a video authentication scheme for h.264/avc main profile

58
1 A video authentication scheme for H.264/AVC Main profile Nandakishore Ramaswamy Multimedia Processing Lab July 9 th , 2004.

Upload: muncel

Post on 13-Feb-2016

48 views

Category:

Documents


0 download

DESCRIPTION

A video authentication scheme for H.264/AVC Main profile. Nandakishore Ramaswamy Multimedia Processing Lab July 9 th , 2004. Agenda. Objectives Introduction Previous work Encoder/Decoder description Simulation Results Conclusion and Future work References. Objectives. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: A video authentication scheme for H.264/AVC Main profile

1

A video authentication scheme for H.264/AVC Main profile

Nandakishore RamaswamyMultimedia Processing Lab

July 9th, 2004.

Page 2: A video authentication scheme for H.264/AVC Main profile

2

Agenda Objectives Introduction Previous work Encoder/Decoder description Simulation Results Conclusion and Future work References

Page 3: A video authentication scheme for H.264/AVC Main profile

3

Objectives Verify the integrity of the video

bitstream compressed by H.264/AVC Main Profile

Identify the originator (sender) of the video

Page 4: A video authentication scheme for H.264/AVC Main profile

4

Introduction Multimedia authentication: - Verify

the integrity of the multimedia signala) Hard authentication: - Allows no alteration of

the pixel values. b) Soft authentication: - Accepts manipulations of

the pixel values which preserve the semantic structure of the multimedia signal.

Typically, cryptographic techniques are used for authentication and verification.

Page 5: A video authentication scheme for H.264/AVC Main profile

5

Digital Signature Vs Encryption Digital Signature Alice wants to sign and send a message to Bob

Encryption algorithm

BobMessages match

Alice’s private key

Digital Signature

Alice’s public key

Received Digital Signature

Original Message

Received Message

Encryption algorithm

Alice

Yes = Signature VerifiedNo= Signature Verification failed

Page 6: A video authentication scheme for H.264/AVC Main profile

6

Digital Signature Vs Encryption (contd.) Encryption Alice wants to encrypt and send a message to Bob

Encryption algorithm

Bob

Bob’s public key

Cipher message

Bob’s private key

Received cipher message

Original Message

Original MessageEncryption algorithm

Alice

Page 7: A video authentication scheme for H.264/AVC Main profile

7

Introduction (contd.) A generic video authentication process [1]

Page 8: A video authentication scheme for H.264/AVC Main profile

8

Introduction (contd.) A generic video verification process [1]

Page 9: A video authentication scheme for H.264/AVC Main profile

9

Digital Signature Standard Digital signature standard (DSS) a) Developed by NIST b) Consists of two parts - Secure Hash Algorithm (SHA)

- Digital Signature Algorithm (DSA)

Page 10: A video authentication scheme for H.264/AVC Main profile

10

(DSA and SHA)’s relationship

Secure Hash Algorithm

DSA Sign operation

Secure Hash Algorithm

DSA Verify Operation

Signature

Original Message

Received Message

Message Digest Message Digest

Private Key

Public Key

Yes = Signature VerifiedNo= Signature Verification failed

Signature Generation

Signature Verification

Source:- Federal Information Processing Standards Publications –180http://www.itl.nist.gov/fipspubs/fip180-1.htm

160 bits 160 bits

320 bits 320 bits

Page 11: A video authentication scheme for H.264/AVC Main profile

11

Rivest Shamir and Adleman (RSA) EncryptionLet m = Input Message

e = Encrypted messagen = Common parameterpr = Private Keypb = Public Key

Encryptione = mpr * mod(n) Decryptionm = epb * mod(n)

Page 12: A video authentication scheme for H.264/AVC Main profile

12

Previous Work Digital signature generation using block means [2]

Division into 8x8 blocks

Block mean

computation

Quantization

Encryption

Original Image Sender’s

secret keyDigital

Signature

Page 13: A video authentication scheme for H.264/AVC Main profile

13

Previous Work (contd.) Digital signature verification using block means [2]

Division into 8x8 blocks

Extract Block means before inverse quantization

Decryption

Block mean

s matc

hReceive

d Image

Received signatur

eImage

Authentic

Image NOT

AuthenticYes

No

Sender’s

public key

Page 14: A video authentication scheme for H.264/AVC Main profile

14

Previous Work (contd.) Digital signature in JPEG-2000 [3] Every code-block of the compressed image is

hashed using Secure Hash Algorithm and appended at the end of the bitstream.

