Design and Testing of two secure Video Conferencing applications based on JMF (Java Media Framework) and VIC (Video Conferencing Tool)

We present two secure real-time video conferencing solutions with JPEG coding using a cipher engine based on the Blowfish algorithm. One of these solutions is developed from Java media framework (JMF). In this case, our solution consists of encrypting frames coded with JPEG that are later encapsulated in packets of the RTP protocol (H. Schulzrinne et al., 1996) (real time transport protocol). Our cipher system is based on the Blowfish algorithm (B. Schneier, 1994) of the Cryptix open source cryptographic software library. Another solution is developed from VIC (video conferencing tool) (S. McCanne and V. Jacobson, 1995). In this case, our solution consists of encrypting the UDP packets that contain the JPEG coded frames incorporated in RTP packets. In this paper we analyse the solutions proposed and test the implementations developed in different data networks (LAN/WLAN, frame relay)

[1]  Steven McCanne,et al.  vic: a flexible framework for packet video , 1995, MULTIMEDIA '95.

[2]  S. Schwab,et al.  Methodologies and metrics for the testing and analysis of distributed denial of service attacks and defenses , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.

[3]  Bruce Schneier,et al.  Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) , 1993, FSE.

[4]  Henning Schulzrinne,et al.  RTP: A Transport Protocol for Real-Time Applications , 1996, RFC.

[5]  Giovanni Vigna,et al.  Hi-DRA: Intrusion Detection for Internet Security , 2005, Proceedings of the IEEE.

[6]  Symon S. Chang,et al.  An e-intelligence approach to e-commerce intrusion detection , 2005, 2005 IEEE International Conference on Granular Computing.

[7]  Yves Deswarte,et al.  Internet Security: An Intrusion-Tolerance Approach , 2006, Proceedings of the IEEE.

[8]  Avideh Zakhor,et al.  Receiver-driven bandwidth sharing for TCP and its application to video streaming , 2005, IEEE Transactions on Multimedia.

[9]  Qian Zhang,et al.  Sender-adaptive and receiver-driven layered multicast for scalable video over the Internet , 2005, IEEE Transactions on Circuits and Systems for Video Technology.

[10]  Bernhard Plattner,et al.  Media- and TCP-friendly congestion control for scalable video streams , 2006, IEEE Transactions on Multimedia.

[11]  Philip A. Chou,et al.  Rate-distortion optimized streaming of packetized media , 2006, IEEE Transactions on Multimedia.

[12]  Raouf Boutaba,et al.  Adaptive packet video streaming over IP networks: a cross-layer approach , 2005, IEEE Journal on Selected Areas in Communications.

[13]  Hannes Tschofenig,et al.  SPINAT: Integrating IPsec into Overlay Routing , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).