{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,22]],"date-time":"2025-07-22T10:53:03Z","timestamp":1753181583737,"version":"3.41.0"},"reference-count":35,"publisher":"Association for Computing Machinery (ACM)","issue":"4s","license":[{"start":{"date-parts":[[2016,9,15]],"date-time":"2016-09-15T00:00:00Z","timestamp":1473897600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Natural Science Funds of Guangdong","award":["2015A030310017"],"award-info":[{"award-number":["2015A030310017"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Funds of China","doi-asserted-by":"crossref","award":["61402199"],"award-info":[{"award-number":["61402199"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Multimedia Comput. Commun. Appl."],"published-print":{"date-parts":[[2016,11,18]]},"abstract":"<jats:p>H.264\/SVC (Scalable Video Coding) codestreams, which consist of a single base layer and multiple enhancement layers, are designed for quality, spatial, and temporal scalabilities. They can be transmitted over networks of different bandwidths and seamlessly accessed by various terminal devices. With a huge amount of video surveillance and various devices becoming an integral part of the security infrastructure, the industry is currently starting to use the SVC standard to process digital video for surveillance applications such that clients with different network bandwidth connections and display capabilities can seamlessly access various SVC surveillance (sub)codestreams. In order to guarantee the trustworthiness and integrity of received SVC codestreams, engineers and researchers have proposed several authentication schemes to protect video data. However, existing algorithms cannot simultaneously satisfy both efficiency and robustness for SVC surveillance codestreams. Hence, in this article, a highly efficient and robust authentication scheme, named TrustSSV (Trust Scalable Surveillance Video), is proposed. Based on quality\/spatial scalable characteristics of SVC codestreams, TrustSSV combines cryptographic and content-based authentication techniques to authenticate the base layer and enhancement layers, respectively. Based on temporal scalable characteristics of surveillance codestreams, TrustSSV extracts, updates, and authenticates foreground features for each access unit dynamically with background model support. Using SVC test sequences, our experimental results indicate that the scheme is able to distinguish between content-preserving and content-changing manipulations and to pinpoint tampered locations. Compared with existing schemes, the proposed scheme incurs very small computation and communication costs.<\/jats:p>","DOI":"10.1145\/2978573","type":"journal-article","created":{"date-parts":[[2016,9,16]],"date-time":"2016-09-16T19:47:47Z","timestamp":1474055267000},"page":"1-20","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Trustworthy Authentication on Scalable Surveillance Video with Background Model Support"],"prefix":"10.1145","volume":"12","author":[{"given":"Zhuo","family":"Wei","sequence":"first","affiliation":[{"name":"Huawei's Shield Lab, Singapore"}]},{"given":"Zheng","family":"Yan","sequence":"additional","affiliation":[{"name":"Xidian University, China &amp; Aalto University, Finland"}]},{"given":"Yongdong","family":"Wu","sequence":"additional","affiliation":[{"name":"Institute for Infocomm Research, Astar, Singapore"}]},{"given":"Robert Huijie","family":"Deng","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2016,9,15]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2004.823831"},{"key":"e_1_2_1_2_1","first-page":"147","article-title":"Recent advanced statistical background modeling for foreground detection: A systematic survey","volume":"4","author":"Bouwmans T.","year":"2011","unstructured":"T. Bouwmans . 2011 . Recent advanced statistical background modeling for foreground detection: A systematic survey . Recent Patents on Computer Science 4 , 3 (2011), 147 -- 176 . T. Bouwmans. 2011. Recent advanced statistical background modeling for foreground detection: A systematic survey. Recent Patents on Computer Science 4, 3 (2011), 147--176.","journal-title":"Recent Patents on Computer Science"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2011.5995508"},{"key":"e_1_2_1_4_1","unstructured":"CAVIAR. 2004. CAVIAR test case scenarios. http:\/\/homepages.inf.ed.ac.uk\/rbf\/CAVIARDATA1 (2004).  CAVIAR. 2004. CAVIAR test case scenarios. http:\/\/homepages.inf.ed.ac.uk\/rbf\/CAVIARDATA1 (2004)."},{"key":"e_1_2_1_5_1","volume-title":"Processing IEEE International Conference on Information Technology: Coding Computing 11","author":"Fridrich J.","year":"2000","unstructured":"J. Fridrich and M. Goljan . 