Communications of the ACM
Cryptography: Theory and Practice
Cryptography: Theory and Practice
Content-Based Digital Signature for Motion Pictures Authentication and Content-Fragile Watermarking
ICMCS '99 Proceedings of the IEEE International Conference on Multimedia Computing and Systems - Volume 2
A Hierarchical Signature Scheme for Robust Video Authentication using Secret Sharing
MMM '04 Proceedings of the 10th International Multimedia Modelling Conference
Supervised classification for video shot segmentation
ICME '03 Proceedings of the 2003 International Conference on Multimedia and Expo - Volume 1
A new technique for authentication of image/video for multimedia applications
MM&Sec '01 Proceedings of the 2001 workshop on Multimedia and security: new challenges
End-to-end secure delivery of scalable video streams
Proceedings of the 18th international workshop on Network and operating systems support for digital audio and video
Authentication schemes for multimedia streams: Quantitative analysis and comparison
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Proceedings of the 2010 workshop on New security paradigms
A novel watermarking scheme for H.264/AVC video authentication
Image Communication
Hi-index | 0.00 |
This paper addresses the problem of ensuring the integrity of a digital video and presents a scalable signature scheme for video authentication based on cryptographic secret sharing. The proposed method detects spatial cropping and temporal jittering in a video, yet is robust against frame dropping in the streaming video scenario. In our scheme, the authentication signature is compact and independent of the size of the video. Given a video, we identify the key frames based on differential energy between the frames. Considering video frames as shares, we compute the corresponding secret at three hierarchical levels. The master secret is used as digital signature to authenticate the video. The proposed signature scheme is scalable to three hierarchical levels of signature computation based on the needs of different scenarios. We provide extensive experimental results to show the utility of our technique in three different scenarios--streaming video, video identification and face tampering.