1 A video authentication scheme for H.264/AVC Main profile Nandakishore Ramaswamy Multimedia Processing Lab July 9 th, 2004.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Introduction to H.264 / AVC Video Coding Standard Multimedia Systems Sharif University of Technology November 2008.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Digital Image Watermarking ELE 488 Final Project, Fall 2011 Princeton University Ali JavadiAbhari.
Digital Signatures and Hash Functions. Digital Signatures.
-1/20- MPEG 4, H.264 Compression Standards Presented by Dukhyun Chang
Authentication and Digital Signatures CSCI 5857: Encoding and Encryption.
New Attacks on Sari Image Authentication System Proceeding of SPIE 2004 Jinhai Wu 1, Bin B. Zhu 2, Shipeng Li, Fuzong Lin 1 State key Lab of Intelligent.
1 Video Coding Concept Kai-Chao Yang. 2 Video Sequence and Picture Video sequence Large amount of temporal redundancy Intra Picture/VOP/Slice (I-Picture)
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 6 Wenbing Zhao Department of Electrical and Computer Engineering.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Chapter 3 Encryption Algorithms & Systems (Part C)
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
BY AMRUTA KULKARNI STUDENT ID : UNDER SUPERVISION OF DR. K.R. RAO Complexity Reduction Algorithm for Intra Mode Selection in H.264/AVC Video.
Cryptography1 CPSC 3730 Cryptography Chapter 11, 12 Message Authentication and Hash Functions.
1 CS 194: Distributed Systems Security Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer Sciences.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Public Key Model 8. Cryptography part 2.
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
Information Security and Management 13. Digital Signatures and Authentication Protocols Chih-Hung Wang Fall
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
Bob can sign a message using a digital signature generation algorithm
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Message Authentication  message authentication is concerned with: protecting the integrity of a message protecting the integrity of a message validating.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Priyadarshini Anjanappa UTA ID:
DCT-Domain Watermarking Chiou-Ting Hsu and Ja-Ling Wu, "Hidden digital watermarks in images," IEEE Trans. On Image Processing, vol. 8, No. 1, January 1999.
Digital Signatures A primer 1. Why public key cryptography? With secret key algorithms Number of key pairs to be generated is extremely large If there.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
Introduction1-1 Data Communications and Computer Networks Chapter 6 CS 3830 Lecture 31 Omar Meqdadi Department of Computer Science and Software Engineering.
Chapter 21 Public-Key Cryptography and Message Authentication.
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
- By Naveen Siddaraju - Under the guidance of Dr K R Rao Study and comparison of H.264/MPEG4.
- By Naveen Siddaraju - Under the guidance of Dr K R Rao Study and comparison between H.264.
Lecture 8 Overview. Secure Hash Algorithm (SHA) SHA SHA SHA – SHA-224, SHA-256, SHA-384, SHA-512 SHA-1 A message composed of b bits.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
Lecture 2: Introduction to Cryptography
Vamsi Krishna Vegunta University of Texas, Arlington
Prepared by Dr. Lamiaa Elshenawy
Public Key Algorithms Lesson Introduction ●Modular arithmetic ●RSA ●Diffie-Hellman.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
DIGITAL SIGNATURE(DS) IN VIDEO. Contents  What is Digital Signature(DS)?  General Signature Vs. Digital Signatures  How DS is Different from Encryption?
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
Security. Security Needs Computers and data are used by the authorized persons Computers and their accessories, data, and information are available to.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
Introduction to H.264 / AVC Video Coding Standard Multimedia Systems Sharif University of Technology November 2008.
Cryptographic Hash Function
Der-Chyuan Lou and Jiang-Lung Liu,
Introduction Used for communication to verify
NET 311 Information Security
ICS 454 Principles of Cryptography
Watermarking for Image Authentication ( Fragile Watermarking )
Fast Decision of Block size, Prediction Mode and Intra Block for H
ICS 454 Principles of Cryptography
Digital Signatures…!.
Digital Signature Standard (DSS)
Presentation transcript:

1 A video authentication scheme for H.264/AVC Main profile Nandakishore Ramaswamy Multimedia Processing Lab July 9 th, 2004.

