia applications. Therefore, there is a need of for secured data transmission techniques. For the digital video transmission, there are the various encryption techniques which are needed to protect the digital video from the various attackers. Information security has been confirmed with data encryption techniques.<\/p>\n<p style=\"text-align: justify;\">The cryptography is a basis of security improvement used to ensure data on both crystal clear systems. The main elementary objective of cryptography is keeping information secure from the unauthorized users or attackers. The digital videos are large in size so they are usually transmit in compressed format such as MPEG, H.264. Accordingly information is encoded through process of encryption. The reverse of encryption is information sorting out i.e., decryption. Through the process of encryption, data is changed into the scribbled form and then transmitted. At the receiver end, the encrypted data is decrypted to convert it into readable form. This process is known as decryption.<\/p>\n<p style=\"text-align: justify;\">An algorithm is used to encrypt the data at the sender side and a decryption algorithm is used to disclose the data at the receiving end. The AES (Advanced Encryption Standard) is an encryption\/decryption algorithm defined by the US Government. The standard is explained in the Federal Information Processing Standard 197 (AES, 2001) and was request due to the security issues found in DES (Data Encryption Standard) and the undesirable speed of 3DES. The replacement for DES had to support: symmetric encryption, various size encryption keys (128, 192 and 256 bits) and, maybe most important, both hardware and software implementation.<\/p>\n<p style=\"text-align: justify;\">The Encryption mainly focuses on encrypt the data on the basis of algorithms. The algorithms having a basic idea of public key and private key encryption. Both techniques having some advantages and some disadvantages and also have different methods of\u00a0Algorithms. Loss of data either by interloper or an hacker is more, so only if security is compulsory and discretionary over the network.<br \/>\nThe Encryption is classified into lossless and lossy encryption. The studies on image encryption using the keys with digital signatures, chaos theory and vector quantization. These methods\/ techniques have some limitations like key size, cost estimation and the issue of security. To overcome on the limitations the concept of VC was given in which the secret sharing of images is involved by dividing into multiple shares. An intruder cannot recognize any hints about a secret image from individual random share images. In this method, the splitting of image is done at the pixel level so an individual shares transmit no information but the qualified set of these shares will help to redevelop the real image.<br \/>\nIn real application like a video encryption, security is the basic necessity. There are the various reasons for the need of video encryption as if we want to send a personal multimedia message, video conferencing learning and video on demand.For this purpose of security, cryptography, stenography, and water marking techniques can be used to obtain the security and privacy of data. All of these provide confidentiality, authentication and integrity to the transmitted data.<br \/>\nAnother method is digital watermarking employs visual encryption method to increase security without decreasing the data payload. The digital signature provides the authentication &amp; non-repudiation feature to the data transmission on the network. Watermarking is a major application which is used to validate user documents during the transmission. It is the process of embedding information into a digital signal in a way i.e. is difficult to remove. It is providing copyright protection for the intellectual method that is in digital format.<\/p>\n<p style=\"text-align: justify;\"><strong>LITERATURE REVIEW<\/strong><br \/>\n<strong>Qiao, Li et al \u201cA New Algo for MPEG Video Encryption\u201d<\/strong> represent the different statistical behavior of compressed video media in contrast to real time efficient algorithm. They gave an algorithm named as Video Encryption Algorithm [VEA] in which showed the statistical behavior of MPEG video streams and the experimental results on various video verify the goal for providing a fast encryption algorithm and also means that VEA can be a part of retrieval &amp; playback process in video-on-demand.