IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

An End-to-End Video Content Encryption Module for HLS Video Streaming

An End-to-End Video Content Encryption Module for HLS Video Streaming
View Sample PDF
Author(s): Kazim Rizvi (Vellore Institute of Technology, India), Bhavisha J. Dholakia (Vellore Institute of Technology, India), Aditya Kaushik (Vellore Institute of Technology, India), Aswani Kumar Cherukuri (Vellore Institute of Technology, India)and Chandra Mouliswaran S. (Vellore Institute of Technology, India)
Copyright: 2022
Pages: 16
Source title: Advancing Smarter and More Secure Industrial Applications Using AI, IoT, and Blockchain Technology
Source Author(s)/Editor(s): Kavita Saini (AMET University)and Pethuru Raj (Reliance Jio Platforms Ltd., Bangalore, India)
DOI: 10.4018/978-1-7998-8367-8.ch007

Purchase

View An End-to-End Video Content Encryption Module for HLS Video Streaming on the publisher's website for pricing and purchasing information.

Abstract

For an individual or a small organization, protecting and securing content could be a new and challenging task. The existing options do not completely fulfill the demands for today's content consumption and security while providing a good customer experience. The authors came across this problem of content security as a small group while building an application and tried to find a simple solution to secure content for playback on Android, so that the end users would be able to stream seamlessly and without any hindrance caused due to the enhanced security. They explore the way of securing video content through AES and using HLS to enable streaming of those video files over the internet. At the client's end, they have used Google's exoplayer to decrypt the data and play it directly after authentication and authorization. They performed a comparative analysis of the current models with the given model of securing content. Overall, with the aim to create an end-to-end module, they show how all the elements interact and work together as a system to provide protection against external threats.

Related Content

Poshan Yu, Zixuan Zhao, Emanuela Hanes. © 2023. 29 pages.
Subramaniam Meenakshi Sundaram, Tejaswini R. Murgod, Madhu M. Nayak, Usha Rani Janardhan, Usha Obalanarasimhaiah. © 2023. 20 pages.
Rekha R. Nair, Tina Babu, Kishore S.. © 2023. 23 pages.
Wasswa Shafik. © 2023. 22 pages.
Jay Kumar Jain, Dipti Chauhan. © 2023. 24 pages.
George Makropoulos, Dimitrios Fragkos, Harilaos Koumaras, Nancy Alonistioti, Alexandros Kaloxylos, Vaios Koumaras, Theoni Dounia, Christos Sakkas, Dimitris Tsolkas. © 2023. 19 pages.
Shouvik Sanyal, Kalimuthu M., Thangaraja Arumugam, Aruna R., Balaji J., Ajitha Savarimuthu, Chandan Chavadi, Dhanabalan Thangam, Sendhilkumar Manoharan, Shasikala Patil. © 2023. 17 pages.
Body Bottom