2007 IEEE International Conference on Image Processing - San Antonio, Texas, U.S.A. - September 16-19, 2007

Technical Program

Paper Detail

Paper:WP-L4.7
Session:Security VI
Time:Wednesday, September 19, 16:50 - 17:10
Presentation: Lecture
Title: STREAM AUTHENTICATION BASED ON GENERLIZED BUTTERFLY GRAPH
Authors: Zhishou Zhang; Institute for Infocomm Research 
 John Apostolopoulos; Hewlett Packard Laboratories 
 Qibin Sun; Institute for Infocomm Research 
 Susie Wee; Hewlett Packard Laboratories 
 Wai-Choong Wong; National University of Singapore 
Abstract: This paper proposes a stream authentication method based on the Generalized Butterfly Graph (GBG) framework. Compared with the original Butterfly graph, the proposed GBG graph supports an arbitrary overhead budget and number of packets. Within the GBG framework, the problem of constructing an authentication graph is considered as a design problem: Given total number of packets, packet loss rate, and overhead budget, we show how to design the graph (number of rows and columns and edge allocation among nodes) to maximize the expected number of verified packets. In addition, we also propose a new evaluation metric called Loss-Amplification-Factor (LAF), which measures the extent to which the authentication method exacerbates the effective packet loss rate. Experiment results demonstrate significant performance improvements over existing authentication methods like EMSS, Augmented Chain, and the original Butterfly.



©2016 Conference Management Services, Inc. -||- email: webmaster@icip2007.com -||- Last updated Friday, August 17, 2012