<br \/>\nNegi,Y [2013] \u201cA Survey on Video Encryption Techniques\u201d gives information about the existing methods and their improvements and hence providing a platform for new researchers for innovating new techniques for further research. She mainly focuses on the full or selective encryption techniques. She drawn a conclusion as selective encryption takes less time as compared to full encryption. An encryption algorithm is based on the I-frames &amp; XOR has been defined.<br \/>\n<strong>Kulkani, A., et al.[2013]<\/strong> \u201cProposed Video Encryption Algorithm Vs. Other Existing Algorithm: A Comparative Study\u201d. In this paper, the two methods of encryption were highlighted named as symmetric key and asymmetric key encryption. He evaluated these algorithms with respect to their level of security and the encryption speed.<br \/>\n<strong>Singh, S. &amp; Verma N., [2015]<\/strong> \u201cEfficient &amp; Secure Video Encryption &amp; Decryption using Neural Network\u201d focused on that compressing encrypted video still performed efficiently even after the encryption and the compression. They mainly focused on the quality of video after the encryption process.<br \/>\n<strong>Kester,Q., [2014]<\/strong> \u201cA Hybrid Cryptography &amp; Digital Watermarking technique for securing digital images based on symmetric key\u201d. He said that for securing the images,both pixel displacement and pixel encryption were used for the cryptographic techniques. The digital watermarking is used to\u00a0authenticate a user, and documents.<br \/>\n<strong>Bhandari,L &amp; Wadhe,A. [2013]<\/strong> \u201cSpeeding up video encryption using ECC\u201d implemented both ECC &amp; RC5 encryption algorithm and provides the problem happened with the RC5. For encryption process, he uses RC5 for the encoding of DCT.<\/p>\n<p style=\"text-align: justify;\"><strong>Kumar,A., et al., [2013]<\/strong> proposed a new technique for the image stenography. They implemented Hash-LSB with RSA algorithm where it provides more security to both data and data hiding method. This method ensures that before hiding a data into a cover image it has been encrypted. If in any case encrypted data is revealed from the cover image then the intruder cannot read or access the data as it is in encrypted form.<br \/>\n<strong>Peuch,W et.al[2012]<\/strong> focused on the problems associated with the techniques as the number of images and video are increasing. He gave a brief overview of the approaches and the problems which are exist in applying the techniques.<br \/>\n<strong>Munteanu,G et.al[2015]<\/strong> \u201cGPGPU optimized parallel implementation of AES using C++AMP Gabriel\u201d focused on the comparative study on the implementation of AES algorithm on CPU and two different platforms GPGPU and creating a platform independent application and implemented using C++ AMP. The load of the GPGPU was constant, the method was called only once and the resultant value was used for the entire encryption process. However, in case of heavy loaded systems, the method will be called for each step of the encryption. In this way, the best amount of data that can be processed at that instant by the GPGPU without being bothered by the GPGPU will be determined.<br \/>\n<strong>Li,S. et.al[2013]<\/strong> \u201cResearch on the Performance of Encryption Techniques for HighBandwidth Multicast Video Streaming\u201d studied the performance of AES, DES and RC4 encryption algorithms for encrypting the data stream with the bandwidth of 1~1000Mbps. For testing these three encryption algorithm, considered the MPEG-4 format of multicast streaming. They measured the delay time in an encrypting number of texts, audio and video packets with the three algorithms and concluded that AES and RC4 can be used to encrypt the high bandwidth of 20Mbps streaming data.