Chaining Watermarks for Detecting Malicious Modifications to Streaming Data
Authenticating streaming data is a very important research area due to its wide range of applications. Previous technologies mainly focused on authenticating data packets at the IP layer and ensuring the robustness of the verification. These schemes usually incur large communications overhead, which...
Saved in:
Main Authors: | , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2007
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/1184 http://dx.doi.org/10.1016/j.ins.2006.03.014 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-2183 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-21832010-12-22T08:24:06Z Chaining Watermarks for Detecting Malicious Modifications to Streaming Data GUO, Huiping LI, Yingjiu Jajodia, Sushil Authenticating streaming data is a very important research area due to its wide range of applications. Previous technologies mainly focused on authenticating data packets at the IP layer and ensuring the robustness of the verification. These schemes usually incur large communications overhead, which is not desirable in applications with limited bandwidth. In this paper, we propose a novel fragile watermarking algorithm which verifies the integrity of streaming data at the application layer. The data are divided into groups based on synchronization points, so each group can be synchronized and any modifications made to one group only affect up to two groups. A unique watermark is embedded directly into each group to save communications bandwidth. The embedded watermark can detect as well as locate any modifications made to a data stream. To ensure the completeness of the data stream, watermarks are chained across groups so that no matter how many data are deleted, these deletions can be correctly detected. Security analysis and experimental results show that the proposed scheme can efficiently detect and locate modifications and ensure the completeness of data streams. 2007-01-01T08:00:00Z text https://ink.library.smu.edu.sg/sis_research/1184 info:doi/10.1016/j.ins.2006.03.014 http://dx.doi.org/10.1016/j.ins.2006.03.014 Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Fragile watermarking Streaming data Integrity Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Fragile watermarking Streaming data Integrity Information Security |
spellingShingle |
Fragile watermarking Streaming data Integrity Information Security GUO, Huiping LI, Yingjiu Jajodia, Sushil Chaining Watermarks for Detecting Malicious Modifications to Streaming Data |
description |
Authenticating streaming data is a very important research area due to its wide range of applications. Previous technologies mainly focused on authenticating data packets at the IP layer and ensuring the robustness of the verification. These schemes usually incur large communications overhead, which is not desirable in applications with limited bandwidth. In this paper, we propose a novel fragile watermarking algorithm which verifies the integrity of streaming data at the application layer. The data are divided into groups based on synchronization points, so each group can be synchronized and any modifications made to one group only affect up to two groups. A unique watermark is embedded directly into each group to save communications bandwidth. The embedded watermark can detect as well as locate any modifications made to a data stream. To ensure the completeness of the data stream, watermarks are chained across groups so that no matter how many data are deleted, these deletions can be correctly detected. Security analysis and experimental results show that the proposed scheme can efficiently detect and locate modifications and ensure the completeness of data streams. |
format |
text |
author |
GUO, Huiping LI, Yingjiu Jajodia, Sushil |
author_facet |
GUO, Huiping LI, Yingjiu Jajodia, Sushil |
author_sort |
GUO, Huiping |
title |
Chaining Watermarks for Detecting Malicious Modifications to Streaming Data |
title_short |
Chaining Watermarks for Detecting Malicious Modifications to Streaming Data |
title_full |
Chaining Watermarks for Detecting Malicious Modifications to Streaming Data |
title_fullStr |
Chaining Watermarks for Detecting Malicious Modifications to Streaming Data |
title_full_unstemmed |
Chaining Watermarks for Detecting Malicious Modifications to Streaming Data |
title_sort |
chaining watermarks for detecting malicious modifications to streaming data |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2007 |
url |
https://ink.library.smu.edu.sg/sis_research/1184 http://dx.doi.org/10.1016/j.ins.2006.03.014 |
_version_ |
1770570889957474304 |