Abstract
A novel video data authentication model based on digital video watermarking and MAC (message authentication code) in multicast protocol is proposed in this paper. The digital watermarking which composes of the MAC of the significant video content, the key and instant authentication data is embedded into the insignificant video component by the MLUT (modified look-up table) video watermarking technology. We explain a method that does not require storage of each data packet for a time, thus making receiver not vulnerable to DOS (denial of service) attack. So the video packets can be authenticated instantly without large volume buffer in the receivers. TESLA (timed efficient stream loss-tolerant authentication) does not explain how to select the suitable value ford, which is an important parameter in multicast source authentication. So we give a method to calculate the key disclosure delay (number of intervals). Simulation results show that the proposed algorithms improve the performance of data source authentication in multicast.
Similar content being viewed by others
References
Cox I J, Kilian J, Leighton F T,et al. Secure Spread Spectrum Watermarking for Multimedia [J].IEEE Trans on Image Processing, 1997,6(12):1673–1686.
Cox I J, Miller M L. The First 50 Years of Electronic Watermarking [J].EURASIP Journal of Applied Signal Processing, 2002,2:126–132.
Canetti R, Garay J, Itkis G,et al. Multicast Security: a Taxonomy and Some Efficient Constructions [C]//INFOCOMM'99. New York, March, 1999.
Kruus P. Survey of Multicast Security Issues and Architectures [C]//21st National Information Systems Security Conf. Rlington, VA, October 5–8, 1998.
Wong C K, Lam S S. Digital Signatures for Flows and Multicasts [J].IEEE/ACM Transactions on Networking, 1999,7(4):502–513.
Perrig A, Canetti R, Briscoe B,et al. TESLA: Multicast Source Authentication Transform [EB/OL]. [2000-12-25], July 2000.http://www/.ielf.org/mail-archive/web/ielfannounce/Current/insg00754.html.
Hartung F, Girod B. Watermarking of Uncompressed and Compressed Video [J].Signal Processing, 1998,66:283–301.
Swanson M D, Zhu B, Tewfik A H. Multi-Resolution Scene-Based Video Watermarking Using Perceptual Models [J].IEEE Trans on Selected Areas in Communication, 1998,16(4):540–550.
Langelaar G C.Real-Time Watermarking Techniques for Compressed Video Data: [Ph. D. dissertation]. Delft, Netherlands: Delft University of Technology, 2000.
Wu M, Liu B. Watermarking for Image Authentication [J].ICIP, 1998,(2):437–441.
Network lab. Network Simulator, Version 2. [2004-07],http://ns2.netlab.cse.yzu.edu.tw/.
Royer E, Perkins C E. Multicast Operation of Ad Hoc On-Demand Distance Vector Routing Protocol [C]//Proceedings of ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom). Seattle, WA, August, 1999:201–218.
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation item: Supported by the National Natural Science Foundation of China (60175001)
Biography: ZHAO Anjun(1975-), male, Lecturer, Post Doctor of North-western Polytechnical University, research, direction: network security, multicast security, digital watermarking.
Rights and permissions
About this article
Cite this article
Anjun, Z., Xiangli, L. & Lei, G. A novel video data-source authentication model based on digital watermarking and MAC in multicast. Wuhan Univ. J. Nat. Sci. 11, 1257–1261 (2006). https://doi.org/10.1007/BF02829247
Received:
Issue Date:
DOI: https://doi.org/10.1007/BF02829247
Key words
- video data authentication
- multicast
- MAC(message authentication code)
- digital watermarking
- MLUT (modified look-up table)