<br \/>\n<strong>Lakshmi ,R et.al[2015]<\/strong>\u201cEfficient Technique for Secure Transmission of Real-Time Video over Internet\u201d focuses on a techniques named as Enhanced Real Time Video Encryption using lossless compression for the encryption of video with a best quality of resultant video. According to result analysis, concluded that the proposed algorithm has lossless compression with a fast speed of transmission and better security. The proposed method is efficient in real time video and the time of encryption depends on the type of encryption method used. In ERTVEL technique, both video and audio are encrypted and therefore, it provides a good security. The lossless compression technique provides a better output video after the decryption of video.<br \/>\n<strong>Saraf,K et.al [2014]<\/strong> \u201cText and Image Encryption Decryption Using Advanced Encryption Standard\u201d presents the text and image encryption using the AES algorithm using java application platform SDK. For the text encryption, Code Composer Studio and DSP processor is used for the implementation and provide a unique solution for the same. For image encryption, AES algorithm in CFB mode and PKCS55 padding is used.<\/p>\n<p style=\"text-align: justify;\"><strong>METHODOLOGY<\/strong><br \/>\nThe AES has various modes of operations such as ECB, CBC, OFB, CTR, CFB etc. Here CBC mode of AES is used. It allows three different key size as 128,192,256 bits and here 128 bits key size is used in video encryption and decryption.<\/p>\n<p style=\"text-align: justify;\">Algorithm:<br \/>\n\uf0b7 Take the video of maximum size 4.3 Mb and it must be in the .mov format.<br \/>\n\uf0b7 Divide the video into the frames and number of frames must be 5183.<br \/>\n\uf0b7 Save these frames into the .png format.<br \/>\n\uf0b7 Identify the edges of an object into each frame.<br \/>\n\uf0b7 Read the pixels of edge in each frame and saves these pixels into the matrix variable.<br \/>\n\uf0b7 Apply the AES encryption algorithm and the digital signature on to the edge pixels and save<\/p>\n<p style=\"text-align: justify;\">Then, these frames are send to the receiver in sequenced manner.<br \/>\n\uf0b7 At the receiver side, apply the reverse algorithm for the decryption of the encrypted video. these encrypted frames into .png format.<br \/>\n\uf0b7 Algorithm for AES encryption in matlab<br \/>\nAlgorithm:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-693 aligncenter\" src=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/12\/aa-32.jpg\" alt=\"\" width=\"349\" height=\"645\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-695 aligncenter\" src=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/12\/aa-33.jpg\" alt=\"\" width=\"435\" height=\"312\" \/><\/p>\n<p style=\"text-align: center;\">FIG2: Snapshot of encryption algo using MATLAB<\/p>\n<p style=\"text-align: justify;\">The main aim of digital signature is to ensure that message is being not tailored and it is signed to ensuring the receiving party that message is being sent by the expected party. The encrypted video send to receiver with the digital signature for ensuring the receiver that video is sent by the right person or party. It is better for the quality of video and security purposes.<\/p>\n<p style=\"text-align: justify;\"><strong>\u00a0<\/strong><strong>CONCLUSION\u00a0<\/strong><strong>&amp;\u00a0<\/strong><strong>RESULT<\/strong><\/p>\n<p style=\"text-align: justify;\">The fusion nature of the algorithm involves the cryptographic techniques and digital watermarking. In this paper, a combination of AES and Digital Signature technique is proposed for the video encryption.<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-699 aligncenter\" src=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/12\/aa-36.jpg\" alt=\"\" width=\"348\" height=\"244\" srcset=\"https:\/\/www.gyanvihar.org\/journals\/uploads\/2018\/12\/aa-36.jpg 348w, https:\/\/www.gyanvihar.org\/journals\/uploads\/2018\/12\/aa-36-100x70.jpg 100w\" sizes=\"auto, (max-width: 348px) 100vw, 348px\" \/><\/p>\n<p style=\"text-align: center;\">Histogram analysis of AES algorithm using Different Frame rate and Different Key Used in matlab.<\/p>\n<p style=\"text-align: justify;\">This is mainly aimed on the security of video when it is transmitted on the open network as internet.It\u00a0reduces the overhead processing as encryption is applied only the edge. There is no need of compression of video as on compressed encrypted video, signal noise ratio increases as compared to the original encrypted video.