JPEG-2000 code-block

Compute hash using

SHAEncrypt

using RSA

Sender’s

public key

160 bit digest

Append to bitstream

For verification, received image’s code-blocks are hashed and matched with decrypted hash.

Page 15: A video authentication scheme for H.264/AVC Main profile

15

Encoder/Decoder description

A video authentication scheme for H.264/AVC Main

profile

Page 16: A video authentication scheme for H.264/AVC Main profile

16

Encoder Luma values only Features taken in transform

domain Intra and Inter MB’s Signature for every coded video

sequence

Page 17: A video authentication scheme for H.264/AVC Main profile

17

Encoder (contd.) Intra 4x4 and Inter MB

DC

AC

AC

(0,0)

(3,0)

(0,3)

(3,3)

(3,0) (3,3

)

(0,3)

(0,0)

Q

4X4 integer DCT

T

Original residual block

Transformed and quantized blockFeature data

Page 18: A video authentication scheme for H.264/AVC Main profile

18

Encoder (contd.) Intra 16x16 MB

T

Q

T4X4 integer DCT

4X4 Hadamard transform

Original 16x16 MB residual

Transformed 16x16 MB

Quantized Hadamard coefficients

Q

Feature data

Page 19: A video authentication scheme for H.264/AVC Main profile

19

Encoder (contd.) Collect all feature data of a MB for

every picture. Insert picture number after a

picture is coded Repeat process until end of

sequence

Page 20: A video authentication scheme for H.264/AVC Main profile

20

Encoder (contd.)

Feature data Hash (SHA)

Generate signature D=DSA(H)

Encryption E= RSA(D)

Sender’s private key

Receiver’s public key

Append as SEI to video bitstream

Signature generation for a coded video sequence

H

D

E

Page 21: A video authentication scheme for H.264/AVC Main profile

21

Encoder (contd.) Multiple signature generation

a) Video = 1 or more video sequencesb) Generate signature for every video sequence

c) Append every signature as SEI in the corresponding video sequence

Page 22: A video authentication scheme for H.264/AVC Main profile

22

Decoder (contd.) Luma values only

Features taken in transform domain

Signature verification for every coded video sequence

Page 23: A video authentication scheme for H.264/AVC Main profile

23

Decoder (contd.) Intra 4x4 and Inter MB’s

DC

AC

AC

(0,0)

(3,0)

(0,3)

(3,3)4x4 block of transform

coefficients before inverse quantization

Feature data

Page 24: A video authentication scheme for H.264/AVC Main profile

24

Decoder (contd.) Intra 16x16 MB

Transformed 16x16 MB before inverse quantization

Hadamard coefficients before inverse quantization

15 AC coefficients

Feature data

Page 25: A video authentication scheme for H.264/AVC Main profile

25

Decoder (contd.) Collect all feature data of a MB for

every picture.

