메뉴 건너뛰기




Volumn 49, Issue 4, 2003, Pages 792-801

Content-aware authentication of motion JPEG2000 stream in lossy networks

Author keywords

Digital signature; Forward erasure code (FEC); Motion JPEG2000; Multiple description code (MDC); Stream authentication scheme (SAS)

Indexed keywords

CODES (SYMBOLS); ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; ERROR CORRECTION; IMAGE CODING; IMAGE COMPRESSION; MULTICASTING; PACKET NETWORKS;

EID: 1542753484     PISSN: 00983063     EISSN: None     Source Type: Journal    
DOI: 10.1109/TCE.2003.1261157     Document Type: Article
Times cited : (5)

References (45)
  • 1
    • 0004773692 scopus 로고    scopus 로고
    • RTP payload format for H.261 video stream
    • T. Turletti, and C. Huitema, "RTP Payload Format for H.261 Video Stream," RFC 2032, 1996
    • (1996) RFC 2032
    • Turletti, T.1    Huitema, C.2
  • 2
    • 1542521233 scopus 로고    scopus 로고
    • 15444-3 amendment 2, motion JPEG 2000, motion JPEG 2000 version 2, MJP2 derived from ISO media file format
    • ISO/IEC JTC 1/SC 29/WG1 N2780F, 24/01/2003
    • Takahiro Fukuhara, and David Singer, "15444-3 Amendment 2, Motion JPEG 2000, Motion JPEG 2000 Version 2, MJP2 derived from ISO Media File Format," ISO/IEC JTC 1/SC 29/WG1 N2780F, 24/01/2003
    • Fukuhara, T.1    Singer, D.2
  • 4
    • 29844433716 scopus 로고    scopus 로고
    • ISO 154447 ITU-T recommendation T.800
    • ISO 154447 ITU-T Recommendation T.800, http://www.jpeg.org
  • 5
    • 0036132948 scopus 로고    scopus 로고
    • An overview of the JPEG2000 still image compression standard
    • Majid Rabbani, and Rajan Joshi, "An overview of the JPEG2000 still image compression standard," Signal Processing: Image Communication, 17, pp. 3-48, 2002.
    • (2002) Signal Processing: Image Communication , vol.17 , pp. 3-48
    • Rabbani, M.1    Joshi, R.2
  • 7
    • 0010227314 scopus 로고    scopus 로고
    • Digital signatures for flows and multicasts
    • Chung Kei Wong, and Simon S. Lam, "Digital Signatures for Flows and Multicasts," IEEE ICNP'98
    • IEEE ICNP'98
    • Wong, C.K.1    Lam, S.S.2
  • 10
  • 13
    • 0033280006 scopus 로고    scopus 로고
    • A compact and fast hybrid signature scheme for multicast packet authentication
    • P. Rohatgi. "A Compact and Fast Hybrid Signature Scheme for Multicast Packet Authentication," 6th ACM Conference on Computer and Communication Security, pp.93-100, 1999.
    • (1999) 6th ACM Conference on Computer and Communication Security , pp. 93-100
    • Rohatgi, P.1
  • 15
    • 85180799647 scopus 로고    scopus 로고
    • Authenticating streamed data in the presence of random packet loss
    • Philippe Golle, and Nagendra Modadugu, "Authenticating Streamed Data in the Presence of Random Packet Loss," NDSS 2001
    • NDSS 2001
    • Golle, P.1    Modadugu, N.2
  • 16
    • 85180537111 scopus 로고    scopus 로고
    • Efficient multicast packet authentication
    • Alain Pannetrat, and Refik Molva, "Efficient Multicast Packet Authentication," NDSS 2003
    • NDSS 2003
    • Pannetrat, A.1    Molva, R.2
  • 17
    • 84974694679 scopus 로고    scopus 로고
    • Efficient object-based stream authentication
    • Yongdong Wu, Di Ma, and Changsheng Xu, "Efficient Object-based Stream Authentication," Indocrypto 2002, LNCS 2551, pp.354-367
    • Indocrypto 2002, LNCS 2551 , pp. 354-367
    • Wu, Y.1    Ma, D.2    Xu, C.3
  • 18
    • 0034792761 scopus 로고    scopus 로고
    • Scalable streaming of JPEG2000 images using hypertext transfer protocol
    • S. Deshpande, and W. Zeng, "Scalable streaming of JPEG2000 images using Hypertext Transfer Protocol," ACM Multimedia, 2001
    • (2001) ACM Multimedia
    • Deshpande, S.1    Zeng, W.2
  • 19
    • 0032155046 scopus 로고    scopus 로고
    • A survey of packet-loss recovery techniques for streaming audio
    • Colin Perkins, Orion Hodson, and Vicky Hardman, "A Survey of Packet-Loss Recovery Techniques for Streaming Audio," IEEE Network, 1998, pp.40-48
    • (1998) IEEE Network , pp. 40-48
    • Perkins, C.1    Hodson, O.2    Hardman, V.3
  • 20
  • 21
    • 84962120837 scopus 로고    scopus 로고
    • A survey of error-concealment schemes for real-time audio and video transmissions over the internet
    • B. W. Wah, X. Su, and D. Lin, "A Survey of Error-Concealment Schemes for Real-Time Audio and Video Transmissions over the Internet," Int'l Symposium on Multimedia Software Engineering, 2000, pp. 17-24
    • Int'l Symposium on Multimedia Software Engineering, 2000 , pp. 17-24
    • Wah, B.W.1    Su, X.2    Lin, D.3
  • 22
    • 0033706694 scopus 로고    scopus 로고
    • Error concealment for SNR scalable video coding in wireless communication