2 Agenda Objectives Introduction Previous work  Encoder/Decoder description Simulation Results Conclusion and Future work References

3 Objectives Verify the integrity of the video bitstream compressed by H.264/AVC Main Profile Identify the originator (sender) of the video

4 Introduction Multimedia authentication: - Verify the integrity of the multimedia signal a) Hard authentication: - Allows no alteration of the pixel values. b) Soft authentication: - Accepts manipulations of the pixel values which preserve the semantic structure of the multimedia signal. Typically, cryptographic techniques are used for authentication and verification.

5 Digital Signature Vs Encryption Digital Signature Alice wants to sign and send a message to Bob Encryption algorithm Bob Messages match Alice’s private key Digital Signature Alice’s public key Received Digital Signature Original Message Received Message Encryption algorithm Alice Yes = Signature Verified No= Signature Verification failed

6 Digital Signature Vs Encryption (contd.) Encryption Alice wants to encrypt and send a message to Bob Encryption algorithm Bob Bob’s public key Cipher message Bob’s private key Received cipher message Original Message Encryption algorithm Alice

7 Introduction (contd.) A generic video authentication process [1]

8 Introduction (contd.) A generic video verification process [1]

9 Digital Signature Standard Digital signature standard (DSS) a) Developed by NIST b) Consists of two parts - Secure Hash Algorithm (SHA) - Digital Signature Algorithm (DSA)

10 (DSA and SHA)’s relationship Secure Hash Algorithm DSA Sign operation Secure Hash Algorithm DSA Verify Operation Signature Original Message Received Message Message Digest Private Key Public Key Yes = Signature Verified No= Signature Verification failed Signature Generation Signature Verification Source:- Federal Information Processing Standards Publications – bits 320 bits

11 Rivest Shamir and Adleman (RSA) Encryption Let m = Input Message e = Encrypted message n = Common parameter pr = Private Key pb = Public Key Encryption e = m pr * mod(n) Decryption m = e pb * mod(n)

12 Previous Work Digital signature generation using block means [2] Division into 8x8 blocks Block mean computation QuantizationEncryption Original Image Sender’s secret key Digital Signature

13 Previous Work (contd.) Digital signature verification using block means [2] Division into 8x8 blocks Extract Block means before inverse quantization Decryption Block means match Received Image Received signature Image Authentic Image NOT Authentic Yes No Sender’s public key

14 Previous Work (contd.) Digital signature in JPEG-2000 [3] Every code-block of the compressed image is hashed using Secure Hash Algorithm and appended at the end of the bitstream. JPEG-2000 code-block Compute hash using SHA Encrypt using RSA Sender’s public key 160 bit digest Append to bitstream For verification, received image’s code-blocks are hashed and matched with decrypted hash.

15 Encoder/Decoder description A video authentication scheme for H.264/AVC Main profile

16 Encoder Luma values only Features taken in transform domain Intra and Inter MB’s Signature for every coded video sequence

17 Encoder (contd.) Intra 4x4 and Inter MB DCAC (0,0) (3,0) (0,3) (3,3) (3,0) (3,3) (0,3) (0,0) Q 4X4 integer DCT T Original residual block Transformed and quantized block Feature data

18 Encoder (contd.) Intra 16x16 MB T Q T 4X4 integer DCT 4X4 Hadamard transform Original 16x16 MB residual Transformed 16x16 MB Quantized Hadamard coefficients Q Feature data

19 Encoder (contd.) Collect all feature data of a MB for every picture. Insert picture number after a picture is coded Repeat process until end of sequence

20 Encoder (contd.) Feature data Hash (SHA) Generate signature D=DSA(H) Encryption E= RSA(D) Sender’s private key Receiver’s public key Append as SEI to video bitstream Signature generation for a coded video sequence H D E

21 Encoder (contd.) Multiple signature generation a) Video = 1 or more video sequences b) Generate signature for every video sequence c) Append every signature as SEI in the corresponding video sequence

