Generalized Butterfly Graph and Its Application to Video Stream Authentication
暂无分享,去创建一个
[1] Philip A. Chou,et al. Rate-distortion optimized streaming of packetized media , 2006, IEEE Transactions on Multimedia.
[2] Ajay Luthra,et al. Overview of the H.264/AVC video coding standard , 2003, IEEE Trans. Circuits Syst. Video Technol..
[3] Gary J. Sullivan,et al. Rate-constrained coder control and comparison of video coding standards , 2003, IEEE Trans. Circuits Syst. Video Technol..
[4] Wenjun Zeng,et al. Multimedia Security Technologies for Digital Rights Management , 2006 .
[5] Bernd Girod,et al. Rate-distortion optimized video streaming with multiple deadlines , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).
[6] A. Ortega,et al. Optimal scheduling for streaming of scalable media , 2000, Conference Record of the Thirty-Fourth Asilomar Conference on Signals, Systems and Computers (Cat. No.00CH37154).
[7] Edwin K. P. Chong,et al. Efficient multicast packet authentication using signature amortization , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[8] Bernd Girod,et al. Rate-distortion optimized packet scheduling and routing for media streaming with path diversity , 2003, Data Compression Conference, 2003. Proceedings. DCC 2003.
[9] Rosario Gennaro,et al. How to Sign Digital Streams , 1997, CRYPTO.
[10] Philippe Golle,et al. Authenticating Streamed Data in the Presence of Random Packet Loss , 2001, NDSS.
[11] Bernd Girod,et al. Rate-distortion hint tracks for adaptive video streaming , 2005, IEEE Transactions on Circuits and Systems for Video Technology.
[12] Simon S. Lam,et al. Digital signatures for flows and multicasts , 1998, Proceedings Sixth International Conference on Network Protocols (Cat. No.98TB100256).
[13] Deepa Kundur,et al. Special Issue on Enabling Security Technologies for Digital Rights Management , 2004, Proc. IEEE.
[14] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[15] Steven McCanne,et al. Soft ARQ for Layered Streaming Media , 2001, J. VLSI Signal Process..
[16] Lawrence Wai-Choong Wong,et al. An Optimized Content-Aware Authentication Scheme for Streaming JPEG-2000 Images Over Lossy Networks , 2007, IEEE Trans. Multim..
[17] Lawrence Wai-Choong Wong,et al. A proposal of butterfly-graph based stream authentication over lossy networks , 2005, 2005 IEEE International Conference on Multimedia and Expo.
[18] John G. Apostolopoulos,et al. secure media streaming & secure adaptation for non-scalable video , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[19] Hiroshi Shigeno,et al. NAL Level Stream Authentication for H.264/AVC , 2007 .