Efficient multicast stream authentication using erasure codes
ACM Transactions on Information and System Security (TISSEC)
Multimedia content authentication for proxy-side adaptation
ICDT '06 Proceedings of the international conference on Digital Telecommunications
A scalable signature scheme for video authentication
Multimedia Tools and Applications
Video Authentication and Tamper Detection Based on Cloud Model
IIH-MSP '07 Proceedings of the Third International Conference on International Information Hiding and Multimedia Signal Processing (IIH-MSP 2007) - Volume 01
Scalable authentication of MPEG-4 streams
IEEE Transactions on Multimedia
Design of an efficient authentication method for modern image and video
IEEE Transactions on Consumer Electronics
IEEE Transactions on Circuits and Systems for Video Technology
Optimized Rate-Distortion Extraction With Quality Layers in the Scalable Extension of H.264/AVC
IEEE Transactions on Circuits and Systems for Video Technology
Overview of the Scalable Video Coding Extension of the H.264/AVC Standard
IEEE Transactions on Circuits and Systems for Video Technology
IEEE Transactions on Circuits and Systems for Video Technology
NSS'12 Proceedings of the 6th international conference on Network and System Security
Technique for authenticating H.264/SVC and its performance evaluation over wireless mobile networks
Journal of Computer and System Sciences
Hi-index | 0.03 |
We investigate the problem of securing the delivery of scalable video streams so that receivers can ensure the authenticity (originality and integrity) of the video. Our focus is on recent scalable video coding techniques, e.g., H.264/SVC, that can provide three scalability types at the same time: temporal, spatial, and quality (or PSNR). This three-dimensional scalability offers a great flexibility that enables customizing video streams for a wide range of heterogeneous receivers and network conditions. This flexibility, however, is not supported by current stream authentication schemes in the literature. We propose an efficient authentication scheme that accounts for the full scalability of video streams: it enables verification of all possible substreams that can be extracted and decoded from the original stream. Our evaluation study shows that the proposed authentication scheme is robust against packet losses, adds low communication and computation overheads, and is suitable for live streaming systems as it has short delay.