Technique for authenticating H.264/SVC streams in surveillance applications

Zhuo Wei, Robert H. Deng, Jialie Shen, Yongdong Wu, Xuhua Ding, Sweewon Lo

Research output: Chapter in Book/Report/Conference proceedingConference Paper published in Proceedingspeer-review

Abstract

Surveillance streams coded by H.264/SVC (scalable video coding), which consist of one base layer and one or multiple enhancement layers, support flexible and various quality, resolution, and temporal scalabilities such that clients with different network bandwidth and terminal devices can seamlessly access them. In this paper, based on characteristics of SVC layer and surveillance sequences, we present an efficient and hybrid authentication scheme to ensure the integrity of SVC surveillance streams, named AUSSS (Authenticating SVC Surveillance Streams). Distinguished from the existing schemes, AUSSS exploits both cryptographic-based authentication and content-based authentication. Compared to existing authentication schemes, experimental results demonstrate that AUSSS causes less computation complexity and smaller compression overhead.

Original languageEnglish
Title of host publication2013 IEEE International Conference on Multimedia and Expo Workshops (ICMEW)
Place of PublicationSan Jose, USA
PublisherIEEE Computer Society
Pages-
Number of pages4
ISBN (Print)9781479916047
DOIs
Publication statusPublished - 29 Nov 2013
Externally publishedYes
Event2013 IEEE International Conference on Multimedia and Expo Workshops, ICMEW 2013 - San Jose, CA, United States
Duration: 15 Jul 201319 Jul 2013

Conference

Conference2013 IEEE International Conference on Multimedia and Expo Workshops, ICMEW 2013
CountryUnited States
CitySan Jose, CA
Period15/07/1319/07/13

Fingerprint

Dive into the research topics of 'Technique for authenticating H.264/SVC streams in surveillance applications'. Together they form a unique fingerprint.

Cite this