Acknowledgement
This work was suported by the PaiChai University research grant in 2020.
References
- J. K. Lee, J. E. Lee, M. Y. Lee, and H. L. Kim, "The study on the policy improvement of personal broadcasting for the user protection," Korea Communications Commission, Communications Policy Research, KCC-2018-23, Nov. 2018.
- D. G. Youn, "Thoughts on non-face-to-face remote classes due to the spread of Corona 19," Korea Internet & Security Agency Report, vol. 3, 2020.
- H. S. Yoo, J. H. Song, J. H. Lee, and S. W. Jeong, "A study on improvements in software and legal infrastructure for K-12 online education," Software Policy & Research Institute, no. 096, 2020.
- J. H. Jung, Y. W. Shin, and S. H. Gwon, "Status and Tasks of information and communication technology to revitalize the non-face-to-face economy," National Assembly Research Service, no. 178, 2020.
- J. W. Hong, J. J. Yoo, and J. K. Hong, "Low-Delay, Low-Power, and Real-Time Audio Remote Transmission System over Wi-Fi," Journal of information and communication convergence engineering, vol. 18, no. 2, pp. 115-122, Jun. 2020. https://doi.org/10.6109/JICCE.2020.18.2.115
- J. Kua, G. Armitage, and P. Branch, "A survey of rate adaptation techniques for dynamic adaptive streaming over HTTP," IEEE Communications Surveys & Tutorials, vol. 19, no. 3, pp. 1842-1866, 2017. https://doi.org/10.1109/COMST.2017.2685630
- M. Abdallah, C. Griwodz, K. T. Chen, G. Simon, P. C. Wang, and C. H. Hsu, "Delay-sensitive video computing in the cloud: a survey," ACM Transactions on Multimedia Computing, Communications, and Applications, vol. 14, no. 54, pp. 1-29, Jun. 2018.
- Korea Policy Briefing. Video conference, do it with confidence, Service and product security enhancement support [Internet]. Available: http://www.korea.kr/news/policyNewsView.do?newsId=148871556.
- Yonhapnews Article. Hacking pornography in South African parliament 'Zoom' video conference [Internet]. Available: https://www.yna.co.kr/view/AKR20200508003700099.
- F. Liu and H. Koenig, "A survey of video encryption algorithms," Computers & Security, vol. 29, no. 1, pp. 3-15, Feb. 2010. https://doi.org/10.1016/j.cose.2009.06.004
- A. Massoudi, F. Lefebvre, C. De Vleeschouwer, B. Macq, and J. J. Quisquater, "Overview on selective encryption of image and video: challenges and perspectives," EURASIP Journal on Information Security, vol. 2008. no. 179290, pp. 1-18, Dec. 2008.
- Apple, MPEG-2 Stream Encryption Format for HTTP Live Streaming [Internet]. Available: https://developer.apple.com/documentation/http_live_streaming.
- K. M. Go, I. G. Lee, S. W. Kang, and M. C. Kim, "Secure video transmission framework for battery-powered video devices," IEEE Transactions on Dependable and Secure Computing, Early access, 2020.
- Xiph.Org Foundation [Internet]. Available: http://media.xiph.org/video/derf/.
- S. G. Quan, H. Ha, and R. Ran, "Unequal Loss Protection Using Layer-Based Recovery Rate (ULP-LRR) for Robust Scalable Video Streaming over Wireless Networks," Journal of Information and Communication Convergence Engineering, vol. 14, no. 4, pp. 240-245, Dec. 2016. https://doi.org/10.6109/jicce.2016.14.4.240
- Y. S. Kim, M. W. Jeong, J. M. Shin, J. Y. Ryu, and T. W. Ban, "Adaptive Video Streaming System Using Receiver Caching," Journal of the Korea Institute of Information and Communication Engineering, vol. 23, no. 7, pp. 837-844, Jul. 2019. https://doi.org/10.6109/JKIICE.2019.23.7.837