End-to-end secure delivery of scalable video streams
Proceedings of the 18th international workshop on Network and operating systems support for digital audio and video
Authentication schemes for multimedia streams: Quantitative analysis and comparison
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
NSS'12 Proceedings of the 6th international conference on Network and System Security
Technique for authenticating H.264/SVC and its performance evaluation over wireless mobile networks
Journal of Computer and System Sciences
Hi-index | 0.00 |
The heterogeneity of current terminals and networks leads to data transmission disturbances, particularly with multimedia flows. Dynamic adaptation is a de facto solution which enables users to exchange any data type in an optimal way, in spite of various networks, terminals, applications, needs and preferences. However Content Authentication is more complex since it may be adapted by intermediate proxies. In this paper, we present AMCA an authentication scheme for adaptive multimedia content in a multi-proxy adaptation platform. Our system, based on a multi-hop signature scheme using a Merkle Hash Tree, aims to deliver an end-to-end authenticity of original content exchanged in a heterogeneous network while allowing content adaptation by intermediary proxies between the content transmitter and the final users. We also give an overview of a prototype of our authentication framework as an implementation of AMCA within a content delivery platform based on proxy-side adaptation.