Technique for Authenticating H.264/SVC Streams in Surveillance Applications
Surveillance codestreams coded by H.264/SVC (scalable video coding), which consists of one base layer and one or more enhancement layers, supply flexible and various quality, resolution, and temporal (sub)codestreams such that clients with different network bandwidth and terminal devices can seamles...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2013
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/1949 https://ink.library.smu.edu.sg/context/sis_research/article/2948/viewcontent/Technique_for_Authenticating_H.264_SVC_Streams_in_Surveillance_Ap.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-2948 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-29482018-11-27T05:53:59Z Technique for Authenticating H.264/SVC Streams in Surveillance Applications ZHUO, Wei DENG, Robert H. SHEN, Jialie WU, Yongdong DING, Xuhua LO, Swee Won Surveillance codestreams coded by H.264/SVC (scalable video coding), which consists of one base layer and one or more enhancement layers, supply flexible and various quality, resolution, and temporal (sub)codestreams such that clients with different network bandwidth and terminal devices can seamlessly access them. In this paper, we present a robust authentication scheme for them in order to insure the integrity of SVC surveillance codestreams, named AUSSC (Authenticating SVC Surveillance Codestreams). AUSSC exploits cryptographic-based authentication for base layer and content-based authentication for enhancement layers. For content-based authentication, AUSSC extracts full features from the first frame of each GOP (group of picture) and partial features from “active” macroblocks of other frames. Performance analysis indicates that AUSSC is robust to content-preserving manipulations and sensitive to content-changing manipulations of enhancement layers. Compared with cryptographic-based and watermarking-based authentication schemes, experimental results show that AUSSC causes less computation complexity and smaller compression overhead. Thus, it appears that AUSSC is suitable for real time SVC surveillance applications. 2013-07-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/1949 info:doi/10.1109/ICMEW.2013.6618259 https://ink.library.smu.edu.sg/context/sis_research/article/2948/viewcontent/Technique_for_Authenticating_H.264_SVC_Streams_in_Surveillance_Ap.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Authentication Feature extraction Scalability Static VAr compensators Streaming media Surveillance Vectors Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Authentication Feature extraction Scalability Static VAr compensators Streaming media Surveillance Vectors Information Security |
spellingShingle |
Authentication Feature extraction Scalability Static VAr compensators Streaming media Surveillance Vectors Information Security ZHUO, Wei DENG, Robert H. SHEN, Jialie WU, Yongdong DING, Xuhua LO, Swee Won Technique for Authenticating H.264/SVC Streams in Surveillance Applications |
description |
Surveillance codestreams coded by H.264/SVC (scalable video coding), which consists of one base layer and one or more enhancement layers, supply flexible and various quality, resolution, and temporal (sub)codestreams such that clients with different network bandwidth and terminal devices can seamlessly access them. In this paper, we present a robust authentication scheme for them in order to insure the integrity of SVC surveillance codestreams, named AUSSC (Authenticating SVC Surveillance Codestreams). AUSSC exploits cryptographic-based authentication for base layer and content-based authentication for enhancement layers. For content-based authentication, AUSSC extracts full features from the first frame of each GOP (group of picture) and partial features from “active” macroblocks of other frames. Performance analysis indicates that AUSSC is robust to content-preserving manipulations and sensitive to content-changing manipulations of enhancement layers. Compared with cryptographic-based and watermarking-based authentication schemes, experimental results show that AUSSC causes less computation complexity and smaller compression overhead. Thus, it appears that AUSSC is suitable for real time SVC surveillance applications. |
format |
text |
author |
ZHUO, Wei DENG, Robert H. SHEN, Jialie WU, Yongdong DING, Xuhua LO, Swee Won |
author_facet |
ZHUO, Wei DENG, Robert H. SHEN, Jialie WU, Yongdong DING, Xuhua LO, Swee Won |
author_sort |
ZHUO, Wei |
title |
Technique for Authenticating H.264/SVC Streams in Surveillance Applications |
title_short |
Technique for Authenticating H.264/SVC Streams in Surveillance Applications |
title_full |
Technique for Authenticating H.264/SVC Streams in Surveillance Applications |
title_fullStr |
Technique for Authenticating H.264/SVC Streams in Surveillance Applications |
title_full_unstemmed |
Technique for Authenticating H.264/SVC Streams in Surveillance Applications |
title_sort |
technique for authenticating h.264/svc streams in surveillance applications |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2013 |
url |
https://ink.library.smu.edu.sg/sis_research/1949 https://ink.library.smu.edu.sg/context/sis_research/article/2948/viewcontent/Technique_for_Authenticating_H.264_SVC_Streams_in_Surveillance_Ap.pdf |
_version_ |
1770571695189393408 |