22 Decoder (contd.) Luma values only Features taken in transform domain Signature verification for every coded video sequence

23 Decoder (contd.) Intra 4x4 and Inter MB’s DCAC (0,0) (3,0) (0,3) (3,3) 4x4 block of transform coefficients before inverse quantization Feature data

24 Decoder (contd.) Intra 16x16 MB Transformed 16x16 MB before inverse quantization Hadamard coefficients before inverse quantization 15 AC coefficients Feature data

25 Decoder (contd.) Collect all feature data of a MB for every picture. Insert picture number after a picture is decoded Repeat process until end of sequence

26 Decoder (contd.) Signature verification for a coded video sequence Feature data Hash (SHA) Verify signature D’’ = DSV(H’,D’) Decryption D’=RSA -1 (E’) Received video and signature D’’= D’ Sender’s public key Receiver’s private key Video Authenticated Video NOT Authenticated E’ D’ D’’ H’ Yes No

27 Decoder (contd.) Tampering frames = Signature failure Sender forgery = Signature failure Cannot point out the reason of signature failure If tampered, cannot point out location of tampering Modify encoder to accommodate these issues

28 Revised Encoder Compute hash of every picture in the coded video sequence. Signature failure = Match decoder hash Inter and Intra for hash computation Transform domain values only Luma frames Authentication data = Signature + Hash

29 Hash computation Intra 4x4 and Inter MB DCAC (0,0) (3,0) (0,3) (3,3) (3,0) (3,3) (0,3) (0,0) Q 4X4 integer DCT T Original residual block Transformed and quantized block Feature data

30 Hash computation (contd.) Intra 16x16 MB T Q T 4X4 integer DCT 4X4 Hadamard transform Original 16x16 MB residual Transformed 16x16 MB Quantized Hadamard coefficients Q Feature data

31 Hash computation (contd.) Feature data for a picture Hash P H = SHA(data) Encryption E H = RSA(P H ) Receiver’s public key Append as SEI to video bitstream Hash generation for a picture PHPH EHEH Repeat process for every picture in the coded video sequence

32 Tampered locations and sender forgery Signature Failure Decrypt hashes Compute Hash for every picture All Hashes match? Signature failure due to sender forgery Signature failure due to tampering. ( Identify tampered locations) Receiver’s private key YesNo

33 Decoder Hash Computation Intra 4x4 and Inter MB: - DC and AC coefficients of every 4x4 block before inverse quantization DCAC (0,0) (3,0)(3,3) (0,3) 4x4 block of transform coefficients before inverse quantization Feature data

34 Decoder Hash Computation (contd.) Intra 16x16 MB Transformed 16x16 MB before inverse quantization Hadamard coefficients before inverse quantization 15 AC coefficients Feature data

35 Simulation Results A video authentication scheme for H.264/AVC Main profile

36 DSA common parameters Private Key Public Key

37 Results for one coded video sequence Common Parameters Total frames encoded = 59 Total coefficients = Encoder signature r = s = Without tampering or forgery Decoder Signature v = Since r = v, signature is verified.

38 Results for one coded video sequence (contd.) Frame tampering Frame 0 = I frame = tampered Location = 1 st Intra 16x16 block, DC coefficient at (0,0) after Hadamard transform and quantization Original value = 5 Modified value = 15 Decoder signature v = But r = Since, r is not equal to v, Signature is NOT verified.

39 Results for one coded video sequence (contd.) Hash of all pictures in the video sequence are compared. Picture 0 Encoder Hash = Decoder Hash = Hashes are NOT equal. Tampered location = Picture 0

40 Results for one coded video sequence (contd.) Detecting malicious activity Private key used to sign video = Imposter’s Public key used to verify = Legal user’s Original Private Key = Imposter’s private key =

41 Results for one coded video sequence (contd.) Encoder signature r = s = Decoder signature v = Since r is NOT equal to v, signature is NOT verified. Encoder hashes = Decoder hashes Thus, signature failure due to malicious activity.

