Download presentation

Presentation is loading. Please wait.

Published byDawson Abramson Modified over 2 years ago

1
1 A video authentication scheme for H.264/AVC Main profile Nandakishore Ramaswamy Multimedia Processing Lab July 9 th, 2004.

2
2 Agenda Objectives Introduction Previous work Encoder/Decoder description Simulation Results Conclusion and Future work References

3
3 Objectives Verify the integrity of the video bitstream compressed by H.264/AVC Main Profile Identify the originator (sender) of the video

4
4 Introduction Multimedia authentication: - Verify the integrity of the multimedia signal a) Hard authentication: - Allows no alteration of the pixel values. b) Soft authentication: - Accepts manipulations of the pixel values which preserve the semantic structure of the multimedia signal. Typically, cryptographic techniques are used for authentication and verification.

5
5 Digital Signature Vs Encryption Digital Signature Alice wants to sign and send a message to Bob Encryption algorithm Bob Messages match Alice’s private key Digital Signature Alice’s public key Received Digital Signature Original Message Received Message Encryption algorithm Alice Yes = Signature Verified No= Signature Verification failed

6
6 Digital Signature Vs Encryption (contd.) Encryption Alice wants to encrypt and send a message to Bob Encryption algorithm Bob Bob’s public key Cipher message Bob’s private key Received cipher message Original Message Encryption algorithm Alice

7
7 Introduction (contd.) A generic video authentication process [1]

8
8 Introduction (contd.) A generic video verification process [1]

9
9 Digital Signature Standard Digital signature standard (DSS) a) Developed by NIST b) Consists of two parts - Secure Hash Algorithm (SHA) - Digital Signature Algorithm (DSA)

10
10 (DSA and SHA)’s relationship Secure Hash Algorithm DSA Sign operation Secure Hash Algorithm DSA Verify Operation Signature Original Message Received Message Message Digest Private Key Public Key Yes = Signature Verified No= Signature Verification failed Signature Generation Signature Verification Source:- Federal Information Processing Standards Publications –180 http://www.itl.nist.gov/fipspubs/fip180-1.htm 160 bits 320 bits

11
11 Rivest Shamir and Adleman (RSA) Encryption Let m = Input Message e = Encrypted message n = Common parameter pr = Private Key pb = Public Key Encryption e = m pr * mod(n) Decryption m = e pb * mod(n)

12
12 Previous Work Digital signature generation using block means [2] Division into 8x8 blocks Block mean computation QuantizationEncryption Original Image Sender’s secret key Digital Signature

13
13 Previous Work (contd.) Digital signature verification using block means [2] Division into 8x8 blocks Extract Block means before inverse quantization Decryption Block means match Received Image Received signature Image Authentic Image NOT Authentic Yes No Sender’s public key

14
14 Previous Work (contd.) Digital signature in JPEG-2000 [3] Every code-block of the compressed image is hashed using Secure Hash Algorithm and appended at the end of the bitstream. JPEG-2000 code-block Compute hash using SHA Encrypt using RSA Sender’s public key 160 bit digest Append to bitstream For verification, received image’s code-blocks are hashed and matched with decrypted hash.

15
15 Encoder/Decoder description A video authentication scheme for H.264/AVC Main profile

16
16 Encoder Luma values only Features taken in transform domain Intra and Inter MB’s Signature for every coded video sequence

17
17 Encoder (contd.) Intra 4x4 and Inter MB DCAC (0,0) (3,0) (0,3) (3,3) (3,0) (3,3) (0,3) (0,0) Q 4X4 integer DCT T Original residual block Transformed and quantized block Feature data

18
18 Encoder (contd.) Intra 16x16 MB T Q T 4X4 integer DCT 4X4 Hadamard transform Original 16x16 MB residual Transformed 16x16 MB Quantized Hadamard coefficients Q Feature data

19
19 Encoder (contd.) Collect all feature data of a MB for every picture. Insert picture number after a picture is coded Repeat process until end of sequence

