Proceedings of the The 1st International Workshop on Cloud Computing and Information Security

The Mechanism of Tencent QQ Video Communication

Authors
Chen Xiaoxian, Yuan Zhenlong, Xue Yibo
Corresponding Author
Chen Xiaoxian
Available Online November 2013.
DOI
10.2991/ccis-13.2013.63How to use a DOI?
Keywords
Tencent QQ; Video Communication Mechanism; Media transport protocol; Video codec.
Abstract

The supernormal growth of QQ has outdistanced all the expectations and the number of users has reached up to 780 million till the end of 2012. At the same time, QQ causes several intractable issues, such as generating huge traffic, especially for the great video traffic. However, owing to proprietary protocol and encrypted traffic, the QQ video mechanism is little to be known and very hard to be identified. In this paper, we reveal the QQ video mechanism and its protocol structure, and introduce its communication process in details. To the best of our knowledge, this is the first time to discover the QQ video mechanism. This will be very useful for optimizing network bandwidth and improving quality of service.

Copyright
© 2013, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the The 1st International Workshop on Cloud Computing and Information Security
Series
Advances in Intelligent Systems Research
Publication Date
November 2013
ISBN
10.2991/ccis-13.2013.63
ISSN
1951-6851
DOI
10.2991/ccis-13.2013.63How to use a DOI?
Copyright
© 2013, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Chen Xiaoxian
AU  - Yuan Zhenlong
AU  - Xue Yibo
PY  - 2013/11
DA  - 2013/11
TI  - The Mechanism of Tencent QQ Video Communication
BT  - Proceedings of the The 1st International Workshop on Cloud Computing and Information Security
PB  - Atlantis Press
SP  - 270
EP  - 273
SN  - 1951-6851
UR  - https://doi.org/10.2991/ccis-13.2013.63
DO  - 10.2991/ccis-13.2013.63
ID  - Xiaoxian2013/11
ER  -