Please use this identifier to cite or link to this item:
https://doi.org/10.1109/TCSVT.2006.888822
DC Field | Value | |
---|---|---|
dc.title | Rate-distortion-authentication optimized streaming of authenticated video | |
dc.contributor.author | Zhang, Z. | |
dc.contributor.author | Sun, Q. | |
dc.contributor.author | Wong, W.-C. | |
dc.contributor.author | Apostolopoulos, J. | |
dc.contributor.author | Wee, S. | |
dc.date.accessioned | 2014-06-17T03:03:22Z | |
dc.date.available | 2014-06-17T03:03:22Z | |
dc.date.issued | 2007-05 | |
dc.identifier.citation | Zhang, Z., Sun, Q., Wong, W.-C., Apostolopoulos, J., Wee, S. (2007-05). Rate-distortion-authentication optimized streaming of authenticated video. IEEE Transactions on Circuits and Systems for Video Technology 17 (5) : 544-557. ScholarBank@NUS Repository. https://doi.org/10.1109/TCSVT.2006.888822 | |
dc.identifier.issn | 10518215 | |
dc.identifier.uri | http://scholarbank.nus.edu.sg/handle/10635/57192 | |
dc.description.abstract | We define authenticated video as decoded video that results from those received packets whose authenticities have been verified. Generic data stream authentication methods usually impose overhead and dependency among packets for verification. Therefore, the conventional rate-distortion (R-D) optimized video streaming techniques produce highly sub-optimal R-D performance for authenticated video, since they do not account for the overhead and additional dependencies for authentication. In this paper, we study this practical problem and propose an Rate-Distortion-Authentication (R-D-A) optimized streaming technique for authenticated video. Based on packets' importance in terms of both video quality and authentication dependencies, the proposed technique computes a packet transmission schedule that minimizes the expected end-to-end distortion of the authenticated video at the receiver subject to a constraint on the average transmission rate. Simulation results based on H.264 JM 10.2 and NS-2 demonstrate that our proposed R-D-A optimized streaming technique substantially outperforms both prior (authentication-unaware) R-D optimized streaming techniques and data stream authentication techniques. In particular, when the channel capacity is below the source rate, the PSNR of authenticated video quickly drops to unacceptable levels using conventional R-D optimized streaming techniques, while the proposed R-D-A Optimization technique still maintains optimized video quality. Furthermore, we examine a low-complexity version of the proposed algorithm, and also an enhanced version which accounts for the multiple deadlines associated with each packet, which is introduced by stream authentication. © 2007 IEEE. | |
dc.description.uri | http://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1109/TCSVT.2006.888822 | |
dc.source | Scopus | |
dc.subject | Butterfly | |
dc.subject | Digital signature | |
dc.subject | R-D optimization | |
dc.subject | R-D-A optimization | |
dc.subject | Stream authentication | |
dc.type | Article | |
dc.contributor.department | ELECTRICAL & COMPUTER ENGINEERING | |
dc.description.doi | 10.1109/TCSVT.2006.888822 | |
dc.description.sourcetitle | IEEE Transactions on Circuits and Systems for Video Technology | |
dc.description.volume | 17 | |
dc.description.issue | 5 | |
dc.description.page | 544-557 | |
dc.description.coden | ITCTE | |
dc.identifier.isiut | 000246192100003 | |
Appears in Collections: | Staff Publications |
Show simple item record
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.