Wuhan University Journal of Natural Sciences

, Volume 11, Issue 5, pp 1257–1261 | Cite as

A novel video data-source authentication model based on digital watermarking and MAC in multicast

  • Zhao Anjun
  • Lu Xiangli
  • Guo Lei
Web Information Security


A novel video data authentication model based on digital video watermarking and MAC (message authentication code) in multicast protocol is proposed in this paper. The digital watermarking which composes of the MAC of the significant video content, the key and instant authentication data is embedded into the insignificant video component by the MLUT (modified look-up table) video watermarking technology. We explain a method that does not require storage of each data packet for a time, thus making receiver not vulnerable to DOS (denial of service) attack. So the video packets can be authenticated instantly without large volume buffer in the receivers. TESLA (timed efficient stream loss-tolerant authentication) does not explain how to select the suitable value ford, which is an important parameter in multicast source authentication. So we give a method to calculate the key disclosure delay (number of intervals). Simulation results show that the proposed algorithms improve the performance of data source authentication in multicast.

Key words

video data authentication multicast MAC(message authentication code) digital watermarking MLUT (modified look-up table) 

CLC number

TP 391.4 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    Cox I J, Kilian J, Leighton F T,et al. Secure Spread Spectrum Watermarking for Multimedia [J].IEEE Trans on Image Processing, 1997,6(12):1673–1686.CrossRefGoogle Scholar
  2. [2]
    Cox I J, Miller M L. The First 50 Years of Electronic Watermarking [J].EURASIP Journal of Applied Signal Processing, 2002,2:126–132.CrossRefGoogle Scholar
  3. [3]
    Canetti R, Garay J, Itkis G,et al. Multicast Security: a Taxonomy and Some Efficient Constructions [C]//INFOCOMM'99. New York, March, 1999.Google Scholar
  4. [4]
    Kruus P. Survey of Multicast Security Issues and Architectures [C]//21st National Information Systems Security Conf. Rlington, VA, October 5–8, 1998.Google Scholar
  5. [5]
    Wong C K, Lam S S. Digital Signatures for Flows and Multicasts [J].IEEE/ACM Transactions on Networking, 1999,7(4):502–513.CrossRefGoogle Scholar
  6. [6]
    Perrig A, Canetti R, Briscoe B,et al. TESLA: Multicast Source Authentication Transform [EB/OL]. [2000-12-25], July 2000.http://www/ Google Scholar
  7. [7]
    Hartung F, Girod B. Watermarking of Uncompressed and Compressed Video [J].Signal Processing, 1998,66:283–301.MATHCrossRefGoogle Scholar
  8. [8]
    Swanson M D, Zhu B, Tewfik A H. Multi-Resolution Scene-Based Video Watermarking Using Perceptual Models [J].IEEE Trans on Selected Areas in Communication, 1998,16(4):540–550.CrossRefGoogle Scholar
  9. [9]
    Langelaar G C.Real-Time Watermarking Techniques for Compressed Video Data: [Ph. D. dissertation]. Delft, Netherlands: Delft University of Technology, 2000.Google Scholar
  10. [10]
    Wu M, Liu B. Watermarking for Image Authentication [J].ICIP, 1998,(2):437–441.Google Scholar
  11. [11]
    Network lab. Network Simulator, Version 2. [2004-07], Scholar
  12. [12]
    Royer E, Perkins C E. Multicast Operation of Ad Hoc On-Demand Distance Vector Routing Protocol [C]//Proceedings of ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom). Seattle, WA, August, 1999:201–218.Google Scholar

Copyright information

© Springer 2006

Authors and Affiliations

  1. 1.School of Information and Control EngineeringXi' an University of Architecture and TechnologyXi'an, ShaanxiChina
  2. 2.School of Automatic ControlNorthwestern Polytechnical UniversityXi'an, ShaanxiChina

Personalised recommendations