20
20 Encoder (contd.) Feature data Hash (SHA) Generate signature D=DSA(H) Encryption E= RSA(D) Sender’s private key Receiver’s public key Append as SEI to video bitstream Signature generation for a coded video sequence H D E

21
21 Encoder (contd.) Multiple signature generation a) Video = 1 or more video sequences b) Generate signature for every video sequence c) Append every signature as SEI in the corresponding video sequence

22
22 Decoder (contd.) Luma values only Features taken in transform domain Signature verification for every coded video sequence

23
23 Decoder (contd.) Intra 4x4 and Inter MB’s DCAC (0,0) (3,0) (0,3) (3,3) 4x4 block of transform coefficients before inverse quantization Feature data

24
24 Decoder (contd.) Intra 16x16 MB Transformed 16x16 MB before inverse quantization Hadamard coefficients before inverse quantization 15 AC coefficients Feature data

25
25 Decoder (contd.) Collect all feature data of a MB for every picture. Insert picture number after a picture is decoded Repeat process until end of sequence

26
26 Decoder (contd.) Signature verification for a coded video sequence Feature data Hash (SHA) Verify signature D’’ = DSV(H’,D’) Decryption D’=RSA -1 (E’) Received video and signature D’’= D’ Sender’s public key Receiver’s private key Video Authenticated Video NOT Authenticated E’ D’ D’’ H’ Yes No

27
27 Decoder (contd.) Tampering frames = Signature failure Sender forgery = Signature failure Cannot point out the reason of signature failure If tampered, cannot point out location of tampering Modify encoder to accommodate these issues

28
28 Revised Encoder Compute hash of every picture in the coded video sequence. Signature failure = Match decoder hash Inter and Intra for hash computation Transform domain values only Luma frames Authentication data = Signature + Hash

29
29 Hash computation Intra 4x4 and Inter MB DCAC (0,0) (3,0) (0,3) (3,3) (3,0) (3,3) (0,3) (0,0) Q 4X4 integer DCT T Original residual block Transformed and quantized block Feature data

30
30 Hash computation (contd.) Intra 16x16 MB T Q T 4X4 integer DCT 4X4 Hadamard transform Original 16x16 MB residual Transformed 16x16 MB Quantized Hadamard coefficients Q Feature data

31
31 Hash computation (contd.) Feature data for a picture Hash P H = SHA(data) Encryption E H = RSA(P H ) Receiver’s public key Append as SEI to video bitstream Hash generation for a picture PHPH EHEH Repeat process for every picture in the coded video sequence

32
32 Tampered locations and sender forgery Signature Failure Decrypt hashes Compute Hash for every picture All Hashes match? Signature failure due to sender forgery Signature failure due to tampering. ( Identify tampered locations) Receiver’s private key YesNo

33
33 Decoder Hash Computation Intra 4x4 and Inter MB: - DC and AC coefficients of every 4x4 block before inverse quantization DCAC (0,0) (3,0)(3,3) (0,3) 4x4 block of transform coefficients before inverse quantization Feature data

34
34 Decoder Hash Computation (contd.) Intra 16x16 MB Transformed 16x16 MB before inverse quantization Hadamard coefficients before inverse quantization 15 AC coefficients Feature data

35
35 Simulation Results A video authentication scheme for H.264/AVC Main profile

36
36 DSA common parameters Private Key 932308816105877193346324924405238358561797363453 Public Key 49250364518976760201935612031242625664970300784488999206628 913898684885553279548885211476769179063848086265981390552 828860770995411616739007429069330033064008697384549473384 637876060915808531747270579608164016570165925297909070695 052210446426918824013612814674507994466578915575028597282 519755964472561590380

37
37 Results for one coded video sequence Common Parameters Total frames encoded = 59 Total coefficients = 12501 Encoder signature r = 258230994199886379618680381531392644375747268307 s = 553921005467375065529673563440116158716908054793 Without tampering or forgery Decoder Signature v = 258230994199886379618680381531392644375747268307 Since r = v, signature is verified.

