There are two main approaches for authenticating digital streams, namely the tree chaining [1] and the hash chaining [2,3]. Both approaches have their disadvantages. Hash chaining is superior for low communication overhead, however, it is not resilient to packet loss and it has a longer verification delay. On the other hand, tree chaining is more robust even if packet loss occurs and with shorter verification delay, but the communication overhead is too high to be tolerable, especially in online applications. In this paper, we try to combine the two techniques and propose a hybrid scheme for authenticating MPEG-2 streaming data, which are still used by real application systems, by taking advantage of the characteristics of MPEG frames. The ...
The prospection of video streaming security has been changed considerably during the last years. Wit...
We study the multicast stream authentication problem when an opponent can drop, reorder and inject d...
We study the multicast stream authentication problem when an opponent can drop, reorder and inject d...
Recently, digital streams have become widely used to make audio, video, and other media available in...
Recently, digital streams have become widely used to make audio, video, and other media available in...
Stream authentication methods usually impose overhead and dependency among packets. The straightforw...
Abstract—We consider stored content being streamed to a resource-poor device (such as a sensor node ...
We present a novel video stream authentication scheme which combines signature amortization by means...
AbstractWe present a new efficient paradigm for signing digital streams. The problem of signing digi...
We present a new efficient paradigm for signing digital streams. The problem of signing digital stre...
Satellite link presents peculiar characteristics like no packet reordering and low bit error rate. I...
Several solutions had been introduced to authenticate streamed data delivered in real-time over inse...
In this paper, we study the verification of data integrity during peer-to-peer video streaming sessi...
Various schemes have been proposed to achieve strong authentication of streamed data in a lossy netw...
Multicast video streaming in heterogeneous networks undergoes to very different physical constraints...
The prospection of video streaming security has been changed considerably during the last years. Wit...
We study the multicast stream authentication problem when an opponent can drop, reorder and inject d...
We study the multicast stream authentication problem when an opponent can drop, reorder and inject d...
Recently, digital streams have become widely used to make audio, video, and other media available in...
Recently, digital streams have become widely used to make audio, video, and other media available in...
Stream authentication methods usually impose overhead and dependency among packets. The straightforw...
Abstract—We consider stored content being streamed to a resource-poor device (such as a sensor node ...
We present a novel video stream authentication scheme which combines signature amortization by means...
AbstractWe present a new efficient paradigm for signing digital streams. The problem of signing digi...
We present a new efficient paradigm for signing digital streams. The problem of signing digital stre...
Satellite link presents peculiar characteristics like no packet reordering and low bit error rate. I...
Several solutions had been introduced to authenticate streamed data delivered in real-time over inse...
In this paper, we study the verification of data integrity during peer-to-peer video streaming sessi...
Various schemes have been proposed to achieve strong authentication of streamed data in a lossy netw...
Multicast video streaming in heterogeneous networks undergoes to very different physical constraints...
The prospection of video streaming security has been changed considerably during the last years. Wit...
We study the multicast stream authentication problem when an opponent can drop, reorder and inject d...
We study the multicast stream authentication problem when an opponent can drop, reorder and inject d...