A Computational Approach to Edge Detection
IEEE Transactions on Pattern Analysis and Machine Intelligence
MPEG: a video compression standard for multimedia applications
Communications of the ACM - Special issue on digital multimedia systems
Watermarking of uncompressed and compressed video
Signal Processing
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Keying Hash Functions for Message Authentication
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Efficient Multicast Packet Authentication Using Signature Amortization
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Digital Signatures for Flows and Multicasts
ICNP '98 Proceedings of the Sixth International Conference on Network Protocols
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
A secure and robust approach to scalable video authentication
ICME '03 Proceedings of the 2003 International Conference on Multimedia and Expo - Volume 1
Reversible data hiding algorithm based on prediction error
CAR'10 Proceedings of the 2nd international Asia conference on Informatics in control, automation and robotics - Volume 3
Watermarking of free-view video
IEEE Transactions on Image Processing
Digital watermarking robust to geometric distortions
IEEE Transactions on Image Processing
Technique for authenticating H.264/SVC and its performance evaluation over wireless mobile networks
Journal of Computer and System Sciences
Hi-index | 0.24 |
Multicast video streaming in heterogeneous networks undergoes to very different physical constraints, in fact, such networks are characterized by different QoS parameters, involving one or more transcoding process between the sender and the receivers. Video streaming authentication algorithms must be robust to transcoding processes and must guarantee the copyright of the video owner/producer. We propose a real-time video streaming authentication algorithm that can guarantee the copyright of the video owner and that we prove to be robust to packet loss and transcoding processes.