Analysis of authentication schemes for nonscalable video streams

Mohamed Hefeeda, Kianoosh Mokhtarian

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The problem of multimedia stream authentication has received significant attention by previous works and various solutions have been proposed. These solutions, however, have not been rigorously analyzed and contrasted to each other, and thus their relative suitability for different streaming environments is not clear. In this paper, we conduct comprehensive analysis and comparison among the main authentication schemes proposed in the literature. To perform this analysis, we propose five performance metrics: computation cost, communication overhead, receiver buffer size, delay, and tolerance to packet losses. We derive analytic formulas for these metrics for all schemes, and we numerically analyze these formulas. In addition, we implement all schemes in a simulator to study their performance in different environments. Our detailed analysis reveals the merits and shortcomings of each scheme and provides guidelines on choosing the most appropriate scheme for a given application. Our analysis also helps in designing new authentication schemes and/or improving existing ones.

Original languageEnglish
Title of host publication2009 17th International Packet Video Workshop, PV 2009
DOIs
Publication statusPublished - 2 Nov 2009
Externally publishedYes
Event2009 17th International Packet Video Workshop, PV 2009 - Seattle, WA, United States
Duration: 11 May 200912 May 2009

Other

Other2009 17th International Packet Video Workshop, PV 2009
CountryUnited States
CitySeattle, WA
Period11/5/0912/5/09

Fingerprint

Authentication
Packet loss
Simulators
Communication
Costs

Keywords

  • Multimedia authentication
  • Multimedia security
  • Secure streaming

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Cite this

Hefeeda, M., & Mokhtarian, K. (2009). Analysis of authentication schemes for nonscalable video streams. In 2009 17th International Packet Video Workshop, PV 2009 [5152157] https://doi.org/10.1109/PACKET.2009.5152157

Analysis of authentication schemes for nonscalable video streams. / Hefeeda, Mohamed; Mokhtarian, Kianoosh.

2009 17th International Packet Video Workshop, PV 2009. 2009. 5152157.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hefeeda, M & Mokhtarian, K 2009, Analysis of authentication schemes for nonscalable video streams. in 2009 17th International Packet Video Workshop, PV 2009., 5152157, 2009 17th International Packet Video Workshop, PV 2009, Seattle, WA, United States, 11/5/09. https://doi.org/10.1109/PACKET.2009.5152157
Hefeeda M, Mokhtarian K. Analysis of authentication schemes for nonscalable video streams. In 2009 17th International Packet Video Workshop, PV 2009. 2009. 5152157 https://doi.org/10.1109/PACKET.2009.5152157
Hefeeda, Mohamed ; Mokhtarian, Kianoosh. / Analysis of authentication schemes for nonscalable video streams. 2009 17th International Packet Video Workshop, PV 2009. 2009.
@inproceedings{0eb2d043e4c142b19b42b51534493065,
title = "Analysis of authentication schemes for nonscalable video streams",
abstract = "The problem of multimedia stream authentication has received significant attention by previous works and various solutions have been proposed. These solutions, however, have not been rigorously analyzed and contrasted to each other, and thus their relative suitability for different streaming environments is not clear. In this paper, we conduct comprehensive analysis and comparison among the main authentication schemes proposed in the literature. To perform this analysis, we propose five performance metrics: computation cost, communication overhead, receiver buffer size, delay, and tolerance to packet losses. We derive analytic formulas for these metrics for all schemes, and we numerically analyze these formulas. In addition, we implement all schemes in a simulator to study their performance in different environments. Our detailed analysis reveals the merits and shortcomings of each scheme and provides guidelines on choosing the most appropriate scheme for a given application. Our analysis also helps in designing new authentication schemes and/or improving existing ones.",
keywords = "Multimedia authentication, Multimedia security, Secure streaming",
author = "Mohamed Hefeeda and Kianoosh Mokhtarian",
year = "2009",
month = "11",
day = "2",
doi = "10.1109/PACKET.2009.5152157",
language = "English",
isbn = "9781424446520",
booktitle = "2009 17th International Packet Video Workshop, PV 2009",

}

TY - GEN

T1 - Analysis of authentication schemes for nonscalable video streams

AU - Hefeeda, Mohamed

AU - Mokhtarian, Kianoosh

PY - 2009/11/2

Y1 - 2009/11/2

N2 - The problem of multimedia stream authentication has received significant attention by previous works and various solutions have been proposed. These solutions, however, have not been rigorously analyzed and contrasted to each other, and thus their relative suitability for different streaming environments is not clear. In this paper, we conduct comprehensive analysis and comparison among the main authentication schemes proposed in the literature. To perform this analysis, we propose five performance metrics: computation cost, communication overhead, receiver buffer size, delay, and tolerance to packet losses. We derive analytic formulas for these metrics for all schemes, and we numerically analyze these formulas. In addition, we implement all schemes in a simulator to study their performance in different environments. Our detailed analysis reveals the merits and shortcomings of each scheme and provides guidelines on choosing the most appropriate scheme for a given application. Our analysis also helps in designing new authentication schemes and/or improving existing ones.

AB - The problem of multimedia stream authentication has received significant attention by previous works and various solutions have been proposed. These solutions, however, have not been rigorously analyzed and contrasted to each other, and thus their relative suitability for different streaming environments is not clear. In this paper, we conduct comprehensive analysis and comparison among the main authentication schemes proposed in the literature. To perform this analysis, we propose five performance metrics: computation cost, communication overhead, receiver buffer size, delay, and tolerance to packet losses. We derive analytic formulas for these metrics for all schemes, and we numerically analyze these formulas. In addition, we implement all schemes in a simulator to study their performance in different environments. Our detailed analysis reveals the merits and shortcomings of each scheme and provides guidelines on choosing the most appropriate scheme for a given application. Our analysis also helps in designing new authentication schemes and/or improving existing ones.

KW - Multimedia authentication

KW - Multimedia security

KW - Secure streaming

UR - http://www.scopus.com/inward/record.url?scp=70350389342&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=70350389342&partnerID=8YFLogxK

U2 - 10.1109/PACKET.2009.5152157

DO - 10.1109/PACKET.2009.5152157

M3 - Conference contribution

AN - SCOPUS:70350389342

SN - 9781424446520

BT - 2009 17th International Packet Video Workshop, PV 2009

ER -