{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T06:51:37Z","timestamp":1759042297188,"version":"3.41.0"},"reference-count":48,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2010,2,1]],"date-time":"2010-02-01T00:00:00Z","timestamp":1264982400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Multimedia Comput. Commun. Appl."],"published-print":{"date-parts":[[2010,2]]},"abstract":"<jats:p>With the rapid increase in the demand for multimedia services, securing the delivery of multimedia content has become an important issue. Accordingly, the problem of multimedia stream authentication has received considerable attention by previous research and various solutions have been proposed. However, these solutions have not been rigorously analyzed and contrasted to each other, and thus their relative suitability for different streaming environments is not clear. This article presents comprehensive analysis and comparison among different schemes proposed in the literature to authenticate multimedia streams. Authentication schemes for nonscalable and scalable multimedia streams are analyzed. To conduct this analysis, we define five important performance metrics, which are computation cost, communication overhead, receiver buffer size, delay, and tolerance to packet losses. We derive analytic formulas for these metrics for all considered authentication schemes to numerically analyze their performance. In addition, we implement all schemes in a simulator to study and compare their performance in different environments. The parameters for the simulator are carefully chosen to mimic realistic settings. We draw several conclusions on the advantages and disadvantages of each scheme. We extend our analysis to authentication techniques for scalable streams. We pay careful attention to the flexibility of scalable streams and analyze its impacts on the authentication schemes. Our analysis and comparison reveal the merits and shortcomings of each scheme, provide guidelines on choosing the most appropriate scheme for a given multimedia streaming application, and could stimulate designing new authentication schemes or improving existing ones. For example, our detailed analysis has led us to design a new authentication scheme that combines the best features of two previous schemes.<\/jats:p>","DOI":"10.1145\/1671954.1671960","type":"journal-article","created":{"date-parts":[[2010,2,16]],"date-time":"2010-02-16T20:51:06Z","timestamp":1266353466000},"page":"1-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Authentication schemes for multimedia streams"],"prefix":"10.1145","volume":"6","author":[{"given":"Mohamed","family":"Hefeeda","sequence":"first","affiliation":[{"name":"Simon Fraser University, Canada"}]},{"given":"Kianoosh","family":"Mokhtarian","sequence":"additional","affiliation":[{"name":"Simon Fraser University, Canada"}]}],"member":"320","published-online":{"date-parts":[[2010,2,22]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2007.905521"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1025126.1025949"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-006-0074-7"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2004.5342292"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-005-0190-7"},{"volume":"1294","volume-title":"Proceedings of the Advances in Cryptology (CRYPTO'97)","author":"Gennaro R.","key":"e_1_2_1_6_1"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2004.839391"},{"key":"e_1_2_1_8_1","unstructured":"Global. 2007. Video conferencing\u2014A global strategic business report. Global Industry Analysts Inc. http:\/\/www.strategyr.com\/MCP-1062.asp.  Global. 2007. Video conferencing\u2014A global strategic business report. Global Industry Analysts Inc. http:\/\/www.strategyr.com\/MCP-1062.asp."},{"volume-title":"Proceedings of the Network and Distributed Systems Security Symposium (NDSS'01)","author":"Golle P.","key":"e_1_2_1_9_1"},{"volume":"4472","volume-title":"Proceedings of the SPIE Applications of Digital Image Processing XXIV.","author":"Grosbois R.","key":"e_1_2_1_10_1"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.102"},{"key":"e_1_2_1_12_1","unstructured":"Insight. 2006. Streaming media IPTV and broadband transport: Telecommunications carriers and entertainment services 2006--2011. The Insight Research Corporation. http:\/\/www.insight-corp.com\/execsummaries\/iptv06execsum.pdf.  Insight. 2006. Streaming media IPTV and broadband transport: Telecommunications carriers and entertainment services 2006--2011. The Insight Research Corporation. http:\/\/www.insight-corp.com\/execsummaries\/iptv06execsum.pdf."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDT.2006.50"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICISP.2006.30"},{"key":"e_1_2_1_15_1","unstructured":"Klima V. 2005. Finding MD5 collisions a toy for a notebook. Cryptology ePrint Archive: Rep. 2005\/075.  Klima V. 2005. Finding MD5 collisions a toy for a notebook. Cryptology ePrint Archive: Rep. 2005\/075."},{"key":"e_1_2_1_16_1","unstructured":"Klima V. 2006. Tunnels in hash functions: MD5 collisions within a minute. Cryptology ePrint Archive: Rep. 2006\/105.  Klima V. 2006. Tunnels in hash functions: MD5 collisions within a minute. Cryptology ePrint Archive: Rep. 2006\/105."