Unequal authenticity protection of video multicasting

Multicast video authentication is important to verify the authenticity of video data transmitted over the network. In this paper, we focus on unequal authenticity protection for video multicasting. A two-stage authentication strategy, which is composed of hash-based authentication and FEC-based corr...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Jian-Ru Chen, Chun-Shien Lu
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 848
container_issue
container_start_page 845
container_title
container_volume
creator Jian-Ru Chen
Chun-Shien Lu
description Multicast video authentication is important to verify the authenticity of video data transmitted over the network. In this paper, we focus on unequal authenticity protection for video multicasting. A two-stage authentication strategy, which is composed of hash-based authentication and FEC-based correction, is proposed to resist the pollution attack. Different from the traditional methods, the FEC parameters instead of the rate are derived via a RD optimization procedure. In addition, we also analyze the issues of security strength, authentication rate, and hash length for the proposed method. The analyses show that our method with unequal hash length indeed achieves better RD performance. Simulation results further demonstrate the effectiveness of the proposed method.
doi_str_mv 10.1109/ICME.2008.4607567
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4607567</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4607567</ieee_id><sourcerecordid>4607567</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-c6ef9aca6b651a6a7b1960199c264ae7dc41f161344212f673c7ce2ebc5803013</originalsourceid><addsrcrecordid>eNpFkM1Kw0AUhcefgm3tA4ibvEDivfObWUpotVBxY8FdmUxvdCRNajIV-vZGLHo2Z_HBx-EwdoOQIYK9WxZP84wD5JnUYJQ2Z2yCkkvJlUF7zsZopUpNnr9e_AOAyz9gcMQmPwILUgK_YrO-_4AhRkoLYszUuqHPg6sTd4jv1MTgQzwm-66N5GNom6Stkq-wpTbZHeqBuj6G5u2ajSpX9zQ79ZStF_OX4jFdPT8si_tVGtComHpNlXXe6VIrdNqZEq0GtNZzLR2ZrZdYoUYx7EZeaSO88cSp9CoHASim7PbXG4hos-_CznXHzekL8Q1_00wf</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Unequal authenticity protection of video multicasting</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Jian-Ru Chen ; Chun-Shien Lu</creator><creatorcontrib>Jian-Ru Chen ; Chun-Shien Lu</creatorcontrib><description>Multicast video authentication is important to verify the authenticity of video data transmitted over the network. In this paper, we focus on unequal authenticity protection for video multicasting. A two-stage authentication strategy, which is composed of hash-based authentication and FEC-based correction, is proposed to resist the pollution attack. Different from the traditional methods, the FEC parameters instead of the rate are derived via a RD optimization procedure. In addition, we also analyze the issues of security strength, authentication rate, and hash length for the proposed method. The analyses show that our method with unequal hash length indeed achieves better RD performance. Simulation results further demonstrate the effectiveness of the proposed method.</description><identifier>ISSN: 1945-7871</identifier><identifier>ISBN: 1424425700</identifier><identifier>ISBN: 9781424425709</identifier><identifier>EISSN: 1945-788X</identifier><identifier>EISBN: 1424425719</identifier><identifier>EISBN: 9781424425716</identifier><identifier>DOI: 10.1109/ICME.2008.4607567</identifier><identifier>LCCN: 2008904402</identifier><language>eng</language><publisher>IEEE</publisher><subject>Authentication ; Erbium ; Error correction codes ; FEC ; Forward error correction ; Hash ; Multicast video authentication ; Optimization ; Security ; Streaming media ; Unequal authenticity protection</subject><ispartof>2008 IEEE International Conference on Multimedia and Expo, 2008, p.845-848</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4607567$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4607567$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Jian-Ru Chen</creatorcontrib><creatorcontrib>Chun-Shien Lu</creatorcontrib><title>Unequal authenticity protection of video multicasting</title><title>2008 IEEE International Conference on Multimedia and Expo</title><addtitle>ICME</addtitle><description>Multicast video authentication is important to verify the authenticity of video data transmitted over the network. In this paper, we focus on unequal authenticity protection for video multicasting. A two-stage authentication strategy, which is composed of hash-based authentication and FEC-based correction, is proposed to resist the pollution attack. Different from the traditional methods, the FEC parameters instead of the rate are derived via a RD optimization procedure. In addition, we also analyze the issues of security strength, authentication rate, and hash length for the proposed method. The analyses show that our method with unequal hash length indeed achieves better RD performance. Simulation results further demonstrate the effectiveness of the proposed method.