Flexible Video Authentication based on Aggregate Signature

  • Shin, Weon (Department of Information Security, Tongmyong University) ;
  • Hong, Young-Jin (Department of Electrical & Electronic Engineering, Tongmyong University) ;
  • Lee, Won-Young (Department of Information Security, Pukyong National University) ;
  • Rhee, Kyung-Hyune (Division of Electronic, Computer and Telecommunications Engineering, Pukyong National University)
  • Published : 2009.06.30

Abstract

In this paper we propose a flexible video authentication scheme based on aggregate signature, which provides authenticity of a digital video by means of cryptographic signature to guarantee right of users. In contrast to previous works, the proposed scheme provides flexible usages on content distribution system, and it allows addition of new contents to the signed contents and deletion of some parts of the signed contents. A modification can be done by content owner or others. Although contents are modified by one or more users, our scheme can guarantee each user's right by aggregation of the each user's signatures. Moreover, proposed scheme has half size of Digital Signature Algorithm (DSA) with comparable security.

Keywords

References

  1. W. Zeng, H. Yu, and C. Lin, Multimedia Security Technologies for Digital Rights Management, Elservier Inc, London, UK., 2006.
  2. Q. B. Sun and S.-F. Chang, Multimedia Security HandBook, CRC press, Boca Raton, FL,2004.
  3. C.-Y. Lin and S,-F. Chang. "Issuse and solutions for authenticating MPEG video," SPIE Int. Conf, Security and Watermarking of Multimedia Contents, Vol.3657, No.06, pp. 54-56, 1999.
  4. ITU-T Recommendation H.264, "Advanced video coding for generic audiovisual services," 2005.
  5. Atul Puri, Xuemin Chen and Ajay Luthra. "Video conding using the H.264/MPEG-4 AVC compression standard," Signal Processing : Image Communication, No.19, pp. 793-849, 2004.
  6. T. Wiegand, Gary J. Sullivan, G. Bjontegaard, and A. Luthra. "Overview of the H.264/AVC Video Coding Standard," IEEE Transactions on Circuits and Systems for Video Technology, Vol.13, No.7, 2003.
  7. D. Boneh, C. Gentry, B. Lynn and H. Shacham, "Aggregate and verifiably encrypted signatures from bilinear maps," Eurocrypt 2003, LNCS 2656, pp. 416-432, 2003.
  8. D. Boneh, B. Lynn, and H. Shacham. "Short signatures from the Weil pairing," Proceedings of Asiacrypt 2001, LNCS 2248, pp. 514-532, 2001.
  9. A. Menezes, P. Oorschot, and S. Vanstone, Handbook of Applied Cryptography, CRC Press, Boca Raton , FL, 1996.
  10. D. Boneh, C. Gentry, B. Lynn and H.Shacham. "A Survey of Two Signature Aggregation Techniques," RSA CryptoBytes, Vol.6, No.2, pp. 1-9, 2003.
  11. Yu, H., "Scalable Multimedia Authentication," the 4th IEEE Pacific-Rim Conference on Multimedia (PCM) 2003, Vol.1, pp. 443-447, 2003.
  12. Q. Sun, D. He, Z. Zhang, Q. Tian, "A secure and robust approach to scalable video authentication," International Conference on Multimedia and Expo'03, Vol.2, pp. II-209-212, 2003.
  13. Heiko Schewarz, Detlev Marpe and Thomas Wiegand, "Overview of the Scalable Video Coding Extension of the H.264/AVC Standard," IEEE Transaction on Circuits and Systems for Video Technology, Special Issue on Scalable Video Coding, Vol.17, No.3, pp. 1103-1120, 2007. https://doi.org/10.1109/TCSVT.2007.905532