Digital signatures for flows and multicasts
IEEE/ACM Transactions on Networking (TON)
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Efficient multicast stream authentication using erasure codes
ACM Transactions on Information and System Security (TISSEC)
Expander Graphs for Digital Stream Authentication and Robust Overlay Networks
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Graph-Based Authentication of Digital Streams
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Error Control Coding, Second Edition
Error Control Coding, Second Edition
Multimedia content authentication for proxy-side adaptation
ICDT '06 Proceedings of the international conference on Digital Telecommunications
End-to-end secure delivery of scalable video streams
Proceedings of the 18th international workshop on Network and operating systems support for digital audio and video
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Authentication schemes for multimedia streams: Quantitative analysis and comparison
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Loss tolerant video streaming authentication in heterogeneous wireless networks
Computer Communications
On the key exposure problem in chameleon hashes
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
Scalable authentication of MPEG-4 streams
IEEE Transactions on Multimedia
IEEE Journal on Selected Areas in Communications
Overview of the Scalable Video Coding Extension of the H.264/AVC Standard
IEEE Transactions on Circuits and Systems for Video Technology
Hi-index | 0.00 |
In this paper, a bit stream-based authentication scheme for H.264/Scalable Video Coding (SVC) is proposed. The proposed scheme seamlessly integrates cryptographic algorithms and Erasure Correction Codes (ECCs) to SVC video streams such that the authenticated streams are format compliant with the SVC specifications and preserve the three-dimensional scalability (i.e., spatial, quality and temporal) of the original streams. We implement our scheme on a smart phone and study its performance over a realistic bursty packet-lossy wireless mobile network. Our analysis and experimental results show that the scheme achieves very high verification rates with lower communication overhead and much smaller decoding delay compared with the existing solutions.