A study of content authentication in proxy-enabled multimedia delivery systems: Model, techniques, and applications
暂无分享,去创建一个
[1] Ran Canetti,et al. Efficient and Secure Source Authentication for Multicast , 2001, NDSS.
[2] Darko Kirovski,et al. Multimedia encryption and authentication - techniques and applications , 2006 .
[3] Robert H. Deng,et al. Scalable authentication of MPEG-4 streams , 2006, IEEE Transactions on Multimedia.
[4] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[5] Edwin K. P. Chong,et al. Efficient multicast stream authentication using erasure codes , 2003, TSEC.
[6] Darko Kirovski,et al. Multimedia content screening using a dual watermarking and fingerprinting system , 2002, MULTIMEDIA '02.
[7] Min Wu,et al. Robust and secure image hashing , 2006, IEEE Transactions on Information Forensics and Security.
[8] Dawn Xiaodong Song,et al. Homomorphic Signature Schemes , 2002, CT-RSA.
[9] Philip S. Yu,et al. Collaborative proxy system for distributed Web content transcoding , 2000, CIKM '00.
[10] Qing Chen,et al. Lossless data embedding with file size preservation , 2004, IS&T/SPIE Electronic Imaging.
[11] Ravi Jain,et al. A System for End-to-End Authentication of Adaptive Multimedia Content , 2004, Communications and Multimedia Security.
[12] Bruno Crispo,et al. Chained Stream Authentication , 2000, Selected Areas in Cryptography.
[13] Newton Lee,et al. ACM Transactions on Multimedia Computing, Communications and Applications (ACM TOMCCAP) , 2007, CIE.
[14] Jacques Stern,et al. Twin signatures: an alternative to the hash-and-sign paradigm , 2001, CCS '01.
[15] Dima Pröfrock,et al. Dual watermarking for protection of rightful ownership and secure image authentication , 2006, MCPS '06.
[16] Ralph C. Merkle,et al. A Certified Digital Signature , 1989, CRYPTO.
[17] Robert H. Deng,et al. A flexible and scalable authentication scheme for JPEG2000 image codestreams , 2003, MULTIMEDIA '03.
[18] Philippe Golle,et al. Authenticating Streamed Data in the Presence of Random Packet Loss , 2001, NDSS.
[19] Harald Kosch,et al. Content adaptation of multimedia delivery and indexing using MPEG-7 , 2002, MULTIMEDIA '02.
[20] Ahmet M. Eskicioglu,et al. Selective Encryption of Multimedia Content in Distribution Networks: Challenges and New Directions , 2003 .
[21] D. Kirovski,et al. Fingerprinting and forensic analysis of multimedia , 2004, MULTIMEDIA '04.
[22] Ron Steinfeld,et al. Content Extraction Signatures , 2001, ICISC.
[23] Refik Molva,et al. Efficient Multicast Packet Authentication , 2003, NDSS.
[24] Roberto Tamassia,et al. Multicast authentication in fully adversarial networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[25] Pankaj Rohatgi,et al. A compact and fast hybrid signature scheme for multicast packet authentication , 1999, CCS '99.
[26] David K. Y. Yau,et al. A case for a multi-key secure video proxy: theory, design, and implementation , 2002, MULTIMEDIA '02.
[27] Bob Briscoe,et al. FLAMeS: Fast, Loss-Tolerant Authentication of Multicast Streams , 2000 .
[28] Ellen W. Zegura,et al. Self-organizing wide-area network caches , 1998, Proceedings. IEEE INFOCOM '98, the Conference on Computer Communications. Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies. Gateway to the 21st Century (Cat. No.98.
[29] Bambang Parmanto,et al. Transcoding Biomedical Information Resources for Mobile Handhelds , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[30] Jessica Staddon,et al. Graph-based authentication of digital streams , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[31] Wei Tsang Ooi,et al. Distributing media transformation over multiple media gateways , 2001, MULTIMEDIA '01.
[32] David Mazières,et al. On-the-fly verification of rateless erasure codes for efficient content distribution , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[33] Thomas Hardjono,et al. Sibling Intractable Function Families and Their Applications (Extended Abstract) , 1991, ASIACRYPT.
[34] Ming-Syan Chen,et al. A QoS-aware transcoding proxy using on-demand data broadcasting , 2004, IEEE INFOCOM 2004.
[35] Huafei Zhu,et al. Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream , 2005, ICICS.
[36] Robert H. Deng,et al. Scalable trusted online dissemination of JPEG2000 images , 2005, Multimedia Systems.
[37] Ravi Jain,et al. End-to-end security in the presence of intelligent data adapting proxies: the case of authenticating transcoded streaming media , 2005, IEEE Journal on Selected Areas in Communications.
[38] Hideo Miyahara,et al. ASIA : Information Sharing System with Derived Content Restriction Management , 2003 .
[39] Gene Tsudik,et al. Sanitizable Signatures , 2005, ESORICS.
[40] H DengRobert,et al. A study of content authentication in proxy-enabled multimedia delivery systems , 2009 .
[41] Jinan Fiaidhi,et al. Developing secure transcoding intermediary for SVG medical images within peer-to-peer ubiquitous environment , 2005, 3rd Annual Communication Networks and Services Research Conference (CNSR'05).
[42] Wolfgang Kellerer,et al. Web services selection for distributed composition of multimedia content , 2004, MULTIMEDIA '04.
[43] Graham A. Jullien,et al. Complexity and Fast Algorithms for Multiexponentiations , 2000, IEEE Trans. Computers.
[44] Charilaos Christopoulos,et al. Video transcoding for universal multimedia access , 2000, MULTIMEDIA '00.
[45] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[46] John R. Smith,et al. Content-based transcoding of images in the Internet , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[47] Ron Steinfeld,et al. VSH, an Efficient and Provable Collision Resistant Hash Function , 2006, IACR Cryptol. ePrint Arch..
[48] Hideki Imai,et al. Digitally signed document sanitizing scheme based on bilinear maps , 2006, ASIACCS '06.
[49] Keiichi Yasumoto,et al. Resource-aware service composition for video multicast to heterogeneous mobile users , 2005, MSC '05.
[50] Adrian Perrig,et al. The BiBa one-time signature and broadcast authentication protocol , 2001, CCS '01.
[51] Shih-Fu Chang,et al. A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..
[52] Shih-Fu Chang,et al. A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.
[53] Ron Kikinis,et al. Flexible frameworks for medical multimedia , 2004, MULTIMEDIA '04.
[54] Hovav Shacham,et al. Sequential Aggregate Signatures from Trapdoor Permutations , 2004, EUROCRYPT.
[55] Nicolas D. Georganas,et al. Digital image watermarking for joint ownership , 2002, MULTIMEDIA '02.
[56] Sung-Ju Lee,et al. Streaming Media Caching with Transcoding-Enabled Proxies , 2003 .
[57] Keqiu Li,et al. Coordinated enroute multimedia object caching in transcoding proxies for tree networks , 2005, TOMCCAP.