A study of content authentication in proxy-enabled multimedia delivery systems: Model, techniques, and applications

Compared with the direct server-user approach, the server-proxy-user architecture for multimedia delivery promises significantly improved system scalability. The introduction of the intermediary transcoding proxies between content servers and end users in this architecture, however, brings unprecedented challenges to content security. In this article, we present a systematic study on the end-to-end content authentication problem in the server-proxy-user context, where intermediary proxies transcode multimedia content dynamically. We present a formal model for the authentication problem, propose a concrete construction for authenticating generic data modality and formally prove its security. We then apply the generic construction to authenticating specific multimedia formats, for example, JPEG2000 code-streams and MPEG-4 video streams. The prototype implementation shows that our scheme is suitable for practical applications.

[1]  Ran Canetti,et al.  Efficient and Secure Source Authentication for Multicast , 2001, NDSS.

[2]  Darko Kirovski,et al.  Multimedia encryption and authentication - techniques and applications , 2006 .

[3]  Robert H. Deng,et al.  Scalable authentication of MPEG-4 streams , 2006, IEEE Transactions on Multimedia.

[4]  Mihir Bellare,et al.  Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.

[5]  Edwin K. P. Chong,et al.  Efficient multicast stream authentication using erasure codes , 2003, TSEC.

[6]  Darko Kirovski,et al.  Multimedia content screening using a dual watermarking and fingerprinting system , 2002, MULTIMEDIA '02.

[7]  Min Wu,et al.  Robust and secure image hashing , 2006, IEEE Transactions on Information Forensics and Security.

[8]  Dawn Xiaodong Song,et al.  Homomorphic Signature Schemes , 2002, CT-RSA.

[9]  Philip S. Yu,et al.  Collaborative proxy system for distributed Web content transcoding , 2000, CIKM '00.

[10]  Qing Chen,et al.  Lossless data embedding with file size preservation , 2004, IS&T/SPIE Electronic Imaging.

[11]  Ravi Jain,et al.  A System for End-to-End Authentication of Adaptive Multimedia Content , 2004, Communications and Multimedia Security.

[12]  Bruno Crispo,et al.  Chained Stream Authentication , 2000, Selected Areas in Cryptography.

[13]  Newton Lee,et al.  ACM Transactions on Multimedia Computing, Communications and Applications (ACM TOMCCAP) , 2007, CIE.

[14]  Jacques Stern,et al.  Twin signatures: an alternative to the hash-and-sign paradigm , 2001, CCS '01.

[15]  Dima Pröfrock,et al.  Dual watermarking for protection of rightful ownership and secure image authentication , 2006, MCPS '06.

[16]  Ralph C. Merkle,et al.  A Certified Digital Signature , 1989, CRYPTO.

[17]  Robert H. Deng,et al.  A flexible and scalable authentication scheme for JPEG2000 image codestreams , 2003, MULTIMEDIA '03.

[18]  Philippe Golle,et al.  Authenticating Streamed Data in the Presence of Random Packet Loss , 2001, NDSS.

[19]  Harald Kosch,et al.  Content adaptation of multimedia delivery and indexing using MPEG-7 , 2002, MULTIMEDIA '02.

[20]  Ahmet M. Eskicioglu,et al.  Selective Encryption of Multimedia Content in Distribution Networks: Challenges and New Directions , 2003 .

[21]  D. Kirovski,et al.  Fingerprinting and forensic analysis of multimedia , 2004, MULTIMEDIA '04.

[22]  Ron Steinfeld,et al.  Content Extraction Signatures , 2001, ICISC.

[23]  Refik Molva,et al.  Efficient Multicast Packet Authentication , 2003, NDSS.

[24]  Roberto Tamassia,et al.  Multicast authentication in fully adversarial networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[25]  Pankaj Rohatgi,et al.  A compact and fast hybrid signature scheme for multicast packet authentication , 1999, CCS '99.

[26]  David K. Y. Yau,et al.  A case for a multi-key secure video proxy: theory, design, and implementation , 2002, MULTIMEDIA '02.

