Stream authentication methods usually impose overhead and dependency among packets. The straightforward application of state-of-the-art rate-distortion (R-D) optimized streaming techniques produce highly sub-optimal R-D performance for authenticated video, since they do not account for the additional dependencies. This paper proposes an R-D optimized streaming technique for authenticated video, by accounting for authentication dependencies and overhead. It schedules packet transmission based on packets ’ importance in terms of both video quality and authentication dependencies. The proposed technique works with any stream authentication method as long as the verification probability can be quantitatively computed from packet loss probabilit...
Recently, digital streams have become widely used to make audio, video, and other media available in...
10.1109/ICME.2006.2624452006 IEEE International Conference on Multimedia and Expo, ICME 2006 - Proce...
secure streaming, secure transcoding, secure scalable streaming, secure video, H.264/MPEG-4 AVC Two ...
Multicast video streaming in heterogeneous networks undergoes to very different physical constraints...
Multicast video streaming in heterogeneous networks undergoes to very different physical constraints...
We investigate the problem of securing the delivery of scalable video streams so that receivers can ...
Wireless communication channels are grown tremendously. Multimedia applications are using different ...
Internet video streaming places new demands on source coding and network transport algorithms. The c...
There are two main approaches for authenticating digital streams, namely the tree chaining [1] and t...
In this paper, we study the verification of data integrity during peer-to-peer video streaming sessi...
Recently, digital streams have become widely used to make audio, video, and other media available in...
In this paper, we study the performance of rate-distortion optimized video streaming over traces of ...
When streaming packetized media data over a lossy packet network, it is desirable to use transmissio...
We present a novel video stream authentication scheme which combines signature amortization by means...
10.1109/ICIP.2008.4712450Proceedings - International Conference on Image Processing, ICIP3096-309
Recently, digital streams have become widely used to make audio, video, and other media available in...
10.1109/ICME.2006.2624452006 IEEE International Conference on Multimedia and Expo, ICME 2006 - Proce...
secure streaming, secure transcoding, secure scalable streaming, secure video, H.264/MPEG-4 AVC Two ...
Multicast video streaming in heterogeneous networks undergoes to very different physical constraints...
Multicast video streaming in heterogeneous networks undergoes to very different physical constraints...
We investigate the problem of securing the delivery of scalable video streams so that receivers can ...
Wireless communication channels are grown tremendously. Multimedia applications are using different ...
Internet video streaming places new demands on source coding and network transport algorithms. The c...
There are two main approaches for authenticating digital streams, namely the tree chaining [1] and t...
In this paper, we study the verification of data integrity during peer-to-peer video streaming sessi...
Recently, digital streams have become widely used to make audio, video, and other media available in...
In this paper, we study the performance of rate-distortion optimized video streaming over traces of ...
When streaming packetized media data over a lossy packet network, it is desirable to use transmissio...
We present a novel video stream authentication scheme which combines signature amortization by means...
10.1109/ICIP.2008.4712450Proceedings - International Conference on Image Processing, ICIP3096-309
Recently, digital streams have become widely used to make audio, video, and other media available in...
10.1109/ICME.2006.2624452006 IEEE International Conference on Multimedia and Expo, ICME 2006 - Proce...
secure streaming, secure transcoding, secure scalable streaming, secure video, H.264/MPEG-4 AVC Two ...