Efficient dispersal of information for security, load balancing, and fault tolerance
Journal of the ACM (JACM)
Digital signatures for flows and multicasts
IEEE/ACM Transactions on Networking (TON)
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Handbook of Applied Cryptography
Handbook of Applied Cryptography
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Efficient multicast stream authentication using erasure codes
ACM Transactions on Information and System Security (TISSEC)
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
A flexible and scalable authentication scheme for JPEG2000 image codestreams
MULTIMEDIA '03 Proceedings of the eleventh ACM international conference on Multimedia
Performance Analysis of Cryptographic Protocols on Handheld Devices
NCA '04 Proceedings of the Network Computing and Applications, Third IEEE International Symposium
A Tree-Based Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming
IEEE Transactions on Knowledge and Data Engineering
A secure and robust approach to scalable video authentication
ICME '03 Proceedings of the 2003 International Conference on Multimedia and Expo - Volume 1
ICISP '06 Proceedings of the International Conference on Internet Surveillance and Protection
Exposing digital forgeries in video by detecting double MPEG compression
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Multimedia content authentication for proxy-side adaptation
ICDT '06 Proceedings of the international conference on Digital Telecommunications
A scalable signature scheme for video authentication
Multimedia Tools and Applications
Video Authentication and Tamper Detection Based on Cloud Model
IIH-MSP '07 Proceedings of the Third International Conference on International Information Hiding and Multimedia Signal Processing (IIH-MSP 2007) - Volume 01
Multi-Source stream authentication framework in case of composite MPEG-4 stream
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
A taxonomy of multicast data origin authentication: Issues and solutions
IEEE Communications Surveys & Tutorials
Scalable authentication of MPEG-4 streams
IEEE Transactions on Multimedia
IEEE Journal on Selected Areas in Communications
File Format for Scalable Video Coding
IEEE Transactions on Circuits and Systems for Video Technology
Mobile Video Transmission Using Scalable Video Coding
IEEE Transactions on Circuits and Systems for Video Technology
Overview of the Scalable Video Coding Extension of the H.264/AVC Standard
IEEE Transactions on Circuits and Systems for Video Technology
Hash chain links resynchronization methods in video streaming security: performance comparison
Journal of Mobile Multimedia
Challenging the feasibility of authentication mechanisms for P2P live streaming
Proceedings of the 6th Latin America Networking Conference
A joint layered scheme for reliable and secure mobile JPEG-2000 streaming
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
NSS'12 Proceedings of the 6th international conference on Network and System Security
Technique for authenticating H.264/SVC and its performance evaluation over wireless mobile networks
Journal of Computer and System Sciences
Hi-index | 0.00 |
With the rapid increase in the demand for multimedia services, securing the delivery of multimedia content has become an important issue. Accordingly, the problem of multimedia stream authentication has received considerable attention by previous research and various solutions have been proposed. However, these solutions have not been rigorously analyzed and contrasted to each other, and thus their relative suitability for different streaming environments is not clear. This article presents comprehensive analysis and comparison among different schemes proposed in the literature to authenticate multimedia streams. Authentication schemes for nonscalable and scalable multimedia streams are analyzed. To conduct this analysis, we define five important performance metrics, which are computation cost, communication overhead, receiver buffer size, delay, and tolerance to packet losses. We derive analytic formulas for these metrics for all considered authentication schemes to numerically analyze their performance. In addition, we implement all schemes in a simulator to study and compare their performance in different environments. The parameters for the simulator are carefully chosen to mimic realistic settings. We draw several conclusions on the advantages and disadvantages of each scheme. We extend our analysis to authentication techniques for scalable streams. We pay careful attention to the flexibility of scalable streams and analyze its impacts on the authentication schemes. Our analysis and comparison reveal the merits and shortcomings of each scheme, provide guidelines on choosing the most appropriate scheme for a given multimedia streaming application, and could stimulate designing new authentication schemes or improving existing ones. For example, our detailed analysis has led us to design a new authentication scheme that combines the best features of two previous schemes.