A hybrid approach for authenticating MPEG-2 streaming data

被引:0
|
作者
Wang, Meiqin [1 ]
Li, Lin [1 ]
Yiu, S. M. [2 ]
Hui, Lucas C. K. [2 ]
Chong, C. F. [2 ]
Chow, K. P. [2 ]
Tsang, W. W. [2 ]
Chan, H. W. [2 ]
Pun, K. H. [2 ]
机构
[1] Shandong Univ, Minist Educ, Lab Cryptog Technol & Informat Secur, Jinan 250100, Shandong, Peoples R China
[2] Univ Hong Kong, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
There are two main approaches for authenticating digital streams, namely the tree chaining [1] and the hash chaining [2,3]. Both approaches have their disadvantages. Hash chaining is superior for low communication overhead, however, it is not resilient to packet loss and it has a longer verification delay. On the other hand, tree chaining is more robust even if packet loss occurs and with shorter verification delay, but the communication overhead is too high to be tolerable, especially in online applications. In this paper, we try to combine the two techniques and propose a hybrid scheme for authenticating MPEG-2 streaming data, which are still used by real application systems, by taking advantage of the characteristics of MPEG frames. The hybrid approach is shown to be more effective as compared to the other two approaches.
引用
收藏
页码:203 / +
页数:2
相关论文
共 50 条
  • [1] Secure MPEG-2 streaming
    Kim, JH
    Jeong, YJ
    Yoon, KS
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS, AND INFORMATICS, VOL XVI, PROCEEDINGS, 2004, : 226 - 230
  • [2] MPEG-2 streaming of full interactive content
    Psannis, KE
    Hadjinicolaou, MG
    Krikelis, A
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2006, 16 (02) : 280 - 285
  • [3] Protection system for MPEG-2 streaming media
    Kim, JH
    Jeong, YJ
    Yoon, KS
    6TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS: BROADBAND CONVERGENCE NETWORK INFRASTRUCTURE, 2004, : 873 - 876
  • [4] Protection scheme for secure MPEG-2 streaming
    Kim, JH
    Jeong, YJ
    Yoon, KS
    2004 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXP (ICME), VOLS 1-3, 2004, : 927 - 930
  • [5] A rational approach to testing MPEG-2
    Noah, JO
    IEEE SPECTRUM, 1997, 34 (05) : 67 - 72
  • [6] MPEG-2 streaming protection scheme for digital rights management
    Jeong, Y
    Yoon, K
    Ryou, J
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2004, E87D (12): : 2594 - 2601
  • [7] Hybrid M-JPEG/MPEG-2 video streams using MPEG-2 compliant spatial scalability
    Shanableh, T
    ELECTRONICS LETTERS, 2003, 39 (23) : 1644 - 1646
  • [8] On MPEG-2 decoding of noisy input data
    Matzner, R
    Eck, P
    Xie, CS
    INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, PROCEEDINGS - VOL III, 1996, : 751 - 754
  • [9] MPEG与MPEG-2标准
    康诵诗
    广播与电视技术, 1995, (03) : 14 - 20
  • [10] QoS adaptive MPEG-2 streaming based on scalable media object framework
    Ahn, SH
    Kang, MG
    Kim, DH
    Kim, HC
    15TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, PROCEEDINGS, 2001, : 683 - 688