Skip to main content

Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN

  • Conference paper
Information and Communications Security (ICICS 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3269))

Included in the following conference series:

Abstract

The current packet based stream authentication schemes provide effective and efficient authentication over a group of packets transmitted on erasure channels. However, by fixing the packets in transmission, any packet manipulation will cause authentication failure. In p2p content delivery network where a proxy-in-the-middle is able to store, forward, transcode and transform the stream, previous schemes are simply unapplicable. To address the problem, we propose a flexible verification scheme that relies on special stream formats (i.e. Unequal Loss Protection ULP scheme [7]). We apply the so called Unequal Loss Verification ULV scheme into MPEG-4 framework. The encoding, packing, amortizing and verifying methods are elaborated in this paper. Our analysis shows that the scheme is secure and cost effective. The scheme is indeed content aware and ensures the verification rate intuitively reflecting a meaningful stream. Further on, we describe the general method of publishing and retrieving a stream in p2p CDN.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. ISO/IEC 14496-1:2001 Information Technology - Coding of Audio-Visual Objects- Part 1: Systems

    Google Scholar 

  2. ISO/IEC 14496-2:2003 Information Technology - Coding of Audio-Visual Objects- Part 2: Visual

    Google Scholar 

  3. Li, W.: Overview of fine granularity scalability in MPEG-4 video standard. IEEE Trans. on Circuits and Systems for Video Technology 11(3), 301–317 (2001)

    Article  Google Scholar 

  4. Kuhne, G., Kuhmnch, C.: Transmitting MPEG-4 Video Streams over the Internet: Problems and Solutions. ACM Multimedia (1999)

    Google Scholar 

  5. Chia, C.H., Beg, M.S.: MPEG-4 video transmission over bluetooth links. In: IEEE International Conference on Personal Wireless Communications, pp. 280–284 (2002)

    Google Scholar 

  6. Ikkurthy, P., Labrador, M.A.: Characterization of MPEG-4 traffic over IEEE 802.11b wireless LANs. In: 27th Annual IEEE Conference on Local Computer Networks, pp. 421–427 (2002)

    Google Scholar 

  7. Mohr, A.E., Riskin, E.A., Ladner, R.E.: Unequal loss protection: graceful degradation of image quality over packet erasure channels through forward error correction. IEEE Journal on Selected Areas in Communications 18(6), 819–828 (2000)

    Article  Google Scholar 

  8. Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218–238. Springer, Heidelberg (1990)

    Google Scholar 

  9. Jonathan Robbins RTT and Loss vs. Packet Size and Bitrate, http://www.cs.unc.edu/~robbins/comp249/HW3/

  10. Saroui, S., Gummadi, K.P., Dunn, R.J., Gribble, S.D., Levy, H.M.: An analysis of Internet content delivery systems. In: Proc. 5th Symposium on Operating Systems Design and Implementation (OSDI), Boston, MA (October 2002)

    Google Scholar 

  11. Luby, M., Mitzenmacher, M., Shokrollahi, A., Spielman, D., Stemann, V.: Practical loss-resilient codes. In: Proc. 29th Annual ACM Symposium on Theory of Computing (STOC), El Paso, TX (May 1997)

    Google Scholar 

  12. Castro, M., Druschel, P., Kermarrec, A., Nandi, A., Rowstron, A., Singh, A.: Splitstream: High-bandwidth multicast in a cooperative environment. In: Proc. 18th ACM symposiom on operating systems principles (SOSP), NY (October 2003)

    Google Scholar 

  13. Padmanabhan, V.N., Wang, H.J., Chou, P.A.: Resilient Peer-to-Peer Streaming. In: IEEE ICNP 2003, Atlanta, GA, USA (November 2003)

    Google Scholar 

  14. Canetti, R., Garay, J., Itkis, G., Micciancio, D., Naor, M., Pinkas, B.: Multicast security: A taxonomy and some efficient constructions. In: Proc. IEEE INFOCOM 1999, New York, NY (1999)

    Google Scholar 

  15. Gennaro, R., Rohatgi, P.: How to sign digital streams. In: Advances in Cryptology-CRYPTO 1997, Santa Barbara, CA (August 1997)

    Google Scholar 

  16. Wong, C.K., Lam, S.S.: Digital signatures for flows and multicasts. In: Proc. IEEE International Conference on Network Protocols, Austin, TX (October 1998)

    Google Scholar 

  17. Rohatgi, P.: A compact and fast hybrid signature scheme for multicast packet authentication. In: Proc. 6th ACM Conference on Computer and Communication Security (CCS), Singapore (November 1999)

    Google Scholar 

  18. Perrig, A., Canetti, R., Tygar, J.D., Song, D.: Efficient authentication and signature of multicast streams over lossy channels. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, May 2000, pp. 56–73 (2000)

    Google Scholar 

  19. Perrig, A., Canetti, R., Song, D., Tygar, J.D.: Efficient and secure source authentication for multicast. In: Proceedings of the Symposium on Network and Distributed Systems Security (NDSS 2001), February 2001, pp. 35–46. Internet Society, San Diego (2001)

    Google Scholar 

  20. Golle, P., Modadugu, N.: Authenticated streamed data in the presernce of random packet loss. In: Proc. NDSS 2001, San Diego, CA (2001)

    Google Scholar 

  21. Miner, S., Staddon, J.: Graph-based authentication of digital streams. In: IEEE S&P 2001, pp. 232–246 (2001)

    Google Scholar 

  22. Perrig, A.: The BiBa one-time signature and broadcast authentication protocol. In: Proceedings of the Eighth ACM Conference on Computer and Communications Security (CCS-8), Philadelphia PA, USA, November 2001, pp. 28–37 (2001)

    Google Scholar 

  23. Park, J.M., Chong, E.K., Siegel, H.J.: Efficient multicast packet authentication using signature amortization. In: IEEE S&P 2002, pp. 227–240 (2002)

    Google Scholar 

  24. Pannetrat, A., Molva, R.: Efficient multicast packet authentication. In: Proc. NDSS 2003, San Diego, CA (2003)

    Google Scholar 

  25. Krohn, M.N., Freedman, M.J., Mazires, D.: On-the-Fly Verification of Rateless Erasure Codes for Efficient Content Distribution. In: IEEE S&P 2004, California, USA (2004)

    Google Scholar 

  26. Karlof, C., Sastry, N., Li, Y., Perrig, A., Tygar, J.: Distillation codes and applications to DoS resistant multicast authentication. In: Proc. NDSS 2004, San Diego, CA (February 2004)

    Google Scholar 

  27. Lysyanskaya, A., Tamassia, R., Triandopoulos, N.: Multicast Authentication in Fully Adversarial Networks. In: IEEE S&P 2004, California, USA (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Li, T., Wu, Y., Ma, D., Zhu, H., Deng, R.H. (2004). Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN. In: Lopez, J., Qing, S., Okamoto, E. (eds) Information and Communications Security. ICICS 2004. Lecture Notes in Computer Science, vol 3269. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30191-2_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30191-2_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-23563-7

  • Online ISBN: 978-3-540-30191-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics