Please use this identifier to cite or link to this item:
|Title:||Rate-distortion-authentication optimized streaming with generalized butterfly graph authentication|
|Source:||Zhang, Z., Sun, Q., Apostolopoulos, J., Wong, W.-C. (2008). Rate-distortion-authentication optimized streaming with generalized butterfly graph authentication. Proceedings - International Conference on Image Processing, ICIP : 3096-3099. ScholarBank@NUS Repository. https://doi.org/10.1109/ICIP.2008.4712450|
|Abstract:||This paper shows how Rate-Distortion-Authentication (R-D-A) optimized streaming may be performed with the Generalized Butterfly Graph (GBG) stream authentication method. R-D-A streaming is designed to compute an optimized transmission policy by accounting for both coding and authentication dependencies, and GBG is designed to protect the authenticity of a media stream. The GBG graph is better suited for streaming than the original Butterfly graph since it is highly flexible and can support an arbitrary number of packets and arbitrary overhead. However, the dependency chains within the GBG graph are much longer and are tangled with each other - making it very difficult to quantify the dependencies necessary to perform R-D-A streaming. We propose a method to estimate the authentication dependencies, which is then used by the RD-A technique to compute the optimized transmission policy. © 2008 IEEE.|
|Source Title:||Proceedings - International Conference on Image Processing, ICIP|
|Appears in Collections:||Staff Publications|
Show full item record
Files in This Item:
There are no files associated with this item.
checked on Dec 6, 2017
WEB OF SCIENCETM
checked on Nov 20, 2017
checked on Dec 10, 2017
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.