Font Size: a A A

Study And Realization Of The Secure Video Conference System Based On Chaotic Encryption

Posted on:2012-09-03Degree:MasterType:Thesis
Country:ChinaCandidate:Y S LiuFull Text:PDF
GTID:2218330335494475Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
Researches on chaotic secure communication have been a hot research field for a long time.However, these studies focused on innovations of chaos algorithms in theory, there is not yet a mature business application example with chaotic encryption. On the other hand, we find that there have been many famous video conference products basically based on the hardware of high cost, or based on C/S (client/sever) structure, even a system based on pure software-based or P2P network structure, the input about conference center management server is still a big investment, and inevitable.The paper conducts a in-depth analysis about the recent status of chaos encryption in domestic and international, and a research on structures,security mechanism,stream media transmission audio/video data acquisition and playback technology of a video conference system. In this paper, we break through a limitation in network architecture that current video conferencing systems are mainly based on C/S structure or P2P structure with a central server and design a P2P secure video conference system based on Windows Peer-to-Peer platform, using a reciprocally-disordered diploid chaotic sequences alternated in subsection algorithm to conduct audio/video data encryption. The system is implemented with WPPN SDK,Directshow SDK and MFC. We did a preliminary test about the system performance and some detailed analysis or summary about the testing results.The system transmits audio/video datas with flooding mechanism. We organize all the participating nodes as a basic unit of conference with a peer graph, thereby reducing the network load caused by data flooding and improving the data transmission capability of the system, to a certain extent. The system dose not need a special conference control and data forwarding center server, all conference related management and encryption process are completed by the node. The encryption algorithm implemented in the paper is efficient, could afford a real-time full audio/video data encryption by XOR. Meanwhile, we use a rate control mechanism in the message buffer, which ensures the basic synchronization between send and receive of audio/video datas. It makes the system more stable even if the network condition is changing. In addition, the system interface is simple to use, with research and practical value.
Keywords/Search Tags:Chaotic Encryption, P2P, Directshow, Authentication, Video Conference
PDF Full Text Request
Related items