2007
DOI: 10.1109/tcsvt.2006.888822
|View full text |Cite
|
Sign up to set email alerts
|

Rate-Distortion-Authentication Optimized Streaming of Authenticated Video

Abstract: Abstract-We define authenticated video as decoded video that results from those received packets whose authenticities have been verified. Generic data stream authentication methods usually impose overhead and dependency among packets for verification. Therefore, the conventional rate-distortion (R-D) optimized video streaming techniques produce highly sub-optimal R-D performance for authenticated video, since they do not account for the overhead and additional dependencies for authentication. In this paper, we… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2008
2008
2016
2016

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 24 publications
(4 citation statements)
references
References 22 publications
0
4
0
Order By: Relevance
“…A three-level wavelet decomposition is applied to a group of 16 frames and the 3-D wavelet coefficients are divided into two groups using the method proposed in [13]. We use RS (15,9) as the channel coding in the following simulations.…”
Section: Simulation Results and Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…A three-level wavelet decomposition is applied to a group of 16 frames and the 3-D wavelet coefficients are divided into two groups using the method proposed in [13]. We use RS (15,9) as the channel coding in the following simulations.…”
Section: Simulation Results and Discussionmentioning
confidence: 99%
“…Hence, packet P i can be authenticated if and only if Fig. 1 Architecture of the joint authentication and coding scheme there is a path from P i to the signature packet that only includes nodes corresponding to the received packets [9]. We denote the probability that P i is linked to P sig via such a path by Pr[P i → P sig ].…”
Section: Definitions and Notationsmentioning
confidence: 99%
“…In practice, we can use standard cryptographic hash functions such as SHA1 [13] and MD5 [14]. To authenticate the packet P j , the receiver simply computes the hash of P j and checks whether it equals the corresponding hash value carried in the packet P i [18]. Since the cryptographic hash function is collision resistant, it is computationally infeasible to find a different packet P 0 that hashes to the same authenticated value.…”
Section: Graph-based Authentication Toolmentioning
confidence: 99%
“…The scheme significantly improved the authenticated image quality even under strict communication energy consumption constraints in WMSN. In [12], a rate-distortion optimization authentication scheme for H.264 video transmissions was proposed. A video packet transmission scheduler was designed to minimize the visual distortion under the limitation of total bit budget and authentication dependency.…”
Section: Introductionmentioning
confidence: 99%