Abstract
Multimedia streaming service has been growing rapidly. The content authentication for multimedia streams is an important issue. Several content authentication schemes for multimedia streams have been developed. However, the developed authentication schemes do not allow modification of the content after authentication material is generated. Multimedia content producers and streaming service providers are different in many cases. Multimedia content is produced by the content producer and streaming service is performed by the streaming service provider. The authentication material of the content is generated by the content producer. The content producer may allow the streaming service provider to modify certain parts of the content after the authentication material is generated. We propose a content authentication scheme for multimedia streams in this paper. The proposed scheme allows modification of specific parts of the content by the streaming service provider after the authentication material is generated.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Silberschatz, Galvin, Gagne: Operating System Concepts, 8th edn. Wiley (2008)
Gennaro, R., Rohatgi, P.: How to Sign Digital Streams. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 180–197. Springer, Heidelberg (1997)
Golle, P., Modagudu, N.: Authenticating streamed data in the presence of random packet loss. In: NDSS 2001, pp. 13–22 (2001)
Zhang, Z., Sun, Q., Wong, W.: A Proposal of butterfly-graph based stream authentication over lossy networks. In: ICME 2005, pp. 784–787 (2005)
Hefeeda, M., Mokhtarian, K.: Authentication Schemes for Multimedia Streams: Quantitative Analysis and Comparison. ACM Tran. Multimedia Communications and Applications 6(1), Article 6 (2010)
Digital Signature Standard, FIPS 186, NIST (1994)
Secure Hash Standard, FIPS 180-1, NIST (1995)
Ateniese, G., de Medeiros, B.: On the Key Exposure Problem in Chameleon Hashes. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 165–179. Springer, Heidelberg (2005)
Ateniese, G., Chou, D.H., de Medeiros, B., Tsudik, G.: Sanitizable Signatures. In: de Capitani di Vimercati, S., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 159–177. Springer, Heidelberg (2005)
Brzuska, C., Fischlin, M., Freudenreich, T., Lehmann, A., Page, M., Schelbert, J., Schröder, D., Volk, F.: Security of Sanitizable Signatures Revisited. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 317–336. Springer, Heidelberg (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Joo, H. (2011). Content Authentication Scheme for Modifiable Multimedia Streams. In: Kim, Th., et al. Multimedia, Computer Graphics and Broadcasting. MulGraB 2011. Communications in Computer and Information Science, vol 262. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27204-2_45
Download citation
DOI: https://doi.org/10.1007/978-3-642-27204-2_45
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27203-5
Online ISBN: 978-3-642-27204-2
eBook Packages: Computer ScienceComputer Science (R0)