A hybrid approach for authenticating MPEG-2 streaming data

  • Authors:
  • Meiqin Wang;Lin Li;S. M. Yiu;Lucas C. K. Hui;C. F. Chong;K. P. Chow;W. W. Tsang;H. W. Chan;K. H. Pun

  • Affiliations:
  • Laboratory of Cryptographic Technology and Information Security, Ministry of Education, Shandong University, Jinan, China;Laboratory of Cryptographic Technology and Information Security, Ministry of Education, Shandong University, Jinan, China;Department of Computer Science, The University of Hong Kong, Hong Kong SAR, China;Department of Computer Science, The University of Hong Kong, Hong Kong SAR, China;Department of Computer Science, The University of Hong Kong, Hong Kong SAR, China;Department of Computer Science, The University of Hong Kong, Hong Kong SAR, China;Department of Computer Science, The University of Hong Kong, Hong Kong SAR, China;Department of Computer Science, The University of Hong Kong, Hong Kong SAR, China;Department of Computer Science, The University of Hong Kong, Hong Kong SAR, China

  • Venue:
  • MCAM'07 Proceedings of the 2007 international conference on Multimedia content analysis and mining
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

There are two main approaches for authenticating digital streams, namely the tree chaining [1] and the hash chaining [2,3]. Both approaches have their disadvantages. Hash chaining is superior for low communication overhead, however, it is not resilient to packet loss and it has a longer verification delay. On the other hand, tree chaining is more robust even if packet loss occurs and with shorter verification delay, but the communication overhead is too high to be tolerable, especially in online applications. In this paper, we try to combine the two techniques and propose a hybrid scheme for authenticating MPEG-2 streaming data, which are still used by real application systems, by taking advantage of the characteristics of MPEG frames. The hybrid approach is shown to be more effective as compared to the other two approaches.