Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
In this paper, we try to combine the two techniques and propose a hybrid scheme for authenticating MPEG-2 streaming data, which are still used by real ...
In this paper, we try to combine the two techniques and propose a hybrid scheme for authenticating MPEG-2 streaming data, which are still used by real ...
Abstract. There are two main approaches for authenticating digital streams, namely the tree chaining [1] and the hash chaining [2,3]. Both.
Sep 25, 2010 · Abstract, There are two main approaches for authenticating digital streams, namely the tree chaining [1] and the hash chaining [2,3].
Bibliographic details on A Hybrid Approach for Authenticating MPEG-2 Streaming Data.
A Hybrid Approach for Authenticating MPEG-2 Streaming Data. M. Wang, L. Li, S. Yiu, L. Hui, C. Chong, K. Chow, W. Tsang, H. Chan, and K. Pun.
This paper proposes a hybrid scheme for authenticating MPEG-2 streaming data, which are still used by real application systems, by taking advantage of the ...
A hybrid approach for authenticating MPEG-2 streaming data · Author Picture ... FBSA: a self-adjustable multi-source data scheduling algorithm for P2P media ...
We propose a new scheme for authenticating streamed data delivered in real-time over an insecure network. The difficulty of signing live streams is twofold.
Video authentication techniques are used to prove the originality of received video content and to detect malicious tampering.