skip to main content
research-article

A joint layered scheme for reliable and secure mobile JPEG-2000 streaming

Published: 06 August 2012 Publication History

Abstract

This article presents a novel joint layered approach to simultaneously achieve both reliable and secure mobile JPEG-2000 image streaming. With a priori knowledge of JPEG-2000 source coding and channel coding, the proposed joint system integrates authentication into the media error protection components to ensure that every source-decodable media unit is authenticated. By such a dedicated design, the proposed scheme protects both compressed JPEG-2000 codestream and the authentication data from wireless channel impairments. It is fundamentally different from many existing systems that consider the problem of media authentication separately from the other operations in the media transmission system. By utilizing the contextual relationship, such as coding dependency and content importance between media slices for authentication hash appending, the proposed scheme generates an extremely low authentication overhead. Under this joint layered coding framework, an optimal rate allocation algorithm for source coding, channel coding, and media authentication is developed to guarantee end-to-end media quality. Experiment results on JPEG-2000 images validate the proposed scheme and demonstrate that the performance of the proposed scheme is approaching its upper bound, in which case no authentication is applied to the media stream.

References

[1]
Ababneh, S., Ansari, R., and Khokhar, A. 2009. Compensated signature embedding for multimedia content authentication. J. Data Inf. Qual. 1, 3.
[2]
Albanese, A., Blomer, J., Edmonds, J., Luby, M., and Sudan, M. 1996. Priority encoding transmission. IEEE Trans Information Theory 42, 6, 1737--1744.
[3]
Cai, H., Zeng, B., Shen, G., Xiong Z., and Li, S. 2006. Error-resilient unequal error protection of fine granularity scalable video bitstreams. EURASIP J. Appl. Sig. Proc. 1--11.
[4]
Deng, R. H. and Yang, Y. 2009. A study of content authentication in proxy-enabled multimedia delivery systems: Model, techniques and applications. ACM Trans. Multimedia Comput. Commun. Appl., 5, 4, Article 28.
[5]
Gennaro, R. and Rohatgi, P. 1997. How to sign digital streams. In Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology. 180--197.
[6]
Hefeeda, M. and Mokhtarian, K. 2010. Auhentication schemes for multimedia streams: Quantitative analysis and comparison. ACM Trans. Multimed. Comput. Commun. Appl. 6, 1.
[7]
Huang, Y. and Apostolopoulos, J. G. 2006. Making packet erasures to improve quality of FEC-protected video. In Proceedings of the IEEE International Conference on Image Processing (ICIP'06), 1685--1688.
[8]
ITU Rec. T.800-2000. Information Technology -- JPEG-2000 Image Coding System, ISO/IEC International Standard 15444-1 2000, ITU Rec. T. 800.
[9]
Li, Z., Sun, Q., Lian, Y., and Chen, C. W. 2007. Joint source-channel-authentication resource allocation and unequal authenticity protection for multimedia over wireless networks, IEEE Trans. Multimed. 9, 4, 837--850.
[10]
Lin, C.-Y. and Chang, S.-F. 2001. A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans. Circ. Syst. Video Tech. 11, 2, 153--168.
[11]
Lu, C. S. and Liao, H. Y. M. 2003. Structure digital signature for image authentication: An incidental distortion resistant scheme. IEEE Trans. Multimed. 5, 2, 161--173.
[12]
Merkle, R. 1980. Protocols for public key cryptosystems. In Proceedings of the IEEE Symposium on Research in Security and Privacy. 122--134.
[13]
Merkle, R. C. 1989. A certified digital signature. In Proceedings of Advances in Cryptology. 218--238.
[14]
Mohanty, S. P. and Bhargava, B. K. 2008. Invisible watermarking based on creation and robust insertion-extraction of image adaptive watermarks. ACM Trans. Multimedia Comput. Commun. Appl. 5, 2.
[15]
Mohr, A., Ladner, R., and Riskin, E. 2000. Approximately optimal assignment for unequal loss protection. In Proceedings of the IEEE International Conference on Image Proceedings. 367--370.
[16]
Ortega, A. and Ramchandran, K. 1998. Rate-distortion methods for image and video compression. IEEE Signal Processing Mag. 15, 6, 23--50.
[17]
Pannetrat, A. and Molva, R. 2003. Efficient multicast packet authentication. In Proceedings of the Network and Distributed Systems Security Symposium (NDSS'03).
[18]
Park, J., Chong, E., and Siegel, H. 2003. Efficient multicast stream authentication using erasure codes. ACM Trans. Inf. Syst. Security 6, 2, 258--285.
[19]
Park, Y. and Cho, Y. 2004. The eSAIDA stream authentication scheme. In Proceedings of the International Conference on Computational Science and Its Applications (ICCSA'04). Lecture Notes in Computer Science, vol. 3046, Springer, 799--807.
[20]
Peng, C., Deng, R., Wu, Y., and Shao, W. 2003. A flexible and scalable authentication scheme for JPEG-2000 image codestreams. In Proceedings of the ACM International Conference on Multimedia. 433--441.
[21]
Perrig, A., Canetti, R., Tygar J., and Song, D. 2000. Efficient authentication and signing of multicast streams over lossy channels. In Proceedings of the IEEE Symposium on Security and Privacy. 56--73.
[22]
Sachs, D. G., Anand, R., and Ramchandran, K. 2000. Wireless image transmission using multiple-description based concatenated code. In Proceedings of Data Compression Conference (DCC'00). 569.
[23]
Schlauweg, M., Profrock, D., and Muller, E. 2006. JPEG2000-based secure image authentication. In Proceedings of the Workshop on Multimedia and Security. 62--67.
[24]
Sun, Q., Apostolopoulos, J., Chen, C. W., and Chang, S.-F. 2008. Quality-optimized and secure end-to-end authentication for media delivery. Proc. IEEE 96, 1, (Jan'08 98--111).
[25]
Sun, Q., Chang, S.-F., and Kurato, M. 2002. A quantitative semi-fragile JPEG2000 image authentication system. In Proceedings of the IEEE International Conference on Image Processing. 921--924.
[26]
Sun, Q., Ye, S., Lin, C.-Y., and Chang, S.-F. 2005. A crypto signature scheme for image authentication over wireless channel. Int. J. Image Graph. 5, 1.
[27]
Thie, J. and Taubman, D. 2004. Optimal erasure protection assignment for scalable compressed data with small channel packets and short channel code-words. EURASIP J. Appl. Sign. Proc. 207--219.
[28]
Zhang, Z., Qiu, G., Sun, Q., Lin, X., Ni, Z., and Shi, Y. Q. 2004. A unified authentication framework for JPEG2000. In Proceedings of the IEEE International Conference on Multimedia and Expo. 915--918.
[29]
Zhang, Z., Sun, Q., Wong, W., Apostolopoulos, J., and Wee, S. 2007. An optimized content-aware authentication scheme for streaming JPEG-2000 images over lossy networks. IEEE Trans. Multimed. 9, 2, 320--331.
[30]
Zhang, Z., Sun, Q., and Wong, W. 2005. A proposal of butterfly-graph based stream authentication over lossy networks. In Proceedings of the IEEE International Conference on Multimedia and Expo. 784--787.
[31]
Zhu, X., Zhang, Z., Li, Z., and Sun, Q. 2007. Flexible layered authentication graph for multimedia streaming. In Proceedings of the IEEE International Workshop on Multimedia Signal Processing. 349--352.
[32]
Zhu, X., Sun, Q. Zhang, Z., and Chen, C. W. 2008. A joint ECC based media error and authentication protection scheme. In Proceedings of the IEEE International Conference on Multimedia and Expo (ICME'08). 13--16.
[33]
Zhu, X., Zhang, Z., and Chen, C. W. 2009. A joint layered coding scheme for unified reliable and secure media transmission with implementation on JPEG-2000 Images. In Proceedings of the IEEE International Conference on Multimedia and Expo (ICME'09). 710--717.

Cited By

View all
  • (2022)Joint Source-Channel Decoding of Polar Codes for HEVC-Based Video StreamingACM Transactions on Multimedia Computing, Communications, and Applications10.1145/350220818:4(1-23)Online publication date: 4-Mar-2022
  • (2016)A Joint Source-Channel Adaptive Scheme for Wireless H.264/AVC Video AuthenticationIEEE Transactions on Information Forensics and Security10.1109/TIFS.2015.248136611:1(141-153)Online publication date: Jan-2016
  • (2014)Sensors with lasersProceedings of the 13th international symposium on Information processing in sensor networks10.5555/2602339.2602368(261-272)Online publication date: 15-Apr-2014
  • Show More Cited By

Index Terms

  1. A joint layered scheme for reliable and secure mobile JPEG-2000 streaming

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Transactions on Multimedia Computing, Communications, and Applications
      ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 8, Issue 3
      July 2012
      143 pages
      ISSN:1551-6857
      EISSN:1551-6865
      DOI:10.1145/2240136
      Issue’s Table of Contents
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 06 August 2012
      Accepted: 01 May 2011
      Revised: 01 March 2011
      Received: 01 November 2010
      Published in TOMM Volume 8, Issue 3

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Multimedia authentication
      2. authentication schemes
      3. communication system security
      4. error correction coding
      5. mobile media communication
      6. streaming authentication

      Qualifiers

      • Research-article
      • Research
      • Refereed

      Funding Sources

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)1
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 01 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2022)Joint Source-Channel Decoding of Polar Codes for HEVC-Based Video StreamingACM Transactions on Multimedia Computing, Communications, and Applications10.1145/350220818:4(1-23)Online publication date: 4-Mar-2022
      • (2016)A Joint Source-Channel Adaptive Scheme for Wireless H.264/AVC Video AuthenticationIEEE Transactions on Information Forensics and Security10.1109/TIFS.2015.248136611:1(141-153)Online publication date: Jan-2016
      • (2014)Sensors with lasersProceedings of the 13th international symposium on Information processing in sensor networks10.5555/2602339.2602368(261-272)Online publication date: 15-Apr-2014
      • (2014)Mobile Video Perception: New Insights and Adaptation StrategiesIEEE Journal of Selected Topics in Signal Processing10.1109/JSTSP.2014.23134568:3(390-401)Online publication date: Jun-2014
      • (2013)Secure randomized image watermarking based on singular value decompositionACM Transactions on Multimedia Computing, Communications, and Applications10.1145/2542205.254220710:1(1-21)Online publication date: 27-Dec-2013
      • (2013)Joint FEC codes and hash chains for optimizing authentication of JPEG2000 image streaming2013 IEEE International Conference on Multimedia and Expo (ICME)10.1109/ICME.2013.6607591(1-6)Online publication date: Jul-2013

      View Options

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media