<\/p>\n<p style=\"text-align: justify;\"><strong>REFERENCES<\/strong><br \/>\n[1]Abomhara, M. et al. [2010] \u201cAn Overview of Video Encryption Techniques \u201cInternational Journal of Computer Theory and Engineering, Vol. 2, No. 1 February, 2010 1793-8201.<br \/>\n[2]Bhandari ,L. et al [2013]\u201cSpeeding up Video Encryption using Elliptic Curve Cryptography (ECC)\u201d International Journal of Emerging Research in Management &amp;Technology ISSN: 2278-9359 (Volume-2, Issue-3)<br \/>\n[3]Jaffar , A .et al[2014] \u201cVisual Digital Signature Scheme: A New Approach\u201d IAENG International Journal of Computer Science, 37:4, IJCS_37_4_04<br \/>\n[4]Kester , Q. et al[2014]\u201cA Hybrid Cryptographic and Digital Watermarking Technique for Securing Digital Images based on a Generated Symmetric Key\u201d International Journal of Computer Applications (0975 \u2013 8887) Volume 94 \u2013 No. 19, May 2014<br \/>\n[5]Kulkarni , A. et al[2013]\u201cProposed Video Encryption Algorithm v\/s Other Existing Algorithms: A Comparative Study\u201d International Journal of Computer Applications (0975 \u2013 8887) Volume 65\u2013 No.1, March 2013<br \/>\n[6]Kumar , N. et al[2013] \u201cIssues and Challenges in Symmetric Key based Cryptographic Algorithm for Videos and Images\u201d International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 5, May 2013 ISSN: 2277 128X<br \/>\n[7]Li ,S. et al[2007]\u201cOn the Design of Perceptual MPEG-Video Encryption Algorithms\u201d IEEE Transactions On Circuits And Systems For Video Technology, Vol. 17, No. 2, Pages 214-223, February 2007<br \/>\n[8]Negi ,Y[2013] \u201cA Survey on Video Encryption Techniques\u201d International Journal of Emerging Technology and Advanced Engineering, (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 4, April 2013)<br \/>\n[9]Qiao ,L .et al[2013] \u201cA New Algo for MPEG Video Encryption\u201d<br \/>\n[10]Saraf , K. et al[2014] \u201cText and Image Encryption Decryption Using Advanced Encryption Standard\u201d International Journal of Emerging Trends &amp; Technology in Computer Science (IJETTCS) ISSN 2278-6856(vol-3)<br \/>\n[11]Singh ,S. et al [2015] \u201cEfficient and Secure Video Encryption and Decryption using Neural Network\u201d International Journal of Advanced Research in Computer Science ISSN No. 0976-5697<br \/>\n[12]Soni, S.[2015]\u201cA Road Map to Visual Cryptography\u201dInternational Journal of Advanced Research in Computer Science and Software Engineering Volume 5, Issue 4, 2015 ISSN: 2277 128X<\/p>\n","protected":false},"excerpt":{"rendered":"<p>pp 8-12 Richa Singh1 Gajanand Sharma2 1Research Scholar, Dept.of Computer Science &amp; IT ,SGVU,jaipur 2\u00a0Assistant Professor,Dept.of Computer Science &amp; IT,SGVU,Jaipur Abstract-An important concern in multimedia technology is security and privacy issue of the transmitted data. The encryption of information helps to secure the data from any attack so, there is a need of developing a [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[50],"tags":[],"class_list":["post-684","post","type-post","status-publish","format-standard","hentry","category-volume-3-issue-1-2017-journal-of-engineering-and-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>research journal - Research Journal<\/title>\n<meta name=\"description\" content=\"Development Of New Framework For Secure Live Video Streaming Over P2p Network Using Randomize Algorithm Journal at SGVU Jaipur.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.gyanvihar.org\/journals\/development-of-new-framework-for-secure-live-video-streaming-over-p2p-network-using-randomize-algorithm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Development Of New Framework For Secure Live Video Streaming\" \/>\n<meta property=\"og:description\" content=\"Development Of New Framework For Secure Live Video Streaming Over P2p Network Using Randomize Algorithm Journal at SGVU Jaipur.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.gyanvihar.org\/journals\/development-of-new-framework-for-secure-live-video-streaming-over-p2p-network-using-randomize-algorithm\/\" \/>\n<meta property=\"og:site_name\" content=\"research journal\" \/>\n<meta property=\"article:published_time\" content=\"2018-12-03T08:09:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-22T10:47:10+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/12\/aa-32.jpg\" \/>\n<meta name=\"author\" content=\"gyanvihar\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Development Of New Framework For Secure Live Video Streaming\" \/>\n<meta name=\"twitter:description\" content=\"Development Of New Framework For Secure Live Video Streaming Over P2p Network Using Randomize Algorithm Journal at SGVU Jaipur.