Rate-Distortion-Authentication Optimized Streaming With Generalized Butterfly Graph Authentication

Zhishou Zhang,Qibin Sun,John Apostolopoulos,Wai-Choong Wong
DOI: https://doi.org/10.1109/ICIP.2008.4712450
2008-01-01
Abstract:This paper shows how Rate-Distortion-Authentication (R-D-A) optimized streaming may be performed with the Generalized Butterfly Graph (GBG) stream authentication method. R-D-A streaming is designed to compute an optimized transmission policy by accounting for both coding and authentication dependencies, and GBG is designed to protect the authenticity of a media stream. The GBG graph is better suited for streaming than the original Butterfly graph since it is highly flexible and can support an arbitrary number of packets and arbitrary overhead. However, the dependency chains within the GBG graph are much longer and are tangled with each other making it very difficult to quantify the dependencies necessary to perforin R-D-A streaming. We propose a method to estimate the authentication dependencies, which is then used by the R-D-A technique to compute the optimized transmission policy.
What problem does this paper attempt to address?