38
38 Results for one coded video sequence (contd.) Frame tampering Frame 0 = I frame = tampered Location = 1 st Intra 16x16 block, DC coefficient at (0,0) after Hadamard transform and quantization Original value = 5 Modified value = 15 Decoder signature v = 363510879679629003962752313295967888200812862057 But r = 258230994199886379618680381531392644375747268307 Since, r is not equal to v, Signature is NOT verified.

39
39 Results for one coded video sequence (contd.) Hash of all pictures in the video sequence are compared. Picture 0 Encoder Hash = 244521134779192871239422005322433514569730613982 Decoder Hash = 564856327811211747778209339112070483726931840033 Hashes are NOT equal. Tampered location = Picture 0

40
40 Results for one coded video sequence (contd.) Detecting malicious activity Private key used to sign video = Imposter’s Public key used to verify = Legal user’s Original Private Key = 932308816105877193346324924405238358561797363453 Imposter’s private key = 1 3230881610587719334632492440523835856179736345

41
41 Results for one coded video sequence (contd.) Encoder signature r = 258230994199886379618680381531392644375747268307 s = 659115584368708655163218960845447884312706027895 Decoder signature v = 757611328353143787983558147251463660400321700712 Since r is NOT equal to v, signature is NOT verified. Encoder hashes = Decoder hashes Thus, signature failure due to malicious activity.

42
42 Results for one coded video sequence (contd.) Robustness to quantization Sequence is encoded with QP 29 Encoder signature r = 258230994199886379618680381531392644375747268307 s = 553921005467375065529673563440116158716908054793

43
43 Results for one coded video sequence (contd.) Sequence is re-encoded with QP 35 Decoder signature v = 450045542578458967124875488958087354781835818707 Since r is NOT equal to v, Video is NOT authenticated.

44
44 Results for one coded video sequence (contd.) Frame reordering attack Original Re-ordered

45
45 Results for one coded video sequence (contd.) DC Attack : - Block mean kept the same but values modified. Original BlockTransformed BlockQuantized Block Modified BlockTransformed BlockQuantized Block TQ T Q

46
46 Results for one coded video sequence (contd.) When using only DC coefficient Encoder Signature (Original Block) Decoder Signature (Modified Block) Video is authenticated (Signatures match) even though the block has changed!

47
47 Results for one coded video sequence (contd.) When using DC and AC coefficients Encoder Signature (Original Block) Decoder Signature (Modified Block) Video is NOT authenticated. Robust to DC attack!

48
48 Results for one coded video sequence (contd.) Encoder signature r = 258230994199886379618680381531392644375747268307 s = 553921005467375065529673563440116158716908054793 Decoder signature v = 796457292123352592426447215935643118188436156788 Since r is NOT equal to v, signature is NOT verified.

49
49 Results for multiple coded video sequence (contd.) Total number of frames encoded = 59 Total number of video sequences = 6 Total number of signatures = 6 Encoder Signature 1 Total number of coefficients = 4334 r = 258230994199886379618680381531392644375747268307 s = 602843151256385963511141755924782867386260766615

50
50 Results for multiple coded video sequence (contd.) Encoder Signature 2 Total number of coefficients = 3724 r = 258230994199886379618680381531392644375747268307 s = 909298954038809272308410772111508639025580732794 Encoder Signature 3 Total number of coefficients = 3896 r = 258230994199886379618680381531392644375747268307 s = 37131761566210379177239004151768998162822235640 Encoder Signature 4 Total number of coefficients = 4561 r = 258230994199886379618680381531392644375747268307 s = 219871236647467187087134837911922129305756281586

51
51 Results for multiple coded video sequence (contd.) Encoder Signature 5 Total number of coefficients = 4020 r = 258230994199886379618680381531392644375747268307 s = 908124295867495640787368571873172959524293811336 Encoder Signature 6 Total number of coefficients = 3860 r = 258230994199886379618680381531392644375747268307 s = 954693410128487399463060653092140043143216469688

