Please use this identifier to cite or link to this item:
https://doi.org/10.1109/TMM.2007.893338
DC Field | Value | |
---|---|---|
dc.title | Joint source-channel-authentication resource allocation and unequal authenticity protection for multimedia over wireless networks | |
dc.contributor.author | Li, Z. | |
dc.contributor.author | Sun, Q. | |
dc.contributor.author | Lian, Y. | |
dc.contributor.author | Chen, C.W. | |
dc.date.accessioned | 2014-06-17T02:54:36Z | |
dc.date.available | 2014-06-17T02:54:36Z | |
dc.date.issued | 2007-06 | |
dc.identifier.citation | Li, Z., Sun, Q., Lian, Y., Chen, C.W. (2007-06). Joint source-channel-authentication resource allocation and unequal authenticity protection for multimedia over wireless networks. IEEE Transactions on Multimedia 9 (4) : 837-850. ScholarBank@NUS Repository. https://doi.org/10.1109/TMM.2007.893338 | |
dc.identifier.issn | 15209210 | |
dc.identifier.uri | http://scholarbank.nus.edu.sg/handle/10635/56440 | |
dc.description.abstract | There have been increasing concerns about the security issues of wireless transmission of multimedia in recent years. Wireless networks, by their nature, are more vulnerable to external intrusions than wired ones. Many applications demand authenticating the integrity of multimedia content delivered wirelessly. In this work, we describe a framework for jointly coding and authenticating multimedia to be delivered over heterogeneous wireless networks. We firstly introduce a novel concept called unequal authenticity protection (UAF), which unequally allocate resources to achieve an optimal authentication result. We then consider integrating UAP with specific source and channel-coding models, to obtain optimal end-to-end quality by the means of joint sourcechannel- authentication analysis. Lastly, we present an implementation of the proposed joint coding and authentication system on a progressive JPEG coder. Experimental results demonstrate that the proposed approach is indeed able to achieve the desired authentication of multimedia over wireless networks. © 2007 IEEE. | |
dc.description.uri | http://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1109/TMM.2007.893338 | |
dc.source | Scopus | |
dc.subject | Authentication | |
dc.subject | Digital signatures | |
dc.subject | Joint source-channel coding | |
dc.subject | Rate-distortion optimization | |
dc.subject | Unequal authenticity protection | |
dc.type | Article | |
dc.contributor.department | ELECTRICAL & COMPUTER ENGINEERING | |
dc.description.doi | 10.1109/TMM.2007.893338 | |
dc.description.sourcetitle | IEEE Transactions on Multimedia | |
dc.description.volume | 9 | |
dc.description.issue | 4 | |
dc.description.page | 837-850 | |
dc.description.coden | ITMUF | |
dc.identifier.isiut | 000246671200014 | |
Appears in Collections: | Staff Publications |
Show simple item record
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.