Skip to main content

An Improved Authentication Scheme for H.264/SVC and Its Performance Evaluation over Non-stationary Wireless Mobile Networks

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7645))

Abstract

In this paper, a bit stream-based authentication scheme for H.264/Scalable Video Coding (SVC) is proposed. The proposed scheme seamlessly integrates cryptographic algorithms and erasure correction codes (ECCs) to SVC video streams such that the authenticated streams are format compliant with the SVC specifications and preserve the three dimensional scalability (i. e., spatial, quality and temporal) of the original streams. We implement our scheme on a smart phone and study its performance over a realistic bursty packet-lossy wireless mobile network. Our analysis and experimental results show that the scheme achieves very high verification rates with lower communication overhead and much smaller decoding delay compared with the existing solutions.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Deng, R.H., Yang, Y.: A study of content authentication in proxy-enabled multimedia delivery systems: Model, techniques and applications. ACM Transactions on Multimedia Computing, Communications and Applications 5(4), 1–20 (2009)

    Article  Google Scholar 

  2. Ferre, P., et al.: Packet loss modelling for H.264 video transmission over IEEE 802.11g wireless LANs. In: IEEE 13th International Workshop on Image Analysis for Multimedia Interactive Services, WIAMIS (2005)

    Google Scholar 

  3. Geeknet Inc.: Open SVC decoder, http://sourceforge.net/apps/mediawiki/opensvcdecoder/index.php?title=Main_Page

  4. Gennaro, R., Rohatgi, P.: How to Sign Digital Streams. In: Kaliski, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 180–197. Springer, Heidelberg (1997), http://dx.doi.org/10.1007/BFb0052235

    Google Scholar 

  5. Gentry, C., et al.: End-to-end security in the presence of intelligent data adapting proxies: The case of authenticating transcoded streaming media. IEEE Journal on Selected Areas in Communications 23(2), 464–473 (2005)

    Article  Google Scholar 

  6. Gilbert, E.: Capacity of a burst-noise channel. Bell System Technical Journal 39, 1253–1265 (1960)

    MathSciNet  Google Scholar 

  7. Golle, P., Modadugu, N.: Authenticating streamed data in the presence of random packet loss. In: Proceedings on Network and Distributed Systems Security Symposium (NDSS 2001), pp. 13–22 (2001)

    Google Scholar 

  8. Hefeeda, M., Mokhtarian, K.: Authentication schemes for multimedia streams: Quantitative analysis and comparison. ACM Transactions on Multimedia Computing, Communications and Applications 6(1), 1–24 (2010)

    Article  Google Scholar 

  9. Joint Video Team (JVT) of ISO/IEC MPEG & ITU-T VCEG: Joint scalable video model, JVT-X202 (2007)

    Google Scholar 

  10. ITU-T Rec. H.264: H.264 advanced video coding for generic audiovisual services (2003)

    Google Scholar 

  11. Kaced, A.R., Moissinac, J.C.: Multimedia content authentication for proxy-side adaptation. In: Proceedings of International Conference on Digital Telecommunication (ICDT), pp. 62–66 (2006)

    Google Scholar 

  12. Li, T., Wu, Y.: Adaptive stream authentication for wireless multimedia communications. In: Proceedings of IEEE Wireless Communications and Networking Conference (WCNC), pp. 2613–2618 (2007)

    Google Scholar 

  13. Lin, S., Costello, D.J.: Error Control Coding: Fundamentals and Applications, 2nd edn. Prentice-Hall, NJ (2004)

    Google Scholar 

  14. Miner, S., Staddon, J.: Graph-based authentication of digital streams. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 232–246 (2001)

    Google Scholar 

  15. Mokhtarian, K., Hefeeda, M.: End-to-end secure delivery of scalable video streams. In: Proceedings of the 18th International Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV 2009), pp. 79–84 (2009)

    Google Scholar 

  16. Network Systems Lab: svcAuth - NSL, http://nsl.cs.sfu.ca/wiki/index.php/svcAuth

  17. NIST: Federal Information Processing Standard (FIPS) 180-2, Secure Hash Standard (2002)

    Google Scholar 

  18. Offspark.com: Polar SSL, http://polarssl.org/

  19. Pannetrat, A., Molva, R.: Efficient multicast packet authentication. In: Proceedings on Network and Distributed Systems Security Symposium, NDSS 2003 (2003)

    Google Scholar 

  20. Park, J.M., Chong, E.K.P., Siegel, H.J.: Efficient multicast stream authentication using erasure codes. ACM Transactions on Information and System Security 6(2), 258–285 (2003)

    Article  Google Scholar 

  21. Plank, J.S., Simmerman, S., Schuman, C.D.: Jerasure: A library in C/C++ facilitating erasure coding for storage applications - Version 1.2. Tech. Rep. CS-08-627, University of Tennessee (August 2008)

    Google Scholar 

  22. Reed, I.S., Solomon, G.: Polynomial codes over certain finite fields. Journal of the Society for Industrial and Applied Mathematics (SIAM) 8(2), 300–304 (1960)

    Article  MathSciNet  MATH  Google Scholar 

  23. Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2), 120–126 (1978)

    Article  MathSciNet  MATH  Google Scholar 

  24. Song, D., Zuckerman, D., Tygar, J.D.: Expander graphs for digital stream aauthentication and robust overlay networks. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 258–270 (2002)

    Google Scholar 

  25. Wenger, S., Wang, Y.K., Schierl, T., Eleftheriadis, A.: RTP payload format for scalable video coding (2011)

    Google Scholar 

  26. Wong, C., Lam, S.: Digital signatures for flows and multicasts. IEEE Transactions on Networking 7(4), 502–513 (1999)

    Article  Google Scholar 

  27. Wu, Y., Deng, R.H.: Scalable authentication of MPEG-4 streams. IEEE Transactions on Multimedia 8(1), 152–161 (2006)

    Article  MathSciNet  Google Scholar 

  28. Zhang, Z., Sun, Q., Wong, W.C.: A proposal of butterfly-graph based stream authentication over lossy networks. In: Proceedings of IEEE International Conference on Multimedia and Expo (ICME 2005), 4 pages (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhao, Y., Lo, SW., Deng, R.H., Ding, X. (2012). An Improved Authentication Scheme for H.264/SVC and Its Performance Evaluation over Non-stationary Wireless Mobile Networks. In: Xu, L., Bertino, E., Mu, Y. (eds) Network and System Security. NSS 2012. Lecture Notes in Computer Science, vol 7645. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34601-9_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34601-9_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34600-2

  • Online ISBN: 978-3-642-34601-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics