Technique for Authenticating H.264/SVC Streams in Surveillance Applications

Surveillance codestreams coded by H.264/SVC (scalable video coding), which consists of one base layer and one or more enhancement layers, supply flexible and various quality, resolution, and temporal (sub)codestreams such that clients with different network bandwidth and terminal devices can seamles...

Full description

Saved in:
Bibliographic Details
Main Authors: ZHUO, Wei, DENG, Robert H., SHEN, Jialie, WU, Yongdong, DING, Xuhua, LO, Swee Won
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2013
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/1949
https://ink.library.smu.edu.sg/context/sis_research/article/2948/viewcontent/Technique_for_Authenticating_H.264_SVC_Streams_in_Surveillance_Ap.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-2948
record_format dspace
spelling sg-smu-ink.sis_research-29482018-11-27T05:53:59Z Technique for Authenticating H.264/SVC Streams in Surveillance Applications ZHUO, Wei DENG, Robert H. SHEN, Jialie WU, Yongdong DING, Xuhua LO, Swee Won Surveillance codestreams coded by H.264/SVC (scalable video coding), which consists of one base layer and one or more enhancement layers, supply flexible and various quality, resolution, and temporal (sub)codestreams such that clients with different network bandwidth and terminal devices can seamlessly access them. In this paper, we present a robust authentication scheme for them in order to insure the integrity of SVC surveillance codestreams, named AUSSC (Authenticating SVC Surveillance Codestreams). AUSSC exploits cryptographic-based authentication for base layer and content-based authentication for enhancement layers. For content-based authentication, AUSSC extracts full features from the first frame of each GOP (group of picture) and partial features from “active” macroblocks of other frames. Performance analysis indicates that AUSSC is robust to content-preserving manipulations and sensitive to content-changing manipulations of enhancement layers. Compared with cryptographic-based and watermarking-based authentication schemes, experimental results show that AUSSC causes less computation complexity and smaller compression overhead. Thus, it appears that AUSSC is suitable for real time SVC surveillance applications. 2013-07-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/1949 info:doi/10.1109/ICMEW.2013.6618259 https://ink.library.smu.edu.sg/context/sis_research/article/2948/viewcontent/Technique_for_Authenticating_H.264_SVC_Streams_in_Surveillance_Ap.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Authentication Feature extraction Scalability Static VAr compensators Streaming media Surveillance Vectors Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Authentication
Feature extraction
Scalability
Static VAr compensators
Streaming media
Surveillance
Vectors
Information Security
spellingShingle Authentication
Feature extraction
Scalability
Static VAr compensators
Streaming media
Surveillance
Vectors
Information Security
ZHUO, Wei
DENG, Robert H.
SHEN, Jialie
WU, Yongdong
DING, Xuhua
LO, Swee Won
Technique for Authenticating H.264/SVC Streams in Surveillance Applications
description Surveillance codestreams coded by H.264/SVC (scalable video coding), which consists of one base layer and one or more enhancement layers, supply flexible and various quality, resolution, and temporal (sub)codestreams such that clients with different network bandwidth and terminal devices can seamlessly access them. In this paper, we present a robust authentication scheme for them in order to insure the integrity of SVC surveillance codestreams, named AUSSC (Authenticating SVC Surveillance Codestreams). AUSSC exploits cryptographic-based authentication for base layer and content-based authentication for enhancement layers. For content-based authentication, AUSSC extracts full features from the first frame of each GOP (group of picture) and partial features from “active” macroblocks of other frames. Performance analysis indicates that AUSSC is robust to content-preserving manipulations and sensitive to content-changing manipulations of enhancement layers. Compared with cryptographic-based and watermarking-based authentication schemes, experimental results show that AUSSC causes less computation complexity and smaller compression overhead. Thus, it appears that AUSSC is suitable for real time SVC surveillance applications.
format text
author ZHUO, Wei
DENG, Robert H.
SHEN, Jialie
WU, Yongdong
DING, Xuhua
LO, Swee Won
author_facet ZHUO, Wei
DENG, Robert H.
SHEN, Jialie
WU, Yongdong
DING, Xuhua
LO, Swee Won
author_sort ZHUO, Wei
title Technique for Authenticating H.264/SVC Streams in Surveillance Applications
title_short Technique for Authenticating H.264/SVC Streams in Surveillance Applications
title_full Technique for Authenticating H.264/SVC Streams in Surveillance Applications
title_fullStr Technique for Authenticating H.264/SVC Streams in Surveillance Applications
title_full_unstemmed Technique for Authenticating H.264/SVC Streams in Surveillance Applications
title_sort technique for authenticating h.264/svc streams in surveillance applications
publisher Institutional Knowledge at Singapore Management University
publishDate 2013
url https://ink.library.smu.edu.sg/sis_research/1949
https://ink.library.smu.edu.sg/context/sis_research/article/2948/viewcontent/Technique_for_Authenticating_H.264_SVC_Streams_in_Surveillance_Ap.pdf
_version_ 1770571695189393408