Recovering tampered regions in encrypted video using POB number system

Abstract Explosive growth in multimedia contents and wide spectrum of facilities provided by the cloud paradigm is attracting the global infrastructure towards it. However, the security and privacy issues of the outsourced content while availing these cloud based services is one of the major concerns. To secure the content, the traditional way is to render the data encrypted prior to outsourcing. However, just encrypting the data does not ensure that the content is intact as there may be attack attempts on the encrypted content. Hence, in this paper, an approach has been proposed to ensure the integrity of the content in the encrypted domain. If any breaches are attempted at the third party cloud service providers which alters the content in the encrypted form, the proposed scheme is able to first detect these tampered regions very accurately at the pixel level and thereafter, is capable of recovering the tampered content in the encrypted domain itself. Further, the overheads of bandwidth transmission are minimized here as the original information, spatial tampering bits, temporal tampering bits as well as the recovery information are compacted very efficiently exploiting the properties of the Permutation Ordered Binary (POB) number system. The scheme has been specifically tested with video contents as they contribute a major portion of the ever increasing multimedia repository. The efficacy of the scheme has been validated by testing against various attack scenarios and the scheme has been found to be performing satisfactorily well.

[1]  Yongdong Zhang,et al.  Restricted H.264/AVC video coding for privacy protected video scrambling , 2011, J. Vis. Commun. Image Represent..

[2]  A. Murat Tekalp,et al.  Video authentication with self-recovery , 2002, IS&T/SPIE Electronic Imaging.

[3]  Manoj Misra,et al.  A secure image sharing scheme based on SVD and Fractional Fourier Transform , 2017, Signal Process. Image Commun..

[4]  Cong Wang,et al.  Toward secure and effective data utilization in public cloud , 2012, IEEE Network.

[5]  K. Srinathan,et al.  Efficient privacy preserving video surveillance , 2009, 2009 IEEE 12th International Conference on Computer Vision.

[6]  Bijan G. Mobasseri,et al.  Content-dependent video authentication by self-watermarking in color space , 2001, IS&T/SPIE Electronic Imaging.

[7]  Kianoosh Mokhtarian,et al.  Authentication of Scalable Video Streams With Low Communication Overhead , 2010, IEEE Transactions on Multimedia.

[8]  Cong Wang,et al.  Enabling Privacy-Preserving Image-Centric Social Discovery , 2014, 2014 IEEE 34th International Conference on Distributed Computing Systems.

[9]  Bin Li,et al.  Automatic Detection of Object-Based Forgery in Advanced Video , 2016, IEEE Transactions on Circuits and Systems for Video Technology.

[10]  Wenjun Zeng,et al.  Efficient frequency domain selective scrambling of digital video , 2003, IEEE Trans. Multim..

[11]  Athanasios V. Vasilakos,et al.  Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..

[12]  Yongdong Zhang,et al.  Prediction restricted H.264/AVC video scrambling for privacy protection , 2010 .

[13]  Mohamed Rida,et al.  A survey of intrusion detection systems for cloud computing environment , 2016, 2016 International Conference on Engineering & MIS (ICEMIS).

[14]  Chang Wen Chen,et al.  Secure media sharing in the cloud: Two-dimensional-scalable access control and comprehensive key management , 2014, 2014 IEEE International Conference on Multimedia and Expo (ICME).

[15]  Pradeep K. Atrey,et al.  Secure Cloud-Based Image Tampering Detection and Localization Using POB Number System , 2017, ACM Trans. Multim. Comput. Commun. Appl..

[16]  Jinwei Wang,et al.  Hierarchical recovery for tampered images based on watermark self-embedding , 2017, Displays.

[17]  Mohan S. Kankanhalli,et al.  A hierarchical signature scheme for robust video authentication using secret sharing , 2004, 10th International Multimedia Modelling Conference, 2004. Proceedings..

[18]  Robert H. Deng,et al.  A Hybrid Scheme for Authenticating Scalable Video Codestreams , 2014, IEEE Transactions on Information Forensics and Security.

[19]  Monjur Ahmed,et al.  Cloud Computing and Security Issues in the Cloud , 2014, Trinity Journal of Management, IT & Media.

[20]  Balasubramanian Raman,et al.  Toward Encrypted Video Tampering Detection and Localization Based on POB Number System Over Cloud , 2018, IEEE Transactions on Circuits and Systems for Video Technology.

[21]  Cong Wang,et al.  Towards Efficient Privacy-preserving Image Feature Extraction in Cloud Computing , 2014, ACM Multimedia.

[22]  Suneeta Agarwal,et al.  An efficient fragile watermarking scheme with multilevel tamper detection and recovery based on dynamic domain selection , 2015, Multimedia Tools and Applications.

[23]  Pradeep K. Atrey,et al.  Confidence Evolution in Multimedia Systems , 2008, IEEE Transactions on Multimedia.

[24]  Robert H. Deng,et al.  Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks , 2013, IEEE Transactions on Multimedia.

[25]  C.-C. Jay Kuo,et al.  Design of integrated multimedia compression and encryption systems , 2005, IEEE Transactions on Multimedia.

[26]  Mehdi Semsarzadeh,et al.  Tampering Detection in Compressed Digital Video Using Watermarking , 2014, IEEE Transactions on Instrumentation and Measurement.

[27]  Chin-Chen Chang,et al.  Adaptive self-recovery for tampered images based on VQ indexing and inpainting , 2013, Signal Process..

[28]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[29]  Suneeta Agarwal,et al.  A self recoverable dual watermarking scheme for copyright protection and integrity verification , 2017, Multimedia Tools and Applications.