Affiliation:
1. Vellore Institute of Technology, India
Abstract
For an individual or a small organization, protecting and securing content could be a new and challenging task. The existing options do not completely fulfill the demands for today's content consumption and security while providing a good customer experience. The authors came across this problem of content security as a small group while building an application and tried to find a simple solution to secure content for playback on Android, so that the end users would be able to stream seamlessly and without any hindrance caused due to the enhanced security. They explore the way of securing video content through AES and using HLS to enable streaming of those video files over the internet. At the client's end, they have used Google's exoplayer to decrypt the data and play it directly after authentication and authorization. They performed a comparative analysis of the current models with the given model of securing content. Overall, with the aim to create an end-to-end module, they show how all the elements interact and work together as a system to provide protection against external threats.
Reference36 articles.
1. Adiguna, T. (2016). Secure H. 264 Video Coding using AES/CFB/PKCS5 padding encryption on various video frames (I, P, B). In 2016 10th International Conference on Telecommunication Systems Services and Applications (TSSA) (pp. 1-5). IEEE.
2. Alsaffar, D. M., Almutiri, A. S., Alqahtani, B., Alamri, R. M., Alqahtani, H. F., Alqahtani, N. N., & Ali, A. A. (2020). Image Encryption Based on AES and RSA Algorithms. In 2020 3rd International Conference on Computer Applications & Information Security (ICCAIS) (pp. 1-5). IEEE.
3. An AES cryptosystem for small scale network
4. Look ahead: a DASH adaptation algorithm.;R.Belda;2018 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB),2018
5. Bento documentation for conversion from mp4 to HLS. (n.d.). https://www.bento4.com/documentation/mp42hls/