G. Oligeri, S. Chessa, P. Barsocchi, G. Giunta, P. Chan, P. Pillai
{"title":"Real-time loss tolerant video streaming authentication for satellite links","authors":"G. Oligeri, S. Chessa, P. Barsocchi, G. Giunta, P. Chan, P. Pillai","doi":"10.1109/IWSSC.2009.5286403","DOIUrl":null,"url":null,"abstract":"A new real time loss tolerant video streaming authentication scheme is presented. The bandwidth overhead is negligible, and authentication information are transmitted from the sender to all the receivers by means of a watermarking technique. Real time constraints are achieved by using a features computation algorithm, the sender embeds in each block of pictures the features computed over the current block, and a message authentication code that authenticates them. The receiver computes the features over the received block and compares it with that ones authenticated and extracted from the current block.","PeriodicalId":137431,"journal":{"name":"2009 International Workshop on Satellite and Space Communications","volume":"210 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Workshop on Satellite and Space Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IWSSC.2009.5286403","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
A new real time loss tolerant video streaming authentication scheme is presented. The bandwidth overhead is negligible, and authentication information are transmitted from the sender to all the receivers by means of a watermarking technique. Real time constraints are achieved by using a features computation algorithm, the sender embeds in each block of pictures the features computed over the current block, and a message authentication code that authenticates them. The receiver computes the features over the received block and compares it with that ones authenticated and extracted from the current block.