Please use this identifier to cite or link to this item:
Title: Rate-distortion-authentication optimized streaming with generalized butterfly graph authentication
Authors: Zhang, Z.
Sun, Q.
Apostolopoulos, J.
Wong, W.-C. 
Keywords: R-D-A optimization
Stream authentication
Issue Date: 2008
Citation: Zhang, Z., Sun, Q., Apostolopoulos, J., Wong, W.-C. (2008). Rate-distortion-authentication optimized streaming with generalized butterfly graph authentication. Proceedings - International Conference on Image Processing, ICIP : 3096-3099. ScholarBank@NUS Repository.
Abstract: This paper shows how Rate-Distortion-Authentication (R-D-A) optimized streaming may be performed with the Generalized Butterfly Graph (GBG) stream authentication method. R-D-A streaming is designed to compute an optimized transmission policy by accounting for both coding and authentication dependencies, and GBG is designed to protect the authenticity of a media stream. The GBG graph is better suited for streaming than the original Butterfly graph since it is highly flexible and can support an arbitrary number of packets and arbitrary overhead. However, the dependency chains within the GBG graph are much longer and are tangled with each other - making it very difficult to quantify the dependencies necessary to perform R-D-A streaming. We propose a method to estimate the authentication dependencies, which is then used by the RD-A technique to compute the optimized transmission policy. © 2008 IEEE.
Source Title: Proceedings - International Conference on Image Processing, ICIP
ISBN: 1424417643
ISSN: 15224880
DOI: 10.1109/ICIP.2008.4712450
Appears in Collections:Staff Publications

Show full item record
Files in This Item:
There are no files associated with this item.

Google ScholarTM



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.