Multi-layer authentication scheme for HEVC video based on embedded statistics

A three layers HEVC authentication scheme is proposed.Authentication tag is generated from one slice and embedded into its subsequent slice.Tampered region is detected and localized by utilizing data embedding technique.Proposed authentication scheme is robust against common attacks. A multi-layer authentication scheme for HEVC compressed video is proposed. The combination of CU sizes, which is unique to HEVC and sensitive to video manipulation, is considered along with other elements in the HEVC coding standard to generate the authentication tag. Temporal dependency was enforced, where the authentication tag generated in one slice is embedded into its subsequent slice. By design, the authentication tag is repeatedly but selectively embedded into various elements in a HEVC video, including nonzero DCT coefficients, QP parameter values, and prediction modes, depending on the bit segment in the generated tag. Our scheme offers three layers of authentication to detect and localize the tampered regions in a HEVC video, as well as verifying the source/sender of the video using a shared secret key. Video sequences from various classes (resolutions) are considered to verify the performance of the proposed multi-layer authentication scheme. Results show that, at the expense of slight degradation in perceptual quality, the proposed scheme is robust against several common attacks. A functional comparison is performed between the proposed multi-layer authentication scheme and the conventional schemes.

[1]  Jun Chen,et al.  A low-cost authenticating mechanism for interactive video streaming , 2013, 2013 IEEE 4th International Conference on Software Engineering and Service Science.

[2]  Aaron T. Sharp,et al.  Digital video authentication with motion vector watermarking , 2010, 2010 4th International Conference on Signal Processing and Communication Systems.

[3]  Eero P. Simoncelli,et al.  Image quality assessment: from error visibility to structural similarity , 2004, IEEE Transactions on Image Processing.

[4]  Robert H. Deng,et al.  A Hybrid Scheme for Authenticating Scalable Video Codestreams , 2014, IEEE Transactions on Information Forensics and Security.

[5]  Alan C. Bovik,et al.  Blind Image Quality Assessment: From Natural Scene Statistics to Perceptual Quality , 2011, IEEE Transactions on Image Processing.

[6]  Saurabh Upadhyay,et al.  Learning based video authentication using statistical local information , 2011, 2011 International Conference on Image Information Processing.

[7]  Robert H. Deng,et al.  Generic attacks on content-based video stream authentication , 2014, 2014 IEEE International Conference on Multimedia and Expo Workshops (ICMEW).

[8]  Joonsang Baek,et al.  An Authentication Framework for Automatic Dependent Surveillance-Broadcast Based on Online/Offline Identity-Based Signature , 2013, 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing.

[9]  Xing Xin,et al.  A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization , 2015, J. Vis. Commun. Image Represent..

[10]  KokSheik Wong,et al.  An Overview of Information Hiding in H.264/AVC Compressed Video , 2014, IEEE Transactions on Circuits and Systems for Video Technology.

[11]  Huaxiong Wang,et al.  Authentication of Digital Streams , 2011, IEEE Transactions on Information Theory.

[12]  Fangzhe Chang,et al.  Authenticating Lossy Surveillance Video , 2013, IEEE Transactions on Information Forensics and Security.

[13]  Joonsang Baek,et al.  Efficient online/offline identity-based signature for wireless sensor network , 2010, International Journal of Information Security.

[14]  Rashid Ansari,et al.  Iterative compensation schemes for multimedia content authentication , 2009, J. Vis. Commun. Image Represent..

[15]  Marko Viitanen,et al.  Efficient Mode Decision Schemes for HEVC Inter Prediction , 2014, IEEE Transactions on Circuits and Systems for Video Technology.

[16]  Gary J. Sullivan,et al.  Overview of the High Efficiency Video Coding (HEVC) Standard , 2012, IEEE Transactions on Circuits and Systems for Video Technology.

[17]  Hazem Al-Otum,et al.  Semi-fragile watermarking for grayscale image authentication and tamper detection based on an adjusted expanded-bit multiscale quantization-based technique , 2014, J. Vis. Commun. Image Represent..

[18]  Dinu Coltuc,et al.  Improved control for low bit-rate reversible watermarking , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[19]  Jing Zhang,et al.  Efficient Video Authentication for H.264/AVC , 2006, First International Conference on Innovative Computing, Information and Control - Volume I (ICICIC'06).

[20]  KokSheik Wong,et al.  Information hiding in HEVC standard using adaptive coding block size decision , 2014, 2014 IEEE International Conference on Image Processing (ICIP).

[21]  Jennifer Ren,et al.  Accuracy of a high-level, loss-tolerant video fingerprint for surveillance authentication , 2012, Proceedings of the 21st International Conference on Pattern Recognition (ICPR2012).

[22]  Xin Li,et al.  Hardware Implementation of a Digital Watermarking System for Video Authentication , 2013, IEEE Transactions on Circuits and Systems for Video Technology.

[23]  Yu-Chen Hu,et al.  An adaptive image authentication scheme for vector quantization compressed image , 2011, J. Vis. Commun. Image Represent..

[24]  Mohan S. Kankanhalli,et al.  Digital Video Authentication , 2009 .