Please use this identifier to cite or link to this item: https://doi.org/10.1109/ICIP.2007.4379536
DC FieldValue
dc.titleStream authentication based on generlized butterfly graph
dc.contributor.authorZhang, Z.
dc.contributor.authorApostolopoulos, J.
dc.contributor.authorSun, Q.
dc.contributor.authorWee, S.
dc.contributor.authorWong, W.-C.
dc.date.accessioned2014-06-19T03:28:50Z
dc.date.available2014-06-19T03:28:50Z
dc.date.issued2006
dc.identifier.citationZhang, Z.,Apostolopoulos, J.,Sun, Q.,Wee, S.,Wong, W.-C. (2006). Stream authentication based on generlized butterfly graph. Proceedings - International Conference on Image Processing, ICIP 6 : VI121-VI124. ScholarBank@NUS Repository. <a href="https://doi.org/10.1109/ICIP.2007.4379536" target="_blank">https://doi.org/10.1109/ICIP.2007.4379536</a>
dc.identifier.isbn1424414377
dc.identifier.issn15224880
dc.identifier.urihttp://scholarbank.nus.edu.sg/handle/10635/71875
dc.description.abstractThis paper proposes a stream authentication method based on the Generalized Butterfly Graph (GBG) framework. Compared with the original Butterfly graph, the proposed GBG graph supports an arbitrary overhead budget and number of packets. Within the GBG framework, the problem of constructing an authentication graph is considered as a design problem: Given total number of packets, packet loss rate, and overhead budget, we show how to design the graph (number of rows and columns and edge allocation among nodes) to maximize the expected number of verified packets. In addition, we also propose a new evaluation metric called Loss-Amplification-Factor (LAF), which measures the extent to which the authentication method exacerbates the effective packet loss rate. Experimental results demonstrate significant performance improvements over existing authentication methods like EMSS, Augmented Chain, and the original Butterfly. © 2007 IEEE.
dc.description.urihttp://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1109/ICIP.2007.4379536
dc.sourceScopus
dc.subjectMedia security
dc.subjectStream authentication
dc.typeConference Paper
dc.contributor.departmentELECTRICAL & COMPUTER ENGINEERING
dc.description.doi10.1109/ICIP.2007.4379536
dc.description.sourcetitleProceedings - International Conference on Image Processing, ICIP
dc.description.volume6
dc.description.pageVI121-VI124
dc.identifier.isiutNOT_IN_WOS
Appears in Collections:Staff Publications

Show simple item record
Files in This Item:
There are no files associated with this item.

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.