Jump to : Download | Abstract | Contact | BibTex reference | EndNote reference |

sunproceedings

Q. Sun, J. Apostolopoulos, C. W. Chen, S.F. Chang. Quality-Optimized and Secure End-to-End Authentication for Media Delivery. Proceedings of the IEEE, 96(1):97-111, 2008.

Download [help]

Download paper: Adobe portable document (pdf)

Copyright notice:This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.

Abstract

The need for security services, such as confidentiality and authentication, has become one of the major concerns in multimedia communication applications, such as video on demand and peer-to-peer content delivery. Conventional data authentication cannot be directly applied for streaming media when an unreliable channel is used and packet loss may occur. This paper begins by reviewing existing end-to-end media authentication schemes, which can be classified into stream-based and content-based techniques. We then motivate and describe how to design authentication schemes for multimedia delivery that exploit the unequal importance of different packets. By applying conventional cryptographic hashes and digital signatures to the media packets, the system security is similar to that achievable in conventional data security. However, instead of optimizing packet verification probability, we optimize the quality of the authenticated media, which is determined by the packets that are received and able to be decoded and authenticated. The quality of the authenticated media is optimized by allocating the authentication resources unequally across streamed packets based on their relative importance, thereby providing unequal authenticity protection. The effectiveness of this approach is demonstrated through experimental results on different media types (image and video), different compression standards (JPEG, JPEG2000, and H.264), and different channels (wired with packet erasures and wireless with bit errors)

Contact

Qibin Sun
Shih-Fu Chang

BibTex Reference

@article{sunproceedings,
   Author = {Sun, Q. and Apostolopoulos, J. and Chen, C. W. and Chang, S.F.},
   Title = {{Quality-Optimized and Secure End-to-End Authentication for Media Delivery}},
   Journal = {Proceedings of the IEEE},
   Volume = {96},
   Number = {1},
   Pages = {97--111},
   Year = {2008}
}

EndNote Reference [help]

Get EndNote Reference (.ref)

 
bar

For problems or questions regarding this web site contact The Web Master.

This document was translated automatically from BibTEX by bib2html (Copyright 2003 © Eric Marchand, INRIA, Vista Project).