Skip to main content
Log in

A scalable signature scheme for video authentication

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

This paper addresses the problem of ensuring the integrity of a digital video and presents a scalable signature scheme for video authentication based on cryptographic secret sharing. The proposed method detects spatial cropping and temporal jittering in a video, yet is robust against frame dropping in the streaming video scenario. In our scheme, the authentication signature is compact and independent of the size of the video. Given a video, we identify the key frames based on differential energy between the frames. Considering video frames as shares, we compute the corresponding secret at three hierarchical levels. The master secret is used as digital signature to authenticate the video. The proposed signature scheme is scalable to three hierarchical levels of signature computation based on the needs of different scenarios. We provide extensive experimental results to show the utility of our technique in three different scenarios—streaming video, video identification and face tampering.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Atrey PK, Yan WQ, Chang EC, Kankanhalli MS (2004) A hierarchical signature scheme for robust video authentication using secret sharing. In: International multi-media modelling conference, Brisbane, Australia, pp 330–337

  2. Celik MU, Sharma G, Tekalp AM, Saber ES (2002) Video authentication with self-recovery. In: SPIE: security and watermarking of multimedia contents IV, vol 4675. San Jose, CA, pp 531–541

  3. Daniel C, Bijan M (2002) Watermarking for self-authentication of compressed video. In: IEEE international conference on image processing, vol II. Rochester, NY, pp 913–916

  4. Dittman J, Steinmetz A, Steinmetz R (1999) Content based digital signature for motion pictures authentication and content-fragile watermarking. In: IEEE international conference on multimedia computing and systems, vol 2. Firenze, Italy, p 204

  5. Divakaran A, Radhakrishnan R, Peker KA (2002) Motion activity based extraction of key frames from video shots. In: IEEE international conference on image processing, vol I. Rochester, NY, pp 932–935

  6. Du R, Fridrich J (2002) Lossless authentication of MPEG-2 video. In: IEEE international conference on image processing, vol II. Rochester, NY, pp 893–896

    Google Scholar 

  7. Eskicioglu AM (2001) A prepositioned secret sharing scheme for message authentication in broadcast networks. In: The 5th joint working conference on communications and multimedia security, Darmstadt, Germany, pp 363–373

  8. He D, Sun Q, Tian Q (2003) A semi-fragile object based video authentication system. In: IEEE international symposium on circuits and systems, vol III. Bangkok, Thailand, pp 814–817

  9. Lang ST, Peticolos FA (2003) Authentication of MPEG-4 data: risks and solutions. In: SPIE international conference on security and watermarking of multimedia contents V, vol 5020. Santa Clara, CA, pp 452–461

  10. Lin CY, Chang SF (1999) Issues and solutions for authenticating MPEG video. In: IEEE international conference on acoustics, speech and signal processing, pp 54–65

  11. Mobasseri BG, Sieffert MJ, Simard RJ (2000) Content authentication and tamper detection in digital video. In: IEEE international conference on image processing, vol I. Vancouver, BC, Canada, pp 458–461

  12. Qi Y, Liu T, Hauptmann A (2004) Supervised classification of video shot segmentation. In: IEEE international conference on multimedia and expo, vol II. Baltimore, MD, pp 689–692

  13. Quisquater JJ, Marc J, Macq B, Degand N, Bernard A (1997) Practical solutions to authentication of images with a secure camera. In: SPIE international conference on storage and retrieval for image and video databases V, vol 3022. San Jose, CA, pp 290–297

  14. Radhakrishnan R, Xiong Z, Memon ND (2003) On the security of visual hash function. In: SPIE international conference annual symposium on electronic imaging: Science and technology, vol 5020. Santa Clara, CA, pp 644–652

  15. Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613

    Article  MATH  MathSciNet  Google Scholar 

  16. Stinson DR (1995) Cryptography: Theory and Practice, 1st edn, Chap 11. CRC Press, Boca Raton

    MATH  Google Scholar 

  17. Tzeng CH, Tsai WH (2001) A new technique for authentication of image/video for multimedia applications. In: Multimedia and security workshop at ACM multimedia, Ottawa, Canada

  18. Yan WQ, Kankanhalli MS (2003) Motion trajectory based video authentication. In: IEEE international symposium on circuits and systems, vol III. Bangkok, Thailand, pp 810–813

  19. Yin P, Yu HH (2002) A semi-fragile watermarking system for MPEG video authentication. In: International conference on acoustic speech and signal processing, vol IV. Orlando, FL, pp 3461–3464

  20. Zhang HJ, Wu J, Zhong D, Smoliar S (1997) An integrated system for content-based video retrieval and browsing. Pattern Recogn 30(4):643–658

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Pradeep K. Atrey.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Atrey, P.K., Yan, WQ. & Kankanhalli, M.S. A scalable signature scheme for video authentication. Multimed Tools Appl 34, 107–135 (2007). https://doi.org/10.1007/s11042-006-0074-7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-006-0074-7

Keywords

Navigation