Authentication schemes for multimedia streams

With the rapid increase in the demand for multimedia services, securing the delivery of multimedia content has become an important issue. Accordingly, the problem of multimedia stream authenticatio...

[1]  A.R. Kaced,et al.  SEMAFOR: A Framework for Authentication of Aadaptive Multimedia Content and Delivery for Heterogeneous Networks , 2006, International Conference on Internet Surveillance and Protection (ICISP’06).

[2]  Qi Tian,et al.  A secure and robust approach to scalable video authentication , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).

[3]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[4]  Lawrence Wai-Choong Wong,et al.  A proposal of butterfly-graph based stream authentication over lossy networks , 2005, 2005 IEEE International Conference on Multimedia and Expo.

[5]  Heiko Schwarz,et al.  Overview of the Scalable Video Coding Extension of the H.264/AVC Standard , 2007, IEEE Transactions on Circuits and Systems for Video Technology.

[6]  Edwin K. P. Chong,et al.  Efficient multicast stream authentication using erasure codes , 2003, TSEC.

[7]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[8]  Peter Amon,et al.  File Format for Scalable Video Coding , 2007, IEEE Transactions on Circuits and Systems for Video Technology.

[9]  Kenneth J. Turner,et al.  An Architectural Description of Intelligent Network Features and Their Interactions , 1998, Comput. Networks.

[10]  Shih-Fu Chang,et al.  Semifragile watermarking for authenticating JPEG visual content , 2000, Electronic Imaging.

[11]  Hitesh Tewari,et al.  Performance analysis of cryptographic protocols on handheld devices , 2004, Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings..

[12]  Gary J. Sullivan,et al.  Video Compression - From Concepts to the H.264/AVC Standard , 2005, Proceedings of the IEEE.

[13]  Ran Canetti,et al.  Efficient and Secure Source Authentication for Multicast , 2001, NDSS.

[14]  Luigi Logrippo,et al.  Structural Models for Specifying Telephone Systems , 1997, Comput. Networks ISDN Syst..

[15]  Donald F. Towsley,et al.  Measurement and modelling of the temporal dependence in packet loss , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[16]  Ralph C. Merkle,et al.  A Certified Digital Signature , 1989, CRYPTO.

[17]  Thomas Wiegand,et al.  Mobile Video Transmission Using Scalable Video Coding , 2007, IEEE Transactions on Circuits and Systems for Video Technology.

[18]  Weihong Wang,et al.  Exposing digital forgeries in video by detecting double MPEG compression , 2006, MM&Sec '06.

[19]  Touradj Ebrahimi,et al.  Authentication and access control in the JPEG 2000 compressed domain , 2001, Optics + Photonics.

[20]  Robert H. Deng,et al.  Scalable authentication of MPEG-4 streams , 2006, IEEE Transactions on Multimedia.

[21]  Kenneth J. Turner,et al.  Relating Architecture and Specification , 1997, Comput. Networks ISDN Syst..

[22]  Refik Molva,et al.  Efficient Multicast Packet Authentication , 2003, NDSS.

[23]  Ran Canetti,et al.  Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[24]  Shipeng Li,et al.  Encryption and authentication for scalable multimedia: current state of the art and challenges , 2004, SPIE Optics East.

[25]  Ravi Jain,et al.  End-to-end security in the presence of intelligent data adapting proxies: the case of authenticating transcoded streaming media , 2005, IEEE Journal on Selected Areas in Communications.

[26]  Ravi Jain,et al.  A System for End-to-End Authentication of Adaptive Multimedia Content , 2004, Communications and Multimedia Security.

[27]  Kenneth J. Turner Exploiting the m4 Macro Language , 1994 .

[28]  Rosario Gennaro,et al.  How to Sign Digital Streams , 1997, CRYPTO.

[29]  Shih-Fu Chang,et al.  A new semi-fragile image authentication framework combining ECC and PKI infrastructures , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).

[30]  Simon S. Lam,et al.  Digital signatures for flows and multicasts , 1999, TNET.

[31]  Yookun Cho,et al.  The eSAIDA Stream Authentication Scheme , 2004, ICCSA.

[32]  Robert H. Deng,et al.  A flexible and scalable authentication scheme for JPEG2000 image codestreams , 2003, MULTIMEDIA '03.

[33]  Philippe Golle,et al.  Authenticating Streamed Data in the Presence of Random Packet Loss , 2001, NDSS.

[34]  Ang Li,et al.  Video Authentication and Tamper Detection Based on Cloud Model , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[35]  Michael O. Rabin,et al.  Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.

[36]  A.R. Kaced,et al.  Multimedia content authentication for proxy-side adaptation , 2006, International Conference on Digital Telecommunications (ICDT'06).

[37]  Johann Großschädl,et al.  A Survey of Public-Key Cryptography on J2ME-Enabled Mobile Devices , 2004, ISCIS.

[38]  Huafei Zhu,et al.  Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream , 2005, ICICS.

[39]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[40]  Bharat K. Bhargava,et al.  A tree-based forward digest protocol to verify data integrity in distributed media streaming , 2005, IEEE Transactions on Knowledge and Data Engineering.