Abstract
In this paper, we propose a novel lightweight approximate authentication algorithm that provides efficient protection for wireless video streaming where attacks on the stream are possible, but classical integrity protection algorithms are impractical because bit errors occur naturally. The benefits of the proposed algorithm over other algorithms are fast execution and small message authentication code size. Moreover, the approximate authentication supports error resilient video decoding by dropping seriously damaged packets, thus improving the perceived quality of the video stream. The performance of the algorithm is demonstrated via numerical analysis, simulations and measurements over modeled and real wireless channels.
Similar content being viewed by others
References
Wang, Y., Wenger, S., Wen, J.T., Katsaggelos, A.K.: Review of error resilient coding techniques for real-time video communications. IEEE Signal Process Mag. 17(4), 61–82 (2000)
Ferugson, N.: Michael: an improved MIC for 802.11 WEP. IEEE 802.11 doc. 02-020r0, January 2002
Wi-Fi Alliance: Wi-Fi protected access: strong, standards-based, interoperable security for today’s Wi-Fi networks, April 2003
Graveman, R.F., Fu, K.E.: Approximate message authentication codes. In: Proceedings of the 3rd Annual Fedlab Symposium on Advanced Telecommunications/Information Distribution, US Army Research Labs, Adelphi, MD, February 1999
Gravemen, R., Fu, K.: Approximate image authentication codes. In: Proceedings of the 3rd Annual Symposium on Advanced Telecommunications and Information Distribution Research Program (ATIRP), College Park, MD (1999)
Gravemen, R., Xie, L., Arce, G.R.: Approximate image authentication codes. In: Proceedings of the 4th Annual Symposium on Advanced Telecommunications and Information Distribution Research Program (ATIRP), College Park, MD, 2–4 February 2000
Xie, L., Arce, G.R.: Approximate message authentication code. IEEE Trans. Image Process. 3(2), 242–252 (2002)
Crescenzo, G.D., Braveman, R., Arce, G.R., Ge, R.: A formal security analysis of approximate message authentication codes. In: Proceedings of CTA Communications and Networks, College Park, MD, April 2003, pp. 217–221
Ge, R., Arce, G.R., Crescenzo, G.D.: Approximate message authentication codes for n-ary alphabets. IEEE Trans. Signal Process. 1(1), 56–57 (2004)
Boncelet, C.G.: The NTMAC for authentication of noisy messages. IEEE Trans. Inf. Forensics Secur. 1(1), 35–42 (2006)
Boncelet, C.: The NTMAC for noisy message authentication. In: Proceedings of the 2003 ARL Annual Symposium on Communications and Networks, College Park, MD, April 2003
Liu, Y., Boncelet, C.: The CRC-NTMAC for noisy message authentication. In: Proceedings of the Military Communication Conference 2005, Atlantic City, NJ, 17–20 October 2005
Liu, Y., Boncelet, C.: The BCH-NTMAC for noisy message authentication. In: Proceedings of the 40th Annual Conference on Information Sciences and Systems, Princeton, NJ, 22–24 March 2006
Xiao, S., Boncelet, C.: Efficient noise-tolerant message authentication codes using direct sequence spread spectrum technique. In: Proceedings of the 40th Annual Conference on Information Sciences and Systems, Princeton, NJ, 22–24 March 2006
Chen, M., He, Y., Lagendijk, R.L.: A fragile watermark error detection scheme for wireless video communications. IEEE Trans. Multimed. 7(2), 201–211 (2005)
National Institute of Standards and Technology: Advanced encryption standard (AES), November 2001
Schneier, B.: Applied Cryptography: Protocols, Algorithms and Source Code in C, 2nd ed. Wiley, New York (1996)
Wiegand, T., Sullivan, G.J., Bjøntegaard, G., Luthra, A.: Overview of the H.264/AVC video coding standard. IEEE Trans. Circuits Syst. Video Technol. 13, 560–576 (2003)
Kumar S., et al.: Overview of error resiliency schemes in H.264/AVC standard. JVCIR, Special Issue on H.264/AVC, vol. 17, June–August 2005
PHOENIX project, Jointly optimising multimedia transmissions in IP based wireless networks, EU FP6 IST-001812. http://www.ist-phoenix.org
Joint verification model for H.264 (JM 10.1). http://iphome.hhi.de/suehring/tml (November 2005)
Lamy-Bergot, C., Chautru, N., Bergeron, C.: Unequal error protection for H.263+ bitstreams over a wireless IP network. In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP’06), pp. V-377/V-380, Toulouse, France, May 2006
Gilbert, E.N.: Capacity of a burst-noise channel. BellSyst. Tech. J. 39, 1253–1265 (1960)
Elliot, E.O.: Estimates of error rates for codes on burst-noise channels. BellSyst. Tech. J. 42, 1977–1997 (1963)
Willig, A., Kubisch, M., Hoene, C., Wolisz, A.: Measurements of a wireless link in an industrial environment using an IEEE 802.11-compliant physical layer. IEEE Trans. Industrial Electronics 49(6), 1265–1282 (2002)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Fehér, G., Oláh, I. Enhancing wireless video streaming using lightweight approximate authentication. Multimedia Systems 14, 167–177 (2008). https://doi.org/10.1007/s00530-008-0122-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00530-008-0122-4