On Security of Content-based Video Stream Authentication
Conference Proceeding Article
Content-based authentication (CBA) schemes are used to authenticate multimedia streams while allowing content-preserving manipulations such as bit-rate transcoding. In this paper, we survey and classify existing transform-domain CBA schemes for videos into two categories, and point out that in contrary to CBA for images, there exists a common design flaw in these schemes. We present the principles (based on video coding concept) on how the flaw can be exploited to mount semantic-changing attacks in the transform domain that cannot be detected by existing CBA schemes. We show attack examples including content removal, modification and insertion attacks. Noting that these CBA schemes are designed at the macroblock level, we discuss, from the attacker’s point of view, the conditions in attacking contentbased authenticated macroblocks.
Content-based authentication, Attack, H.264/AVC
Computer Sciences | Information Security
Computer Security – ESORICS 2015: 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I
City or Country
LO SWEE WON; WEI, Zhou; DENG, Robert H.; and DING, Xuhua.
On Security of Content-based Video Stream Authentication. (2015). Computer Security – ESORICS 2015: 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I. 366-383. Research Collection School Of Information Systems.
Available at: http://ink.library.smu.edu.sg/sis_research/2882
This document is currently not available here.