Skip to main navigation Skip to search Skip to main content

A hierarchical signature scheme for robust video authentication using secret sharing

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

15 Scopus citations

Abstract

Ensuring the integrity of a digital video is an important and challenging research problem arising out of many video applications, In this paper, we present a hierarchical framework for video authentication based on cryptographic secret sharing that protects a video from spatial cropping and temporal jittering, yet is robust against frame dropping in the streaming video scenario. Our algorithm provides a trade-off between security and robustness by having configurable inputs. The authentication signature is compact and very sensitive against spatial attacks such as region tampering, and inter-frame attacks like frame replacement, major frame dropping, and frame reordering. Given a video, we identify the key frames based on differential energy between the frames. Considering video frames as shares, we compute the secret at three hierarchical levels. The master secret is used as digital signature to authenticate the video. We present extensive experimental results which show the utility of our technique.

Original languageEnglish
Title of host publicationProceedings - 10th International Multimedia Modelling Conference, MMM 2004
EditorsY.-P.P. Chen
Pages330-337
Number of pages8
DOIs
StatePublished - 2004
EventProceedings - 10th International Multimedia Modelling Conference, MMM 2004 - Brisbana, Australia
Duration: Jan 5 2004Jan 7 2004

Publication series

NameProceedings - 10th International Multimedia Modelling Conference, MMM 2004

Conference

ConferenceProceedings - 10th International Multimedia Modelling Conference, MMM 2004
Country/TerritoryAustralia
CityBrisbana
Period01/5/0401/7/04

Fingerprint

Dive into the research topics of 'A hierarchical signature scheme for robust video authentication using secret sharing'. Together they form a unique fingerprint.

Cite this