{"id":"https://openalex.org/W2752563351","doi":"https://doi.org/10.1109/access.2017.2743019","title":"Authentication of Scalable Video Coding Streams Based on Topological Sort on Decoding Dependency Graph","display_name":"Authentication of Scalable Video Coding Streams Based on Topological Sort on Decoding Dependency Graph","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2752563351","doi":"https://doi.org/10.1109/access.2017.2743019","mag":"2752563351"},"language":"en","primary_location":{"id":"doi:10.1109/access.2017.2743019","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2017.2743019","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2017.2743019","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100612718","display_name":"Qiang Ma","orcid":"https://orcid.org/0000-0002-1360-8571"},"institutions":[{"id":"https://openalex.org/I1297991670","display_name":"Southwest University of Science and Technology","ror":"https://ror.org/04d996474","country_code":"CN","type":"education","lineage":["https://openalex.org/I1297991670"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qiang Ma","raw_affiliation_strings":["School of Information Engineering, Southwest University of Science and Technology, Mianyang, China"],"raw_orcid":"https://orcid.org/0000-0002-1360-8571","affiliations":[{"raw_affiliation_string":"School of Information Engineering, Southwest University of Science and Technology, Mianyang, China","institution_ids":["https://openalex.org/I1297991670"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100727909","display_name":"Ling Xing","orcid":"https://orcid.org/0000-0002-5132-3817"},"institutions":[{"id":"https://openalex.org/I167383011","display_name":"Henan University of Science and Technology","ror":"https://ror.org/05d80kz58","country_code":"CN","type":"education","lineage":["https://openalex.org/I167383011"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ling Xing","raw_affiliation_strings":["School of Information Engineering, Henan University of Science and Technology, Luoyang, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Information Engineering, Henan University of Science and Technology, Luoyang, China","institution_ids":["https://openalex.org/I167383011"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5046499666","display_name":"Longshui Zheng","orcid":null},"institutions":[{"id":"https://openalex.org/I1297991670","display_name":"Southwest University of Science and Technology","ror":"https://ror.org/04d996474","country_code":"CN","type":"education","lineage":["https://openalex.org/I1297991670"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Longshui Zheng","raw_affiliation_strings":["School of Information Engineering, Southwest University of Science and Technology, Mianyang, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Information Engineering, Southwest University of Science and Technology, Mianyang, China","institution_ids":["https://openalex.org/I1297991670"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100612718"],"corresponding_institution_ids":["https://openalex.org/I1297991670"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.0924,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.47188194,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"5","issue":null,"first_page":"16847","last_page":"16857"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10741","display_name":"Video Coding and Compression Technologies","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9854000210762024,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8653678297996521},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7456088066101074},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.6910764575004578},{"id":"https://openalex.org/keywords/scalable-video-coding","display_name":"Scalable Video Coding","score":0.5722286701202393},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.5707458853721619},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.49484676122665405},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4861721396446228},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.4649103581905365},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.44988375902175903},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.38886457681655884},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2909834384918213},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.0824754536151886}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8653678297996521},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7456088066101074},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.6910764575004578},{"id":"https://openalex.org/C133529210","wikidata":"https://www.wikidata.org/wiki/Q1076113","display_name":"Scalable Video