Please use this identifier to cite or link to this item:
https://doi.org/10.1109/ICIP.2007.4379536
DC Field | Value | |
---|---|---|
dc.title | Stream authentication based on generlized butterfly graph | |
dc.contributor.author | Zhang, Z. | |
dc.contributor.author | Apostolopoulos, J. | |
dc.contributor.author | Sun, Q. | |
dc.contributor.author | Wee, S. | |
dc.contributor.author | Wong, W.-C. | |
dc.date.accessioned | 2014-06-19T03:28:50Z | |
dc.date.available | 2014-06-19T03:28:50Z | |
dc.date.issued | 2006 | |
dc.identifier.citation | Zhang, Z.,Apostolopoulos, J.,Sun, Q.,Wee, S.,Wong, W.-C. (2006). Stream authentication based on generlized butterfly graph. Proceedings - International Conference on Image Processing, ICIP 6 : VI121-VI124. ScholarBank@NUS Repository. <a href="https://doi.org/10.1109/ICIP.2007.4379536" target="_blank">https://doi.org/10.1109/ICIP.2007.4379536</a> | |
dc.identifier.isbn | 1424414377 | |
dc.identifier.issn | 15224880 | |
dc.identifier.uri | http://scholarbank.nus.edu.sg/handle/10635/71875 | |
dc.description.abstract | This paper proposes a stream authentication method based on the Generalized Butterfly Graph (GBG) framework. Compared with the original Butterfly graph, the proposed GBG graph supports an arbitrary overhead budget and number of packets. Within the GBG framework, the problem of constructing an authentication graph is considered as a design problem: Given total number of packets, packet loss rate, and overhead budget, we show how to design the graph (number of rows and columns and edge allocation among nodes) to maximize the expected number of verified packets. In addition, we also propose a new evaluation metric called Loss-Amplification-Factor (LAF), which measures the extent to which the authentication method exacerbates the effective packet loss rate. Experimental results demonstrate significant performance improvements over existing authentication methods like EMSS, Augmented Chain, and the original Butterfly. © 2007 IEEE. | |
dc.description.uri | http://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1109/ICIP.2007.4379536 | |
dc.source | Scopus | |
dc.subject | Media security | |
dc.subject | Stream authentication | |
dc.type | Conference Paper | |
dc.contributor.department | ELECTRICAL & COMPUTER ENGINEERING | |
dc.description.doi | 10.1109/ICIP.2007.4379536 | |
dc.description.sourcetitle | Proceedings - International Conference on Image Processing, ICIP | |
dc.description.volume | 6 | |
dc.description.page | VI121-VI124 | |
dc.identifier.isiut | NOT_IN_WOS | |
Appears in Collections: | Staff Publications |
Show simple item record
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.