Authentication schemes for multimedia streams: Quantitative analysis and comparison

With the rapid increase in the demand for multimedia services, securing the delivery of multimedia content has become an important issue. Accordingly, the problem of multimedia stream authentication has received considerable attention by previous research and various solutions have been proposed. However, these solutions have not been rigorously analyzed and contrasted to each other, and thus their relative suitability for different streaming environments is not clear. This article presents comprehensive analysis and comparison among different schemes proposed in the literature to authenticate multimedia streams. Authentication schemes for nonscalable and scalable multimedia streams are analyzed. To conduct this analysis, we define five important performance metrics, which are computation cost, communication overhead, receiver buffer size, delay, and tolerance to packet losses. We derive analytic formulas for these metrics for all considered authentication schemes to numerically analyze their performance. In addition, we implement all schemes in a simulator to study and compare their performance in different environments. The parameters for the simulator are carefully chosen to mimic realistic settings. We draw several conclusions on the advantages and disadvantages of each scheme. We extend our analysis to authentication techniques for scalable streams. We pay careful attention to the flexibility of scalable streams and analyze its impacts on the authentication schemes. Our analysis and comparison reveal the merits and shortcomings of each scheme, provide guidelines on choosing the most appropriate scheme for a given multimedia streaming application, and could stimulate designing new authentication schemes or improving existing ones. For example, our detailed analysis has led us to design a new authentication scheme that combines the best features of two previous schemes.

[1]  A.R. Kaced,et al.  SEMAFOR: A Framework for Authentication of Aadaptive Multimedia Content and Delivery for Heterogeneous Networks , 2006, International Conference on Internet Surveillance and Protection (ICISP’06).

[2]  Robert H. Deng,et al.  Scalable trusted online dissemination of JPEG2000 images , 2005, Multimedia Systems.

[3]  Touradj Ebrahimi,et al.  Authentication and access control in the JPEG 2000 compressed domain , 2001, Optics + Photonics.

[4]  Hitesh Tewari,et al.  Performance analysis of cryptographic protocols on handheld devices , 2004, Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings..

[5]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[6]  HefeedaMohamed,et al.  Authentication schemes for multimedia streams , 2010 .

[7]  Lawrence Wai-Choong Wong,et al.  A proposal of butterfly-graph based stream authentication over lossy networks , 2005, 2005 IEEE International Conference on Multimedia and Expo.

[8]  Ravi Jain,et al.  A System for End-to-End Authentication of Adaptive Multimedia Content , 2004, Communications and Multimedia Security.

[9]  Rosario Gennaro,et al.  How to Sign Digital Streams , 1997, CRYPTO.

[10]  Shih-Fu Chang,et al.  Semifragile watermarking for authenticating JPEG visual content , 2000, Electronic Imaging.

[11]  Simon S. Lam,et al.  Digital signatures for flows and multicasts , 1999, TNET.

[12]  Roni Even,et al.  RTP Payload Format for H.264 Video , 2011, RFC.

[13]  Yookun Cho,et al.  The eSAIDA Stream Authentication Scheme , 2004, ICCSA.

[14]  Yacine Challal,et al.  A taxonomy of multicast data origin authentication: Issues and solutions , 2004, IEEE Communications Surveys & Tutorials.

[15]  Vlastimil Klíma,et al.  Tunnels in Hash Functions: MD5 Collisions Within a Minute , 2006, IACR Cryptol. ePrint Arch..

[16]  Ralph C. Merkle,et al.  A Certified Digital Signature , 1989, CRYPTO.

[17]  Johann Großschädl,et al.  A Survey of Public-Key Cryptography on J2ME-Enabled Mobile Devices , 2004, ISCIS.

[18]  Huafei Zhu,et al.  Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream , 2005, ICICS.

[19]  Lawrence Wai-Choong Wong,et al.  Stream Authentication Based on Generlized Butterfly Graph , 2007, 2007 IEEE International Conference on Image Processing.

[20]  Refik Molva,et al.  Efficient Multicast Packet Authentication , 2003, NDSS.

[21]  Bharat K. Bhargava,et al.  A tree-based forward digest protocol to verify data integrity in distributed media streaming , 2005, IEEE Transactions on Knowledge and Data Engineering.

[22]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[23]  Ran Canetti,et al.  Efficient and Secure Source Authentication for Multicast , 2001, NDSS.

[24]  Donald F. Towsley,et al.  Measurement and modelling of the temporal dependence in packet loss , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[25]  Robert H. Deng,et al.  Scalable authentication of MPEG-4 streams , 2006, IEEE Transactions on Multimedia.

[26]  Gary J. Sullivan,et al.  Video Compression - From Concepts to the H.264/AVC Standard , 2005, Proceedings of the IEEE.

[27]  Mohan S. Kankanhalli,et al.  A scalable signature scheme for video authentication , 2006, Multimedia Tools and Applications.

[28]  Thomas Wiegand,et al.  Mobile Video Transmission Using Scalable Video Coding , 2007, IEEE Transactions on Circuits and Systems for Video Technology.

[29]  Robert H. Deng,et al.  A flexible and scalable authentication scheme for JPEG2000 image codestreams , 2003, MULTIMEDIA '03.

[30]  Philippe Golle,et al.  Authenticating Streamed Data in the Presence of Random Packet Loss , 2001, NDSS.

[31]  Simon S. Lam,et al.  Digital signatures for flows and multicasts , 1998, Proceedings Sixth International Conference on Network Protocols (Cat. No.98TB100256).

[32]  Ang Li,et al.  Video Authentication and Tamper Detection Based on Cloud Model , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[33]  Edwin K. P. Chong,et al.  Efficient multicast stream authentication using erasure codes , 2003, TSEC.

[34]  Ran Canetti,et al.  Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[35]  Michael O. Rabin,et al.  Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.

[36]  A.R. Kaced,et al.  Multimedia content authentication for proxy-side adaptation , 2006, International Conference on Digital Telecommunications (ICDT'06).

[37]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[38]  Peter Amon,et al.  File Format for Scalable Video Coding , 2007, IEEE Transactions on Circuits and Systems for Video Technology.

[39]  Rosario Gennaro,et al.  How to Sign Digital Streams , 1997, Inf. Comput..

[40]  Newton Lee,et al.  ACM Transactions on Multimedia Computing, Communications and Applications (ACM TOMCCAP) , 2007, CIE.

[41]  Weihong Wang,et al.  Exposing digital forgeries in video by detecting double MPEG compression , 2006, MM&Sec '06.

[42]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[43]  Vlastimil Klíma Finding MD5 Collisions - a Toy For a Notebook , 2005, IACR Cryptol. ePrint Arch..

[44]  Shih-Fu Chang,et al.  A new semi-fragile image authentication framework combining ECC and PKI infrastructures , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).

[45]  Shipeng Li,et al.  Encryption and authentication for scalable multimedia: current state of the art and challenges , 2004, SPIE Optics East.

[46]  Qi Tian,et al.  A secure and robust approach to scalable video authentication , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).

[47]  Heiko Schwarz,et al.  Overview of the Scalable Video Coding Extension of the H.264/AVC Standard , 2007, IEEE Transactions on Circuits and Systems for Video Technology.

[48]  Ravi Jain,et al.  End-to-end security in the presence of intelligent data adapting proxies: the case of authenticating transcoded streaming media , 2005, IEEE Journal on Selected Areas in Communications.