An Efficient Fibonacci Based Content Distribution scheme for interactive VoD Streaming

2013 ◽  
Vol 2 (2) ◽  
pp. 32-39
Author(s):  
G. Kowsalya ◽  
T. Sudha ◽  
D. Jeeva ◽  
M. Parthiban
Author(s):  
P. PRATYUSHA ◽  
SD.AFZAL AHMAD ◽  
P. BABU

Although random access operations are desirable for on-demand video streaming in peer-to-peer systems, they are difficult to efficiently achieve due to the asynchronous interactive behaviors of users and the dynamic nature of peers. In this paper, we propose a network coding equivalent content distribution (NCECD) scheme to efficiently handle interactive videoon- demand (VoD) operations in peer-to-peer systems. In NCECD, videos are divided into segments that are then further divided into blocks. These blocks are encoded into independent blocks that are distributed to different peers for local storage. With NCECD, a new client only needs to connect to a sufficient number of parent peers to be able to view the whole video and rarely needs to find new parents when performing random access operations. In most existing methods, a new client must search for parent peers containing specific segments; however, NCECD uses the properties of network coding to cache equivalent content in peers, so that one can pick any parent without additional searches. Experimental results show that the proposed scheme achieves low startup and jump searching delays and requires fewer server resources. In addition, we present the analysis of system parameters to achieve reasonable block loss rates for the proposed scheme.


2016 ◽  
Vol E99.D (12) ◽  
pp. 2956-2967
Author(s):  
Tatsuyuki MATSUSHITA ◽  
Shinji YAMANAKA ◽  
Fangming ZHAO

Author(s):  
Shiguo Lian

In this chapter, the digital fingerprinting technology that is used to trace illegal distributors in multimedia content distribution is investigated. Firstly, the background and basic knowledge of digital fingerprinting- based multimedia distribution are reviewed. Then, some existing fingerprinting algorithms are introduced and compared. Additionally, the methods to embed the fingerprint securely are overviewed and analyzed. As an example, the secure audio distribution scheme is presented, and its performances are evaluated. Finally, some open issues and the future trends in digital fingerprinting are proposed. It is expected to provide valuable information to the students, engineers or researchers interested in this research topic.


Sign in / Sign up

Export Citation Format

Share Document