    • Andre Kaup, "Error Concealment for SNR Scalable Video Coding in Wireless Communication," Visual Communications and Image Processing 2000}, Vol. 4067, pp. 175-186.
    • Visual Communications and Image Processing 2000 , vol.4067 , pp. 175-186
    • Kaup, A.1
  • 25
    • 0035578066 scopus 로고    scopus 로고
    • Unequal packet loss resilience for fine-granular-scalability video
    • M. van der Schaar, and Hayder Radha, "Unequal packet loss resilience for fine-granular-scalability video," IEEE Transactions on Multimedia, 3(4):381-391, 2001
    • (2001) IEEE Transactions on Multimedia , vol.3 , Issue.4 , pp. 381-394
    • Van Der Schaar, M.1    Radha, H.2
  • 27
    • 0034205048 scopus 로고    scopus 로고
    • Unequal loss protection: Graceful degradation of image quality over packet erasure channels through forward error correction
    • A.E. Mohr, E.A. Riskin, and R.E Ladner, "Unequal loss protection: graceful degradation of image quality over packet erasure channels through forward error correction," IEEE Journal on Selected Areas in Communications, 18(6):819-828, 2000
    • (2000) IEEE Journal on Selected Areas in Communications , vol.18 , Issue.6 , pp. 819-828
    • Mohr, A.E.1    Riskin, E.A.2    Ladner, R.E.3
  • 29
    • 0038005381 scopus 로고    scopus 로고
    • Error-resilient image and video transmission over the internet using unequal error protection
    • Joohee Kim, R.M. Mersereau, and Y. Altunbasak, "Error-resilient image and video transmission over the Internet using unequal error protection," IEEE Transactions on Image Processing, 12(2):121-131, 2003
    • (2003) IEEE Transactions on Image Processing , vol.12 , Issue.2 , pp. 121-131
    • Kim, J.1    Mersereau, R.M.2    Altunbasak, Y.3
  • 32
    • 0036346222 scopus 로고    scopus 로고
    • On multiple description streaming with content delivery networks
    • John Apostolopoulos, Tina Wong, Wai-tian Tan, and Susie Wee, "On Multiple Description Streaming with Content Delivery Networks," IEEE Infocom 2002
    • (2002) IEEE Infocom
    • Apostolopoulos, J.1    Wong, T.2    Tan, W.-T.3    Wee, S.4
  • 33
    • 0033872149 scopus 로고    scopus 로고
    • Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
    • M. Holliman, and N. Memon, "Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes," IEEE Transactions on Image Processing, 9(3):432-441, 2000
    • (2000) IEEE Transactions on Image Processing , vol.9 , Issue.3 , pp. 432-441
    • Holliman, M.1    Memon, N.2
  • 34
    • 0003309618 scopus 로고    scopus 로고
    • SDP: Session description protocol
    • M. Handley, and V. Jacobson, "SDP: Session Description Protocol," RFC 2327, 1998
    • (1998) RFC 2327
    • Handley, M.1    Jacobson, V.2
  • 35
    • 0031122982 scopus 로고    scopus 로고
    • Effective erasure codes for reliable computer communication protocols
    • L. Rizzo, "Effective erasure codes for reliable computer communication protocols," ACM Computer Communication Review, 27, 1997.
    • (1997) ACM Computer Communication Review , pp. 27
    • Rizzo, L.1
  • 36
    • 0003195066 scopus 로고
    • The MD5 message digest algorithm
    • R. Rivest, "The MD5 Message Digest Algorithm," RFC 1321, 1992
    • (1992) RFC 1321
    • Rivest, R.1
  • 37
    • 0003629991 scopus 로고
    • FIPS Publication 180-1
    • National Institute of Standards and Technology, "Secure Hash Standard (SHS)," FIPS Publication 180-1, 1995.
    • (1995) Secure Hash Standard (SHS)
  • 39
    • 8344253818 scopus 로고    scopus 로고
    • Federal Information Processing Standards Publication (FIPS PUB) 180-2, Secure Hash Standard, 2002
    • (2002) Secure Hash Standard
  • 40
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. L. Rivest, A. Shamir, and L. M. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, Vol. 21, No. 2, pp. 120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 41
    • 1542625912 scopus 로고    scopus 로고
    • RSA Cryptography Standard
    • RSA Labs, PKCS#1 v2/1, RSA Cryptography Standard, 2002
    • (2002) PKCS#1 V2/1
  • 42
    • 0000758345 scopus 로고
    • Proposed federal information processing standard for digital signature standard (DSS)
    • National Institute of Standards and Technology, "Proposed Federal Information Processing Standard for Digital Signature Standard (DSS)," Federal Register, Vol. 56, No. 169, pp. 42980-42982, 1991.
    • (1991) Federal Register , vol.56 , Issue.169 , pp. 42980-42982
  • 43
    • 0032677669 scopus 로고    scopus 로고
    • Measurement and modelling of the temporal dependence in packet loss
    • M. Yajnik, S. Moon, J. Kurose, and D. Towsley, "Measurement and modelling of the temporal dependence in packet loss," IEEE Infocom 1999.
    • (1999) IEEE Infocom
    • Yajnik, M.1    Moon, S.2    Kurose, J.3    Towsley, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.