Please use this identifier to cite or link to this item:
|Title:||Stream authentication based on generlized butterfly graph||Authors:||Zhang, Z.
|Issue Date:||2006||Citation:||Zhang, Z.,Apostolopoulos, J.,Sun, Q.,Wee, S.,Wong, W.-C. (2006). Stream authentication based on generlized butterfly graph. Proceedings - International Conference on Image Processing, ICIP 6 : VI121-VI124. ScholarBank@NUS Repository. https://doi.org/10.1109/ICIP.2007.4379536||Abstract:||This paper proposes a stream authentication method based on the Generalized Butterfly Graph (GBG) framework. Compared with the original Butterfly graph, the proposed GBG graph supports an arbitrary overhead budget and number of packets. Within the GBG framework, the problem of constructing an authentication graph is considered as a design problem: Given total number of packets, packet loss rate, and overhead budget, we show how to design the graph (number of rows and columns and edge allocation among nodes) to maximize the expected number of verified packets. In addition, we also propose a new evaluation metric called Loss-Amplification-Factor (LAF), which measures the extent to which the authentication method exacerbates the effective packet loss rate. Experimental results demonstrate significant performance improvements over existing authentication methods like EMSS, Augmented Chain, and the original Butterfly. © 2007 IEEE.||Source Title:||Proceedings - International Conference on Image Processing, ICIP||URI:||http://scholarbank.nus.edu.sg/handle/10635/71875||ISBN:||1424414377||ISSN:||15224880||DOI:||10.1109/ICIP.2007.4379536|
|Appears in Collections:||Staff Publications|
Show full item record
Files in This Item:
There are no files associated with this item.
checked on May 15, 2019
checked on May 11, 2019
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.