File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1007/978-3-540-73417-8_27
- Scopus: eid_2-s2.0-37249063080
- Find via
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: A hybrid approach for authenticating MPEG-2 streaming data
Title | A hybrid approach for authenticating MPEG-2 streaming data |
---|---|
Authors | |
Issue Date | 2007 |
Publisher | Springer Verlag. The Journal's web site is located at http://springerlink.com/content/105633/ |
Citation | Lecture Notes In Computer Science (Including Subseries Lecture Notes In Artificial Intelligence And Lecture Notes In Bioinformatics), 2007, v. 4577 LNCS, p. 203-212 How to Cite? |
Abstract | There are two main approaches for authenticating digital streams, namely the tree chaining [1] and the hash chaining [2,3]. Both approaches have their disadvantages. Hash chaining is superior for low communication overhead, however, it is not resilient to packet loss and it has a longer verification delay. On the other hand, tree chaining is more robust even if packet loss occurs and with shorter verification delay, but the communication overhead is too high to be tolerable, especially in online applications. In this paper, we try to combine the two techniques and propose a hybrid scheme for authenticating MPEG-2 streaming data, which are still used by real application systems, by taking advantage of the characteristics of MPEG frames. The hybrid approach is shown to be more effective as compared to the other two approaches. © Springer-Verlag Berlin Heidelberg 2007. |
Persistent Identifier | http://hdl.handle.net/10722/93438 |
ISSN | 2020 SCImago Journal Rankings: 0.249 |
References |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Wang, M | en_HK |
dc.contributor.author | Li, N | en_HK |
dc.contributor.author | Yiu, SM | en_HK |
dc.contributor.author | Hui, LCK | en_HK |
dc.contributor.author | Chong, CF | en_HK |
dc.contributor.author | Chow, KP | en_HK |
dc.contributor.author | Tsang, WW | en_HK |
dc.contributor.author | Chan, HW | en_HK |
dc.contributor.author | Pun, KH | en_HK |
dc.date.accessioned | 2010-09-25T15:01:10Z | - |
dc.date.available | 2010-09-25T15:01:10Z | - |
dc.date.issued | 2007 | en_HK |
dc.identifier.citation | Lecture Notes In Computer Science (Including Subseries Lecture Notes In Artificial Intelligence And Lecture Notes In Bioinformatics), 2007, v. 4577 LNCS, p. 203-212 | en_HK |
dc.identifier.issn | 0302-9743 | en_HK |
dc.identifier.uri | http://hdl.handle.net/10722/93438 | - |
dc.description.abstract | There are two main approaches for authenticating digital streams, namely the tree chaining [1] and the hash chaining [2,3]. Both approaches have their disadvantages. Hash chaining is superior for low communication overhead, however, it is not resilient to packet loss and it has a longer verification delay. On the other hand, tree chaining is more robust even if packet loss occurs and with shorter verification delay, but the communication overhead is too high to be tolerable, especially in online applications. In this paper, we try to combine the two techniques and propose a hybrid scheme for authenticating MPEG-2 streaming data, which are still used by real application systems, by taking advantage of the characteristics of MPEG frames. The hybrid approach is shown to be more effective as compared to the other two approaches. © Springer-Verlag Berlin Heidelberg 2007. | en_HK |
dc.language | eng | en_HK |
dc.publisher | Springer Verlag. The Journal's web site is located at http://springerlink.com/content/105633/ | en_HK |
dc.relation.ispartof | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | en_HK |
dc.title | A hybrid approach for authenticating MPEG-2 streaming data | en_HK |
dc.type | Conference_Paper | en_HK |
dc.identifier.email | Yiu, SM:smyiu@cs.hku.hk | en_HK |
dc.identifier.email | Hui, LCK:hui@cs.hku.hk | en_HK |
dc.identifier.email | Chong, CF:chong@cs.hku.hk | en_HK |
dc.identifier.email | Chow, KP:chow@cs.hku.hk | en_HK |
dc.identifier.email | Tsang, WW:tsang@cs.hku.hk | en_HK |
dc.identifier.email | Chan, HW:hwchan@cs.hku.hk | en_HK |
dc.identifier.email | Pun, KH:pun@cs.hku.hk | en_HK |
dc.identifier.authority | Yiu, SM=rp00207 | en_HK |
dc.identifier.authority | Hui, LCK=rp00120 | en_HK |
dc.identifier.authority | Chong, CF=rp00110 | en_HK |
dc.identifier.authority | Chow, KP=rp00111 | en_HK |
dc.identifier.authority | Tsang, WW=rp00179 | en_HK |
dc.identifier.authority | Chan, HW=rp00091 | en_HK |
dc.identifier.authority | Pun, KH=rp00164 | en_HK |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1007/978-3-540-73417-8_27 | - |
dc.identifier.scopus | eid_2-s2.0-37249063080 | en_HK |
dc.identifier.hkuros | 137445 | en_HK |
dc.relation.references | http://www.scopus.com/mlt/select.url?eid=2-s2.0-37249063080&selection=ref&src=s&origin=recordpage | en_HK |
dc.identifier.volume | 4577 LNCS | en_HK |
dc.identifier.spage | 203 | en_HK |
dc.identifier.epage | 212 | en_HK |
dc.publisher.place | Germany | en_HK |
dc.identifier.scopusauthorid | Wang, M=23092650300 | en_HK |
dc.identifier.scopusauthorid | Li, N=36064475400 | en_HK |
dc.identifier.scopusauthorid | Yiu, SM=7003282240 | en_HK |
dc.identifier.scopusauthorid | Hui, LCK=8905728300 | en_HK |
dc.identifier.scopusauthorid | Chong, CF=7202196414 | en_HK |
dc.identifier.scopusauthorid | Chow, KP=7202180751 | en_HK |
dc.identifier.scopusauthorid | Tsang, WW=7201558521 | en_HK |
dc.identifier.scopusauthorid | Chan, HW=24828151400 | en_HK |
dc.identifier.scopusauthorid | Pun, KH=8979404900 | en_HK |
dc.identifier.issnl | 0302-9743 | - |