Insert picture number after a picture is decoded

Repeat process until end of sequence

Page 26: A video authentication scheme for H.264/AVC Main profile

26

Decoder (contd.) Signature verification for a coded

video sequence

Feature data Hash (SHA)

Verify signature D’’ = DSV(H’,D’)

Decryption D’=RSA-1(E’)

Received video and signature

D’’=D’

Sender’s public key

Receiver’s private key

Video Authenticated

Video NOT Authenticated

E’

D’

D’’

H’

YesNo

Page 27: A video authentication scheme for H.264/AVC Main profile

27

Decoder (contd.) Tampering frames = Signature failure Sender forgery = Signature failure Cannot point out the reason of

signature failure If tampered, cannot point out location

of tampering Modify encoder to accommodate

these issues

Page 28: A video authentication scheme for H.264/AVC Main profile

28

Revised Encoder Compute hash of every picture in the

coded video sequence. Signature failure = Match decoder

hash Inter and Intra for hash computation Transform domain values only Luma frames Authentication data = Signature +

Hash

Page 29: A video authentication scheme for H.264/AVC Main profile

29

Hash computation Intra 4x4 and Inter MB

DC

AC

AC

AC

AC

AC

AC

AC

AC

AC

AC

AC

AC

AC

AC

AC

(0,0)

(3,0)

(0,3)

(3,3)

(3,0) (3,3

)

(0,3)

(0,0)

Q

4X4 integer DCT

T

Original residual block

Transformed and quantized blockFeature data

Page 30: A video authentication scheme for H.264/AVC Main profile

30

Hash computation (contd.) Intra 16x16 MB

T

Q

T4X4 integer DCT

4X4 Hadamard transform

Original 16x16 MB residual

Transformed 16x16 MB

Quantized Hadamard coefficients

Q

Feature data

Page 31: A video authentication scheme for H.264/AVC Main profile

31

Hash computation (contd.)

Feature data for a picture

Hash PH =

SHA(data)

Encryption EH= RSA(PH)

Receiver’s public key

Append as SEI to video bitstream

Hash generation for a picture

PH

EH

Repeat process for every picture in the coded video sequence

Page 32: A video authentication scheme for H.264/AVC Main profile

32

Tampered locations and sender forgery

Signature Failure

Decrypt hashes

Compute Hash for every picture

All Hashe

s match

?

Signature failure due to sender

forgery

Signature failure due to

tampering. (Identify tampered

locations)

Receiver’s private key

YesNo

Page 33: A video authentication scheme for H.264/AVC Main profile

33

Decoder Hash Computation Intra 4x4 and Inter MB: - DC and

AC coefficients of every 4x4 block before inverse quantization

DC

AC

AC

AC

AC

AC

AC

AC

AC

AC

AC

AC

AC

AC

AC

AC

(0,0)

(3,0)

(3,3)

(0,3)

4x4 block of transform coefficients before inverse quantization

Feature data

Page 34: A video authentication scheme for H.264/AVC Main profile

34

Decoder Hash Computation (contd.) Intra 16x16 MB

Transformed 16x16 MB before inverse quantization

Hadamard coefficients before inverse quantization

15 AC coefficients

Feature data

Page 35: A video authentication scheme for H.264/AVC Main profile

35

Simulation Results

A video authentication scheme for H.264/AVC Main

profile

Page 36: A video authentication scheme for H.264/AVC Main profile

36

DSA common parameters Private Key932308816105877193346324924405238358561797363453 Public Key49250364518976760201935612031242625664970300784488999206628

913898684885553279548885211476769179063848086265981390552828860770995411616739007429069330033064008697384549473384637876060915808531747270579608164016570165925297909070695052210446426918824013612814674507994466578915575028597282519755964472561590380

Page 37: A video authentication scheme for H.264/AVC Main profile

37

Results for one coded video sequence Common ParametersTotal frames encoded = 59Total coefficients = 12501Encoder signaturer = 258230994199886379618680381531392644375747268307 s = 553921005467375065529673563440116158716908054793 Without tampering or forgeryDecoder Signaturev = 258230994199886379618680381531392644375747268307Since r = v, signature is verified.

