2010
DOI: 10.1109/tmm.2010.2051410
|View full text |Cite
|
Sign up to set email alerts
|

Authentication of Scalable Video Streams With Low Communication Overhead

Abstract: Abstract-The large prevalence of multimedia systems in recent years makes the security of multimedia communications an important and critical issue. We study the problem of securing the delivery of scalable video streams so that receivers can ensure the authenticity of the video content. Our focus is on recent scalable video coding (SVC) techniques, such as H.264/SVC, which can provide three scalability types at the same time: temporal, spatial, and visual quality. This three-dimensional scalability offers a g… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(12 citation statements)
references
References 23 publications
0
12
0
Order By: Relevance
“…It can be seen in th e simulations that the m alicious modification and coding noises can be discriminated using this scalable P-hashing. Comparing with previous works in scalable video authentication [10,11], the proposed scheme is m ore efficient in th e computation cost and robustness and communication overload. In the experiments we used the ratio of different energy as the features to construct P-Hashing.…”
Section: Resultsmentioning
confidence: 92%
See 1 more Smart Citation
“…It can be seen in th e simulations that the m alicious modification and coding noises can be discriminated using this scalable P-hashing. Comparing with previous works in scalable video authentication [10,11], the proposed scheme is m ore efficient in th e computation cost and robustness and communication overload. In the experiments we used the ratio of different energy as the features to construct P-Hashing.…”
Section: Resultsmentioning
confidence: 92%
“…And it is questionable whether or not watermarking only IPMs can protect the whole content of SVC video streams. In [ 10,11], Mokhtarian et al proposed a n authentication scheme that accounts for the full scalability of video streams, and enables verification of all possible sub-streams that can be extracted from the original stream, in which the adaptation for spatial, quality and temporal dimension are all co nsidered. In the scheme, the hashing generated from MGS (mediumgrained scalable) packets to layers, then to CGS (coarsegrained scalable) and spatial layers, video frames to GOP according to temporal relation c onstructed a complex hash trees to au thentication video data in an y layers and this hash trees can also resist packets lossy as well as ada pt to different layers discarding case.…”
Section: Related Workmentioning
confidence: 99%
“…Theoretical route overhead is presented in the [8] by counting the number of control messages generated in the network entities such as BS or AP for route maintenance. In [9] the communication overhead of the presented mechanism was calculated and to minimize this communication overhead an algorithm was presented. The presented algorithm was proved effective with the help of simulation results.…”
Section: Load Balancing Architecturesmentioning
confidence: 99%
“…The other category is based on the multimedia coding structure. For example, Kianoosh Mokhtarian et al [19] proposed the authentication for Scalable Video Coding (SVC) streams, whose hash appendence follows the coding structure of SVC.…”
Section: Introductionmentioning
confidence: 99%