42 Results for one coded video sequence (contd.) Robustness to quantization Sequence is encoded with QP 29 Encoder signature r = s =

43 Results for one coded video sequence (contd.) Sequence is re-encoded with QP 35 Decoder signature v = Since r is NOT equal to v, Video is NOT authenticated.

44 Results for one coded video sequence (contd.) Frame reordering attack Original Re-ordered

45 Results for one coded video sequence (contd.) DC Attack : - Block mean kept the same but values modified. Original BlockTransformed BlockQuantized Block Modified BlockTransformed BlockQuantized Block TQ T Q

46 Results for one coded video sequence (contd.) When using only DC coefficient Encoder Signature (Original Block) Decoder Signature (Modified Block) Video is authenticated (Signatures match) even though the block has changed!

47 Results for one coded video sequence (contd.) When using DC and AC coefficients Encoder Signature (Original Block) Decoder Signature (Modified Block) Video is NOT authenticated. Robust to DC attack!

48 Results for one coded video sequence (contd.) Encoder signature r = s = Decoder signature v = Since r is NOT equal to v, signature is NOT verified.

49 Results for multiple coded video sequence (contd.) Total number of frames encoded = 59 Total number of video sequences = 6 Total number of signatures = 6 Encoder Signature 1 Total number of coefficients = 4334 r = s =

50 Results for multiple coded video sequence (contd.) Encoder Signature 2 Total number of coefficients = 3724 r = s = Encoder Signature 3 Total number of coefficients = 3896 r = s = Encoder Signature 4 Total number of coefficients = 4561 r = s =

51 Results for multiple coded video sequence (contd.) Encoder Signature 5 Total number of coefficients = 4020 r = s = Encoder Signature 6 Total number of coefficients = 3860 r = s =

52 Results for multiple coded video sequence (contd.) Decoder Signatures v i = Signature for i th video sequence v 1 = v 2 = v 3 = v 4 = v 5 = v 6 = Signatures match, hence video authenticated

53 Storage requirements Signature = Two 160 bit numbers = 320 bits After encryption 1024 bits Hash of every picture = 160 bits After encryption = 1024 bits If there are ‘n’ pictures in a video sequence Bits required for hash = 1024 * n Total bits required = 1024 * (n+1) If there are ‘x’ coded video sequences Total bits required = x * 1024 * (n+1)

54 Conclusions Robust to temporal and spatial manipulations Can detect sender forgery Identifies tamper locations Not robust to quantization Neglect of chrominance coefficients may lead to attack on chroma components

55 Future Work Include chrominance components Requires further research for robustness to quantization Watermarking the authentication data directly into the video may result in bit savings

56 References 1)Atrey, P.K. et al “A hierarchical signature scheme for robust video authentication using secret sharing”, In Proc of IEEE 10th International Multimedia Modelling Conference, pp , 5-7 Jan )Der-Chyuan Lou and Jiang-Lung Liu, “Fault resilient and compression tolerant digital signature for image authentication”, IEEE Trans. on Consumer Electronics, Vol. 46, pp , Feb )Grosbois, R. and Ebrahimi, T., “Secure JPEG 2000-JPSEC”, In Proc of IEEE International Conference on Acoustics, Speech and Signal Processing, Vol. 4 pp , 6-10 Apr 2003.

57 References (contd.) 4)Zhu, B.B., Swanson, M.D., and Tewfik, A.H. "When seeing isn't believing [multimedia authentication technologies]", IEEE Signal Processing Magazine, Vol.21, pp , Mar )Digital Signature Standard Federal Information Processing Standards Publication )Special Issue on H.264/AVC IEEE Trans. on Circuits and Systems for Video Technology, vol. 13, pp , Jul 2003.

58 References (contd.) 7)Tamhankar, A. and Rao, K.R. “An overview of H.264/MPEG4- Part 10”, Video/Image Processing and Multimedia Communications, 4th EURASIP, Zagreb, Croatia, )H.264/AVC International Standard ITU ‑ T Rec. H.264 | ISO/IEC ‑ 10 version 3 9) H.264 Reference software 10) YUV 4:2:0 video sequences