Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
A compact and fast hybrid signature scheme for multicast packet authentication
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Complexity and Fast Algorithms for Multiexponentiations
IEEE Transactions on Computers
Collaborative proxy system for distributed Web content transcoding
Proceedings of the ninth international conference on Information and knowledge management
Video transcoding for universal multimedia access
MULTIMEDIA '00 Proceedings of the 2000 ACM workshops on Multimedia
Distributing media transformation over multiple media gateways
MULTIMEDIA '01 Proceedings of the ninth ACM international conference on Multimedia
Twin signatures: an alternative to the hash-and-sign paradigm
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
The BiBa one-time signature and broadcast authentication protocol
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
JPEG 2000: Image Compression Fundamentals, Standards and Practice
JPEG 2000: Image Compression Fundamentals, Standards and Practice
Digital image watermarking for joint ownership
Proceedings of the tenth ACM international conference on Multimedia
Multimedia content screening using a dual watermarking and fingerprinting system
Proceedings of the tenth ACM international conference on Multimedia
A case for a multi-key secure video proxy: theory, design, and implementation
Proceedings of the tenth ACM international conference on Multimedia
Content adaptation of multimedia delivery and indexing using MPEG-7
Proceedings of the tenth ACM international conference on Multimedia
CT-RSA '02 Proceedings of the The Cryptographer's Track at the RSA Conference on Topics in Cryptology
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Sibling Intractable Function Families and Their Applications (Extended Abstract)
ASIACRYPT '91 Proceedings of the International Conference on the Theory and Applications of Cryptology: Advances in Cryptology
Efficient multicast stream authentication using erasure codes
ACM Transactions on Information and System Security (TISSEC)
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Graph-Based Authentication of Digital Streams
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
A flexible and scalable authentication scheme for JPEG2000 image codestreams
MULTIMEDIA '03 Proceedings of the eleventh ACM international conference on Multimedia
Web services selection for distributed composition of multimedia content
Proceedings of the 12th annual ACM international conference on Multimedia
Flexible frameworks for medical multimedia
Proceedings of the 12th annual ACM international conference on Multimedia
Fingerprinting and forensic analysis of multimedia
Proceedings of the 12th annual ACM international conference on Multimedia
Transcoding Biomedical Information Resources for Mobile Handhelds
HICSS '05 Proceedings of the Proceedings of the 38th Annual Hawaii International Conference on System Sciences (HICSS'05) - Track 6 - Volume 06
CNSR '05 Proceedings of the 3rd Annual Communication Networks and Services Research Conference
Coordinated enroute multimedia object caching in transcoding proxies for tree networks
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Resource-aware service composition for video multicast to heterogeneous mobile users
Proceedings of the first ACM international workshop on Multimedia service composition
Digitally signed document sanitizing scheme based on bilinear maps
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Dual watermarking for protection of rightful ownership and secure image authentication
Proceedings of the 4th ACM international workshop on Contents protection and security
Multimedia Encryption and Authentication Techniques and Applications (Internet and Communications Series)
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
Multi-Source stream authentication framework in case of composite MPEG-4 stream
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
VSH, an efficient and provable collision-resistant hash function
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Robust and secure image hashing
IEEE Transactions on Information Forensics and Security
Scalable authentication of MPEG-4 streams
IEEE Transactions on Multimedia
IEEE Journal on Selected Areas in Communications
A robust image authentication method distinguishing JPEG compression from malicious manipulation
IEEE Transactions on Circuits and Systems for Video Technology
A joint layered scheme for reliable and secure mobile JPEG-2000 streaming
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
NSS'12 Proceedings of the 6th international conference on Network and System Security
Technique for authenticating H.264/SVC and its performance evaluation over wireless mobile networks
Journal of Computer and System Sciences
Hi-index | 0.00 |
Compared with the direct server-user approach, the server-proxy-user architecture for multimedia delivery promises significantly improved system scalability. The introduction of the intermediary transcoding proxies between content servers and end users in this architecture, however, brings unprecedented challenges to content security. In this article, we present a systematic study on the end-to-end content authentication problem in the server-proxy-user context, where intermediary proxies transcode multimedia content dynamically. We present a formal model for the authentication problem, propose a concrete construction for authenticating generic data modality and formally prove its security. We then apply the generic construction to authenticating specific multimedia formats, for example, JPEG2000 code-streams and MPEG-4 video streams. The prototype implementation shows that our scheme is suitable for practical applications.