A hierarchical signature scheme for robust video authentication using secret sharing

Ensuring the integrity of a digital video is an important and challenging research problem arising out of many video applications. In this paper, we present a hierarchical framework for video authentication based on cryptographic secret sharing that protects a video from spatial cropping and temporal jittering, yet is robust against frame dropping in the streaming video scenario. Our algorithm provides a tradeoff between security and robustness by having configurable inputs. The authentication signature is compact and very sensitive against spatial attacks such as region tampering, and interframe attacks like frame replacement, major frame dropping, and frame reordering. Given a video, we identify the key frames based on different energy between the frames. Considering video frames as shares, we compute the secret at three hierarchical levels. The master secret is used as digital signature to authenticate the video. We present extensive experimental results which show the utility of our technique.

[1]  Shih-Fu Chang,et al.  Issues and solutions for authenticating MPEG video , 1999, Electronic Imaging.

[2]  Bijan G. Mobasseri,et al.  Content authentication and tamper detection in digital video , 2000, Proceedings 2000 International Conference on Image Processing (Cat. No.00CH37101).

[3]  Jiri Fridrich,et al.  Lossless authentication of MPEG-2 video , 2002, Proceedings. International Conference on Image Processing.

[4]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[5]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[6]  A. Murat Tekalp,et al.  Video authentication with self-recovery , 2002, IS&T/SPIE Electronic Imaging.

[7]  Wei-Ying Ma,et al.  An indexing and browsing system for home video , 2000, 2000 10th European Signal Processing Conference.

[8]  Wen-Hsiang Tsai,et al.  A new technique for authentication of image/video for multimedia applications , 2001, MM&Sec '01.

[9]  Bijan G. Mobasseri,et al.  Watermarking for self-authentication of compressed video , 2002, Proceedings. International Conference on Image Processing.

[10]  Hong Heather Yu,et al.  A semi-fragile watermarking system for MPEG video authentication , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[11]  Qi Tian,et al.  A semi-fragile object based video authentication system , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..

[12]  Fabien A. P. Petitcolas,et al.  Authentication of MPEG-4 data: risks and solutions , 2003, IS&T/SPIE Electronic Imaging.

[13]  Regunathan Radhakrishnan,et al.  Security of visual hash function , 2003, IS&T/SPIE Electronic Imaging.

[14]  Ahmet M. Eskicioglu A Prepositioned Secret Sharing Scheme for Message Authentication in Broadcast Networks , 2001 .

[15]  Marc Joye,et al.  Authentication of Sequences with the SL2 Hash Function: Application to Video Sequences , 1997, J. Comput. Secur..

[16]  Mohan S. Kankanhalli,et al.  Motion trajectory based video authentication , 2003, Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS '03..