Proving Multimedia Integrity using Sanitizable Signatures Recorded on Blockchain

While significant advancements have been made in the field of multimedia forensics to detect altered content, existing techniques mostly focus on enabling the content recipient to verify the content integrity without any inputs from the content creator. In many application scenarios, the creator has a strong incentive to establish the provenance and integrity of the multimedia data created and released by him. Hence, there is a strong need for mechanisms that allow the content creator to prove the authenticity of the released content. Since blockchain technology provides an immutable distributed database, it is an ideal solution for reliably time-stamping content with its creation time and storing an irrefutable signature of the content at the time of its creation. However, a simple digital signature scheme does not allow modification of the content after the initial commitment. Authorized multimedia content alteration by its creator is often necessary (e.g., redaction of faces to protect the privacy of individuals in a video, redaction of sensitive fields in a text document) before the content is distributed. The main contributions of this paper are: (i) a novel sanitizable signature scheme that enables the content creator to prove the integrity of the redacted content, while preventing the recipients from reconstructing the redacted segments based on the published commitment, and (ii) a blockchain-based solution for securely managing the sanitizable signature. The proposed solution employs a robust hashing scheme using chameleon hash function and Merkle tree to generate the initial signature, which is stored on the blockchain. The auxiliary data required for the integrity verification step is retained by the content creator and only a signature of this auxiliary data is stored on the blockchain. Any modifications to the multimedia content requires only updating the signature of the auxiliary data, which is securely recorded on the blockchain. We demonstrate that the proposed approach enables verification of integrity of redacted multimedia content without compromising the content privacy requirements.

[1]  Martin Wattenberg,et al.  A fuzzy commitment scheme , 1999, CCS '99.

[2]  Dawn Xiaodong Song,et al.  Homomorphic Signature Schemes , 2002, CT-RSA.

[3]  Vitaly Shmatikov,et al.  Defeating Image Obfuscation with Deep Learning , 2016, ArXiv.

[4]  Nikita Borisov,et al.  Do You Hear What I Hear?: Fingerprinting Smart Devices Through Embedded Acoustic Components , 2014, CCS.

[5]  Hugo Krawczyk,et al.  Chameleon Signatures , 2000, NDSS.

[6]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[7]  A.H. Tewfik,et al.  When seeing isn't believing [multimedia authentication technologies] , 2004, IEEE Signal Processing Magazine.

[8]  Henrich Christopher Pöhls,et al.  Non-interactive Public Accountability for Sanitizable Signatures , 2012, EuroPKI.

[9]  Marc Fischlin,et al.  Redactable Graph Hashing , Revisited , 2017 .

[10]  Christian Riess,et al.  Ieee Transactions on Information Forensics and Security an Evaluation of Popular Copy-move Forgery Detection Approaches , 2022 .

[11]  Bela Gipp,et al.  Securing Video Integrity Using Decentralized Trusted Timestamping on the Bitcoin Blockchain , 2016, MCIS.

[12]  Ralph C. Merkle,et al.  A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.

[13]  Kwangjo Kim,et al.  Chameleon Hashing Without Key Exposure , 2004, ISC.

[14]  E M Van Buskirk,et al.  When seeing isn't believing. , 1997, Journal of glaucoma.

[15]  Miroslav Goljan,et al.  Digital camera identification from sensor pattern noise , 2006, IEEE Transactions on Information Forensics and Security.

[16]  Judith Redi,et al.  Digital image forensics: a booklet for beginners , 2010, Multimedia Tools and Applications.

[17]  Eran Tromer,et al.  PhotoProof: Cryptographic Image Authentication for Any Set of Permissible Transformations , 2016, 2016 IEEE Symposium on Security and Privacy (SP).

[18]  Touradj Ebrahimi,et al.  PEViD: privacy evaluation video dataset , 2013, Optics & Photonics - Optical Engineering + Applications.

[19]  Kun He,et al.  MIHash: Online Hashing with Mutual Information , 2017, 2017 IEEE International Conference on Computer Vision (ICCV).

[20]  Nick Szabo,et al.  Formalizing and Securing Relationships on Public Networks , 1997, First Monday.

[21]  Melanie Swan,et al.  Blockchain: Blueprint for a New Economy , 2015 .

[22]  Gary Friedman,et al.  The trustworthy digital camera: restoring credibility to the photographic image , 1993 .

[23]  Douglas M. Blough,et al.  Verifiable and Redactable Medical Documents , 2012, AMIA.

[24]  Sharath Pankanti,et al.  Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.

[25]  Giuseppe Ateniese,et al.  On the Key Exposure Problem in Chameleon Hashes , 2004, SCN.

[26]  Jean-Luc Dugelay,et al.  A Survey of Watermarking Algorithms for Image Authentication , 2002, EURASIP J. Adv. Signal Process..

[27]  Mahmudur Rahman,et al.  Video Liveness for Citizen Journalism: Attacks and Defenses , 2017, IEEE Transactions on Mobile Computing.