On Security of Content-Based Video Stream Authentication

  • Swee-Won LoEmail author
  • Zhuo Wei
  • Robert H. Deng
  • Xuhua Ding
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9326)


Content-based authentication (CBA) schemes are used to authenticate multimedia streams while allowing content-preserving manipulations such as bit-rate transcoding. In this paper, we survey and classify existing transform-domain CBA schemes for videos into two categories, and point out that in contrary to CBA for images, there exists a common design flaw in these schemes. We present the principles (based on video coding concept) on how the flaw can be exploited to mount semantic-changing attacks in the transform domain that cannot be detected by existing CBA schemes. We show attack examples including content removal, modification and insertion attacks. Noting that these CBA schemes are designed at the macroblock level, we discuss, from the attacker’s point of view, the conditions in attacking content-based authenticated macroblocks.


Content-based authentication Attack H.264/AVC 



This work was partly supported by National Natural Science Funds of China (Grant No. 61402199).


  1. 1.
    Arizona State University: Video trace library.
  2. 2.
    Bianchi, T., Rosa, A.D., Piva, A.: Improved DCT coefficient analysis for forgery localization in JPEG images. In: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP 2011), pp. 2444–2447 (2011)Google Scholar
  3. 3.
    Chang, C., Fan, Y., Tai, W.: Four-scanning attack on hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn. 41(2), 654–661 (2008)CrossRefGoogle Scholar
  4. 4.
    Dai, Y., Thiemert, S., Steinebach, M.: Feature-based watermarking scheme for MPEG-I/II video authentication. In: SPIE Security, Steganography, and Watermarking of Multimedia Contents VI, vol. 5306, pp. 325–335 (2004)Google Scholar
  5. 5.
    Du, R., Fridrich, J.: Lossless authentication of MPEG-2 video. In: 2002 International Conference on Image Processing (ICIP), vol. 2, pp. II-893–II-896 (2002)Google Scholar
  6. 6.
    Ebrahimi, T., Horne, C.: MPEG-4 natural video coding - an overview. Signal Process. Image Commun. 15(4–5), 365–385 (2000)CrossRefGoogle Scholar
  7. 7.
    Fridrich, J.: Security of fragile authentication watermarks with localization. In: SPIE, Security and Watermarking of Multimedia Contents IV, vol. 4675, pp. 691–700 (2002)Google Scholar
  8. 8.
    Hefeeda, M., Mokhtarian, K.: Authentication schemes for multimedia streams: quantitative analysis and comparison. ACM Trans. Multimedia Comput. Commun. Appl. 6(1), 1–24 (2010)CrossRefGoogle Scholar
  9. 9.
    Holliman, M., Memon, N.: Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Trans. Image Process. 9(3), 432–442 (2000)CrossRefGoogle Scholar
  10. 10.
    Horng, S.J., Farfoura, M.E., Fan, P., Wang, X., Li, T., Guo, J.M.: A low cost fragile watermarking scheme in H.264/AVC compressed domain. Multimedia Tools Appl. 72(3), 2469–2495 (2014)CrossRefGoogle Scholar
  11. 11.
    Hu, H.T., Hsu, L.Y.: Exploring DWT-SVD-DCT feature parameters for robust multiple watermarking against JPEG and JPEG2000 compression. Comput. Electr. Eng. 41, 52–63 (2015)CrossRefGoogle Scholar
  12. 12.
    Joint Video Team (JVT) of ISO/IEC MPEG & ITU-T VCEG (ISO/IEC JTC1/SC29/WG11 and ITU-T SG16 Q.6).: JM Reference Software Manual (2009)Google Scholar
  13. 13.
    Kim, D., Choi, Y., Kim, H., Yoo, J., Choi, H., Seo, Y.: The problems in digital watermarking into intra-frames of H.264/AVC. Image Vis. Comput. 28(8), 1220–1228 (2010)CrossRefGoogle Scholar
  14. 14.
    Kuo, T.Y., Lo, Y.C., Lin, C.I.: Fragile video watermarking technique by motion field embedding with rate-distortion minimization. In: International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP), pp. 853–856 (2008)Google Scholar
  15. 15.
    Lin, C.Y., Chang, S.F.: Issues and solutions for authenticating MPEG video. In: SPIE International Conference on Security and Watermarking of Multimedia Contents, vol. 3657, pp. 54–56 (1999)Google Scholar
  16. 16.
    Lin, C.Y., Chang, S.F.: Semi-fragile watermarking for authenticating JPEG visual content. In: SPIE Security and Watermarking of Multimedia Contents, pp. 140–151 (2000)Google Scholar
  17. 17.
    Lin, C.Y., Chang, S.F.: A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans. Circuits Syst. Video Technol. 11(2), 153–168 (2001)CrossRefGoogle Scholar
  18. 18.
    Lin, P., Hsieh, C., Huang, P.: A hierarchical digital watermarking method for image tamper detection and recovery. Pattern Recogn. 38(12), 2519–2529 (2005)CrossRefGoogle Scholar
  19. 19.
    Lo, S.W., Wei, Z., Deng, R.H., Ding, X.: Generic attacks on content-based video stream authentication. In: IEEE International Conference on Multimedia and Expo Workshops (ICMEW), pp. 1–6 (2014)Google Scholar
  20. 20.
    Luo, Z., Song, L., Zheng, S., Ling, N.: H.264 advanced video control perceptual optimization coding based on JND-directed coefficient suppression. IEEE Trans. Circuits Syst. Video Technol. 23(6), 935–948 (2013)CrossRefGoogle Scholar