Page 38: A video authentication scheme for H.264/AVC Main profile

38

Results for one coded video sequence (contd.) Frame tamperingFrame 0 = I frame = tamperedLocation = 1st Intra 16x16 block, DC coefficient at (0,0) after

Hadamard transform and quantizationOriginal value = 5Modified value = 15

Decoder signaturev = 363510879679629003962752313295967888200812862057 But r =

258230994199886379618680381531392644375747268307 Since, r is not equal to v, Signature is NOT verified.

Page 39: A video authentication scheme for H.264/AVC Main profile

39

Results for one coded video sequence (contd.) Hash of all pictures in the video

sequence are compared.Picture 0

Encoder Hash = 244521134779192871239422005322433514569730613982 Decoder Hash = 564856327811211747778209339112070483726931840033

Hashes are NOT equal. Tampered location = Picture 0

Page 40: A video authentication scheme for H.264/AVC Main profile

40

Results for one coded video sequence (contd.) Detecting malicious activity Private key used to sign video = Imposter’s Public key used to verify = Legal user’s

Original Private Key = 932308816105877193346324924405238358561797363453

Imposter’s private key = 13230881610587719334632492440523835856179736345

Page 41: A video authentication scheme for H.264/AVC Main profile

41

Results for one coded video sequence (contd.) Encoder signaturer = 258230994199886379618680381531392644375747268307 s = 659115584368708655163218960845447884312706027895

Decoder signaturev = 757611328353143787983558147251463660400321700712

Since r is NOT equal to v, signature is NOT verified.

Encoder hashes = Decoder hashesThus, signature failure due to malicious

activity.

Page 42: A video authentication scheme for H.264/AVC Main profile

42

Results for one coded video sequence (contd.) Robustness to quantizationSequence is encoded with QP 29

Encoder signaturer = 258230994199886379618680381531392644375747268307 s = 553921005467375065529673563440116158716908054793

Page 43: A video authentication scheme for H.264/AVC Main profile

43

Results for one coded video sequence (contd.) Sequence is re-encoded with QP 35

Decoder signaturev = 450045542578458967124875488958087354781835818707 Since r is NOT equal to v, Video is NOT authenticated.

Page 44: A video authentication scheme for H.264/AVC Main profile

44

Results for one coded video sequence (contd.) Frame reordering attack Original Re-ordered

Page 45: A video authentication scheme for H.264/AVC Main profile

45

Results for one coded video sequence (contd.) DC Attack : - Block mean kept the same but

values modified.

Original Block

Transformed Block

Quantized Block

Modified Block

Transformed Block

Quantized Block

T Q

T Q

Page 46: A video authentication scheme for H.264/AVC Main profile

46

Results for one coded video sequence (contd.)

When using only DC coefficientEncoder Signature (Original Block)

Decoder Signature (Modified Block)

Video is authenticated (Signatures match) even though the block has changed!

Page 47: A video authentication scheme for H.264/AVC Main profile

47

Results for one coded video sequence (contd.)

When using DC and AC coefficientsEncoder Signature (Original Block)

Decoder Signature (Modified Block)

Video is NOT authenticated. Robust to DC attack!

Page 48: A video authentication scheme for H.264/AVC Main profile

48

Results for one coded video sequence (contd.) Encoder signaturer = 258230994199886379618680381531392644375747268307 s = 553921005467375065529673563440116158716908054793

Decoder signaturev = 796457292123352592426447215935643118188436156788

Since r is NOT equal to v, signature is NOT verified.

Page 49: A video authentication scheme for H.264/AVC Main profile

49

Results for multiple coded video sequence (contd.) Total number of frames encoded = 59 Total number of video sequences = 6 Total number of signatures = 6

Encoder Signature 1Total number of coefficients = 4334r = 258230994199886379618680381531392644375747268307 s = 602843151256385963511141755924782867386260766615

Page 50: A video authentication scheme for H.264/AVC Main profile

50

Results for multiple coded video sequence (contd.)Encoder Signature 2Total number of coefficients = 3724r = 258230994199886379618680381531392644375747268307 s = 909298954038809272308410772111508639025580732794

Encoder Signature 3Total number of coefficients = 3896r = 258230994199886379618680381531392644375747268307 s = 37131761566210379177239004151768998162822235640

