A Secure and Robust Object-Based Video Authentication System

  • PDF / 2,267,965 Bytes
  • 16 Pages / 600 x 792 pts Page_size
  • 87 Downloads / 213 Views

DOWNLOAD

REPORT


A Secure and Robust Object-Based Video Authentication System Dajun He Institute for Infocomm Research (I2 R), 21 Heng Mui Keng Terrace, Singapore 119613 Email: [email protected]

Qibin Sun Institute for Infocomm Research (I2 R), 21 Heng Mui Keng Terrace, Singapore 119613 Email: [email protected]

Qi Tian Institute for Infocomm Research (I2 R), 21 Heng Mui Keng Terrace, Singapore 119613 Email: [email protected] Received 31 March 2003; Revised 6 December 2003 An object-based video authentication system, which combines watermarking, error correction coding (ECC), and digital signature techniques, is presented for protecting the authenticity between video objects and their associated backgrounds. In this system, a set of angular radial transformation (ART) coefficients is selected as the feature to represent the video object and the background, respectively. ECC and cryptographic hashing are applied to those selected coefficients to generate the robust authentication watermark. This content-based, semifragile watermark is then embedded into the objects frame by frame before MPEG4 coding. In watermark embedding and extraction, groups of discrete Fourier transform (DFT) coefficients are randomly selected, and their energy relationships are employed to hide and extract the watermark. The experimental results demonstrate that our system is robust to MPEG4 compression, object segmentation errors, and some common object-based video processing such as object translation, rotation, and scaling while securely preventing malicious object modifications. The proposed solution can be further incorporated into public key infrastructure (PKI). Keywords and phrases: watermark, authentication, error correction coding, cryptographic hashing, digital signature.

1.

INTRODUCTION

Nowadays, the object-based MPEG4 standard is becoming growingly attractive to various applications in areas such as the Internet, video editing, and wireless communication because of its object-based nature. For instance, in video editing, it is the object of interest, not the whole video, which needs to be processed; in video transmission, if the bandwidth of the channel is limited, only the objects, not the background, are transmitted in real time. Generally speaking, object-based video processing can simplify video editing, reduce bit rate in transmission, and make video search efficient. Such flexibilities, however, also pose new challenges to multimedia security (e.g., content authenticity protection) because the video object (VO) can be easily accessed, modified, or even replaced by another VO in object-based video application. Consider a video surveillance system, shown in Figure 1. The captured video is sent to processing centers or end users

via various channels. This video could even be further processed to serve as a legal testimony in the court in some surveillance applications such as automatic teller machine (ATM) monitoring system. In order to save the transmission and storage cost, only those video clips containing interesting objects are