Abstract
In this paper, a bit stream-based authentication scheme for H.264/Scalable Video Coding (SVC) is proposed. The proposed scheme seamlessly integrates cryptographic algorithms and erasure correction codes (ECCs) to SVC video streams such that the authenticated streams are format compliant with the SVC specifications and preserve the three dimensional scalability (i. e., spatial, quality and temporal) of the original streams. We implement our scheme on a smart phone and study its performance over a realistic bursty packet-lossy wireless mobile network. Our analysis and experimental results show that the scheme achieves very high verification rates with lower communication overhead and much smaller decoding delay compared with the existing solutions.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Deng, R.H., Yang, Y.: A study of content authentication in proxy-enabled multimedia delivery systems: Model, techniques and applications. ACM Transactions on Multimedia Computing, Communications and Applications 5(4), 1–20 (2009)
Ferre, P., et al.: Packet loss modelling for H.264 video transmission over IEEE 802.11g wireless LANs. In: IEEE 13th International Workshop on Image Analysis for Multimedia Interactive Services, WIAMIS (2005)
Geeknet Inc.: Open SVC decoder, http://sourceforge.net/apps/mediawiki/opensvcdecoder/index.php?title=Main_Page
Gennaro, R., Rohatgi, P.: How to Sign Digital Streams. In: Kaliski, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 180–197. Springer, Heidelberg (1997), http://dx.doi.org/10.1007/BFb0052235
Gentry, C., et al.: End-to-end security in the presence of intelligent data adapting proxies: The case of authenticating transcoded streaming media. IEEE Journal on Selected Areas in Communications 23(2), 464–473 (2005)
Gilbert, E.: Capacity of a burst-noise channel. Bell System Technical Journal 39, 1253–1265 (1960)
Golle, P., Modadugu, N.: Authenticating streamed data in the presence of random packet loss. In: Proceedings on Network and Distributed Systems Security Symposium (NDSS 2001), pp. 13–22 (2001)
Hefeeda, M., Mokhtarian, K.: Authentication schemes for multimedia streams: Quantitative analysis and comparison. ACM Transactions on Multimedia Computing, Communications and Applications 6(1), 1–24 (2010)
Joint Video Team (JVT) of ISO/IEC MPEG & ITU-T VCEG: Joint scalable video model, JVT-X202 (2007)
ITU-T Rec. H.264: H.264 advanced video coding for generic audiovisual services (2003)
Kaced, A.R., Moissinac, J.C.: Multimedia content authentication for proxy-side adaptation. In: Proceedings of International Conference on Digital Telecommunication (ICDT), pp. 62–66 (2006)
Li, T., Wu, Y.: Adaptive stream authentication for wireless multimedia communications. In: Proceedings of IEEE Wireless Communications and Networking Conference (WCNC), pp. 2613–2618 (2007)
Lin, S., Costello, D.J.: Error Control Coding: Fundamentals and Applications, 2nd edn. Prentice-Hall, NJ (2004)
Miner, S., Staddon, J.: Graph-based authentication of digital streams. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 232–246 (2001)
Mokhtarian, K., Hefeeda, M.: End-to-end secure delivery of scalable video streams. In: Proceedings of the 18th International Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV 2009), pp. 79–84 (2009)
Network Systems Lab: svcAuth - NSL, http://nsl.cs.sfu.ca/wiki/index.php/svcAuth
NIST: Federal Information Processing Standard (FIPS) 180-2, Secure Hash Standard (2002)
Offspark.com: Polar SSL, http://polarssl.org/
Pannetrat, A., Molva, R.: Efficient multicast packet authentication. In: Proceedings on Network and Distributed Systems Security Symposium, NDSS 2003 (2003)
Park, J.M., Chong, E.K.P., Siegel, H.J.: Efficient multicast stream authentication using erasure codes. ACM Transactions on Information and System Security 6(2), 258–285 (2003)
Plank, J.S., Simmerman, S., Schuman, C.D.: Jerasure: A library in C/C++ facilitating erasure coding for storage applications - Version 1.2. Tech. Rep. CS-08-627, University of Tennessee (August 2008)
Reed, I.S., Solomon, G.: Polynomial codes over certain finite fields. Journal of the Society for Industrial and Applied Mathematics (SIAM) 8(2), 300–304 (1960)
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2), 120–126 (1978)
Song, D., Zuckerman, D., Tygar, J.D.: Expander graphs for digital stream aauthentication and robust overlay networks. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 258–270 (2002)
Wenger, S., Wang, Y.K., Schierl, T., Eleftheriadis, A.: RTP payload format for scalable video coding (2011)
Wong, C., Lam, S.: Digital signatures for flows and multicasts. IEEE Transactions on Networking 7(4), 502–513 (1999)
Wu, Y., Deng, R.H.: Scalable authentication of MPEG-4 streams. IEEE Transactions on Multimedia 8(1), 152–161 (2006)
Zhang, Z., Sun, Q., Wong, W.C.: A proposal of butterfly-graph based stream authentication over lossy networks. In: Proceedings of IEEE International Conference on Multimedia and Expo (ICME 2005), 4 pages (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhao, Y., Lo, SW., Deng, R.H., Ding, X. (2012). An Improved Authentication Scheme for H.264/SVC and Its Performance Evaluation over Non-stationary Wireless Mobile Networks. In: Xu, L., Bertino, E., Mu, Y. (eds) Network and System Security. NSS 2012. Lecture Notes in Computer Science, vol 7645. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34601-9_15
Download citation
DOI: https://doi.org/10.1007/978-3-642-34601-9_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-34600-2
Online ISBN: 978-3-642-34601-9
eBook Packages: Computer ScienceComputer Science (R0)