Publication Type

Conference Proceeding Article

Version

acceptedVersion

Publication Date

9-2015

Abstract

Content-based authentication (CBA) schemes are used to authenticate multimedia streams while allowing content-preserving manipulations such as bit-rate transcoding. In this paper, we survey and classify existing transform-domain CBA schemes for videos into two categories, and point out that in contrary to CBA for images, there exists a common design flaw in these schemes. We present the principles (based on video coding concept) on how the flaw can be exploited to mount semantic-changing attacks in the transform domain that cannot be detected by existing CBA schemes. We show attack examples including content removal, modification and insertion attacks. Noting that these CBA schemes are designed at the macroblock level, we discuss, from the attacker’s point of view, the conditions in attacking contentbased authenticated macroblocks.

Keywords

Content-based authentication, Attack, H.264/AVC

Discipline

Computer Sciences | Information Security

Research Areas

Cybersecurity

Publication

Computer Security – ESORICS 2015: 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, Proceedings

First Page

366

Last Page

383

ISBN

9783319241739

Identifier

10.1007/978-3-319-24174-6_19

Publisher

Springer

City or Country

Cham

Copyright Owner and License

Authors

Additional URL

https://doi.org/10.1007/978-3-319-24174-6_19

Share

COinS