Secure Block-Based Video Authentication with Localization and Self-Recovery

Because of the great advance in multimedia technology, digital multimedia is vulnerable to malicious manipulations. In this paper, a public key self-recovery block-based video authentication technique is proposed which can not only precisely localize the alteration detection but also recover the missing data with high reliability. In the proposed block-based technique, multiple description coding MDC is used to generate two codes (two descriptions) for each block. Although one block code (one description) is enough to rebuild the altered block, the altered block is rebuilt with better quality by the two block descriptions. So using MDC increases the ratability of recovering data. A block signature is computed using a cryptographic hash function and a doubly linked chain is utilized to embed the block signature copies and the block descriptions into the LSBs of distant blocks and the block itself. The doubly linked chain scheme gives the proposed technique the capability to thwart vector quantization attacks. In our proposed technique , anyone can check the authenticity of a given video using the public key. The experimental results show that the proposed technique is reliable for detecting, localizing and recovering the alterations.




References:
[1] C. Fei, D. Kundur and R. H. Kwong, "Analysis and design of secure
watermark-based authentication system," IEEE Trans. on Information
Forensics and Security, vol.1, no.1, pp.43-55, March 2006.
[2] Y. M. Y. Hasan and A. M. Hassan, "Dual domain localized
autorecovery image authentication," in Proc. Information Security
Symposium (ISS-06), Al-Madina, KSA, May 2-4, 2006, pp.138-148.
[3] P. W. Wong, "A public key watermark for image verification and
authentication," in Proc. ICIP, NY, USA, Oct.4-7, 1998, pp.425-429.
[4] P. W. Wong and N. Memon, "Secret and public key image watermarking
schemes for image authentication and ownership verification," IEEE
Trans. on Image Proc., vol.10, no.10, Oct. 2001.
[5] Y. M. Hasan and A. M. Hassan, "Tamper detection with self-correction
hybrid spatial-DCT domains image authentication technique," in Proc.
IEEE ISSPIT'07,Cairo, Egypt, 2007.
[6] Y. M. Y. Hasan and A. M. Hassan, "Fragile blockwise image
authentication thwarting vector quantization attack," in Proc. IEEE
ISSPIT-04, Rome, Italy, Dec. 18-21, 2004, pp.530-533.
[7] E. Lin and E. Delp, "A review of fragile image watermarks," in Proc. of
the ACM Multimedia and Security Workshop, 1999, pp. 25-29.
[8] M. U. Celik, G. Sharma, E. Saber, and A. M. Tekalp, "A hierarchical
image authentication watermark with improved localization and
security," in Proc. ICIP'01, Greece, Oct. 2001, pp.502-505.
[9] E. T. Lin, C. I. Podilchuk, and E. J. Delp, "Detection of image alterations
using semi-fragile watermarks," in Proc. of the SPIE Int. Conf. on
Security and Watermarking of Multimedia Contents II, vol. 3971, San
Jose, CA, USA, Jan. 23 - 28, 2000.
[10] O. Ekici, B. Sankur, B. Coskun, U. Naci and M. Akcay, "Comparative
evaluation of semi-fragile watermarking algorithms," Journal of
Electronic Imaging, vol.13, no.1, pp.209-216, Jan. 2004.
[11] K. Al-sultan, M. Saeb and U. Badawi, "A proposed semi-fragile
watermarking scheme for image authentication," in Proc. ICCTA-04,
Alexandria, Egypt, Sep.6-9, 2004.
[12] J. Fridrich, "Robust bit extraction from images," in Proc. IEEE
ICMCS'99, Florence, Italy, vol. 2, June 7-11, 1999, pp.536-540.
[13] J. Fridrich, "Visual hash for oblivious watermarking," in Proc. SPIE
Photonic West Electronic Imaging: Security and Watermarking of
Multimedia Contents, San Jose, U.S.A., Jan. 24-26, 2000, pp.286-294.
[14] J. Fridrich, M. Goljan, "Robust hash functions for digital watermarking,"
in Proc. ITCC, CA, USA, March 2000, pp.173-178.
[15] J. Fridrich and M. Goljan, "Images with self-correction capabilities," in
Proc. ICIP'99, Kobe, Japan, 1999.
[16] J. Fridrich and M. Goljan, "Protection of digital images using self
embedding," Symp. Content Security and Data Hiding in Digital Media,
New Jersey Institute of Technology, May 14, 1999.
[17] M. Celik, Gaurav , G. Sharma, A. M. Tekalp , E. Saber, " Video
authentication with self recovery," Proceedings of SPIE, Security and
atermarking of Multimedia Content IV, vol 4675. San Jose, CA, USA ,
pp 531-541, 2003.
[18] D. He, Q. Sun, and Q. Tian, "A secure and robust object-based video
authentication system," EURASIP Journal on Applied Signal
Processing, vol. 2004, Issue 14, PP 2185-2200, Jan. 2004.
[19] D. Pröfrock, H. Richter, M. Schlauweg, E. M├╝ller, "H.264/AVC video
authentication using skipped macroblocks for an erasable watermark, "
Proc. of the VCIP, Beijing, China, July 2005.
[20] N. Ramaswamy, K. R. Rao, "Video authentication for H.264/AVC using
digital signature standard and secure hash algorithm, " Proceedings of
the 2006 international workshop on Network and Operating Systems
Support for Digital Audio and Video 2006, Newport, Rhode Island
November 22 - 23, 2006.
[21] M. Holliman and N. Memon, "Counterfeiting attacks on oblivious blockwise
independent invisible watermarking schemes," IEEE Trans. on
Image Processing, vol. 9, no. 3, pp.432-441, March 2000.
[22] M. Kutter, S. Voloshynovskiy znd A. Herrigl, "The watermark copy
attack," in Proc. SPIE Elect. Imaging, San Jose, USA, Jan. 23-28, 2000.
[23] D. Kirovski and F. A. P. Petitcolas, "Blind pattern matching attack on
watermarking systems," IEEE Trans. on Signal Processing, pp.1-9,
2002.
[24] H. Lue, Z. Lu, S. Chu, and J. Pan, "Self embedding watermarking
scheme using halftone image," IIEICE Transactions on Information and
Systems, 2008.
[25] C. Lin and S. F. Chang, "SARI: self-authentication-and-recovery image
watermarking system," Proceedings of the ninth ACM Conference on
Multimedia, Ottawa, Canada ,2001.
[26] A. J. Menezes, P. C. Orschot, and S. A. Vanstone, Handbook of Applied
Cryptography, CRC Press, 2001.
[27] B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source
Code in C, John Wiley & Sons, USA, 1996.
[28] S. Wang and S. Tsai, "Automatic image authentication and recovery
using fractal code embedding and image inpainting," Journal of the
Pattern Recognition Society, vol. 41, pp. 701 - 712, 2008.