We present a novel video stream authentication scheme which combines signature amortization by means of hash chains and an advanced watermarking technique. We propose a new hash chain construction, the Duplex Hash Chain, which allows us to achieve bit-by-bit authentication that is robust to low bit error rates. This construction is well suited for wireless broadcast communications characterized by low packet losses such as in satellite networks. Moreover, neither hardware upgrades nor specific end-user equipment are needed to enjoy the authentication services. The computation overhead experienced on the receiver only sums to two hashes per block of pictures and one digital signature verification for the whole received stream. This overhead ...
Various schemes have been proposed to achieve strong authentication of streamed data in a lossy netw...
Stream authentication methods usually impose overhead and dependency among packets. The straightforw...
Abstract—Because of the great advance in multimedia technology, digital multimedia is vulnerable to ...
We present a novel video stream authentication scheme which combines signature amortization by means...
Satellite link presents peculiar characteristics like no packet reordering and low bit error rate. I...
Multicast video streaming in heterogeneous networks undergoes to very different physical constraints...
Multicast video streaming in heterogeneous networks undergoes to very different physical constraints...
Abstract More web-based services involve distribution of content like digital video, audio, software...
Abstract This paper addresses the problem of ensuring the integrity of a digital video and presents ...
Abstract—We consider stored content being streamed to a resource-poor device (such as a sensor node ...
We investigate the problem of securing the delivery of scalable video streams so that receivers can ...
Video authentication techniques generally do not allow any form of manipulation, thus making it impr...
Wireless communication channels are grown tremendously. Multimedia applications are using different ...
AbstractWe present a new efficient paradigm for signing digital streams. The problem of signing digi...
Several solutions had been introduced to authenticate streamed data delivered in real-time over inse...
Various schemes have been proposed to achieve strong authentication of streamed data in a lossy netw...
Stream authentication methods usually impose overhead and dependency among packets. The straightforw...
Abstract—Because of the great advance in multimedia technology, digital multimedia is vulnerable to ...
We present a novel video stream authentication scheme which combines signature amortization by means...
Satellite link presents peculiar characteristics like no packet reordering and low bit error rate. I...
Multicast video streaming in heterogeneous networks undergoes to very different physical constraints...
Multicast video streaming in heterogeneous networks undergoes to very different physical constraints...
Abstract More web-based services involve distribution of content like digital video, audio, software...
Abstract This paper addresses the problem of ensuring the integrity of a digital video and presents ...
Abstract—We consider stored content being streamed to a resource-poor device (such as a sensor node ...
We investigate the problem of securing the delivery of scalable video streams so that receivers can ...
Video authentication techniques generally do not allow any form of manipulation, thus making it impr...
Wireless communication channels are grown tremendously. Multimedia applications are using different ...
AbstractWe present a new efficient paradigm for signing digital streams. The problem of signing digi...
Several solutions had been introduced to authenticate streamed data delivered in real-time over inse...
Various schemes have been proposed to achieve strong authentication of streamed data in a lossy netw...
Stream authentication methods usually impose overhead and dependency among packets. The straightforw...
Abstract—Because of the great advance in multimedia technology, digital multimedia is vulnerable to ...