Advertisement

An Improved Authentication Scheme for H.264/SVC and Its Performance Evaluation over Non-stationary Wireless Mobile Networks

  • Yifan Zhao
  • Swee-Won Lo
  • Robert H. Deng
  • Xuhua Ding
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7645)

Abstract

In this paper, a bit stream-based authentication scheme for H.264/Scalable Video Coding (SVC) is proposed. The proposed scheme seamlessly integrates cryptographic algorithms and erasure correction codes (ECCs) to SVC video streams such that the authenticated streams are format compliant with the SVC specifications and preserve the three dimensional scalability (i. e., spatial, quality and temporal) of the original streams. We implement our scheme on a smart phone and study its performance over a realistic bursty packet-lossy wireless mobile network. Our analysis and experimental results show that the scheme achieves very high verification rates with lower communication overhead and much smaller decoding delay compared with the existing solutions.

Keywords

Authentication data integrity protection H.264/SVC Gilbert channel model multimedia security 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Deng, R.H., Yang, Y.: A study of content authentication in proxy-enabled multimedia delivery systems: Model, techniques and applications. ACM Transactions on Multimedia Computing, Communications and Applications 5(4), 1–20 (2009)CrossRefGoogle Scholar
  2. 2.
    Ferre, P., et al.: Packet loss modelling for H.264 video transmission over IEEE 802.11g wireless LANs. In: IEEE 13th International Workshop on Image Analysis for Multimedia Interactive Services, WIAMIS (2005)Google Scholar
  3. 3.
  4. 4.
    Gennaro, R., Rohatgi, P.: How to Sign Digital Streams. In: Kaliski, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 180–197. Springer, Heidelberg (1997), http://dx.doi.org/10.1007/BFb0052235 Google Scholar
  5. 5.
    Gentry, C., et al.: End-to-end security in the presence of intelligent data adapting proxies: The case of authenticating transcoded streaming media. IEEE Journal on Selected Areas in Communications 23(2), 464–473 (2005)CrossRefGoogle Scholar
  6. 6.
    Gilbert, E.: Capacity of a burst-noise channel. Bell System Technical Journal 39, 1253–1265 (1960)MathSciNetGoogle Scholar
  7. 7.
    Golle, P., Modadugu, N.: Authenticating streamed data in the presence of random packet loss. In: Proceedings on Network and Distributed Systems Security Symposium (NDSS 2001), pp. 13–22 (2001)Google Scholar
  8. 8.
    Hefeeda, M., Mokhtarian, K.: Authentication schemes for multimedia streams: Quantitative analysis and comparison. ACM Transactions on Multimedia Computing, Communications and Applications 6(1), 1–24 (2010)CrossRefGoogle Scholar
  9. 9.
    Joint Video Team (JVT) of ISO/IEC MPEG & ITU-T VCEG: Joint scalable video model, JVT-X202 (2007)Google Scholar
  10. 10.
    ITU-T Rec. H.264: H.264 advanced video coding for generic audiovisual services (2003)Google Scholar
  11. 11.
    Kaced, A.R., Moissinac, J.C.: Multimedia content authentication for proxy-side adaptation. In: Proceedings of International Conference on Digital Telecommunication (ICDT), pp. 62–66 (2006)Google Scholar
  12. 12.
    Li, T., Wu, Y.: Adaptive stream authentication for wireless multimedia communications. In: Proceedings of IEEE Wireless Communications and Networking Conference (WCNC), pp. 2613–2618 (2007)Google Scholar
  13. 13.
    Lin, S., Costello, D.J.: Error Control Coding: Fundamentals and Applications, 2nd edn. Prentice-Hall, NJ (2004)Google Scholar
  14. 14.
    Miner, S., Staddon, J.: Graph-based authentication of digital streams. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 232–246 (2001)Google Scholar
  15. 15.
    Mokhtarian, K., Hefeeda, M.: End-to-end secure delivery of scalable video streams. In: Proceedings of the 18th International Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV 2009), pp. 79–84 (2009)Google Scholar
  16. 16.
    Network Systems Lab: svcAuth - NSL, http://nsl.cs.sfu.ca/wiki/index.php/svcAuth
  17. 17.
    NIST: Federal Information Processing Standard (FIPS) 180-2, Secure Hash Standard (2002)Google Scholar
  18. 18.
    Offspark.com: Polar SSL, http://polarssl.org/
  19. 19.
    Pannetrat, A., Molva, R.: Efficient multicast packet authentication. In: Proceedings on Network and Distributed Systems Security Symposium, NDSS 2003 (2003)Google Scholar
  20. 20.
    Park, J.M., Chong, E.K.P., Siegel, H.J.: Efficient multicast stream authentication using erasure codes. ACM Transactions on Information and System Security 6(2), 258–285 (2003)CrossRefGoogle Scholar
  21. 21.
    Plank, J.S., Simmerman, S., Schuman, C.D.: Jerasure: A library in C/C++ facilitating erasure coding for storage applications - Version 1.2. Tech. Rep. CS-08-627, University of Tennessee (August 2008)Google Scholar
  22. 22.
    Reed, I.S., Solomon, G.: Polynomial codes over certain finite fields. Journal of the Society for Industrial and Applied Mathematics (SIAM) 8(2), 300–304 (1960)MathSciNetzbMATHCrossRefGoogle Scholar
  23. 23.
    Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2), 120–126 (1978)MathSciNetzbMATHCrossRefGoogle Scholar
  24. 24.
    Song, D., Zuckerman, D., Tygar, J.D.: Expander graphs for digital stream aauthentication and robust overlay networks. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 258–270 (2002)Google Scholar
  25. 25.
    Wenger, S., Wang, Y.K., Schierl, T., Eleftheriadis, A.: RTP payload format for scalable video coding (2011)Google Scholar
  26. 26.
    Wong, C., Lam, S.: Digital signatures for flows and multicasts. IEEE Transactions on Networking 7(4), 502–513 (1999)CrossRefGoogle Scholar
  27. 27.
    Wu, Y., Deng, R.H.: Scalable authentication of MPEG-4 streams. IEEE Transactions on Multimedia 8(1), 152–161 (2006)MathSciNetCrossRefGoogle Scholar
  28. 28.
    Zhang, Z., Sun, Q., Wong, W.C.: A proposal of butterfly-graph based stream authentication over lossy networks. In: Proceedings of IEEE International Conference on Multimedia and Expo (ICME 2005), 4 pages (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Yifan Zhao
    • 1
  • Swee-Won Lo
    • 2
  • Robert H. Deng
    • 2
  • Xuhua Ding
    • 2
  1. 1.College of Computer Science and TechnologyZhejiang UniversityHangzhouChina
  2. 2.School of Information SystemsSingapore Management UniversitySingapore

Personalised recommendations