期刊文献+

一种基于数字水印的视频多点广播立即源认证模型

A Novel Video Multicast Instant Source Authentication Model Based on Digital Watermarking
在线阅读 下载PDF
导出
摘要 基于数字水印和TESLA,提出了一种视频多点广播立即源认证模型,利用查找表的视频水印算法,将视频重要分量的消息认证码、公开密钥和立即认证散列值等嵌入到视频的非重要分量中;从而达到视频数据多点广播的立即源认证,避免了接收方数据包缓存,并给出公开延迟时间间隔d的一种计算方法。 A novel video multicast instant source authentication model based on digital watermarking and TESLA (Timed Efficient Stream Loss - Tolerant Authentication) is proposed in this paper. With the Modified Look Up Table video watermarking algorithm, the digital watermark, which composes of the Message Authentication Code(MAC) of the significant data, public key and instant authentication data, is embedded into the insignificant video data. The video packages can be authenticated instantly by the use of MAC and instant authentication data without large volume buffer in the receivers. In addition, a method is provided to calculate the key disclosure delay (number of intervals).
出处 《湛江海洋大学学报》 CAS 2005年第4期68-71,共4页 Journal of Zhanjiang Ocean University
基金 国家自然科学资金资助(60175001)
关键词 视频多点广播 立即源认证 数字水印 公开延迟时间间隔 组播源认证(TESLA) 消息认证码 Video muhicast Instant authentication Digital watermarking Key disclosure delay TESLA(Timed Efficient Stream Loss - Tolerant Authentication), MAC(Message Authentication Code)
  • 相关文献

参考文献10

  • 1Cox I J, Kilian J, Leighton F T, etal. Secure spread spectrum watermarking for multimedia[J]. IEEE Trans on Image Processing, 1997, 6(12) : 1673 - 1686.
  • 2Cox I J, Miller M L. The first 50 years of electronic watermarking[ J].EURASIP Journal of Applied Signal Processing, 2002,2:126 - 132.
  • 3Canetti R, Garay J, Itkis G, et al. Multicast security: a taxonomy and some efficient constructions[ C]. INFOCOMM'99.
  • 4Kruus P. Survey of multicast security issues and archltectures[C]. 21st National Information Systems Security Conf. rlington, VA, 1998.
  • 5Wong C K, Iam S S. Digital signatures for flows and multicasts[J].IEEEVACM Transactions on Networking, 1999, 7(4) : 502 - 513.
  • 6Perrig A, Canetti R, Briscoe B,etal. TESLA: multicast source authentication tranform[ C ]. Intemet Draft, Internet Engineering Task Force,2000.
  • 7Hartung F, Girnd B. Watermarking af uncompressed and compressed video[J]. Signal Processing, 1998(66) : 283 - 301.
  • 8Swanson M D, Zhu B, Tewfik A H. Multiresolution scene - based video watermarking using perceptual models[J]. IEEE trans on selected areasin communication, 1998, 16(4) : 540 - 550.
  • 9Langelaar G C. Real - time watermarking techniques for compressed video data[ D]. Ph. D dissertation, Delft University of Technology, 2000.
  • 10Wu M, Liu B. Watermarklng for image authentication[J]. ICIP, 1998(2): 437 - 441.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部