TY - GEN
T1 - Mobile application security for video streaming authentication and data integrity combining digital signature and watermarking techniques
AU - Chessa, Stefano
AU - Di Pietro, Roberto
AU - Ferro, Erina
AU - Giunta, Gaetano
AU - Oligeri, Gabriele
PY - 2007
Y1 - 2007
N2 - Satellite link presents peculiar characteristics like no packet reordering and low bit error rate. In this paper we leverage these characteristics combined with watermarking techniques to propose a novel authentication algorithm for multicast video streaming. This algorithm combines a single digital signature with a hash chain pre-computed on the transmitter side; the hash chain is embedded in the video stream by means of a watermarking technique. Our proposal shows several interesting features: Authentication is enforced, as well as integrity of the received multicast stream; received blocks can be authenticated on the fly; no storage is required on the receiver side, except for the amount of memory needed to store a single hash; overhead computations required on the receiver sum up to single hash per block, while a digital signature verification is amortized over the whole received stream. Finally, note that the bandwidth overhead introduced is negligible, since the applied watermarking technique introduces virtually no modifications (at least, not recognizable by humans) on the original video stream pictures.
AB - Satellite link presents peculiar characteristics like no packet reordering and low bit error rate. In this paper we leverage these characteristics combined with watermarking techniques to propose a novel authentication algorithm for multicast video streaming. This algorithm combines a single digital signature with a hash chain pre-computed on the transmitter side; the hash chain is embedded in the video stream by means of a watermarking technique. Our proposal shows several interesting features: Authentication is enforced, as well as integrity of the received multicast stream; received blocks can be authenticated on the fly; no storage is required on the receiver side, except for the amount of memory needed to store a single hash; overhead computations required on the receiver sum up to single hash per block, while a digital signature verification is amortized over the whole received stream. Finally, note that the bandwidth overhead introduced is negligible, since the applied watermarking technique introduces virtually no modifications (at least, not recognizable by humans) on the original video stream pictures.
UR - https://www.scopus.com/pages/publications/34547271142
U2 - 10.1109/VETECS.2007.141
DO - 10.1109/VETECS.2007.141
M3 - Conference contribution
AN - SCOPUS:34547271142
SN - 1424402662
SN - 9781424402663
T3 - IEEE Vehicular Technology Conference
SP - 634
EP - 638
BT - 2007 IEEE 65th Vehicular Technology Conference - VTC2007-Spring
T2 - 2007 IEEE 65th Vehicular Technology Conference - VTC2007-Spring
Y2 - 22 April 2007 through 25 April 2007
ER -