Abstract
Multimedia community is moving from monolithic applications to more flexible and scalable integrated solutions. Stream authentication is more complex since a stream may consist of multiple sources and be transcoded by intermediate proxies. In this paper, we propose a multi-source stream authentication (mSSA) framework based on MPEG-4 stream format. We describe the overall authentication architecture and elaborate the encoding, hashing, signing, amortizing and verifying methods used in the basic scheme. Further on, we utilize advanced cryptographic primitives-aggregate signature schemes, to reduce the signatures’ size and improve the performance. We illustrate the scheme and discuss the extensions. Our analysis shows that the scheme is secure and efficient.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Smith, J.R., Mohan, R., Li, C.S.: Scalable Multimedia Delivery for Pervasive Computing. In: Proc. ACM Intl. Conf. on Multimedia (ACMM 1999), Orlando, FL (1999)
Microsoft, Architecture of Windows Media Rights Manager, http://www.microsoft.com/windows/windowsmedia/howto/articles/drmarchitecture.aspx
eXtensible right Markup Language (XrML), http://www.xrml.org
ISO/IEC 14496-1:2001 Information Technology-Coding of Audio-Visual Objects-Part 1: Systems
ISO/IEC 14496-2:2003 Information Technology-Coding of Audio-Visual Objects-Part 2: Visual
Li, W.: Overview of fine granularity scalability in MPEG-4 video standard. IEEE Trans. on Circuits and Systems for Video Technology 11(3), 301–317 (2001)
Mohr, A.E., Riskin, E.A., Ladner, R.E.: Unequal loss protection: graceful degradation of image quality over packet erasure channels through forward error correction. IEEE Journal on Selected Areas in Communications 18(6), 819–828 (2000)
Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)
Luby, M., Mitzenmacher, M., Shokrollahi, A., Spielman, D., Stemann, V.: Practical loss-resilient codes. In: Proc. 29th Annual ACM Symposium on Theory of Computing (STOC 1997), El Paso, TX (May 1997)
Perrig, A., Canetti, R., Tygar, J.D., Song, D.: Efficient authentication and signature of multicast streams over lossy channels. In: Proceedings of the IEEE Symposium on Research in Security and Privacy (S&P 2000), May 2000, pp. 56–73 (2000)
Golle, P., Modadugu, N.: Authenticated streamed data in the presernce of random packet loss. In: Proc. Network and Distributed System Security Symposium (NDSS 2001), San Diego, CA (February 2001)
Miner, S., Staddon, J.: Graph-based authentication of digital streams. In: Proceedings of the IEEE Symposium on Research in Security and Privacy (S&P 2001), May 2001, pp. 232–246 (2001)
Park, J.M., Chong, E.K., Siegel, H.J.: Efficient multicast packet authentication using signature amortization. In: Proceedings of the IEEE Symposium on Research in Security and Privacy (S&P 2002), May 2002, pp. 227–240 (2002)
Park, J.M., Chong, E., Siegel, H.J.: Efficient multicast packet authentication using erasure codes. ACM Transactions on Information and System Security (TISSEC 2003) 6(2), 258–285 (2003)
Pannetrat, A., Molva, R.: Efficient multicast packet authentication. In: Proc. Network and Distributed System Security Symposium (NDSS 2003), San Diego, CA (February 2003)
Krohn, M.N., Freedman, M.J., Mazires, D.: On-the-Fly Verification of Rateless Erasure Codes for Efficient Content Distribution. In: IEEE Symposium on Security and Privacy (S&P 2004), California, USA (2004)
Karlof, C., Sastry, N., Li, Y., Perrig, A., Tygar, J.: Distillation codes and applications to DoS resistant multicast authentication. In: Proc. 11th Network and Distributed Systems Security Symposium (NDSS 2004), San Diego, CA (February 2004)
Li, T., Wu, Y., Ma, D., Zhu, H., Deng, R.H.: Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN. In: López, J., Qing, S., Okamoto, E. (eds.) ICICS 2004. LNCS, vol. 3269, pp. 79–91. Springer, Heidelberg (2004)
Suzuki, T., et al.: A system for end-to-end authentication of adaptive multimedia content. In: Eighth IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS 2004) (September 2004)
Gentry, C., Hevia, A., Jain, R., Kawahara, T., Ramzan, Z.: End-to-End Security in the Presence of Intelligent Data Adapting Proxies: the Case of Authenticating Transcoded Streaming Media. J. Selected Areas of Communication, Q1 (2005)
Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In: EUROCRYPT 2003 (2003)
Lysyanskaya, A., Micali, S., Reyzin, L., Shacham, H.: Sequential Aggregate Signatures from trapdoor one-way permutations. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 74–90. Springer, Heidelberg (2004)
Rogaway, P., Bellare, M., Black, J., Krovetz, T.: OCB: A block cipher mode of operation for efficient authenticated encryption. In: Proc. of 8th ACM CCS 2001 (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Li, T., Zhu, H., Wu, Y. (2005). Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream. In: Qing, S., Mao, W., LĂłpez, J., Wang, G. (eds) Information and Communications Security. ICICS 2005. Lecture Notes in Computer Science, vol 3783. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11602897_33
Download citation
DOI: https://doi.org/10.1007/11602897_33
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30934-5
Online ISBN: 978-3-540-32099-9
eBook Packages: Computer ScienceComputer Science (R0)