메뉴 건너뛰기




Volumn 8, Issue 1, 2006, Pages 152-161

Scalable authentication of MPEG-4 streams

Author keywords

Authentication; Digital signature; Erasure correction coding; Fine granular scalability; Merkle hash tree; MPEG 4

Indexed keywords

AUTHENTICATION; ERASURE CORRECTION CODING; FINE GRANULAR SCALABILITY; MERKLE HASH TREES;

EID: 31344458019     PISSN: 15209210     EISSN: None     Source Type: Journal    
DOI: 10.1109/TMM.2005.861283     Document Type: Article
Times cited : (25)

References (48)
  • 3
    • 0041521019 scopus 로고    scopus 로고
    • Internet delivery of MPEG-4 object-based multimedia
    • Jul.-Sep.
    • Y. Pourmohammadi-Fallah, K. Asrar-Haghighi, and H. Alnuweiri, "Internet delivery of MPEG-4 object-based multimedia," IEEE Multimedia, vol. 10, no. 3, pp. 68-78, Jul.-Sep. 2003.
    • (2003) IEEE Multimedia , vol.10 , Issue.3 , pp. 68-78
    • Pourmohammadi-Fallah, Y.1    Asrar-Haghighi, K.2    Alnuweiri, H.3
  • 4
    • 0035279159 scopus 로고    scopus 로고
    • Overview of fine granularity scalability in MPEG-4 video standard
    • Mar.
    • W. Li, "Overview of fine granularity scalability in MPEG-4 video standard," IEEE Trans. Circuits Syst. Video Technol., vol. 11, no. 3, pp. 301-317, Mar. 2001.
    • (2001) IEEE Trans. Circuits Syst. Video Technol. , vol.11 , Issue.3 , pp. 301-317
    • Li, W.1
  • 8
    • 31344478360 scopus 로고    scopus 로고
    • Transmitting MPEG-4 video streams over the internet: Problems and solutions
    • G. Kuhne and C. Kuhmnch, "Transmitting MPEG-4 video streams over the internet: Problems and solutions," ACM Multimedia, 1999.
    • (1999) ACM Multimedia
    • Kuhne, G.1    Kuhmnch, C.2
  • 9
    • 84880901653 scopus 로고    scopus 로고
    • The order of encryption and authentication for protecting communications (or: How secure is SSL?)
    • H. Krawczyk, "The order of encryption and authentication for protecting communications (or: How secure is SSL?)," in Proc. CRYPTO'2001, vol. LNCS 2139, pp. 310-331.
    • Proc. CRYPTO'2001 , vol.LNCS 2139 , pp. 310-331
    • Krawczyk, H.1
  • 10
    • 0004044627 scopus 로고    scopus 로고
    • IP Encapsulating Security Payload (ESP)
    • [Online]
    • S. Kent. (2003) IP Encapsulating Security Payload (ESP), Internet Draft. [Online]. Available: http://www.ietf.org/internet-drafts/draft-ietf-ipsec-esp-v3-06.txt
    • (2003) Internet Draft
    • Kent, S.1
  • 14
    • 33744979306 scopus 로고    scopus 로고
    • [Online]
    • Crypto++ 5.2.1 Benchmarks. [Online]. Available: http://www.eskimo.com/~weidai/benchmarks.html
    • Crypto++ 5.2.1 Benchmarks
  • 16
    • 1542625909 scopus 로고    scopus 로고
    • Efficient multicast stream authentication using erasure codes
    • J. M. Park, E. K. Chong, and H. J. Siegel, "Efficient multicast stream authentication using erasure codes," ACM Trans. Inform. and Syst. Security, vol. 6, no. 2, pp. 258-285, 2003.
    • (2003) ACM Trans. Inform. and Syst. Security , vol.6 , Issue.2 , pp. 258-285
    • Park, J.M.1    Chong, E.K.2    Siegel, H.J.3
  • 18
    • 1542753484 scopus 로고    scopus 로고
    • Content-aware authentication of motion JPEG2000 stream in lossy networks
    • Y. Wu and R. H. Deng, "Content-aware authentication of motion JPEG2000 stream in lossy networks," IEEE Trans. Consumer Electron., vol. 49, no. 4, pp. 792-801, 2003.
    • (2003) IEEE Trans. Consumer Electron. , vol.49 , Issue.4 , pp. 792-801
    • Wu, Y.1    Deng, R.H.2
  • 19
    • 84889351757 scopus 로고    scopus 로고
    • How to sign digital streams
    • R. Gennaro and R. Rohatgi, "How to sign digital streams," in Proc. CRYPTO'97, LNCS 1294, pp. 180-197.
    • Proc. CRYPTO'97 , vol.LNCS 1294 , pp. 180-197
    • Gennaro, R.1    Rohatgi, R.2
  • 20
    • 0032313105 scopus 로고    scopus 로고
    • Digital signatures for flows and multicasts
    • C. K. Wong and S. S. Lam, "Digital signatures for flows and multicasts," in Proc. IEEE ICNP'98.
    • Proc. IEEE ICNP'98
    • Wong, C.K.1    Lam, S.S.2
  • 22
    • 35048891868 scopus 로고    scopus 로고
    • Keying hash functions for message authentication
    • M. Bellare, R. Canetti, and H. Krawczyk, "Keying hash functions for message authentication," in Proc. CRYPTO'96, vol. LNCS 1109, 1996, pp. 1-15.
    • (1996) Proc. CRYPTO'96 , vol.LNCS 1109 , pp. 1-15
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 23
    • 0033280006 scopus 로고    scopus 로고
    • A compact and fast hybrid signature scheme for multicast packet authentication
    • P. Rohatgi, "A compact and fast hybrid signature scheme for multicast packet authentication," in Proc. 6th ACM Conf. Computer and Communication Security, 1999, pp. 93-100.
