Authentication schemes for multimedia streams: Quantitative analysis and comparison
暂无分享,去创建一个
[1] A.R. Kaced,et al. SEMAFOR: A Framework for Authentication of Aadaptive Multimedia Content and Delivery for Heterogeneous Networks , 2006, International Conference on Internet Surveillance and Protection (ICISP’06).
[2] Robert H. Deng,et al. Scalable trusted online dissemination of JPEG2000 images , 2005, Multimedia Systems.
[3] Touradj Ebrahimi,et al. Authentication and access control in the JPEG 2000 compressed domain , 2001, Optics + Photonics.
[4] Hitesh Tewari,et al. Performance analysis of cryptographic protocols on handheld devices , 2004, Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings..
[5] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[6] HefeedaMohamed,et al. Authentication schemes for multimedia streams , 2010 .
[7] Lawrence Wai-Choong Wong,et al. A proposal of butterfly-graph based stream authentication over lossy networks , 2005, 2005 IEEE International Conference on Multimedia and Expo.
[8] Ravi Jain,et al. A System for End-to-End Authentication of Adaptive Multimedia Content , 2004, Communications and Multimedia Security.
[9] Rosario Gennaro,et al. How to Sign Digital Streams , 1997, CRYPTO.
[10] Shih-Fu Chang,et al. Semifragile watermarking for authenticating JPEG visual content , 2000, Electronic Imaging.
[11] Simon S. Lam,et al. Digital signatures for flows and multicasts , 1999, TNET.
[12] Roni Even,et al. RTP Payload Format for H.264 Video , 2011, RFC.
[13] Yookun Cho,et al. The eSAIDA Stream Authentication Scheme , 2004, ICCSA.
[14] Yacine Challal,et al. A taxonomy of multicast data origin authentication: Issues and solutions , 2004, IEEE Communications Surveys & Tutorials.
[15] Vlastimil Klíma,et al. Tunnels in Hash Functions: MD5 Collisions Within a Minute , 2006, IACR Cryptol. ePrint Arch..
[16] Ralph C. Merkle,et al. A Certified Digital Signature , 1989, CRYPTO.
[17] Johann Großschädl,et al. A Survey of Public-Key Cryptography on J2ME-Enabled Mobile Devices , 2004, ISCIS.
[18] Huafei Zhu,et al. Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream , 2005, ICICS.
[19] Lawrence Wai-Choong Wong,et al. Stream Authentication Based on Generlized Butterfly Graph , 2007, 2007 IEEE International Conference on Image Processing.
[20] Refik Molva,et al. Efficient Multicast Packet Authentication , 2003, NDSS.
[21] Bharat K. Bhargava,et al. A tree-based forward digest protocol to verify data integrity in distributed media streaming , 2005, IEEE Transactions on Knowledge and Data Engineering.
[22] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[23] Ran Canetti,et al. Efficient and Secure Source Authentication for Multicast , 2001, NDSS.
[24] Donald F. Towsley,et al. Measurement and modelling of the temporal dependence in packet loss , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[25] Robert H. Deng,et al. Scalable authentication of MPEG-4 streams , 2006, IEEE Transactions on Multimedia.
[26] Gary J. Sullivan,et al. Video Compression - From Concepts to the H.264/AVC Standard , 2005, Proceedings of the IEEE.
[27] Mohan S. Kankanhalli,et al. A scalable signature scheme for video authentication , 2006, Multimedia Tools and Applications.
[28] Thomas Wiegand,et al. Mobile Video Transmission Using Scalable Video Coding , 2007, IEEE Transactions on Circuits and Systems for Video Technology.
[29] Robert H. Deng,et al. A flexible and scalable authentication scheme for JPEG2000 image codestreams , 2003, MULTIMEDIA '03.
[30] Philippe Golle,et al. Authenticating Streamed Data in the Presence of Random Packet Loss , 2001, NDSS.
[31] Simon S. Lam,et al. Digital signatures for flows and multicasts , 1998, Proceedings Sixth International Conference on Network Protocols (Cat. No.98TB100256).
[32] Ang Li,et al. Video Authentication and Tamper Detection Based on Cloud Model , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).
[33] Edwin K. P. Chong,et al. Efficient multicast stream authentication using erasure codes , 2003, TSEC.
[34] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[35] Michael O. Rabin,et al. Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.
[36] A.R. Kaced,et al. Multimedia content authentication for proxy-side adaptation , 2006, International Conference on Digital Telecommunications (ICDT'06).
[37] Adi Shamir,et al. How to share a secret , 1979, CACM.
[38] Peter Amon,et al. File Format for Scalable Video Coding , 2007, IEEE Transactions on Circuits and Systems for Video Technology.
[39] Rosario Gennaro,et al. How to Sign Digital Streams , 1997, Inf. Comput..
[40] Newton Lee,et al. ACM Transactions on Multimedia Computing, Communications and Applications (ACM TOMCCAP) , 2007, CIE.
[41] Weihong Wang,et al. Exposing digital forgeries in video by detecting double MPEG compression , 2006, MM&Sec '06.
[42] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[43] Vlastimil Klíma. Finding MD5 Collisions - a Toy For a Notebook , 2005, IACR Cryptol. ePrint Arch..
[44] Shih-Fu Chang,et al. A new semi-fragile image authentication framework combining ECC and PKI infrastructures , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).
[45] Shipeng Li,et al. Encryption and authentication for scalable multimedia: current state of the art and challenges , 2004, SPIE Optics East.
[46] Qi Tian,et al. A secure and robust approach to scalable video authentication , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).
[47] Heiko Schwarz,et al. Overview of the Scalable Video Coding Extension of the H.264/AVC Standard , 2007, IEEE Transactions on Circuits and Systems for Video Technology.
[48] Ravi Jain,et al. End-to-end security in the presence of intelligent data adapting proxies: the case of authenticating transcoded streaming media , 2005, IEEE Journal on Selected Areas in Communications.