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/11602897_33"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2007.323"},{"volume":"3971","volume-title":"Proceedings of the SPIE Security and Watermarking of Multimedia Content II.","author":"Lin C.","key":"e_1_2_1_19_1"},{"key":"e_1_2_1_20_1","unstructured":"Menezes A. Vanston S. and Van Oorschot P. 1996. Handbook of Applied Cryptography 1st Ed. CRC Press Boca Raton FL.   Menezes A. Vanston S. and Van Oorschot P. 1996. Handbook of Applied Cryptography 1st Ed. CRC Press Boca Raton FL."},{"volume-title":"Proceedings of the Advances in Cryptology (CRYPTO'89)","series-title":"Lecture Notes in Computer Science","author":"Merkle R.","key":"e_1_2_1_21_1"},{"key":"e_1_2_1_22_1","unstructured":"NIST. 1993. Federal information processing standards (FIPS) publication 180: Secure hash standard. National Institute of Standards and Technology (NIST).  NIST. 1993. Federal information processing standards (FIPS) publication 180: Secure hash standard. National Institute of Standards and Technology (NIST)."},{"volume-title":"Proceedings of the Network and Distributed Systems Security Symposium (NDSS'03)","author":"Pannetrat A.","key":"e_1_2_1_23_1"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/762476.762480"},{"volume":"3046","volume-title":"Proceedings of the International Conference on Computational Science and Its Applications (ICCSA'04)","author":"Park Y.","key":"e_1_2_1_25_1"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/957013.957101"},{"volume-title":"Proceedings of the Network and Distributed Systems Security Symposium (NDSS'01)","author":"Perrig A.","key":"e_1_2_1_27_1"},{"volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (S&P'00)","author":"Perrig A.","key":"e_1_2_1_28_1"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/62044.62050"},{"key":"e_1_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Rivest R. 1992. RFC1321; the MD5 message-digest algorithm. IETF.   Rivest R. 1992. RFC1321; the MD5 message-digest algorithm. IETF.","DOI":"10.17487\/rfc1321"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_2_1_32_1","unstructured":"RNCOS. 2006. Global IPTV market analysis (2006--2010). RNCOS. http:\/\/www.rncos.com\/Report\/IM063.htm.  RNCOS. 2006. Global IPTV market analysis (2006--2010). RNCOS. http:\/\/www.rncos.com\/Report\/IM063.htm."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2007.905528"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2007.905532"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2004.839617"},{"volume":"2","volume-title":"Proceedings of the IEEE International Conference on Multimedia and Expo (ICME'03)","author":"Sun A.","key":"e_1_2_1_37_1"},{"volume":"2","volume-title":"Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS'02)","author":"Sun Q.","key":"e_1_2_1_38_1"},{"volume":"175","volume-title":"Proceedings of the IFIP Conference on Communications and Multimedia Security (IFIP CMS'04)","author":"Suzuki T.","key":"e_1_2_1_39_1"},{"volume":"3280","volume-title":"Proceedings of the International Symposium on Computer and Information Sciences (ISCIS'04)","author":"Tillich S.","key":"e_1_2_1_40_1"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1161366.1161375"},{"key":"e_1_2_1_42_1","doi-asserted-by":"crossref","unstructured":"Wenger S. Hannuksela M. Stockhammer T. Westerlund M. and Singer D. 2005. RFC 3984; RTP payload format for H.264 video. IETF.  Wenger S. Hannuksela M. Stockhammer T. Westerlund M. and Singer D. 2005. RFC 3984; RTP payload format for H.264 video. IETF.","DOI":"10.17487\/rfc3984"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.793005"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2005.861283"},{"volume":"1","volume-title":"Proceedings of the IEEE InfoCom'99","author":"Yajnik M.","key":"e_1_2_1_45_1"},{"volume-title":"Proceedings of the IEEE International Conference on Multimedia and Expo (ICME'05)","author":"Zhang Z.","key":"e_1_2_1_46_1"},{"volume":"6","volume-title":"Proceedings of the IEEE International Conference on Image Processing (ICIP'07)","author":"Zhishou Z.","key":"e_1_2_1_47_1"},{"volume":"5601","volume-title":"Proceedings of the SPIE Internet Multimedia Management Systems V.","author":"Zhu B.","key":"e_1_2_1_48_1"}],"container-title":["ACM Transactions on Multimedia Computing, Communications, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1671954.1671960","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1671954.1671960","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:40:53Z","timestamp":1750250453000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1671954.1671960"}},"subtitle":["Quantitative analysis and comparison"],"short-title":[],"issued":{"date-parts":[[2010,2]]},"references-count":48,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2010,2]]}},"alternative-id":["10.1145\/1671954.1671960"],"URL":"https:\/\/doi.org\/10.1145\/1671954.1671960","relation":{},"ISSN":["1551-6857","1551-6865"],"issn-type":[{"type":"print","value":"1551-6857"},{"type":"electronic","value":"1551-6865"}],"subject":[],"published":{"date-parts":[[2010,2]]},"assertion":[{"value":"2008-10-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2009-01-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2010-02-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}