Abstract
There are two main approaches for authenticating digital streams, namely the tree chaining [1] and the hash chaining [2,3]. Both approaches have their disadvantages. Hash chaining is superior for low communication overhead, however, it is not resilient to packet loss and it has a longer verification delay. On the other hand, tree chaining is more robust even if packet loss occurs and with shorter verification delay, but the communication overhead is too high to be tolerable, especially in online applications. In this paper, we try to combine the two techniques and propose a hybrid scheme for authenticating MPEG-2 streaming data, which are still used by real application systems, by taking advantage of the characteristics of MPEG frames. The hybrid approach is shown to be more effective as compared to the other two approaches.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Wong, C.K., Lam, S.S.: Digital signatures for Flows and Multicasts. IEEE/ACM Transactions on Networking 7(4), 502–513 (1999)
Gennaro, R., Rohatgi, P.: How to Sign Digital Streams, Advances in Cryptology. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 180–197. Springer, Heidelberg (1997)
Golle, P., Modadugu, N.: Authenticating Streamed Data in the Presence of Random Packet Loss. In: Proceedings of the Network and Distributed System Security Symposium, pp.13–22 (2001)
Chebroluc, K.: Multi-Access Services in Heterogeneous Wireless Networks, Dissertation (2004), http://home.iitk.ac.in/chebrolu/docs/thesis.pdf
Safavi-Naini, R., Wang, Y., Wysocki, B.J.: On a Method to Authenticate and Verify Digital Streams. Journal of Telecommunications and Information Technology 2/2002, 45–52 (2002)
Miner, S., Staddon, J.: Graph-based Authentication of Digital Streams. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 232–246 (May 2001)
Park, J., Chong, E., Siegel, H.: Efficient Multicast Packet Authentication Using Signature Amortization. In: Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA pp. 227–240 (2002)
Merkle, R.: A Certified Digital Signature, Advances in Cryptology(Crypto’89), pp. 218–238 (August 1989)
Krunz, M., Zhao, W., Matta, I.: Scheduling and Bandwidth Allocation for the Distribution of Archived Video in VOD Systems. Telecommunications System Journal 9(3/4), 335–355 (1998)
Nahrstedt, K.: An Architecture for End-to-End Quality of Service Provision and Its Experimental Validation, Dissertation (1995)
Wu, Y., Deng, R.H.: Scalable Authentication of MPEG-4 Streams. IEEE Transaction on Multimedia 8(1), 152–161 (2006)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer Berlin Heidelberg
About this paper
Cite this paper
Wang, M. et al. (2007). A Hybrid Approach for Authenticating MPEG-2 Streaming Data. In: Sebe, N., Liu, Y., Zhuang, Y., Huang, T.S. (eds) Multimedia Content Analysis and Mining. MCAM 2007. Lecture Notes in Computer Science, vol 4577. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73417-8_27
Download citation
DOI: https://doi.org/10.1007/978-3-540-73417-8_27
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-73416-1
Online ISBN: 978-3-540-73417-8
eBook Packages: Computer ScienceComputer Science (R0)