2000. Robust hash function for digital watermarking . Processing IEEE International Conference on Information Technology: Coding Computing 11 , 2 ( 2000 ), 178--183. J. Fridrich and M. Goljan. 2000. Robust hash function for digital watermarking. Processing IEEE International Conference on Information Technology: Coding Computing 11, 2 (2000), 178--183."},{"key":"e_1_2_1_6_1","doi-asserted-by":"crossref","unstructured":"D. Grois and O. Hadar. 2012. Recent advances in watermarking for scalable video coding. Watermarking Intech Open Access Publisher (2012).  D. Grois and O. Hadar. 2012. Recent advances in watermarking for scalable video coding. Watermarking Intech Open Access Publisher (2012).","DOI":"10.5772\/37543"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-009-0093-2"},{"key":"e_1_2_1_8_1","doi-asserted-by":"crossref","unstructured":"M. Hefeeda and K. Mokhtarian. 2011. Authentication of scalable multimedia streams. In Handbook on Security and Networks Y. Xiao F. H. Li and H. Chen Eds. World Scientific Publishing Co. (2011) 93--125.  M. Hefeeda and K. Mokhtarian. 2011. Authentication of scalable multimedia streams. In Handbook on Security and Networks Y. Xiao F. H. Li and H. Chen Eds. World Scientific Publishing Co. (2011) 93--125.","DOI":"10.1142\/9789814273046_0004"},{"key":"e_1_2_1_9_1","unstructured":"JSVM. 2011. Joint scalable video model software. http:\/\/ip.hhi.de\/imagecomg1\/savce\/downloads\/svc-reference-software.htm. (2011).  JSVM. 2011. Joint scalable video model software. http:\/\/ip.hhi.de\/imagecomg1\/savce\/downloads\/svc-reference-software.htm. (2011)."},{"key":"e_1_2_1_10_1","doi-asserted-by":"crossref","unstructured":"J. Katz and Y. Lindell. 2008. Introduction to Modern Cryptography. Chapman & Hall\/CRC (2008).   J. Katz and Y. Lindell. 2008. Introduction to Modern Cryptography. Chapman & Hall\/CRC (2008).","DOI":"10.1201\/9781420010756"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.815955"},{"key":"e_1_2_1_12_1","volume-title":"Proceedings of the 2000 Conference on Advances in Neural Information Processing Systems 13","author":"Lee D. D.","year":"2000","unstructured":"D. D. Lee and H. S. Seung . 2000. Algorithms for non-negative matrix factorization . In Proceedings of the 2000 Conference on Advances in Neural Information Processing Systems 13 . MIT Press ( 2000 ), 556--562. D. D. Lee and H. S. Seung. 2000. Algorithms for non-negative matrix factorization. In Proceedings of the 2000 Conference on Advances in Neural Information Processing Systems 13. MIT Press (2000), 556--562."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/76.905982"},{"key":"e_1_2_1_14_1","volume-title":"International Workshop on Digital Watermarking","author":"Meerwald P.","year":"2010","unstructured":"P. Meerwald and A. Uhl . 2010. Robust watermarking of H.264\/SVC-encoded video: Quality and resolution scalability . In International Workshop on Digital Watermarking ( 2010 ), 156--169. P. Meerwald and A. Uhl. 2010. Robust watermarking of H.264\/SVC-encoded video: Quality and resolution scalability. In International Workshop on Digital Watermarking (2010), 156--169."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2010.2051410"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2007.902670"},{"key":"e_1_2_1_17_1","doi-asserted-by":"crossref","unstructured":"S. W. Park and S. U. Shin. 2008. Combined scheme of encryption and watermarking in H.264\/scalable video coding (SVC). In New Directions in Intelligent Interactive Multimedia Springer Studies in Computational Intelligence (2008) 351--361.  S. W. Park and S. U. Shin. 2008. Combined scheme of encryption and watermarking in H.264\/scalable video coding (SVC). In New Directions in Intelligent Interactive Multimedia Springer Studies in Computational Intelligence (2008) 351--361.","DOI":"10.1007\/978-3-540-68127-4_37"},{"key":"e_1_2_1_18_1","first-page":"129","article-title":"Authentication and copyright protection scheme for H.264\/AVC and SVC","volume":"27","author":"Park S. W.","year":"2011","unstructured":"S. W. Park and S. U. Shin . 2011 . Authentication and copyright protection scheme for H.264\/AVC and SVC . Journal of Information Science and Engineering 27 , 1 (2011), 129 -- 142 . S. W. Park and S. U. Shin. 2011. Authentication and copyright protection scheme for H.264\/AVC and SVC. Journal of Information Science and Engineering 27, 1 (2011), 129--142.","journal-title":"Journal of Information Science and Engineering"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1996.560425"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2007.905532"},{"key":"e_1_2_1_21_1","volume-title":"Pacific-Rim Conference on Multimedia","author":"Shi F.","year":"2010","unstructured":"F. Shi , S. H. Liu , H. X. Yao , Y. Liu , and S. P. Zhang . 