Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream

  • Tieyan Li
  • Huafei Zhu
  • Yongdong Wu
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3783)


Multimedia community is moving from monolithic applications to more flexible and scalable integrated solutions. Stream authentication is more complex since a stream may consist of multiple sources and be transcoded by intermediate proxies. In this paper, we propose a multi-source stream authentication (mSSA) framework based on MPEG-4 stream format. We describe the overall authentication architecture and elaborate the encoding, hashing, signing, amortizing and verifying methods used in the basic scheme. Further on, we utilize advanced cryptographic primitives-aggregate signature schemes, to reduce the signatures’ size and improve the performance. We illustrate the scheme and discuss the extensions. Our analysis shows that the scheme is secure and efficient.


Foreground Object Digital Right Management Object Group Authentication Data Erasure Code 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Smith, J.R., Mohan, R., Li, C.S.: Scalable Multimedia Delivery for Pervasive Computing. In: Proc. ACM Intl. Conf. on Multimedia (ACMM 1999), Orlando, FL (1999)Google Scholar
  2. 2.
    Microsoft, Architecture of Windows Media Rights Manager,
  3. 3.
    eXtensible right Markup Language (XrML),
  4. 4.
    ISO/IEC 14496-1:2001 Information Technology-Coding of Audio-Visual Objects-Part 1: SystemsGoogle Scholar
  5. 5.
    ISO/IEC 14496-2:2003 Information Technology-Coding of Audio-Visual Objects-Part 2: VisualGoogle Scholar
  6. 6.
    Li, W.: Overview of fine granularity scalability in MPEG-4 video standard. IEEE Trans. on Circuits and Systems for Video Technology 11(3), 301–317 (2001)CrossRefGoogle Scholar
  7. 7.
    Mohr, A.E., Riskin, E.A., Ladner, R.E.: Unequal loss protection: graceful degradation of image quality over packet erasure channels through forward error correction. IEEE Journal on Selected Areas in Communications 18(6), 819–828 (2000)CrossRefGoogle Scholar
  8. 8.
    Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)Google Scholar
  9. 9.
    Luby, M., Mitzenmacher, M., Shokrollahi, A., Spielman, D., Stemann, V.: Practical loss-resilient codes. In: Proc. 29th Annual ACM Symposium on Theory of Computing (STOC 1997), El Paso, TX (May 1997)Google Scholar
  10. 10.
    Perrig, A., Canetti, R., Tygar, J.D., Song, D.: Efficient authentication and signature of multicast streams over lossy channels. In: Proceedings of the IEEE Symposium on Research in Security and Privacy (S&P 2000), May 2000, pp. 56–73 (2000)Google Scholar
  11. 11.
    Golle, P., Modadugu, N.: Authenticated streamed data in the presernce of random packet loss. In: Proc. Network and Distributed System Security Symposium (NDSS 2001), San Diego, CA (February 2001)Google Scholar
  12. 12.
    Miner, S., Staddon, J.: Graph-based authentication of digital streams. In: Proceedings of the IEEE Symposium on Research in Security and Privacy (S&P 2001), May 2001, pp. 232–246 (2001)Google Scholar
  13. 13.
    Park, J.M., Chong, E.K., Siegel, H.J.: Efficient multicast packet authentication using signature amortization. In: Proceedings of the IEEE Symposium on Research in Security and Privacy (S&P 2002), May 2002, pp. 227–240 (2002)Google Scholar
  14. 14.
    Park, J.M., Chong, E., Siegel, H.J.: Efficient multicast packet authentication using erasure codes. ACM Transactions on Information and System Security (TISSEC 2003) 6(2), 258–285 (2003)CrossRefGoogle Scholar
  15. 15.
    Pannetrat, A., Molva, R.: Efficient multicast packet authentication. In: Proc. Network and Distributed System Security Symposium (NDSS 2003), San Diego, CA (February 2003)Google Scholar
  16. 16.
    Krohn, M.N., Freedman, M.J., Mazires, D.: On-the-Fly Verification of Rateless Erasure Codes for Efficient Content Distribution. In: IEEE Symposium on Security and Privacy (S&P 2004), California, USA (2004)Google Scholar
  17. 17.
    Karlof, C., Sastry, N., Li, Y., Perrig, A., Tygar, J.: Distillation codes and applications to DoS resistant multicast authentication. In: Proc. 11th Network and Distributed Systems Security Symposium (NDSS 2004), San Diego, CA (February 2004)Google Scholar
  18. 18.
    Li, T., Wu, Y., Ma, D., Zhu, H., Deng, R.H.: Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN. In: López, J., Qing, S., Okamoto, E. (eds.) ICICS 2004. LNCS, vol. 3269, pp. 79–91. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  19. 19.
    Suzuki, T., et al.: A system for end-to-end authentication of adaptive multimedia content. In: Eighth IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS 2004) (September 2004)Google Scholar
  20. 20.
    Gentry, C., Hevia, A., Jain, R., Kawahara, T., Ramzan, Z.: End-to-End Security in the Presence of Intelligent Data Adapting Proxies: the Case of Authenticating Transcoded Streaming Media. J. Selected Areas of Communication, Q1 (2005)Google Scholar
  21. 21.
    Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In: EUROCRYPT 2003 (2003)Google Scholar
  22. 22.
    Lysyanskaya, A., Micali, S., Reyzin, L., Shacham, H.: Sequential Aggregate Signatures from trapdoor one-way permutations. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 74–90. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  23. 23.
    Rogaway, P., Bellare, M., Black, J., Krovetz, T.: OCB: A block cipher mode of operation for efficient authenticated encryption. In: Proc. of 8th ACM CCS 2001 (2001)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Tieyan Li
    • 1
  • Huafei Zhu
    • 1
  • Yongdong Wu
    • 1
  1. 1.Institute for Infocomm Research (I2R)Singapore

Personalised recommendations