Authentication schemes for multimedia streams: Quantitative analysis and comparison

M Hefeeda, K Mokhtarian - ACM Transactions on Multimedia Computing …, 2010 - dl.acm.org
With the rapid increase in the demand for multimedia services, securing the delivery of
multimedia content has become an important issue. Accordingly, the problem of multimedia …

Authentication of scalable video streams with low communication overhead

K Mokhtarian, M Hefeeda - IEEE Transactions on multimedia, 2010 - ieeexplore.ieee.org
The large prevalence of multimedia systems in recent years makes the security of
multimedia communications an important and critical issue. We study the problem of …

A system for end-to-end authentication of adaptive multimedia content

T Suzuki, Z Ramzan, H Fujimoto, C Gentry… - … Security: 8 th IFIP TC-6 …, 2005 - Springer
We present a multimedia content delivery system that preserves the end-to-end authenticity
of original content while allowing content adaptation by intermediaries. Our system utilizes a …

A study of content authentication in proxy-enabled multimedia delivery systems: Model, techniques, and applications

RH Deng, Y Yang - ACM Transactions on Multimedia Computing …, 2009 - dl.acm.org
Compared with the direct server-user approach, the server-proxy-user architecture for
multimedia delivery promises significantly improved system scalability. The introduction of …

Multimedia content authentication for proxy-side adaptation

AR Kaced, JC Moissinac - International Conference on Digital …, 2006 - ieeexplore.ieee.org
The heterogeneity of current terminals and networks leads to data transmission
disturbances, particularly with multimedia flows. Dynamic adaptation is a de facto solution …

Adaptive SSL: Design, implementation and overhead analysis

CJ Lamprecht, APA van Moorsel - … International Conference on …, 2007 - ieeexplore.ieee.org
Adaptive security is based on the observation that the security requirements of a system or
service heavily depend on the environment in which they operate and should therefore be …

On decomposition of structure element for mathematical morphology

G Wei - 9th International Conference on Pattern Recognition, 1988 - computer.org
The heterogeneity of current terminals and networks leads to data transmission
disturbances, particularly with multimedia flows. Dynamic adaptation is a de facto solution …

End-to-end secure delivery of scalable video streams

K Mokhtarian, M Hefeeda - … of the 18th international workshop on …, 2009 - dl.acm.org
We investigate the problem of securing the delivery of scalable video streams so that
receivers can ensure the authenticity (originality and integrity) of the video. Our focus is on …

[HTML][HTML] Technique for authenticating H. 264/SVC and its performance evaluation over wireless mobile networks

Y Zhao, SW Lo, RH Deng, X Ding - Journal of Computer and System …, 2014 - Elsevier
In this paper, a bit stream-based authentication scheme for H. 264/Scalable Video Coding
(SVC) is proposed. The proposed scheme seamlessly integrates cryptographic algorithms …

Multi-source stream authentication framework in case of composite MPEG-4 stream

T Li, H Zhu, Y Wu - … Security: 7th International Conference, ICICS 2005 …, 2005 - Springer
Multimedia community is moving from monolithic applications to more flexible and scalable
integrated solutions. Stream authentication is more complex since a stream may consist of …