Please use this identifier to cite or link to this item:
Title: Stream authentication based on generlized butterfly graph
Authors: Zhang, Z.
Apostolopoulos, J.
Sun, Q.
Wee, S.
Wong, W.-C. 
Keywords: Media security
Stream authentication
Issue Date: 2006
Citation: Zhang, Z.,Apostolopoulos, J.,Sun, Q.,Wee, S.,Wong, W.-C. (2006). Stream authentication based on generlized butterfly graph. Proceedings - International Conference on Image Processing, ICIP 6 : VI121-VI124. ScholarBank@NUS Repository.
Abstract: This paper proposes a stream authentication method based on the Generalized Butterfly Graph (GBG) framework. Compared with the original Butterfly graph, the proposed GBG graph supports an arbitrary overhead budget and number of packets. Within the GBG framework, the problem of constructing an authentication graph is considered as a design problem: Given total number of packets, packet loss rate, and overhead budget, we show how to design the graph (number of rows and columns and edge allocation among nodes) to maximize the expected number of verified packets. In addition, we also propose a new evaluation metric called Loss-Amplification-Factor (LAF), which measures the extent to which the authentication method exacerbates the effective packet loss rate. Experimental results demonstrate significant performance improvements over existing authentication methods like EMSS, Augmented Chain, and the original Butterfly. © 2007 IEEE.
Source Title: Proceedings - International Conference on Image Processing, ICIP
ISBN: 1424414377
ISSN: 15224880
DOI: 10.1109/ICIP.2007.4379536
Appears in Collections:Staff Publications

Show full item record
Files in This Item:
There are no files associated with this item.


checked on May 15, 2019

Page view(s)

checked on May 11, 2019

Google ScholarTM



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.