[27]  Bob Briscoe,et al.  FLAMeS: Fast, Loss-Tolerant Authentication of Multicast Streams , 2000 .

[28]  Ellen W. Zegura,et al.  Self-organizing wide-area network caches , 1998, Proceedings. IEEE INFOCOM '98, the Conference on Computer Communications. Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies. Gateway to the 21st Century (Cat. No.98.

[29]  Bambang Parmanto,et al.  Transcoding Biomedical Information Resources for Mobile Handhelds , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.

[30]  Jessica Staddon,et al.  Graph-based authentication of digital streams , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[31]  Wei Tsang Ooi,et al.  Distributing media transformation over multiple media gateways , 2001, MULTIMEDIA '01.

[32]  David Mazières,et al.  On-the-fly verification of rateless erasure codes for efficient content distribution , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[33]  Thomas Hardjono,et al.  Sibling Intractable Function Families and Their Applications (Extended Abstract) , 1991, ASIACRYPT.

[34]  Ming-Syan Chen,et al.  A QoS-aware transcoding proxy using on-demand data broadcasting , 2004, IEEE INFOCOM 2004.

[35]  Huafei Zhu,et al.  Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream , 2005, ICICS.

[36]  Robert H. Deng,et al.  Scalable trusted online dissemination of JPEG2000 images , 2005, Multimedia Systems.

[37]  Ravi Jain,et al.  End-to-end security in the presence of intelligent data adapting proxies: the case of authenticating transcoded streaming media , 2005, IEEE Journal on Selected Areas in Communications.

[38]  Hideo Miyahara,et al.  ASIA : Information Sharing System with Derived Content Restriction Management , 2003 .

[39]  Gene Tsudik,et al.  Sanitizable Signatures , 2005, ESORICS.

[40]  H DengRobert,et al.  A study of content authentication in proxy-enabled multimedia delivery systems , 2009 .

[41]  Jinan Fiaidhi,et al.  Developing secure transcoding intermediary for SVG medical images within peer-to-peer ubiquitous environment , 2005, 3rd Annual Communication Networks and Services Research Conference (CNSR'05).

[42]  Wolfgang Kellerer,et al.  Web services selection for distributed composition of multimedia content , 2004, MULTIMEDIA '04.

[43]  Graham A. Jullien,et al.  Complexity and Fast Algorithms for Multiexponentiations , 2000, IEEE Trans. Computers.

[44]  Charilaos Christopoulos,et al.  Video transcoding for universal multimedia access , 2000, MULTIMEDIA '00.

[45]  Ran Canetti,et al.  Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[46]  John R. Smith,et al.  Content-based transcoding of images in the Internet , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[47]  Ron Steinfeld,et al.  VSH, an Efficient and Provable Collision Resistant Hash Function , 2006, IACR Cryptol. ePrint Arch..

[48]  Hideki Imai,et al.  Digitally signed document sanitizing scheme based on bilinear maps , 2006, ASIACCS '06.

[49]  Keiichi Yasumoto,et al.  Resource-aware service composition for video multicast to heterogeneous mobile users , 2005, MSC '05.

[50]  Adrian Perrig,et al.  The BiBa one-time signature and broadcast authentication protocol , 2001, CCS '01.

[51]  Shih-Fu Chang,et al.  A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..

[52]  Shih-Fu Chang,et al.  A robust content based digital signature for image authentication , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[53]  Ron Kikinis,et al.  Flexible frameworks for medical multimedia , 2004, MULTIMEDIA '04.

[54]  Hovav Shacham,et al.  Sequential Aggregate Signatures from Trapdoor Permutations , 2004, EUROCRYPT.

[55]  Nicolas D. Georganas,et al.  Digital image watermarking for joint ownership , 2002, MULTIMEDIA '02.

[56]  Sung-Ju Lee,et al.  Streaming Media Caching with Transcoding-Enabled Proxies , 2003 .

[57]  Keqiu Li,et al.  Coordinated enroute multimedia object caching in transcoding proxies for tree networks , 2005, TOMCCAP.