Encoder Signature 4Total number of coefficients = 4561r = 258230994199886379618680381531392644375747268307 s = 219871236647467187087134837911922129305756281586

Page 51: A video authentication scheme for H.264/AVC Main profile

51

Results for multiple coded video sequence (contd.)Encoder Signature 5Total number of coefficients = 4020r = 258230994199886379618680381531392644375747268307 s = 908124295867495640787368571873172959524293811336

Encoder Signature 6Total number of coefficients = 3860r = 258230994199886379618680381531392644375747268307 s = 954693410128487399463060653092140043143216469688

Page 52: A video authentication scheme for H.264/AVC Main profile

52

Results for multiple coded video sequence (contd.) Decoder Signaturesvi = Signature for ith video sequence

v1 = 258230994199886379618680381531392644375747268307v2 = 258230994199886379618680381531392644375747268307v3 = 258230994199886379618680381531392644375747268307v4 = 258230994199886379618680381531392644375747268307v5 = 258230994199886379618680381531392644375747268307v6 = 258230994199886379618680381531392644375747268307

Signatures match, hence video authenticated

Page 53: A video authentication scheme for H.264/AVC Main profile

53

Storage requirements Signature = Two 160 bit numbers = 320 bitsAfter encryption 1024 bits

Hash of every picture = 160 bitsAfter encryption = 1024 bits

If there are ‘n’ pictures in a video sequenceBits required for hash = 1024 * nTotal bits required = 1024 * (n+1)

If there are ‘x’ coded video sequencesTotal bits required = x * 1024 * (n+1)

Page 54: A video authentication scheme for H.264/AVC Main profile

54

Conclusions Robust to temporal and spatial

manipulations Can detect sender forgery Identifies tamper locations Not robust to quantization Neglect of chrominance

coefficients may lead to attack on chroma components

Page 55: A video authentication scheme for H.264/AVC Main profile

55

Future Work Include chrominance components Requires further research for

robustness to quantization Watermarking the authentication

data directly into the video may result in bit savings

Page 56: A video authentication scheme for H.264/AVC Main profile

56

References1) Atrey, P.K. et al “A hierarchical signature scheme for

robust video authentication using secret sharing”, In Proc of IEEE 10th International Multimedia Modelling Conference, pp. 330-337, 5-7 Jan 2004.

2) Der-Chyuan Lou and Jiang-Lung Liu, “Fault resilient and

compression tolerant digital signature for image authentication”, IEEE Trans. on Consumer Electronics, Vol. 46, pp. 31-39, Feb 2000.

3) Grosbois, R. and Ebrahimi, T., “Secure JPEG 2000-JPSEC”, In Proc of IEEE International Conference on Acoustics, Speech and Signal Processing, Vol. 4 pp. 716-719, 6-10 Apr 2003.

Page 57: A video authentication scheme for H.264/AVC Main profile

57

References (contd.)4) Zhu, B.B., Swanson, M.D., and Tewfik, A.H. "When

seeing isn't believing [multimedia authentication technologies]", IEEE Signal Processing Magazine, Vol.21, pp. 40- 49, Mar 2004.

5) Digital Signature Standard Federal Information Processing Standards

Publication-186http://www.itl.nist.gov/fipspubs/fip186.htm

6) Special Issue on H.264/AVCIEEE Trans. on Circuits and Systems for Video Technology, vol. 13, pp. 557-725, Jul 2003.

Page 58: A video authentication scheme for H.264/AVC Main profile

58

References (contd.)7) Tamhankar, A. and Rao, K.R. “An overview of

H.264/MPEG4- Part 10”, Video/Image Processing and Multimedia Communications, 4th EURASIP, Zagreb, Croatia, 2003.

8) H.264/AVC International Standard ITU‑T Rec. H.264 | ISO/IEC 14496‑10 version 3

9) H.264 Reference softwarehttp://bs.hhi.de/~suehring/tml/

10) YUV 4:2:0 video sequences http://trace.eas.asu.edu/yuv/yuv.html