Analysis of authentication schemes for nonscalable video streams

The problem of multimedia stream authentication has received significant attention by previous works and various solutions have been proposed. These solutions, however, have not been rigorously analyzed and contrasted to each other, and thus their relative suitability for different streaming environments is not clear. In this paper, we conduct comprehensive analysis and comparison among the main authentication schemes proposed in the literature. To perform this analysis, we propose five performance metrics: computation cost, communication overhead, receiver buffer size, delay, and tolerance to packet losses. We derive analytic formulas for these metrics for all schemes, and we numerically analyze these formulas. In addition, we implement all schemes in a simulator to study their performance in different environments. Our detailed analysis reveals the merits and shortcomings of each scheme and provides guidelines on choosing the most appropriate scheme for a given application. Our analysis also helps in designing new authentication schemes and/or improving existing ones.

[1]  Lawrence Wai-Choong Wong,et al.  Stream Authentication Based on Generlized Butterfly Graph , 2007, 2007 IEEE International Conference on Image Processing.

[2]  Refik Molva,et al.  Efficient Multicast Packet Authentication , 2003, NDSS.

[3]  Rosario Gennaro,et al.  How to Sign Digital Streams , 1997, Inf. Comput..

[4]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[5]  Daniel A. Spielman,et al.  Practical loss-resilient codes , 1997, STOC '97.

[6]  Qi Tian,et al.  A secure and robust approach to scalable video authentication , 2003, 2003 International Conference on Multimedia and Expo. ICME '03. Proceedings (Cat. No.03TH8698).

[7]  Heiko Schwarz,et al.  Overview of the Scalable Video Coding Extension of the H.264/AVC Standard , 2007, IEEE Transactions on Circuits and Systems for Video Technology.

[8]  Lawrence Wai-Choong Wong,et al.  A proposal of butterfly-graph based stream authentication over lossy networks , 2005, 2005 IEEE International Conference on Multimedia and Expo.

[9]  Yacine Challal,et al.  A taxonomy of multicast data origin authentication: Issues and solutions , 2004, IEEE Communications Surveys & Tutorials.

[10]  Gary J. Sullivan,et al.  Video Compression - From Concepts to the H.264/AVC Standard , 2005, Proceedings of the IEEE.

[11]  Roni Even,et al.  RTP Payload Format for H.264 Video , 2011, RFC.

[12]  Mohan S. Kankanhalli,et al.  A scalable signature scheme for video authentication , 2006, Multimedia Tools and Applications.

[13]  Miska M. Hannuksela,et al.  RTP Payload Format for H.264 Video , 2005, RFC.

[14]  Yookun Cho,et al.  The eSAIDA Stream Authentication Scheme , 2004, ICCSA.

[15]  Bharat K. Bhargava,et al.  A tree-based forward digest protocol to verify data integrity in distributed media streaming , 2005, IEEE Transactions on Knowledge and Data Engineering.

[16]  Johann Großschädl,et al.  A Survey of Public-Key Cryptography on J2ME-Enabled Mobile Devices , 2004, ISCIS.

[17]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[18]  Donald F. Towsley,et al.  Measurement and modelling of the temporal dependence in packet loss , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[19]  Vlastimil Klíma,et al.  Tunnels in Hash Functions: MD5 Collisions Within a Minute , 2006, IACR Cryptol. ePrint Arch..

[20]  Ralph C. Merkle,et al.  A Certified Digital Signature , 1989, CRYPTO.

[21]  Philippe Golle,et al.  Authenticating Streamed Data in the Presence of Random Packet Loss , 2001, NDSS.

[22]  Edwin K. P. Chong,et al.  Efficient multicast stream authentication using erasure codes , 2003, TSEC.

[23]  Michael O. Rabin,et al.  Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.

[24]  Vlastimil Klíma Finding MD5 Collisions - a Toy For a Notebook , 2005, IACR Cryptol. ePrint Arch..

[25]  Simon S. Lam,et al.  Digital signatures for flows and multicasts , 1998, Proceedings Sixth International Conference on Network Protocols (Cat. No.98TB100256).

[26]  Hitesh Tewari,et al.  Performance analysis of cryptographic protocols on handheld devices , 2004, Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings..