Enhancing wireless video streaming using lightweight approximate authentication

In this paper, we propose a novel lightweight approximate authentication algorithm that provides efficient protection for wireless video streaming where attacks on the stream are possible, but classical integrity protection algorithms are impractical because bit errors occur naturally. The benefits of the proposed algorithm over other algorithms are fast execution and small message authentication code size. Moreover, the approximate authentication supports error resilient video decoding by dropping seriously damaged packets, thus improving the perceived quality of the video stream. The performance of the algorithm is demonstrated via numerical analysis, simulations and measurements over modeled and real wireless channels.

[1]  Ajay Luthra,et al.  Overview of the H.264/AVC video coding standard , 2003, IEEE Trans. Circuits Syst. Video Technol..

[2]  E. O. Elliott Estimates of error rates for codes on burst-noise channels , 1963 .

[3]  Aggelos K. Katsaggelos,et al.  Review of Error Resilient Coding Techniques for Real-Time Video Communications , 2000 .

[4]  Aggelos K. Katsaggelos,et al.  Error resilient video coding techniques , 2000, IEEE Signal Process. Mag..

[5]  S. Xiao,et al.  Efficient Noise-Tolerant Message Authentication Codes Using Direct Sequence Spread Spectrum Technique , 2006, 2006 40th Annual Conference on Information Sciences and Systems.

[6]  Gonzalo R. Arce,et al.  Approximate image message authentication codes , 2001, IEEE Trans. Multim..

[7]  E. Gilbert Capacity of a burst-noise channel , 1960 .

[8]  Sethuraman Panchanathan,et al.  Error resiliency schemes in H.264/AVC standard , 2006, J. Vis. Commun. Image Represent..

[9]  Giovanni Di Crescenzo,et al.  Approximate Message Authentication Codes for$N$-ary Alphabets , 2006, IEEE Transactions on Information Forensics and Security.

[10]  Charles G. Boncelet The NTMAC for authentication of noisy messages , 2006, IEEE Transactions on Information Forensics and Security.

[11]  Yu Liu,et al.  The CRC–NTMAC for Noisy Message Authentication , 2005, IEEE Transactions on Information Forensics and Security.

[12]  Andreas Willig,et al.  Measurements of a wireless link in an industrial environment using an IEEE 802.11-compliant physical layer , 2002, IEEE Trans. Ind. Electron..

[13]  Minghua Chen,et al.  A fragile watermark error detection scheme for wireless video communications , 2005, IEEE Transactions on Multimedia.

[14]  Cyril Bergeron,et al.  Unequal Error Protection for H.263+ bitstreams over a wireless IP network , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.

[15]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[16]  Y. Liu,et al.  The BCH-NTMAC for Noisy Message Authentication , 2006, 2006 40th Annual Conference on Information Sciences and Systems.

[17]  Bruce Schneier,et al.  Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .