DIGITAL SIGNATURE(DS) IN VIDEO. Contents  What is Digital Signature(DS)?  General Signature Vs. Digital Signatures  How DS is Different from Encryption?

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

Hash Functions A hash function takes data of arbitrary size and returns a value in a fixed range. If you compute the hash of the same data at different.
MAC Raushan. DES simple fiestel network 3131 PlainText Blocks 2*4=8bits 31 f f =0011 xor 0011=0000 = 0 f(r,k)=(2*r+k^2)%8 f(1,5)=(2*1+5^2)%8=3 xor 3 3.
Security 1. is one of the most widely used and regarded network services currently message contents are not secure may be inspected either.
1 A video authentication scheme for H.264/AVC Main profile Nandakishore Ramaswamy Multimedia Processing Lab July 9 th, 2004.
Digital Signatures and Hash Functions. Digital Signatures.
1 Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell.
Authentication and Digital Signatures CSCI 5857: Encoding and Encryption.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
ECOMMERCE TECHNOLOGY SUMMER 2002 COPYRIGHT © 2002 MICHAEL I. SHAMOS Cryptographic Security.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Cryptographic Security Cryptographic Mechanisms 1Mesbah Islam– Operating Systems.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Controller of Certifying Authorities PKI Technology - Role of CCA Assistant Controller (Technology) Controller of Certifying Authorities Ministry of Communications.
13.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 13 Digital Signature.
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
Security using Encryption Security Features Message Origin Authentication - verifying that the sender is who he or she says they are Content Integrity.
Chapter 13 Digital Signature
Sorting Out Digital Certificates Bill blog.codingoutloud.com ··· Boston Azure ··· 13·Dec·2012 ···
Csci5233 Computer Security1 Bishop: Chapter 10 Key Management: Digital Signature.
Information Security and Management 13. Digital Signatures and Authentication Protocols Chih-Hung Wang Fall
1 Cryptography Cryptography is a collection of mathematical techniques to ensure confidentiality of information Cryptography is a collection of mathematical.
1 Cryptography Basics. 2 Cryptography Basic terminologies Symmetric key encryption Asymmetric key encryption Public Key Infrastructure Digital Certificates.
16.2 Digital Signatures By: John Barton. What is a Digital Signature? The idea comes from the idea of signing a document by its author (authenticating.
Pretty Good Privacy by Philip Zimmerman presented by: Chris Ward.
CS555Topic 211 Cryptography CS 555 Topic 21: Digital Schemes (1)
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Secure r How do you do it? m Need to worry about sniffing, modifying, end- user masquerading, replaying. m If sender and receiver have shared secret.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Dr. L. Christofi1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security.
Cryptography, Authentication and Digital Signatures
Digital Signatures A primer 1. Why public key cryptography? With secret key algorithms Number of key pairs to be generated is extremely large If there.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
Cryptography and Network Security Chapter 13 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
CSCI 172/283 Fall 2010 Hash Functions, HMACs, and Digital Signatures.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Lecture 8 Overview. Secure Hash Algorithm (SHA) SHA SHA SHA – SHA-224, SHA-256, SHA-384, SHA-512 SHA-1 A message composed of b bits.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Digital Signatures, Message Digest and Authentication Week-9.
Cryptography: Digital Signatures Message Digests Authentication
Authentication Issues and Solutions CSCI 5857: Encoding and Encryption.
DIGITAL SIGNATURE.
Security Using PGP - Prajakta Bahekar. Importance of Security is one of the most widely used network service on Computer Currently .
Prepared by Dr. Lamiaa Elshenawy
DIGITAL SIGNATURE. A digital signature is an authentication mechanism that enables the creator of a message to attach a code that acts as a signature.
Mort Anvari Introduction to Encryption Technology To insert your company logo on this slide From the Insert Menu Select “Picture” Locate your logo file.
©Brooks/Cole, 2003 Chapter 16 Security. ©Brooks/Cole, 2003 Define four aspects of security in a network: privacy, authentication, integrity, and nonrepudiation.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
Privacy and Security Topics From Greenlaw/Hepp, In-line/On-line: Fundamentals of the Internet and the World Wide Web 1 Introduction Known Information Software.
Cryptographic Security Aveek Chakraborty CS5204 – Operating Systems1.
Secure Instant Messenger in Android Name: Shamik Roy Chowdhury.
CS480 Cryptography and Information Security Huiping Guo Department of Computer Science California State University, Los Angeles 14. Digital signature.
Unit 3 Section 6.4: Internet Security
Computer Communication & Networks
NET 311 Information Security
Digital Signatures…!.
Best Digital Signature Service in Noida. Electronic Record 1.Very easy to make copies 2.Very fast distribution 3.Easy archiving and retrieval 4.Copies.
Chapter 13 Digital Signature
Presentation transcript:

DIGITAL SIGNATURE(DS) IN VIDEO

Contents  What is Digital Signature(DS)?  General Signature Vs. Digital Signatures  How DS is Different from Encryption?  Working of DS  Video Authentication of H.264 using DS  Question-Answer  References

What is Digital Signature?  A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message, document, digital image or digital video.  A valid digital signature gives a recipient reason to believe that the message was created by a known sender.  Digital signature provide authenticity, integrity and nonrepudiation.  The sender cannot deny that we have not have not sent the message (Nonrepudiation).  Message is not modified indicate message Integrity.

General Signature Vs. Digital signature-  General signature is part of documents but digital signature is not part of documents, it is sending with documents.  For verification of general signature in documents we compare it with the original signature of file.  But In digital signature verification we compute digital signature at receiver site.  If computed digital signature matched with sender side DS then documents is authentic otherwise tampered.

Continue………  In general signature we use one signature in many documents(One to Many) but in digital signature we use one digital signature for one document (One to One).  Digital signature is more robust in comparison to General Signature.  Digital signature is complex but general signature is simple.  Copying of General signature is easy but not for DS.

Digital signature Process-  The sender uses a signing algorithm to sign the message.  The message and the signature are sent to the receiver.  The receiver receives the message and the signature and applies the verifying algorithm to the combination  If the result is true, the message is accepted; otherwise, it is rejected.

Digital Signature Process-

Continue……………

How DS is Different from Encryption? 9  Digital Signature(DS)- Alice wants to sign and send a message to Bob Encryption algorithm Bob Messages match Alice’s private key Digital Signature Alice’s public key Received Digital Signature Original Message Received Message Encryption algorithm Alice Yes = Signature Verified No= Signature Verification failed

Encryption………. 10 Alice wants to encrypt and send a message to Bob Encryption algorithm Bob Bob’s public key Cipher message Bob’s private key Received cipher message Original Message Encryption algorithm Alice

Continue……….  DS require public key cryptography system, sender sign with its own private key and receiver verify it with public key provide by sender.  Digital Signature use private and public key of sender and public key of cryptography use private and public key of receiver.  Digital signature provide message authentication, Integrity and nonrepudiation but not privacy.

Working of DS-

Video Authentication Scheme for H.264

Encoder-  Encoder for video- 14  Intra 4x4 and Inter MB DCAC (0,0) (3,0) (0,3) (3,3) (3,0) (3,3) (0,3) (0,0) Q 4X4 integer DCT T Original residual block Transformed and quantized block Feature data

Encoder (contd.)  Intra 16x16 MB 15 T Q T 4X4 integer DCT 4X4 Hadamard transform Original 16x16 MB residual Transformed 16x16 MB Quantized Hadamard coefficients Q Feature data

Encoder (contd.)  Collect all feature data of a MB for every picture.  Insert picture number after a picture is coded  Repeat process until end of sequence 16

Encoder (contd.)  Signature generation for a coded video sequence 17 Feature data Hash (SHA) Generate signature D=DSA(H) Encryption E= RSA(D) Sender’s private key Receiver’s public key Append as SEI to video bitstream H D E

Encoder (contd.)  Multiple signature generation a) Video = 1 or more video sequences b) Generate signature for every video sequence c) Append every signature as SEI in the corresponding video sequence 18

Decoder-  Loam values only  Features taken in transform domain  Signature verification for every coded video sequence 19

Decoder (contd.)  Intra 4x4 and Inter MB’s 20 DCAC (0,0) (3,0) (0,3) (3,3) 4x4 block of transform coefficients before inverse quantization Feature data

Decoder (contd.)  Intra 16x16 MB 21 Transformed 16x16 MB before inverse quantization Hadamard coefficients before inverse quantization 15 AC coefficients Feature data

Decoder (contd.)  Collect all feature data of a MB for every picture.  Insert picture number after a picture is decoded  Repeat process until end of sequence 22

Decoder (contd.)  Signature verification for a coded video sequence 23 Feature data Hash (SHA) Verify signature D’’ = DSV(H’,D’) Decryption D’=RSA -1 (E’) Received video and signature D’’ =D’ Sender’s public key Receiver’s private key Video Authenticated Video NOT Authenticated E’ D’ D’’ H’ Yes No

Conclusion of Decoder-  Tampering frames indicate the Signature failure  Sender forgery indicate the Signature failure  If we can not find out out the reason of signature failure and location of tampering then.  Adjust the encoder to accommodate these issues. 24

References: DigitalSignature13.ppt