Skip to main content
Log in

Enhancing wireless video streaming using lightweight approximate authentication

  • Regular Paper
  • Published:
Multimedia Systems Aims and scope Submit manuscript

Abstract

In this paper, we propose a novel lightweight approximate authentication algorithm that provides efficient protection for wireless video streaming where attacks on the stream are possible, but classical integrity protection algorithms are impractical because bit errors occur naturally. The benefits of the proposed algorithm over other algorithms are fast execution and small message authentication code size. Moreover, the approximate authentication supports error resilient video decoding by dropping seriously damaged packets, thus improving the perceived quality of the video stream. The performance of the algorithm is demonstrated via numerical analysis, simulations and measurements over modeled and real wireless channels.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Wang, Y., Wenger, S., Wen, J.T., Katsaggelos, A.K.: Review of error resilient coding techniques for real-time video communications. IEEE Signal Process Mag. 17(4), 61–82 (2000)

    Article  Google Scholar 

  2. Ferugson, N.: Michael: an improved MIC for 802.11 WEP. IEEE 802.11 doc. 02-020r0, January 2002

  3. Wi-Fi Alliance: Wi-Fi protected access: strong, standards-based, interoperable security for today’s Wi-Fi networks, April 2003

  4. Graveman, R.F., Fu, K.E.: Approximate message authentication codes. In: Proceedings of the 3rd Annual Fedlab Symposium on Advanced Telecommunications/Information Distribution, US Army Research Labs, Adelphi, MD, February 1999

  5. Gravemen, R., Fu, K.: Approximate image authentication codes. In: Proceedings of the 3rd Annual Symposium on Advanced Telecommunications and Information Distribution Research Program (ATIRP), College Park, MD (1999)

  6. Gravemen, R., Xie, L., Arce, G.R.: Approximate image authentication codes. In: Proceedings of the 4th Annual Symposium on Advanced Telecommunications and Information Distribution Research Program (ATIRP), College Park, MD, 2–4 February 2000

  7. Xie, L., Arce, G.R.: Approximate message authentication code. IEEE Trans. Image Process. 3(2), 242–252 (2002)

    Google Scholar 

  8. Crescenzo, G.D., Braveman, R., Arce, G.R., Ge, R.: A formal security analysis of approximate message authentication codes. In: Proceedings of CTA Communications and Networks, College Park, MD, April 2003, pp. 217–221

  9. Ge, R., Arce, G.R., Crescenzo, G.D.: Approximate message authentication codes for n-ary alphabets. IEEE Trans. Signal Process. 1(1), 56–57 (2004)

    Google Scholar 

  10. Boncelet, C.G.: The NTMAC for authentication of noisy messages. IEEE Trans. Inf. Forensics Secur. 1(1), 35–42 (2006)

    Article  Google Scholar 

  11. Boncelet, C.: The NTMAC for noisy message authentication. In: Proceedings of the 2003 ARL Annual Symposium on Communications and Networks, College Park, MD, April 2003

  12. Liu, Y., Boncelet, C.: The CRC-NTMAC for noisy message authentication. In: Proceedings of the Military Communication Conference 2005, Atlantic City, NJ, 17–20 October 2005

  13. Liu, Y., Boncelet, C.: The BCH-NTMAC for noisy message authentication. In: Proceedings of the 40th Annual Conference on Information Sciences and Systems, Princeton, NJ, 22–24 March 2006

  14. Xiao, S., Boncelet, C.: Efficient noise-tolerant message authentication codes using direct sequence spread spectrum technique. In: Proceedings of the 40th Annual Conference on Information Sciences and Systems, Princeton, NJ, 22–24 March 2006

  15. Chen, M., He, Y., Lagendijk, R.L.: A fragile watermark error detection scheme for wireless video communications. IEEE Trans. Multimed. 7(2), 201–211 (2005)

    Article  Google Scholar 

  16. National Institute of Standards and Technology: Advanced encryption standard (AES), November 2001

  17. Schneier, B.: Applied Cryptography: Protocols, Algorithms and Source Code in C, 2nd ed. Wiley, New York (1996)

    MATH  Google Scholar 

  18. Wiegand, T., Sullivan, G.J., Bjøntegaard, G., Luthra, A.: Overview of the H.264/AVC video coding standard. IEEE Trans. Circuits Syst. Video Technol. 13, 560–576 (2003)

    Article  Google Scholar 

  19. Kumar S., et al.: Overview of error resiliency schemes in H.264/AVC standard. JVCIR, Special Issue on H.264/AVC, vol. 17, June–August 2005

  20. PHOENIX project, Jointly optimising multimedia transmissions in IP based wireless networks, EU FP6 IST-001812. http://www.ist-phoenix.org

  21. Joint verification model for H.264 (JM 10.1). http://iphome.hhi.de/suehring/tml (November 2005)

  22. Lamy-Bergot, C., Chautru, N., Bergeron, C.: Unequal error protection for H.263+ bitstreams over a wireless IP network. In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP’06), pp. V-377/V-380, Toulouse, France, May 2006

  23. Gilbert, E.N.: Capacity of a burst-noise channel. BellSyst. Tech. J. 39, 1253–1265 (1960)

    Google Scholar 

  24. Elliot, E.O.: Estimates of error rates for codes on burst-noise channels. BellSyst. Tech. J. 42, 1977–1997 (1963)

    Google Scholar 

  25. Willig, A., Kubisch, M., Hoene, C., Wolisz, A.: Measurements of a wireless link in an industrial environment using an IEEE 802.11-compliant physical layer. IEEE Trans. Industrial Electronics 49(6), 1265–1282 (2002)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gábor Fehér.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Fehér, G., Oláh, I. Enhancing wireless video streaming using lightweight approximate authentication. Multimedia Systems 14, 167–177 (2008). https://doi.org/10.1007/s00530-008-0122-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00530-008-0122-4

Keywords

Navigation