Coding","level":3,"score":0.5722286701202393},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.5707458853721619},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.49484676122665405},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4861721396446228},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.4649103581905365},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.44988375902175903},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.38886457681655884},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2909834384918213},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0824754536151886},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2017.2743019","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2017.2743019","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:d482b1e8662445718d1204def70e23c9","is_oa":true,"landing_page_url":"https://doaj.org/article/d482b1e8662445718d1204def70e23c9","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 5, Pp 16847-16857 (2017)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2017.2743019","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2017.2743019","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6661635413","display_name":null,"funder_award_id":"2014JY0215","funder_id":"https://openalex.org/F4320322922","funder_display_name":"Department of Science and Technology of Sichuan Province"},{"id":"https://openalex.org/G8355994222","display_name":null,"funder_award_id":"61171109","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322922","display_name":"Department of Science and Technology of Sichuan Province","ror":"https://ror.org/04323m874"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1627549671","https://openalex.org/W1969838491","https://openalex.org/W1971631990","https://openalex.org/W2025434161","https://openalex.org/W2035370544","https://openalex.org/W2037034832","https://openalex.org/W2039551223","https://openalex.org/W2058795991","https://openalex.org/W2058830214","https://openalex.org/W2066936364","https://openalex.org/W2079129429","https://openalex.org/W2089573388","https://openalex.org/W2096194225","https://openalex.org/W2102724871","https://openalex.org/W2116056698","https://openalex.org/W2140327371","https://openalex.org/W2151383094","https://openalex.org/W2156610543","https://openalex.org/W2158861126","https://openalex.org/W2172073677","https://openalex.org/W2187571407","https://openalex.org/W2216201412","https://openalex.org/W2486763437","https://openalex.org/W2507855991","https://openalex.org/W2587292088","https://openalex.org/W2622386804","https://openalex.org/W6682307640"],"related_works":["https://openalex.org/W2161474341","https://openalex.org/W4302615923","https://openalex.org/W3203142394","https://openalex.org/W2351061015","https://openalex.org/W4220731478","https://openalex.org/W1974101135","https://openalex.org/W2017509870","https://openalex.org/W4251141768","https://openalex.org/W4360952157","https://openalex.org/W2153647085"],"abstract_inverted_index":{"The":[0],"security":[1],"of":[2,55,74,129,169],"streaming":[3],"data":[4,11,109],"should":[5],"be":[6],"ensured":[7],"in":[8,13],"current":[9],"complex":[10],"era":[12],"order":[14],"to":[15,100],"provide":[16],"a":[17,84,116],"trusted":[18],"and":[19,45,79,86,114,134,154,165],"secure":[20,85],"network":[21],"environment.":[22],"To":[23],"authenticate":[24],"the":[25,52,60,67,75,93,101,106,126,131],"scalable":[26],"video":[27,170],"coding":[28],"(SVC)":[29],"streams":[30,76],"by":[31,137],"fully":[32],"utilizing":[33],"its":[34,39],"decoding":[35,47],"relationship":[36],"without":[37],"reducing":[38],"scalability,":[40],"we":[41,65,104],"establish":[42],"an":[43,138],"acyclic":[44],"directed":[46],"dependence":[48],"graph":[49],"(DDG)":[50],"on":[51,63,92],"logical":[53],"units":[54],"SVC":[56,88],"steams.":[57],"By":[58],"applying":[59],"topological":[61],"sort":[62],"DDG,":[64],"obtain":[66],"hash":[68,95],"appendence":[69,96],"mode":[70],"for":[71],"different":[72],"layers":[73],"(i.e.,":[77],"spatial":[78],"temporal":[80],"layers).":[81],"We":[82,124],"propose":[83,115],"efficient":[87],"authentication":[89,118,132,146],"method":[90],"based":[91],"deduced":[94],"mode.":[97],"With":[98],"regard":[99],"quality":[102,108,168],"layer,":[103],"consider":[105],"corresponding":[107],"packets":[110],"with":[111,120,173],"unequal":[112],"importance,":[113],"grouping":[117],"strategy":[119],"constrained":[121],"group":[122],"lengths.":[123],"form":[125],"optimization":[127],"problem":[128],"minimizing":[130],"cost,":[133],"solve":[135],"it":[136,159],"iteration":[139],"method.":[140],"Simulation":[141],"results":[142],"show":[143],"that":[144],"our":[145],"approach":[147],"can":[148,160],"achieve":[149],"much":[150,155],"less":[151],"computation":[152],"cost":[153],"lower":[156],"overhead,":[157],"while":[158],"preserve":[161],"higher":[162],"verification":[163],"rates":[164],"better":[166],"recovered":[167],"as":[171],"compared":[172],"other":[174],"state-of-the-art":[175],"methods.":[176]},"counts_by_year":[{"year":2018,"cited_by_count":1}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
