Skip to main content
Log in

A novel video data-source authentication model based on digital watermarking and MAC in multicast

  • Web Information Security
  • Published:
Wuhan University Journal of Natural Sciences

Abstract

A novel video data authentication model based on digital video watermarking and MAC (message authentication code) in multicast protocol is proposed in this paper. The digital watermarking which composes of the MAC of the significant video content, the key and instant authentication data is embedded into the insignificant video component by the MLUT (modified look-up table) video watermarking technology. We explain a method that does not require storage of each data packet for a time, thus making receiver not vulnerable to DOS (denial of service) attack. So the video packets can be authenticated instantly without large volume buffer in the receivers. TESLA (timed efficient stream loss-tolerant authentication) does not explain how to select the suitable value ford, which is an important parameter in multicast source authentication. So we give a method to calculate the key disclosure delay (number of intervals). Simulation results show that the proposed algorithms improve the performance of data source authentication in multicast.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Cox I J, Kilian J, Leighton F T,et al. Secure Spread Spectrum Watermarking for Multimedia [J].IEEE Trans on Image Processing, 1997,6(12):1673–1686.

    Article  Google Scholar 

  2. Cox I J, Miller M L. The First 50 Years of Electronic Watermarking [J].EURASIP Journal of Applied Signal Processing, 2002,2:126–132.

    Article  Google Scholar 

  3. Canetti R, Garay J, Itkis G,et al. Multicast Security: a Taxonomy and Some Efficient Constructions [C]//INFOCOMM'99. New York, March, 1999.

  4. Kruus P. Survey of Multicast Security Issues and Architectures [C]//21st National Information Systems Security Conf. Rlington, VA, October 5–8, 1998.

  5. Wong C K, Lam S S. Digital Signatures for Flows and Multicasts [J].IEEE/ACM Transactions on Networking, 1999,7(4):502–513.

    Article  Google Scholar 

  6. Perrig A, Canetti R, Briscoe B,et al. TESLA: Multicast Source Authentication Transform [EB/OL]. [2000-12-25], July 2000.http://www/.ielf.org/mail-archive/web/ielfannounce/Current/insg00754.html.

  7. Hartung F, Girod B. Watermarking of Uncompressed and Compressed Video [J].Signal Processing, 1998,66:283–301.

    Article  MATH  Google Scholar 

  8. Swanson M D, Zhu B, Tewfik A H. Multi-Resolution Scene-Based Video Watermarking Using Perceptual Models [J].IEEE Trans on Selected Areas in Communication, 1998,16(4):540–550.

    Article  Google Scholar 

  9. Langelaar G C.Real-Time Watermarking Techniques for Compressed Video Data: [Ph. D. dissertation]. Delft, Netherlands: Delft University of Technology, 2000.

    Google Scholar 

  10. Wu M, Liu B. Watermarking for Image Authentication [J].ICIP, 1998,(2):437–441.

    Google Scholar 

  11. Network lab. Network Simulator, Version 2. [2004-07],http://ns2.netlab.cse.yzu.edu.tw/.

  12. Royer E, Perkins C E. Multicast Operation of Ad Hoc On-Demand Distance Vector Routing Protocol [C]//Proceedings of ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom). Seattle, WA, August, 1999:201–218.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guo Lei.

Additional information

Foundation item: Supported by the National Natural Science Foundation of China (60175001)

Biography: ZHAO Anjun(1975-), male, Lecturer, Post Doctor of North-western Polytechnical University, research, direction: network security, multicast security, digital watermarking.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Anjun, Z., Xiangli, L. & Lei, G. A novel video data-source authentication model based on digital watermarking and MAC in multicast. Wuhan Univ. J. Nat. Sci. 11, 1257–1261 (2006). https://doi.org/10.1007/BF02829247

Download citation

  • Received:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF02829247

Key words

CLC number

Navigation