A secure and robust approach to scalable video authentication

被引:0
|
作者
Sun, QB [1 ]
He, DJ [1 ]
Zhang, ZS [1 ]
Tian, Q [1 ]
机构
[1] Inst Infocomm Res, I2R, Singapore 119613, Singapore
关键词
scalable video authentication; watermarking; digital signature; error correction coding;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we present a secure and robust content authentication scheme for scalable video streaming. In our authentication scheme we consider three common video transcoding methods as acceptable content manipulations, when the streaming bit-rate needs to be reduced, namely frame resizing, frame dropping and multi-cycle coding. By employing error correction coding (ECC) in different ways, the proposed scheme is insensitive to those incidental distortions introduced during the transcoding (i.e., robust) while is still sensitive to other intentional distortions such as frame alterations and insertion (i.e., secure). One key feature in our scheme is that it achieves an end-to-end authentication independent of transcoding infrastructure and obtains a good compromise between system robustness and security.
引用
收藏
页码:209 / 212
页数:4
相关论文
共 50 条
  • [21] Secure, media streaming & secure adaptation for non-scalable video
    Apostolopoulos, JG
    [J]. ICIP: 2004 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1- 5, 2004, : 1763 - 1766
  • [22] Scalable and efficient authentication scheme for secure smart grid communication
    Hammami, Hamza
    Ben Yahia, Sadok
    Obaidat, Mohammad S.
    [J]. IET NETWORKS, 2020, 9 (04) : 165 - 169
  • [23] Authentication of Scalable Video Streams With Low Communication Overhead
    Mokhtarian, Kianoosh
    Hefeeda, Mohamed
    [J]. IEEE TRANSACTIONS ON MULTIMEDIA, 2010, 12 (07) : 730 - 742
  • [24] Secure and Robust Two-Phase Image Authentication
    Tabatabaei, Seyed Amir Hossein
    Ur-Rehman, Obaid
    Zivic, Natasa
    Ruland, Christoph
    [J]. IEEE TRANSACTIONS ON MULTIMEDIA, 2015, 17 (07) : 945 - 956
  • [25] A secure and robust authentication scheme between human and computer
    Ding, Yi
    [J]. 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 4, 2008, : 1034 - 1036
  • [26] Robust biometric authentication system with a secure user template
    Ali, Syed Sadaf
    Baghel, Vivek Singh
    Ganapathi, Iyyakutti Iyappan
    Prakash, Surya
    [J]. IMAGE AND VISION COMPUTING, 2020, 104
  • [27] Robust and Efficient Authentication of Video Stream Broadcasting
    Oligeri, Gabriele
    Chessa, Stefano
    Di Pietro, Roberto
    Giunta, Gaetano
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2011, 14 (01)
  • [28] Polynomial Vault: A Secure and Robust Fingerprint based Authentication
    Ali, Syed Sadaf
    Ganapathi, Iyyakutti Iyappan
    Mahyo, Sajid
    Prakash, Surya
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2021, 9 (02) : 612 - 625
  • [29] Robust and simple authentication protocol for secure communication on the web
    Yoon, EJ
    Kim, WH
    Yoo, KY
    [J]. WEB ENGINEERING, PROCEEDINGS, 2005, 3579 : 352 - 362
  • [30] Robust Secure Authentication and Data Storage with Perfect Secrecy
    Baur, Sebastian
    Boche, Holger
    [J]. CRYPTOGRAPHY, 2018, 2 (02) : 1 - 29