    • (1999) Proc. 6th ACM Conf. Computer and Communication Security , pp. 93-100
    • Rohatgi, P.1
  • 24
    • 15744368857 scopus 로고    scopus 로고
    • Efficient and secure source authentication for multicast
    • San Diego, CA, Feb.
    • A. Perrig, R. Canetti, D. Tygar, and D. Song, "Efficient and secure source authentication for multicast," in Proc. NDSS, San Diego, CA, Feb. 2001.
    • (2001) Proc. NDSS
    • Perrig, A.1    Canetti, R.2    Tygar, D.3    Song, D.4
  • 25
    • 85180799647 scopus 로고    scopus 로고
    • Authenticating streamed data in the presence of random packet loss
    • San Diego, CA, Feb.
    • P. Golle and N. Modadugu, "Authenticating streamed data in the presence of random packet loss," in Proc. NDSS, San Diego, CA, Feb. 2001.
    • (2001) Proc. NDSS
    • Golle, P.1    Modadugu, N.2
  • 26
    • 84974694679 scopus 로고    scopus 로고
    • Efficient object-based stream authentication
    • Y. Wu, D. Ma, and C. Xu, "Efficient object-based stream authentication," in Proc. Indocrypto 2002, vol. LNCS 2551, pp. 354-367.
    • Proc. Indocrypto 2002 , vol.LNCS 2551 , pp. 354-367
    • Wu, Y.1    Ma, D.2    Xu, C.3
  • 29
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. L. Rivest, A. Shamir, and L. M. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol. 21, no. 2, pp. 120-126, 1978.
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 30
    • 0000758345 scopus 로고
    • Proposed federal information processing standard for digital signature standard (DSS)
    • "Proposed federal information processing standard for digital signature standard (DSS)," Federal Register, vol. 56, no. 169, pp. 42 980-42 982, 1991.
    • (1991) Federal Register , vol.56 , Issue.169 , pp. 42980-42982
  • 31
    • 2342472595 scopus 로고    scopus 로고
    • A flexible and scalable authentication scheme for JPEG2000 codestreams
    • C. Peng, R. H. Deng, Y. Wu, and W. Shao, "A flexible and scalable authentication scheme for JPEG2000 codestreams," ACM Multimedia, pp. 433-441, 2003.
    • (2003) ACM Multimedia , pp. 433-441
    • Peng, C.1    Deng, R.H.2    Wu, Y.3    Shao, W.4
  • 36
    • 84969346266 scopus 로고
    • A certified digital signature
    • Lecture Notes on Computer Science
    • R. C. Merkle, "A certified digital signature," in Proc. Crypto'89, vol. 0435, Lecture Notes on Computer Science, 1989, pp. 218-238.
    • (1989) Proc. Crypto'89 , vol.435 , pp. 218-238
    • Merkle, R.C.1
  • 38
    • 0031122982 scopus 로고    scopus 로고
    • Effective erasure codes for reliable computer communication protocols
    • L. Rizzo, "Effective erasure codes for reliable computer communication protocols," ACM Comput. Commun. Rev., vol. 27, 1997.
    • (1997) ACM Comput. Commun. Rev. , vol.27
    • Rizzo, L.1
  • 43
    • 0034205048 scopus 로고    scopus 로고
    • Unequal loss protection: Graceful degradation of image quality over packet erasure channels through forward error correction
    • Jun.
    • A. E. Mohr, E. A. Riskin, and R. E. Ladner, "Unequal loss protection: Graceful degradation of image quality over packet erasure channels through forward error correction," IEEE J. Select. Areas Commun., vol. 18, no. 6, pp. 819-828, Jun. 2000.
    • (2000) IEEE J. Select. Areas Commun. , vol.18 , Issue.6 , pp. 819-828
    • Mohr, A.E.1    Riskin, E.A.2    Ladner, R.E.3
  • 45
    • 84957364590 scopus 로고    scopus 로고
    • A new paradigm for collision-free hashing: Incrementality at reduced cost
    • M. Bellare and D. Micciancio, "A new paradigm for collision-free hashing: Incrementality at reduced cost," in Proc. EUROCRYPT97, vol. LNCS 1233, 1997, pp. 163-192.
    • (1997) Proc. EUROCRYPT97 , vol.LNCS 1233 , pp. 163-192
    • Bellare, M.1    Micciancio, D.2
  • 46
    • 0033872149 scopus 로고    scopus 로고
    • Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes
    • Mar.
    • M. Holliman and N. Memon, "Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes," IEEE Trans. Image Process., vol. 9, no. 3, pp. 432-441, Mar. 2000.
    • (2000) IEEE Trans. Image Process. , vol.9 , Issue.3 , pp. 432-441
    • Holliman, M.1    Memon, N.2
  • 47
    • 84945279475 scopus 로고    scopus 로고
    • An efficient dynamic and distributed cryptographic accumulator
    • M. T. Goodrich, R. Tamassia, and J. Hasic, "An efficient dynamic and distributed cryptographic accumulator," in Proc. ISC2002, vol. LNCS 2433, pp. 372-388.
    • Proc. ISC2002 , vol.2433 , pp. 372-388
    • Goodrich, M.T.1    Tamassia, R.2    Hasic, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.