1. Chandrasekhar S, Chakrabarti S, Singhal M (2012) A trap door hash-based mechanism for stream authentication. IEEE Trans Dependable Secure Comput 9(5):699–713
2. Gennaro R, Rohatgi P (1997) How to sign digital streams. In: Proc. advances in cryptology (CRYPTO’97), vol 1294. Lecture Notes in Computer Science. Springer, Berlin, Germany, pp 180–197
3. Golle P, Modadugu N (2001) Authenticating streamed data in the presence of random packet loss. In: Proc. network and Distributed Systems Security symposium (NDSS’01), pp 13–22
4. Haouzia A, Noumeir R (2008) Methods for image authentication: a survey. Multimed Tools Appl 39(1):1–46
5. Hefeeda M, Mokhtarian K (2010) Authentication schemes for multimedia streams: quantitative analysis and comparison. ACM Trans Multimed Comput Commun Appl 6(1):1–24