Authentication of scalable multimedia streams

Mohamed Hefeeda, Kianoosh Mokhtarian

Research output: Chapter in Book/Report/Conference proceedingChapter

3 Citations (Scopus)

Abstract

Multimedia services such as Internet streaming and video conferencing are increasingly getting very popular among all sectors of society and all ages. Many users rely on these services for activities related to their work, education, and entertainment. Users typically receive multimedia content over open network channels, where malicious attackers could potentially intercept and manipulate such content for political, financial or other reasons. Therefore, ensuring the authenticity of received multimedia streams is clearly an important problem. This chapter first proposes a set of requirements that an authentication scheme designed for multimedia streams should meet. It then surveys the most important schemes in the literature for authenticating non-scalable as well as scalable multimedia streams. Unlike non-scalable streams, scalable streams provide flexible adaptation to accommodate the dynamic network conditions and the diversity of receiving devices. Moreover, the chapter presents a qualitative comparison among the presented schemes using the proposed set of requirements, and it outlines potential directions for future research on authentication of multimedia streams.

Original languageEnglish
Title of host publicationHandbook of Security and Networks
PublisherWorld Scientific Publishing Co.
Pages93-126
Number of pages34
ISBN (Print)9789814273046, 9789814273039
DOIs
Publication statusPublished - 1 Jan 2011
Externally publishedYes

Fingerprint

Authentication
Video conferencing
Multimedia services
Education
Internet

ASJC Scopus subject areas

  • Computer Science(all)

Cite this

Hefeeda, M., & Mokhtarian, K. (2011). Authentication of scalable multimedia streams. In Handbook of Security and Networks (pp. 93-126). World Scientific Publishing Co.. https://doi.org/10.1142/9789814273046_0004

Authentication of scalable multimedia streams. / Hefeeda, Mohamed; Mokhtarian, Kianoosh.

Handbook of Security and Networks. World Scientific Publishing Co., 2011. p. 93-126.

Research output: Chapter in Book/Report/Conference proceedingChapter

Hefeeda, M & Mokhtarian, K 2011, Authentication of scalable multimedia streams. in Handbook of Security and Networks. World Scientific Publishing Co., pp. 93-126. https://doi.org/10.1142/9789814273046_0004
Hefeeda M, Mokhtarian K. Authentication of scalable multimedia streams. In Handbook of Security and Networks. World Scientific Publishing Co. 2011. p. 93-126 https://doi.org/10.1142/9789814273046_0004
Hefeeda, Mohamed ; Mokhtarian, Kianoosh. / Authentication of scalable multimedia streams. Handbook of Security and Networks. World Scientific Publishing Co., 2011. pp. 93-126
@inbook{c6b2c7150e7845e497dcd062c7eafe3d,
title = "Authentication of scalable multimedia streams",
abstract = "Multimedia services such as Internet streaming and video conferencing are increasingly getting very popular among all sectors of society and all ages. Many users rely on these services for activities related to their work, education, and entertainment. Users typically receive multimedia content over open network channels, where malicious attackers could potentially intercept and manipulate such content for political, financial or other reasons. Therefore, ensuring the authenticity of received multimedia streams is clearly an important problem. This chapter first proposes a set of requirements that an authentication scheme designed for multimedia streams should meet. It then surveys the most important schemes in the literature for authenticating non-scalable as well as scalable multimedia streams. Unlike non-scalable streams, scalable streams provide flexible adaptation to accommodate the dynamic network conditions and the diversity of receiving devices. Moreover, the chapter presents a qualitative comparison among the presented schemes using the proposed set of requirements, and it outlines potential directions for future research on authentication of multimedia streams.",
author = "Mohamed Hefeeda and Kianoosh Mokhtarian",
year = "2011",
month = "1",
day = "1",
doi = "10.1142/9789814273046_0004",
language = "English",
isbn = "9789814273046",
pages = "93--126",
booktitle = "Handbook of Security and Networks",
publisher = "World Scientific Publishing Co.",

}

TY - CHAP

T1 - Authentication of scalable multimedia streams

AU - Hefeeda, Mohamed

AU - Mokhtarian, Kianoosh

PY - 2011/1/1

Y1 - 2011/1/1

N2 - Multimedia services such as Internet streaming and video conferencing are increasingly getting very popular among all sectors of society and all ages. Many users rely on these services for activities related to their work, education, and entertainment. Users typically receive multimedia content over open network channels, where malicious attackers could potentially intercept and manipulate such content for political, financial or other reasons. Therefore, ensuring the authenticity of received multimedia streams is clearly an important problem. This chapter first proposes a set of requirements that an authentication scheme designed for multimedia streams should meet. It then surveys the most important schemes in the literature for authenticating non-scalable as well as scalable multimedia streams. Unlike non-scalable streams, scalable streams provide flexible adaptation to accommodate the dynamic network conditions and the diversity of receiving devices. Moreover, the chapter presents a qualitative comparison among the presented schemes using the proposed set of requirements, and it outlines potential directions for future research on authentication of multimedia streams.

AB - Multimedia services such as Internet streaming and video conferencing are increasingly getting very popular among all sectors of society and all ages. Many users rely on these services for activities related to their work, education, and entertainment. Users typically receive multimedia content over open network channels, where malicious attackers could potentially intercept and manipulate such content for political, financial or other reasons. Therefore, ensuring the authenticity of received multimedia streams is clearly an important problem. This chapter first proposes a set of requirements that an authentication scheme designed for multimedia streams should meet. It then surveys the most important schemes in the literature for authenticating non-scalable as well as scalable multimedia streams. Unlike non-scalable streams, scalable streams provide flexible adaptation to accommodate the dynamic network conditions and the diversity of receiving devices. Moreover, the chapter presents a qualitative comparison among the presented schemes using the proposed set of requirements, and it outlines potential directions for future research on authentication of multimedia streams.

UR - http://www.scopus.com/inward/record.url?scp=84891961495&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84891961495&partnerID=8YFLogxK

U2 - 10.1142/9789814273046_0004

DO - 10.1142/9789814273046_0004

M3 - Chapter

SN - 9789814273046

SN - 9789814273039

SP - 93

EP - 126

BT - Handbook of Security and Networks

PB - World Scientific Publishing Co.

ER -