1 / 16

Computer Architecture Lab. Hanbit Kim 2008. 12. 9

Joint Source-Channel-Authentication Resource Allocation and Unequal Authenticity Protection for Multimedia Over Wireless Networks. Zhi Li, Qubin Sun, Yong Lian and Chang Wen Chen IEEE TRANSACTIONS ON MULTIMEDIA, 2007. Computer Architecture Lab. Hanbit Kim 2008. 12. 9. Contents.

aysel
Download Presentation

Computer Architecture Lab. Hanbit Kim 2008. 12. 9

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Joint Source-Channel-Authentication Resource Allocation and Unequal Authenticity Protection for Multimedia Over Wireless Networks • Zhi Li, Qubin Sun, Yong Lian and Chang Wen Chen • IEEE TRANSACTIONS ON MULTIMEDIA, 2007 Computer Architecture Lab. Hanbit Kim 2008. 12. 9

  2. Contents • Introduction • Motivation • Basic Concept • System Overview • Joint source-channel-authentication • Unequal authenticity protection • Evaluation • Conclusion • Discussion

  3. Introduction • Authenticating multimedia data over wireless networks • Sample products • Medical images • Portraits of criminal suspects

  4. Motivation Sender Receiver 11110101010 11100010101 10010100011 11110100010 11100010101 10010100011 Authentication Fail!! Send Exe file Packet loss Bit error Sender Receiver Authentication Fail!! Send • Is it reasonable? Multimedia file

  5. Basic Concept • Content-awareness framework • Optimizing end-to-end quality • Considering source coding, channel coding and authentication together • Differentiating the importance of packet

  6. Basic Concept Before After After

  7. System Overview

  8. Joint Source-Channel-Authentication • Optimization • Minimizing end-to-end distortion • Maximizing an authentication probability • Dopt= minrsrc(Ds,opt(rs) + Dca,opt(Eopt(e(rc),m(rs,rc)), e(rc))) • rs + rc <= 1

  9. Joint Source-Channel-Authentication • Source coding model • R-D relationship • Channel model • e = 1 - (1 - εd)lp • Authentication model • Unequal authenticity protection (UAP)

  10. Unequal Authenticity Protection • Signature amortization through hash-chaining (SAHC) • Sign only one packet.

  11. Unequal Authenticity Protection • Authentication probability (AP) • How likely a packet is verifiable. • Authentication graph (AG)

  12. Unequal Authenticity Protection • Multi-layer unequal chaining (MUC)

  13. Unequal Authenticity Protection • Optimal bit allocation • Select the number of layers for MUC AG. • Select the number of pilot packets • Sort and assign the packets to pilot packets according to the weight. • Compute the maximum Σ weight * APs.

  14. Evaluation End-to-end R-D curve

  15. Conclusion • Content-aware stream-level approach • Novel concept of UAP • Joint overall

  16. Discussion • Work on JPEG only • Computation overhead

More Related