Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30840
Secure Block-Based Video Authentication with Localization and Self-Recovery

Authors: Ayoub Al-Hamadi, Bernd Michaelis, Ammar M. Hassan, Yassin M. Y. Hasan, Mohamed A. A. Wahab


Because of the great advance in multimedia technology, digital multimedia is vulnerable to malicious manipulations. In this paper, a public key self-recovery block-based video authentication technique is proposed which can not only precisely localize the alteration detection but also recover the missing data with high reliability. In the proposed block-based technique, multiple description coding MDC is used to generate two codes (two descriptions) for each block. Although one block code (one description) is enough to rebuild the altered block, the altered block is rebuilt with better quality by the two block descriptions. So using MDC increases the ratability of recovering data. A block signature is computed using a cryptographic hash function and a doubly linked chain is utilized to embed the block signature copies and the block descriptions into the LSBs of distant blocks and the block itself. The doubly linked chain scheme gives the proposed technique the capability to thwart vector quantization attacks. In our proposed technique , anyone can check the authenticity of a given video using the public key. The experimental results show that the proposed technique is reliable for detecting, localizing and recovering the alterations.

Keywords: Authentication, Watermarking, Hash Function, public key encryption, multiple descriptioncoding

Digital Object Identifier (DOI):

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1634


[1] C. Fei, D. Kundur and R. H. Kwong, "Analysis and design of secure watermark-based authentication system," IEEE Trans. on Information Forensics and Security, vol.1, no.1, pp.43-55, March 2006.
[2] Y. M. Y. Hasan and A. M. Hassan, "Dual domain localized autorecovery image authentication," in Proc. Information Security Symposium (ISS-06), Al-Madina, KSA, May 2-4, 2006, pp.138-148.
[3] P. W. Wong, "A public key watermark for image verification and authentication," in Proc. ICIP, NY, USA, Oct.4-7, 1998, pp.425-429.
[4] P. W. Wong and N. Memon, "Secret and public key image watermarking schemes for image authentication and ownership verification," IEEE Trans. on Image Proc., vol.10, no.10, Oct. 2001.
[5] Y. M. Hasan and A. M. Hassan, "Tamper detection with self-correction hybrid spatial-DCT domains image authentication technique," in Proc. IEEE ISSPIT'07,Cairo, Egypt, 2007.
[6] Y. M. Y. Hasan and A. M. Hassan, "Fragile blockwise image authentication thwarting vector quantization attack," in Proc. IEEE ISSPIT-04, Rome, Italy, Dec. 18-21, 2004, pp.530-533.
[7] E. Lin and E. Delp, "A review of fragile image watermarks," in Proc. of the ACM Multimedia and Security Workshop, 1999, pp. 25-29.
[8] M. U. Celik, G. Sharma, E. Saber, and A. M. Tekalp, "A hierarchical image authentication watermark with improved localization and security," in Proc. ICIP'01, Greece, Oct. 2001, pp.502-505.
[9] E. T. Lin, C. I. Podilchuk, and E. J. Delp, "Detection of image alterations using semi-fragile watermarks," in Proc. of the SPIE Int. Conf. on Security and Watermarking of Multimedia Contents II, vol. 3971, San Jose, CA, USA, Jan. 23 - 28, 2000.
[10] O. Ekici, B. Sankur, B. Coskun, U. Naci and M. Akcay, "Comparative evaluation of semi-fragile watermarking algorithms," Journal of Electronic Imaging, vol.13, no.1, pp.209-216, Jan. 2004.
[11] K. Al-sultan, M. Saeb and U. Badawi, "A proposed semi-fragile watermarking scheme for image authentication," in Proc. ICCTA-04, Alexandria, Egypt, Sep.6-9, 2004.
[12] J. Fridrich, "Robust bit extraction from images," in Proc. IEEE ICMCS'99, Florence, Italy, vol. 2, June 7-11, 1999, pp.536-540.
[13] J. Fridrich, "Visual hash for oblivious watermarking," in Proc. SPIE Photonic West Electronic Imaging: Security and Watermarking of Multimedia Contents, San Jose, U.S.A., Jan. 24-26, 2000, pp.286-294.
[14] J. Fridrich, M. Goljan, "Robust hash functions for digital watermarking," in Proc. ITCC, CA, USA, March 2000, pp.173-178.
[15] J. Fridrich and M. Goljan, "Images with self-correction capabilities," in Proc. ICIP'99, Kobe, Japan, 1999.
[16] J. Fridrich and M. Goljan, "Protection of digital images using self embedding," Symp. Content Security and Data Hiding in Digital Media, New Jersey Institute of Technology, May 14, 1999.
[17] M. Celik, Gaurav , G. Sharma, A. M. Tekalp , E. Saber, " Video authentication with self recovery," Proceedings of SPIE, Security and atermarking of Multimedia Content IV, vol 4675. San Jose, CA, USA , pp 531-541, 2003.
[18] D. He, Q. Sun, and Q. Tian, "A secure and robust object-based video authentication system," EURASIP Journal on Applied Signal Processing, vol. 2004, Issue 14, PP 2185-2200, Jan. 2004.
[19] D. Pröfrock, H. Richter, M. Schlauweg, E. M├╝ller, "H.264/AVC video authentication using skipped macroblocks for an erasable watermark, " Proc. of the VCIP, Beijing, China, July 2005.
[20] N. Ramaswamy, K. R. Rao, "Video authentication for H.264/AVC using digital signature standard and secure hash algorithm, " Proceedings of the 2006 international workshop on Network and Operating Systems Support for Digital Audio and Video 2006, Newport, Rhode Island November 22 - 23, 2006.
[21] M. Holliman and N. Memon, "Counterfeiting attacks on oblivious blockwise independent invisible watermarking schemes," IEEE Trans. on Image Processing, vol. 9, no. 3, pp.432-441, March 2000.
[22] M. Kutter, S. Voloshynovskiy znd A. Herrigl, "The watermark copy attack," in Proc. SPIE Elect. Imaging, San Jose, USA, Jan. 23-28, 2000.
[23] D. Kirovski and F. A. P. Petitcolas, "Blind pattern matching attack on watermarking systems," IEEE Trans. on Signal Processing, pp.1-9, 2002.
[24] H. Lue, Z. Lu, S. Chu, and J. Pan, "Self embedding watermarking scheme using halftone image," IIEICE Transactions on Information and Systems, 2008.
[25] C. Lin and S. F. Chang, "SARI: self-authentication-and-recovery image watermarking system," Proceedings of the ninth ACM Conference on Multimedia, Ottawa, Canada ,2001.
[26] A. J. Menezes, P. C. Orschot, and S. A. Vanstone, Handbook of Applied Cryptography, CRC Press, 2001.
[27] B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, John Wiley & Sons, USA, 1996.
[28] S. Wang and S. Tsai, "Automatic image authentication and recovery using fractal code embedding and image inpainting," Journal of the Pattern Recognition Society, vol. 41, pp. 701 - 712, 2008.