Content-aware authentication of motion JPEG2000 stream in lossy networks
نویسندگان
چکیده
—Stream authentication schemes (SAS) aim to achieve effective authentication of multicast streams over lossy networks. Almost all of the existing SASs are designed for stream data integrity protection only. In this paper, we argue that content integrity protection is more important than data integrity to human users. We present a content-aware SAS in Motion JPEG2000 streaming. In our scheme, a chunk of JPEG2000 codestreams is encapsulated into a block of packets using Multiple Description Coding (MDC). Our MDC exploits the inherent structure of Motion JPEG2000 codectreams and is used to preserve the semanteme/content of the stream over lossy networks. To achieve robust authentication, we encode digital signature and other integrity tokens with Forward Erasure Code against packet losses. The experiment result demonstrates that our proposed scheme allows for effective content authentication of Motion JPEF2000 streaming.
منابع مشابه
A PROPOSAL OF BUTTERFLY−GRAPH BASED STREAM AUTHENTICATION OVER LOSSY NETWORKS (WedPmOR6)
In this paper, we propose a butterfly−graph based stream authentication scheme for lossy networks where the streaming packets could be lost in both random and burst ways. Due to the nice properties of butterfly graph, the proposed scheme is quite robust and efficient. Theoretical analysis and simulation results show that the proposed scheme outperforms existing schemes in terms of overhead and ...
متن کاملError-Resilient Scalable Video over the Internet
This paper presents an efficient method for the transmission of scalable video with error resilience over the Internet. We developed a Motion-JPEG2000-based software tool, called stream scaler, which can control the resolution levels and quality layers of codestreams to be adapted to end-user device requirements and to different bandwidth capacities. To analyze the performance of the stream sca...
متن کاملHyperspectral Image Compression Using Three-Dimensional Wavelet Coding: A Lossy-to-Lossless Solution†
We propose an embedded, block-based, image wavelet transform coding algorithm of low complexity. The embedded coding of Set Partitioned Embedded bloCK (SPECK) algorithm is modified and extended to three dimensions. The resultant algorithm, three-Dimensional Set Partitioned Embedded bloCK (3D-SPECK), efficiently encodes 3D volumetric image data by exploiting the dependencies in all dimensions. 3...
متن کاملEvaluation of Watermark Robustness to JPEG2000 Based Content Adaptation Attacks
Bit streams of scalable coded media are adapted at various nodes in multimedia usage chains to cater the variations in network bandwidths, display device resolutions and resources and usage preferences. This is achieved by extracting the most relevant segments from the scalable coded bit stream corresponding to the quality-resolution requirements. Such adaptations can affect the watermarking in...
متن کاملCompliant Asymmetric Authenticated Encryption Scheme for JPEG2000 Code-streams
The JPEG2000 syntax requires that any two consecutive bytes in the encrypted packet body should not be larger than 0xFF8F. This stringent requirement has plagued researchers for a few years. In this paper, we present a novel secure encryption and authentication scheme for JPEG2000 code-streams, which does not introduce superfluous JPEG2000 markers in the protected code-stream. The scheme achiev...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IEEE Trans. Consumer Electronics
دوره 49 شماره
صفحات -
تاریخ انتشار 2003