2010. Scalable and credible video watermarking towards scalable video coding . In Pacific-Rim Conference on Multimedia ( 2010 ), 697--708. F. Shi, S. H. Liu, H. X. Yao, Y. Liu, and S. P. Zhang. 2010. Scalable and credible video watermarking towards scalable video coding. In Pacific-Rim Conference on Multimedia (2010), 697--708."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.815947"},{"key":"e_1_2_1_23_1","unstructured":"SPEVI. 2005. Surveillance performance evaluation initiative (SPEVI) datasets. http:\/\/www.elec.qmul.ac.uk\/ staffinfo\/andrea\/spevi.html (2005).  SPEVI. 2005. Surveillance performance evaluation initiative (SPEVI) datasets. http:\/\/www.elec.qmul.ac.uk\/ staffinfo\/andrea\/spevi.html (2005)."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2009.2017404"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.04.028"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2010.36"},{"key":"e_1_2_1_27_1","volume-title":"IEEE International Conference on Multimedia and Expo","author":"Wei Z.","year":"2013","unstructured":"Z. Wei , R. H. Deng , J. L. Shen , Y. D. Wu , X. H. Ding , and S. W. Lo . 2013. Technique for authenticating H.264\/SVC bit streams in video surveillance applications . In IEEE International Conference on Multimedia and Expo ( 2013 ). Z. Wei, R. H. Deng, J. L. Shen, Y. D. Wu, X. H. Ding, and S. W. Lo. 2013. Technique for authenticating H.264\/SVC bit streams in video surveillance applications. In IEEE International Conference on Multimedia and Expo (2013)."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32805-3_6"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2301916"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68351-3_4"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2005.861283"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2004.1312853"},{"key":"e_1_2_1_33_1","first-page":"192","article-title":"An improve authentication scheme for H.264\/SVC and its performance evaluation over non-stationary wireless mobile networks","volume":"7645","author":"Zhao Y. F.","year":"2012","unstructured":"Y. F. Zhao , S. W. Lo , R. H. Deng , and Xuhua Ding . 2012 . An improve authentication scheme for H.264\/SVC and its performance evaluation over non-stationary wireless mobile networks . Journal of Computer and System Sciences 7645 (2012), 192 -- 205 . Y. F. Zhao, S. W. Lo, R. H. Deng, and Xuhua Ding. 2012. An improve authentication scheme for H.264\/SVC and its performance evaluation over non-stationary wireless mobile networks. Journal of Computer and System Sciences 7645 (2012), 192--205.","journal-title":"Journal of Computer and System Sciences"},{"key":"e_1_2_1_34_1","volume-title":"Proceedings SPIE International Symposium Information Technology & Communication","author":"Zhu B. B.","year":"2004","unstructured":"B. B. Zhu , M. D. Swanson , and S. Li . 2004. Encryption and authentication for scalable multimedia: Current state of the art and challenges . In Proceedings SPIE International Symposium Information Technology & Communication ( 2004 ), 157--170. B. B. Zhu, M. D. Swanson, and S. Li. 2004. Encryption and authentication for scalable multimedia: Current state of the art and challenges. In Proceedings SPIE International Symposium Information Technology & Communication (2004), 157--170."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.11.005"}],"container-title":["ACM Transactions on Multimedia Computing, Communications, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2978573","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2978573","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:54:35Z","timestamp":1750222475000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2978573"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,15]]},"references-count":35,"journal-issue":{"issue":"4s","published-print":{"date-parts":[[2016,11,18]]}},"alternative-id":["10.1145\/2978573"],"URL":"https:\/\/doi.org\/10.1145\/2978573","relation":{},"ISSN":["1551-6857","1551-6865"],"issn-type":[{"type":"print","value":"1551-6857"},{"type":"electronic","value":"1551-6865"}],"subject":[],"published":{"date-parts":[[2016,9,15]]},"assertion":[{"value":"2015-09-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-01-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-09-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}