Authentication schemes for multimedia streams
暂无分享,去创建一个
[1] A.R. Kaced,et al. SEMAFOR: A Framework for Authentication of Aadaptive Multimedia Content and Delivery for Heterogeneous Networks , 2006, International Conference on Internet Surveillance and Protection (ICISP’06).
[2] Qi Tian,et al. A secure and robust approach to scalable video authentication , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).
[3] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[4] Lawrence Wai-Choong Wong,et al. A proposal of butterfly-graph based stream authentication over lossy networks , 2005, 2005 IEEE International Conference on Multimedia and Expo.
[5] Heiko Schwarz,et al. Overview of the Scalable Video Coding Extension of the H.264/AVC Standard , 2007, IEEE Transactions on Circuits and Systems for Video Technology.
[6] Edwin K. P. Chong,et al. Efficient multicast stream authentication using erasure codes , 2003, TSEC.
[7] Adi Shamir,et al. How to share a secret , 1979, CACM.
[8] Peter Amon,et al. File Format for Scalable Video Coding , 2007, IEEE Transactions on Circuits and Systems for Video Technology.
[9] Kenneth J. Turner,et al. An Architectural Description of Intelligent Network Features and Their Interactions , 1998, Comput. Networks.
[10] Shih-Fu Chang,et al. Semifragile watermarking for authenticating JPEG visual content , 2000, Electronic Imaging.
[11] Hitesh Tewari,et al. Performance analysis of cryptographic protocols on handheld devices , 2004, Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings..
[12] Gary J. Sullivan,et al. Video Compression - From Concepts to the H.264/AVC Standard , 2005, Proceedings of the IEEE.
[13] Ran Canetti,et al. Efficient and Secure Source Authentication for Multicast , 2001, NDSS.
[14] Luigi Logrippo,et al. Structural Models for Specifying Telephone Systems , 1997, Comput. Networks ISDN Syst..
[15] Donald F. Towsley,et al. Measurement and modelling of the temporal dependence in packet loss , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[16] Ralph C. Merkle,et al. A Certified Digital Signature , 1989, CRYPTO.
[17] Thomas Wiegand,et al. Mobile Video Transmission Using Scalable Video Coding , 2007, IEEE Transactions on Circuits and Systems for Video Technology.
[18] Weihong Wang,et al. Exposing digital forgeries in video by detecting double MPEG compression , 2006, MM&Sec '06.
[19] Touradj Ebrahimi,et al. Authentication and access control in the JPEG 2000 compressed domain , 2001, Optics + Photonics.
[20] Robert H. Deng,et al. Scalable authentication of MPEG-4 streams , 2006, IEEE Transactions on Multimedia.
[21] Kenneth J. Turner,et al. Relating Architecture and Specification , 1997, Comput. Networks ISDN Syst..
[22] Refik Molva,et al. Efficient Multicast Packet Authentication , 2003, NDSS.
[23] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[24] Shipeng Li,et al. Encryption and authentication for scalable multimedia: current state of the art and challenges , 2004, SPIE Optics East.
[25] Ravi Jain,et al. End-to-end security in the presence of intelligent data adapting proxies: the case of authenticating transcoded streaming media , 2005, IEEE Journal on Selected Areas in Communications.
[26] Ravi Jain,et al. A System for End-to-End Authentication of Adaptive Multimedia Content , 2004, Communications and Multimedia Security.
[27] Kenneth J. Turner. Exploiting the m4 Macro Language , 1994 .
[28] Rosario Gennaro,et al. How to Sign Digital Streams , 1997, CRYPTO.
[29] Shih-Fu Chang,et al. A new semi-fragile image authentication framework combining ECC and PKI infrastructures , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).
[30] Simon S. Lam,et al. Digital signatures for flows and multicasts , 1999, TNET.
[31] Yookun Cho,et al. The eSAIDA Stream Authentication Scheme , 2004, ICCSA.
[32] Robert H. Deng,et al. A flexible and scalable authentication scheme for JPEG2000 image codestreams , 2003, MULTIMEDIA '03.
[33] Philippe Golle,et al. Authenticating Streamed Data in the Presence of Random Packet Loss , 2001, NDSS.
[34] Ang Li,et al. Video Authentication and Tamper Detection Based on Cloud Model , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).
[35] Michael O. Rabin,et al. Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.
[36] A.R. Kaced,et al. Multimedia content authentication for proxy-side adaptation , 2006, International Conference on Digital Telecommunications (ICDT'06).
[37] Johann Großschädl,et al. A Survey of Public-Key Cryptography on J2ME-Enabled Mobile Devices , 2004, ISCIS.
[38] Huafei Zhu,et al. Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream , 2005, ICICS.
[39] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[40] Bharat K. Bhargava,et al. A tree-based forward digest protocol to verify data integrity in distributed media streaming , 2005, IEEE Transactions on Knowledge and Data Engineering.