</description><subject>Authentication</subject><subject>Erbium</subject><subject>Error correction codes</subject><subject>FEC</subject><subject>Forward error correction</subject><subject>Hash</subject><subject>Multicast video authentication</subject><subject>Optimization</subject><subject>Security</subject><subject>Streaming media</subject><subject>Unequal authenticity protection</subject><issn>1945-7871</issn><issn>1945-788X</issn><isbn>1424425700</isbn><isbn>9781424425709</isbn><isbn>1424425719</isbn><isbn>9781424425716</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2008</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpFkM1Kw0AUhcefgm3tA4ibvEDivfObWUpotVBxY8FdmUxvdCRNajIV-vZGLHo2Z_HBx-EwdoOQIYK9WxZP84wD5JnUYJQ2Z2yCkkvJlUF7zsZopUpNnr9e_AOAyz9gcMQmPwILUgK_YrO-_4AhRkoLYszUuqHPg6sTd4jv1MTgQzwm-66N5GNom6Stkq-wpTbZHeqBuj6G5u2ajSpX9zQ79ZStF_OX4jFdPT8si_tVGtComHpNlXXe6VIrdNqZEq0GtNZzLR2ZrZdYoUYx7EZeaSO88cSp9CoHASim7PbXG4hos-_CznXHzekL8Q1_00wf</recordid><startdate>200806</startdate><enddate>200806</enddate><creator>Jian-Ru Chen</creator><creator>Chun-Shien Lu</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200806</creationdate><title>Unequal authenticity protection of video multicasting</title><author>Jian-Ru Chen ; Chun-Shien Lu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-c6ef9aca6b651a6a7b1960199c264ae7dc41f161344212f673c7ce2ebc5803013</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2008</creationdate><topic>Authentication</topic><topic>Erbium</topic><topic>Error correction codes</topic><topic>FEC</topic><topic>Forward error correction</topic><topic>Hash</topic><topic>Multicast video authentication</topic><topic>Optimization</topic><topic>Security</topic><topic>Streaming media</topic><topic>Unequal authenticity protection</topic><toplevel>online_resources</toplevel><creatorcontrib>Jian-Ru Chen</creatorcontrib><creatorcontrib>Chun-Shien Lu</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Jian-Ru Chen</au><au>Chun-Shien Lu</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Unequal authenticity protection of video multicasting</atitle><btitle>2008 IEEE International Conference on Multimedia and Expo</btitle><stitle>ICME</stitle><date>2008-06</date><risdate>2008</risdate><spage>845</spage><epage>848</epage><pages>845-848</pages><issn>1945-7871</issn><eissn>1945-788X</eissn><isbn>1424425700</isbn><isbn>9781424425709</isbn><eisbn>1424425719</eisbn><eisbn>9781424425716</eisbn><abstract>Multicast video authentication is important to verify the authenticity of video data transmitted over the network. In this paper, we focus on unequal authenticity protection for video multicasting. A two-stage authentication strategy, which is composed of hash-based authentication and FEC-based correction, is proposed to resist the pollution attack. Different from the traditional methods, the FEC parameters instead of the rate are derived via a RD optimization procedure. In addition, we also analyze the issues of security strength, authentication rate, and hash length for the proposed method. The analyses show that our method with unequal hash length indeed achieves better RD performance. Simulation results further demonstrate the effectiveness of the proposed method.</abstract><pub>IEEE</pub><doi>10.1109/ICME.2008.4607567</doi><tpages>4</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1945-7871
ispartof 2008 IEEE International Conference on Multimedia and Expo, 2008, p.845-848
issn 1945-7871
1945-788X
language eng
recordid cdi_ieee_primary_4607567
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Authentication
Erbium
Error correction codes
FEC
Forward error correction
Hash
Multicast video authentication
Optimization
Security
Streaming media
Unequal authenticity protection
title Unequal authenticity protection of video multicasting
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-30T05%3A02%3A19IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Unequal%20authenticity%20protection%20of%20video%20multicasting&rft.btitle=2008%20IEEE%20International%20Conference%20on%20Multimedia%20and%20Expo&rft.au=Jian-Ru%20Chen&rft.date=2008-06&rft.spage=845&rft.epage=848&rft.pages=845-848&rft.issn=1945-7871&rft.eissn=1945-788X&rft.isbn=1424425700&rft.isbn_list=9781424425709&rft_id=info:doi/10.1109/ICME.2008.4607567&rft_dat=%3Cieee_6IE%3E4607567%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1424425719&rft.eisbn_list=9781424425716&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4607567&rfr_iscdi=true