<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://projectswiki.eleceng.adelaide.edu.au/projects/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=A1627373</id>
	<title>Projects - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://projectswiki.eleceng.adelaide.edu.au/projects/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=A1627373"/>
	<link rel="alternate" type="text/html" href="https://projectswiki.eleceng.adelaide.edu.au/projects/index.php/Special:Contributions/A1627373"/>
	<updated>2026-04-25T05:21:19Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.31.4</generator>
	<entry>
		<id>https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2017s1-167b_Real_Time_Video_Steam_Substitution&amp;diff=8684</id>
		<title>Projects:2017s1-167b Real Time Video Steam Substitution</title>
		<link rel="alternate" type="text/html" href="https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2017s1-167b_Real_Time_Video_Steam_Substitution&amp;diff=8684"/>
		<updated>2017-09-22T06:15:12Z</updated>

		<summary type="html">&lt;p&gt;A1627373: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Abstract ==&lt;br /&gt;
This project looks at intercepting a real-time video stream between two end-users while also trying to seamlessly substitute the video stream with an arbitrary video or an alternate stream. The project identifies all the complexities and constraints of conducting such an attack with no encryption involved on any of the levels. The project is divided into two parts:&lt;br /&gt;
&lt;br /&gt;
•	Multimedia Network Security&lt;br /&gt;
&lt;br /&gt;
•	Video stream Substitution&lt;br /&gt;
&lt;br /&gt;
Multimedia Network Security aspect of the project will be considering different attack strategies which can be implemented to gain access to the real-time stream while also keeping the end users unaware of any breaches in the network. Different session hijacking techniques and their complexities are examined.&lt;br /&gt;
&lt;br /&gt;
== Project Team ==&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Team Members&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Matt Reynolds&lt;br /&gt;
&lt;br /&gt;
Harish Gowda&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Supervisor&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
&lt;br /&gt;
Matthew Sorell&lt;/div&gt;</summary>
		<author><name>A1627373</name></author>
		
	</entry>
	<entry>
		<id>https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2017s1-167b_Real_Time_Video_Steam_Substitution&amp;diff=8683</id>
		<title>Projects:2017s1-167b Real Time Video Steam Substitution</title>
		<link rel="alternate" type="text/html" href="https://projectswiki.eleceng.adelaide.edu.au/projects/index.php?title=Projects:2017s1-167b_Real_Time_Video_Steam_Substitution&amp;diff=8683"/>
		<updated>2017-09-22T06:12:22Z</updated>

		<summary type="html">&lt;p&gt;A1627373: Created page with &amp;quot;== Abstract == This project looks at intercepting a real-time video stream between two end-users while also trying to seamlessly substitute the video stream with an arbitrary...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Abstract ==&lt;br /&gt;
This project looks at intercepting a real-time video stream between two end-users while also trying to seamlessly substitute the video stream with an arbitrary video or an alternate stream. The project identifies all the complexities and constraints of conducting such an attack with no encryption involved on any of the levels. The project is divided into two parts:&lt;br /&gt;
&lt;br /&gt;
•	Multimedia Network Security&lt;br /&gt;
•	Video stream Substitution&lt;br /&gt;
&lt;br /&gt;
Multimedia Network Security aspect of the project will be considering different attack strategies which can be implemented to gain access to the real-time stream while also keeping the end users unaware of any breaches in the network. Different session hijacking techniques and their complexities are examined.&lt;/div&gt;</summary>
		<author><name>A1627373</name></author>
		
	</entry>
</feed>