Skip to main content

A Hybrid Approach for Authenticating MPEG-2 Streaming Data

  • Conference paper
Book cover Multimedia Content Analysis and Mining (MCAM 2007)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4577))

Included in the following conference series:

Abstract

There are two main approaches for authenticating digital streams, namely the tree chaining [1] and the hash chaining [2,3]. Both approaches have their disadvantages. Hash chaining is superior for low communication overhead, however, it is not resilient to packet loss and it has a longer verification delay. On the other hand, tree chaining is more robust even if packet loss occurs and with shorter verification delay, but the communication overhead is too high to be tolerable, especially in online applications. In this paper, we try to combine the two techniques and propose a hybrid scheme for authenticating MPEG-2 streaming data, which are still used by real application systems, by taking advantage of the characteristics of MPEG frames. The hybrid approach is shown to be more effective as compared to the other two approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Wong, C.K., Lam, S.S.: Digital signatures for Flows and Multicasts. IEEE/ACM Transactions on Networking 7(4), 502–513 (1999)

    Article  Google Scholar 

  2. Gennaro, R., Rohatgi, P.: How to Sign Digital Streams, Advances in Cryptology. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 180–197. Springer, Heidelberg (1997)

    Google Scholar 

  3. Golle, P., Modadugu, N.: Authenticating Streamed Data in the Presence of Random Packet Loss. In: Proceedings of the Network and Distributed System Security Symposium, pp.13–22 (2001)

    Google Scholar 

  4. Chebroluc, K.: Multi-Access Services in Heterogeneous Wireless Networks, Dissertation (2004), http://home.iitk.ac.in/chebrolu/docs/thesis.pdf

  5. Safavi-Naini, R., Wang, Y., Wysocki, B.J.: On a Method to Authenticate and Verify Digital Streams. Journal of Telecommunications and Information Technology 2/2002, 45–52 (2002)

    Google Scholar 

  6. Miner, S., Staddon, J.: Graph-based Authentication of Digital Streams. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 232–246 (May 2001)

    Google Scholar 

  7. Park, J., Chong, E., Siegel, H.: Efficient Multicast Packet Authentication Using Signature Amortization. In: Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA pp. 227–240 (2002)

    Google Scholar 

  8. Merkle, R.: A Certified Digital Signature, Advances in Cryptology(Crypto’89), pp. 218–238 (August 1989)

    Google Scholar 

  9. Krunz, M., Zhao, W., Matta, I.: Scheduling and Bandwidth Allocation for the Distribution of Archived Video in VOD Systems. Telecommunications System Journal 9(3/4), 335–355 (1998)

    Article  Google Scholar 

  10. Nahrstedt, K.: An Architecture for End-to-End Quality of Service Provision and Its Experimental Validation, Dissertation (1995)

    Google Scholar 

  11. Wu, Y., Deng, R.H.: Scalable Authentication of MPEG-4 Streams. IEEE Transaction on Multimedia 8(1), 152–161 (2006)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Nicu Sebe Yuncai Liu Yueting Zhuang Thomas S. Huang

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Wang, M. et al. (2007). A Hybrid Approach for Authenticating MPEG-2 Streaming Data. In: Sebe, N., Liu, Y., Zhuang, Y., Huang, T.S. (eds) Multimedia Content Analysis and Mining. MCAM 2007. Lecture Notes in Computer Science, vol 4577. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73417-8_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-73417-8_27

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-73416-1

  • Online ISBN: 978-3-540-73417-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics