Unequal authenticity protection of video multicasting
Multicast video authentication is important to verify the authenticity of video data transmitted over the network. In this paper, we focus on unequal authenticity protection for video multicasting. A two-stage authentication strategy, which is composed of hash-based authentication and FEC-based corr...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 848 |
---|---|
container_issue | |
container_start_page | 845 |
container_title | |
container_volume | |
creator | Jian-Ru Chen Chun-Shien Lu |
description | Multicast video authentication is important to verify the authenticity of video data transmitted over the network. In this paper, we focus on unequal authenticity protection for video multicasting. A two-stage authentication strategy, which is composed of hash-based authentication and FEC-based correction, is proposed to resist the pollution attack. Different from the traditional methods, the FEC parameters instead of the rate are derived via a RD optimization procedure. In addition, we also analyze the issues of security strength, authentication rate, and hash length for the proposed method. The analyses show that our method with unequal hash length indeed achieves better RD performance. Simulation results further demonstrate the effectiveness of the proposed method. |
doi_str_mv | 10.1109/ICME.2008.4607567 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4607567</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4607567</ieee_id><sourcerecordid>4607567</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-c6ef9aca6b651a6a7b1960199c264ae7dc41f161344212f673c7ce2ebc5803013</originalsourceid><addsrcrecordid>eNpFkM1Kw0AUhcefgm3tA4ibvEDivfObWUpotVBxY8FdmUxvdCRNajIV-vZGLHo2Z_HBx-EwdoOQIYK9WxZP84wD5JnUYJQ2Z2yCkkvJlUF7zsZopUpNnr9e_AOAyz9gcMQmPwILUgK_YrO-_4AhRkoLYszUuqHPg6sTd4jv1MTgQzwm-66N5GNom6Stkq-wpTbZHeqBuj6G5u2ajSpX9zQ79ZStF_OX4jFdPT8si_tVGtComHpNlXXe6VIrdNqZEq0GtNZzLR2ZrZdYoUYx7EZeaSO88cSp9CoHASim7PbXG4hos-_CznXHzekL8Q1_00wf</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Unequal authenticity protection of video multicasting</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Jian-Ru Chen ; Chun-Shien Lu</creator><creatorcontrib>Jian-Ru Chen ; Chun-Shien Lu</creatorcontrib><description>Multicast video authentication is important to verify the authenticity of video data transmitted over the network. In this paper, we focus on unequal authenticity protection for video multicasting. A two-stage authentication strategy, which is composed of hash-based authentication and FEC-based correction, is proposed to resist the pollution attack. Different from the traditional methods, the FEC parameters instead of the rate are derived via a RD optimization procedure. In addition, we also analyze the issues of security strength, authentication rate, and hash length for the proposed method. The analyses show that our method with unequal hash length indeed achieves better RD performance. Simulation results further demonstrate the effectiveness of the proposed method.</description><identifier>ISSN: 1945-7871</identifier><identifier>ISBN: 1424425700</identifier><identifier>ISBN: 9781424425709</identifier><identifier>EISSN: 1945-788X</identifier><identifier>EISBN: 1424425719</identifier><identifier>EISBN: 9781424425716</identifier><identifier>DOI: 10.1109/ICME.2008.4607567</identifier><identifier>LCCN: 2008904402</identifier><language>eng</language><publisher>IEEE</publisher><subject>Authentication ; Erbium ; Error correction codes ; FEC ; Forward error correction ; Hash ; Multicast video authentication ; Optimization ; Security ; Streaming media ; Unequal authenticity protection</subject><ispartof>2008 IEEE International Conference on Multimedia and Expo, 2008, p.845-848</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4607567$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4607567$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Jian-Ru Chen</creatorcontrib><creatorcontrib>Chun-Shien Lu</creatorcontrib><title>Unequal authenticity protection of video multicasting</title><title>2008 IEEE International Conference on Multimedia and Expo</title><addtitle>ICME</addtitle><description>Multicast video authentication is important to verify the authenticity of video data transmitted over the network. In this paper, we focus on unequal authenticity protection for video multicasting. A two-stage authentication strategy, which is composed of hash-based authentication and FEC-based correction, is proposed to resist the pollution attack. Different from the traditional methods, the FEC parameters instead of the rate are derived via a RD optimization procedure. In addition, we also analyze the issues of security strength, authentication rate, and hash length for the proposed method. The analyses show that our method with unequal hash length indeed achieves better RD performance. Simulation results further demonstrate the effectiveness of the proposed method.</description><subject>Authentication</subject><subject>Erbium</subject><subject>Error correction codes</subject><subject>FEC</subject><subject>Forward error correction</subject><subject>Hash</subject><subject>Multicast video authentication</subject><subject>Optimization</subject><subject>Security</subject><subject>Streaming media</subject><subject>Unequal authenticity protection</subject><issn>1945-7871</issn><issn>1945-788X</issn><isbn>1424425700</isbn><isbn>9781424425709</isbn><isbn>1424425719</isbn><isbn>9781424425716</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2008</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpFkM1Kw0AUhcefgm3tA4ibvEDivfObWUpotVBxY8FdmUxvdCRNajIV-vZGLHo2Z_HBx-EwdoOQIYK9WxZP84wD5JnUYJQ2Z2yCkkvJlUF7zsZopUpNnr9e_AOAyz9gcMQmPwILUgK_YrO-_4AhRkoLYszUuqHPg6sTd4jv1MTgQzwm-66N5GNom6Stkq-wpTbZHeqBuj6G5u2ajSpX9zQ79ZStF_OX4jFdPT8si_tVGtComHpNlXXe6VIrdNqZEq0GtNZzLR2ZrZdYoUYx7EZeaSO88cSp9CoHASim7PbXG4hos-_CznXHzekL8Q1_00wf</recordid><startdate>200806</startdate><enddate>200806</enddate><creator>Jian-Ru Chen</creator><creator>Chun-Shien Lu</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200806</creationdate><title>Unequal authenticity protection of video multicasting</title><author>Jian-Ru Chen ; Chun-Shien Lu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-c6ef9aca6b651a6a7b1960199c264ae7dc41f161344212f673c7ce2ebc5803013</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2008</creationdate><topic>Authentication</topic><topic>Erbium</topic><topic>Error correction codes</topic><topic>FEC</topic><topic>Forward error correction</topic><topic>Hash</topic><topic>Multicast video authentication</topic><topic>Optimization</topic><topic>Security</topic><topic>Streaming media</topic><topic>Unequal authenticity protection</topic><toplevel>online_resources</toplevel><creatorcontrib>Jian-Ru Chen</creatorcontrib><creatorcontrib>Chun-Shien Lu</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Jian-Ru Chen</au><au>Chun-Shien Lu</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Unequal authenticity protection of video multicasting</atitle><btitle>2008 IEEE International Conference on Multimedia and Expo</btitle><stitle>ICME</stitle><date>2008-06</date><risdate>2008</risdate><spage>845</spage><epage>848</epage><pages>845-848</pages><issn>1945-7871</issn><eissn>1945-788X</eissn><isbn>1424425700</isbn><isbn>9781424425709</isbn><eisbn>1424425719</eisbn><eisbn>9781424425716</eisbn><abstract>Multicast video authentication is important to verify the authenticity of video data transmitted over the network. In this paper, we focus on unequal authenticity protection for video multicasting. A two-stage authentication strategy, which is composed of hash-based authentication and FEC-based correction, is proposed to resist the pollution attack. Different from the traditional methods, the FEC parameters instead of the rate are derived via a RD optimization procedure. In addition, we also analyze the issues of security strength, authentication rate, and hash length for the proposed method. The analyses show that our method with unequal hash length indeed achieves better RD performance. Simulation results further demonstrate the effectiveness of the proposed method.</abstract><pub>IEEE</pub><doi>10.1109/ICME.2008.4607567</doi><tpages>4</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1945-7871 |
ispartof | 2008 IEEE International Conference on Multimedia and Expo, 2008, p.845-848 |
issn | 1945-7871 1945-788X |
language | eng |
recordid | cdi_ieee_primary_4607567 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Authentication Erbium Error correction codes FEC Forward error correction Hash Multicast video authentication Optimization Security Streaming media Unequal authenticity protection |
title | Unequal authenticity protection of video multicasting |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-30T05%3A02%3A19IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Unequal%20authenticity%20protection%20of%20video%20multicasting&rft.btitle=2008%20IEEE%20International%20Conference%20on%20Multimedia%20and%20Expo&rft.au=Jian-Ru%20Chen&rft.date=2008-06&rft.spage=845&rft.epage=848&rft.pages=845-848&rft.issn=1945-7871&rft.eissn=1945-788X&rft.isbn=1424425700&rft.isbn_list=9781424425709&rft_id=info:doi/10.1109/ICME.2008.4607567&rft_dat=%3Cieee_6IE%3E4607567%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1424425719&rft.eisbn_list=9781424425716&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4607567&rfr_iscdi=true |