Real-time loss tolerant video streaming authentication for satellite links

A new real time loss tolerant video streaming authentication scheme is presented. The bandwidth overhead is negligible, and authentication information are transmitted from the sender to all the receivers by means of a watermarking technique. Real time constraints are achieved by using a features computation algorithm, the sender embeds in each block of pictures the features computed over the current block, and a message authentication code that authenticates them. The receiver computes the features over the received block and compares it with that ones authenticated and extracted from the current block.

[1]  John F. Canny,et al.  A Computational Approach to Edge Detection , 1986, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[2]  Didier Le Gall,et al.  MPEG: a video compression standard for multimedia applications , 1991, CACM.

[3]  Stefano Chessa,et al.  Embedding Source Signature in Multicast Wireless Video Streams , 2007, 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.

[4]  Donald E. Eastlake,et al.  US Secure Hash Algorithm 1 (SHA1) , 2001, RFC.

[5]  Lei Guo,et al.  A novel video multicast instant source authentication model based on digital watermarking and TESLA , 2003, International Conference on Communication Technology Proceedings, 2003. ICCT 2003..

[6]  Philippe Golle,et al.  Authenticating Streamed Data in the Presence of Random Packet Loss , 2001, NDSS.

[7]  Moni Naor,et al.  Multicast security: a taxonomy and some efficient constructions , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[8]  Simon S. Lam,et al.  Digital signatures for flows and multicasts , 1999, TNET.

[9]  Ran Canetti,et al.  Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[10]  William M. Daley,et al.  Digital Signature Standard (DSS) , 2000 .

[11]  Ran Canetti,et al.  Efficient and Secure Source Authentication for Multicast , 2001, NDSS.

[12]  Bart Preneel,et al.  Attacking Some Perceptual Image Hash Algorithms , 2007, 2007 IEEE International Conference on Multimedia and Expo.

[13]  Rosario Gennaro,et al.  How to Sign Digital Streams , 1997, CRYPTO.