\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"gyanvihar\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/development-of-new-framework-for-secure-live-video-streaming-over-p2p-network-using-randomize-algorithm\/\",\"url\":\"https:\/\/www.gyanvihar.org\/journals\/development-of-new-framework-for-secure-live-video-streaming-over-p2p-network-using-randomize-algorithm\/\",\"name\":\"Development Of New Framework For Secure Live Video Streaming\",\"isPartOf\":{\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/development-of-new-framework-for-secure-live-video-streaming-over-p2p-network-using-randomize-algorithm\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/development-of-new-framework-for-secure-live-video-streaming-over-p2p-network-using-randomize-algorithm\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/12\/aa-32.jpg\",\"datePublished\":\"2018-12-03T08:09:51+00:00\",\"dateModified\":\"2019-05-22T10:47:10+00:00\",\"author\":{\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/#\/schema\/person\/8eddba30598505d042b861de57a1c98f\"},\"description\":\"Development Of New Framework For Secure Live Video Streaming Over P2p Network Using Randomize Algorithm Journal at SGVU Jaipur.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/development-of-new-framework-for-secure-live-video-streaming-over-p2p-network-using-randomize-algorithm\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.gyanvihar.org\/journals\/development-of-new-framework-for-secure-live-video-streaming-over-p2p-network-using-randomize-algorithm\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/development-of-new-framework-for-secure-live-video-streaming-over-p2p-network-using-randomize-algorithm\/#primaryimage\",\"url\":\"https:\/\/www.gyanvihar.org\/journals\/uploads\/2018\/12\/aa-32.jpg\",\"contentUrl\":\"https:\/\/www.gyanvihar.org\/journals\/uploads\/2018\/12\/aa-32.jpg\",\"width\":349,\"height\":645},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/development-of-new-framework-for-secure-live-video-streaming-over-p2p-network-using-randomize-algorithm\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.gyanvihar.org\/journals\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Development of new framework for secure live video streaming over p2p network using randomize algorithm\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/#website\",\"url\":\"https:\/\/www.gyanvihar.org\/journals\/\",\"name\":\"research journal\",\"description\":\"Research Journal\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.gyanvihar.org\/journals\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/#\/schema\/person\/8eddba30598505d042b861de57a1c98f\",\"name\":\"gyanvihar\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.gyanvihar.org\/journals\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/da4adb9a3aecf9b52039c367720edd29?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/da4adb9a3aecf9b52039c367720edd29?s=96&d=mm&r=g\",\"caption\":\"gyanvihar\"},\"url\":\"https:\/\/www.gyanvihar.org\/journals\/author\/gyanvihar\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"research journal - Research Journal","description":"Development Of New Framework For Secure Live Video Streaming Over P2p Network Using Randomize Algorithm Journal at SGVU Jaipur.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.gyanvihar.org\/journals\/development-of-new-framework-for-secure-live-video-streaming-over-p2p-network-using-randomize-algorithm\/","og_locale":"en_US","og_type":"article","og_title":"Development Of New Framework For Secure Live Video Streaming","og_description":"Development Of New Framework For Secure Live Video Streaming Over P2p Network Using Randomize Algorithm Journal at SGVU Jaipur.","og_url":"https:\/\/www.gyanvihar.org\/journals\/development-of-new-framework-for-secure-live-video-streaming-over-p2p-network-using-randomize-algorithm\/","og_site_name":"research