52
52 Results for multiple coded video sequence (contd.) Decoder Signatures v i = Signature for i th video sequence v 1 = 258230994199886379618680381531392644375747268307 v 2 = 258230994199886379618680381531392644375747268307 v 3 = 258230994199886379618680381531392644375747268307 v 4 = 258230994199886379618680381531392644375747268307 v 5 = 258230994199886379618680381531392644375747268307 v 6 = 258230994199886379618680381531392644375747268307 Signatures match, hence video authenticated

53
53 Storage requirements Signature = Two 160 bit numbers = 320 bits After encryption 1024 bits Hash of every picture = 160 bits After encryption = 1024 bits If there are ‘n’ pictures in a video sequence Bits required for hash = 1024 * n Total bits required = 1024 * (n+1) If there are ‘x’ coded video sequences Total bits required = x * 1024 * (n+1)

54
54 Conclusions Robust to temporal and spatial manipulations Can detect sender forgery Identifies tamper locations Not robust to quantization Neglect of chrominance coefficients may lead to attack on chroma components

55
55 Future Work Include chrominance components Requires further research for robustness to quantization Watermarking the authentication data directly into the video may result in bit savings

56
56 References 1)Atrey, P.K. et al “A hierarchical signature scheme for robust video authentication using secret sharing”, In Proc of IEEE 10th International Multimedia Modelling Conference, pp. 330- 337, 5-7 Jan 2004. 2)Der-Chyuan Lou and Jiang-Lung Liu, “Fault resilient and compression tolerant digital signature for image authentication”, IEEE Trans. on Consumer Electronics, Vol. 46, pp. 31-39, Feb 2000. 3)Grosbois, R. and Ebrahimi, T., “Secure JPEG 2000-JPSEC”, In Proc of IEEE International Conference on Acoustics, Speech and Signal Processing, Vol. 4 pp. 716-719, 6-10 Apr 2003.

57
57 References (contd.) 4)Zhu, B.B., Swanson, M.D., and Tewfik, A.H. "When seeing isn't believing [multimedia authentication technologies]", IEEE Signal Processing Magazine, Vol.21, pp. 40- 49, Mar 2004. 5)Digital Signature Standard Federal Information Processing Standards Publication-186 http://www.itl.nist.gov/fipspubs/fip186.htm 6)Special Issue on H.264/AVC IEEE Trans. on Circuits and Systems for Video Technology, vol. 13, pp. 557-725, Jul 2003.

58
58 References (contd.) 7)Tamhankar, A. and Rao, K.R. “An overview of H.264/MPEG4- Part 10”, Video/Image Processing and Multimedia Communications, 4th EURASIP, Zagreb, Croatia, 2003. 8)H.264/AVC International Standard ITU ‑ T Rec. H.264 | ISO/IEC 14496 ‑ 10 version 3 9) H.264 Reference software http://bs.hhi.de/~suehring/tml/ 10) YUV 4:2:0 video sequences http://trace.eas.asu.edu/yuv/yuv.html

Similar presentations

OK

1 Video Coding Concept Kai-Chao Yang. 2 Video Sequence and Picture Video sequence Large amount of temporal redundancy Intra Picture/VOP/Slice (I-Picture)

1 Video Coding Concept Kai-Chao Yang. 2 Video Sequence and Picture Video sequence Large amount of temporal redundancy Intra Picture/VOP/Slice (I-Picture)

© 2017 SlidePlayer.com Inc.

All rights reserved.

Ads by Google

Ppt on conservation of land resources in india Ppt on human chromosomes genes Ppt on crime file management system in java Ce ms ppt online Ppt on solar system in hindi Ppt on geometrical shapes Ppt on operating system process management Seminar ppt on circuit breaker Convert pps file to ppt online Ppt on high voltage engineering corporation