journal","article_published_time":"2018-12-03T08:09:51+00:00","article_modified_time":"2019-05-22T10:47:10+00:00","og_image":[{"url":"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/12\/aa-32.jpg","type":"","width":"","height":""}],"author":"gyanvihar","twitter_card":"summary_large_image","twitter_title":"Development Of New Framework For Secure Live Video Streaming","twitter_description":"Development Of New Framework For Secure Live Video Streaming Over P2p Network Using Randomize Algorithm Journal at SGVU Jaipur.","twitter_misc":{"Written by":"gyanvihar","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.gyanvihar.org\/journals\/development-of-new-framework-for-secure-live-video-streaming-over-p2p-network-using-randomize-algorithm\/","url":"https:\/\/www.gyanvihar.org\/journals\/development-of-new-framework-for-secure-live-video-streaming-over-p2p-network-using-randomize-algorithm\/","name":"Development Of New Framework For Secure Live Video Streaming","isPartOf":{"@id":"https:\/\/www.gyanvihar.org\/journals\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.gyanvihar.org\/journals\/development-of-new-framework-for-secure-live-video-streaming-over-p2p-network-using-randomize-algorithm\/#primaryimage"},"image":{"@id":"https:\/\/www.gyanvihar.org\/journals\/development-of-new-framework-for-secure-live-video-streaming-over-p2p-network-using-randomize-algorithm\/#primaryimage"},"thumbnailUrl":"http:\/\/www.gyanvihar.org\/journals\/wp-content\/uploads\/2018\/12\/aa-32.jpg","datePublished":"2018-12-03T08:09:51+00:00","dateModified":"2019-05-22T10:47:10+00:00","author":{"@id":"https:\/\/www.gyanvihar.org\/journals\/#\/schema\/person\/8eddba30598505d042b861de57a1c98f"},"description":"Development Of New Framework For Secure Live Video Streaming Over P2p Network Using Randomize Algorithm Journal at SGVU Jaipur.","breadcrumb":{"@id":"https:\/\/www.gyanvihar.org\/journals\/development-of-new-framework-for-secure-live-video-streaming-over-p2p-network-using-randomize-algorithm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.gyanvihar.org\/journals\/development-of-new-framework-for-secure-live-video-streaming-over-p2p-network-using-randomize-algorithm\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.gyanvihar.org\/journals\/development-of-new-framework-for-secure-live-video-streaming-over-p2p-network-using-randomize-algorithm\/#primaryimage","url":"https:\/\/www.gyanvihar.org\/journals\/uploads\/2018\/12\/aa-32.jpg","contentUrl":"https:\/\/www.gyanvihar.org\/journals\/uploads\/2018\/12\/aa-32.jpg","width":349,"height":645},{"@type":"BreadcrumbList","@id":"https:\/\/www.gyanvihar.org\/journals\/development-of-new-framework-for-secure-live-video-streaming-over-p2p-network-using-randomize-algorithm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.gyanvihar.org\/journals\/"},{"@type":"ListItem","position":2,"name":"Development of new framework for secure live video streaming over p2p network using randomize algorithm"}]},{"@type":"WebSite","@id":"https:\/\/www.gyanvihar.org\/journals\/#website","url":"https:\/\/www.gyanvihar.org\/journals\/","name":"research journal","description":"Research Journal","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.gyanvihar.org\/journals\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.gyanvihar.org\/journals\/#\/schema\/person\/8eddba30598505d042b861de57a1c98f","name":"gyanvihar","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.gyanvihar.org\/journals\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/da4adb9a3aecf9b52039c367720edd29?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/da4adb9a3aecf9b52039c367720edd29?s=96&d=mm&r=g","caption":"gyanvihar"},"url":"https:\/\/www.gyanvihar.org\/journals\/author\/gyanvihar\/"}]}},"_links":{"self":[{"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/posts\/684","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/comments?post=684"}],"version-history":[{"count":4,"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/posts\/684\/revisions"}],"predecessor-version":[{"id":2485,"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/posts\/684\/revisions\/2485"}],"wp:attachment":[{"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/media?parent=684"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/categories?post=684"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.gyanvihar.org\/journals\/wp-json\/wp\/v2\/tags?post=684"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}