  21. 21.
    Ma, S., Gao, W., Zhao, D., Lu, Y.: A study on the quantization scheme in H.264/AVC and its application to rate control. In: Advances in Multimedia Information Processing, PCM, pp. 192–199 (2004)CrossRefGoogle Scholar
  22. 22.
    Mansouri, A., Aznaveh, A.M., Torkamani-Azar, F., Kurugollu, F.: A low complexity video watermarking in H.264 compressed domain. IEEE Trans. Inf. Forensics Secur. 5(4), 649–657 (2010)CrossRefGoogle Scholar
  23. 23.
    Naccari, M., Pereira, F.: Advanced H.264/AVC-based perceptual video coding: architecture, tools and assessment. IEEE Trans. Circuits Syst. Video Technol. 21(6), 806–819 (2011)CrossRefGoogle Scholar
  24. 24.
    Park, J.S., Song, H.J.: Selective intra prediction mode decision for H.264/AVC encoders. World Acad. Sci. Eng. Technol. 13, 51–55 (2006)Google Scholar
  25. 25.
    Park, S.W., Shin, S.: Authentication and copyright protection scheme for H.264/AVC and SVC. J. Inf. Sci. Eng. 27(1), 129–142 (2011)MathSciNetGoogle Scholar
  26. 26.
    Podilchuk, C.I., Delp, E.J.: Digital watermarking: algorithms and applications. IEEE Signal Process. Mag. 18(4), 33–46 (2001)CrossRefGoogle Scholar
  27. 27.
    Richardson, I.E.: The H.264 Advanced Video Compression Standard, 2nd edn. Wiley, Chichester (2010)CrossRefGoogle Scholar
  28. 28.
    Saadi, K.A., Bouridane, A., Guessoum, A.: Combined fragile watermark and digital signature for H.264/AVC video authentication. In: 17th European Signal Processing Conference, pp. 1799–1803 (2009)Google Scholar
  29. 29.
    Schwarz, H., Merpe, D., Wiegand, T.: Overview of the scalable video coding extension of the H.264/AVC standard. IEEE Trans. Circuits Syst. Video Technol. 17(9), 1103–1120 (2007)CrossRefGoogle Scholar
  30. 30.
    Shahabuddin, S., Iqbal, R., Shirmohammadi, S., Zhao, J.: Compressed-domain temporal adaptation-resilient watermarking for H.264 video authentication. In: IEEE International Conference on Multimedia and Expo (ICME), pp. 1752–1755 (2009)Google Scholar
  31. 31.
    Skodras, A., Christopoulos, C., Ebrahimi, T.: The JPEG 2000 still image compression standard. IEEE Signal Process. Mag. 18(5), 36–58 (2001)CrossRefGoogle Scholar
  32. 32.
    Sun, Q., He, D., Tian, Q.: A secure and robust authentication scheme for video transcoding. IEEE Trans. Circuits Syst. Video Technol. 16(10), 1232–1244 (2006)CrossRefGoogle Scholar
  33. 33.
    The CAVIAR team: EC funded CAVIAR project/IST 2001 37540.
  34. 34.
    Ting, G.C., Goi, B.M., Lee, S.W.: Cryptanalysis of a fragile watermark based H.264/AVC video authentication scheme. Appl. Mech. Mater. 145, 552–556 (2011)CrossRefGoogle Scholar
  35. 35.
    Wang, Y., Pearmain, A.: Blind MPEG-2 video watermarking robust against geometric attacks: a set of approaches in DCT domain. IEEE Trans. Image Process. 15(6), 1536–1543 (2006)CrossRefGoogle Scholar
  36. 36.
    Wei, Z., Wu, Y., Deng, R., Ding, X.: A hybrid scheme for authenticating scalable video codestreams. IEEE Trans. Inf. Forensics Secur. 9(4), 543–553 (2014)CrossRefGoogle Scholar
  37. 37.
    Wong, P.: A watermark for image integrity and ownership verification. In: IS and TS PICS Conference, pp. 374–379 (1998)Google Scholar
  38. 38.
    Wu, Y., Xu, C.: A fault-induced attack to semi-fragile image authentiation schemes. In: SPIE on Visual Communications and Image Processing, vol. 5150, pp. 1875–1883 (2003)Google Scholar
  39. 39.
    Yang, X., Lin, W., Lu, Z., Ong, E., Yao, S.: Motion-compensated residue preprocessing in video coding based on just-noticeable-distortion profile. IEEE Trans. Circuits Syst. Video Technol. 15(6), 742–752 (2005)CrossRefGoogle Scholar
  40. 40.
    Yeung, M., Mintzer, F.: An invisible watermarking technique for image verification. In: International Conference on Image Processsing (ICIP), pp. 680–683 (1997)Google Scholar
  41. 41.
    Yin, P., Yu, H.H.: A semi-fragile watermarking system for MPEG video authentication. In: IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), vol. 4, pp. IV-3461–IV-3464 (2002)Google Scholar
  42. 42.
    Zhang, W., Zhang, R., Liu, X., Wu, C., Niu, X.: A video watermarking algorithm of H.264/AVC for content authentication. J. Networks 7(8), 1150–1154 (2012)Google Scholar
  43. 43.
    Zhao, Y., Lo, S.W., Deng, R.H., Ding, X.: An improved authentication scheme for H.264/SVC and its performance evaluation over non-stationary wireless mobile networks. In: 6th International Conference on Network and System Security (NSS), pp. 192–206 (2012)CrossRefGoogle Scholar
  44. 44.
    Zhao, Z., Liang, P.: A statistical analysis of H.264/AVC FME mode reduction. IEEE Trans. Circuits Syst. Video Technol. 21(1), 53–61 (2011)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 2.5 International License (, which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

The images or other third party material in this chapter are included in the chapter's Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the chapter's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.

Authors and Affiliations

  • Swee-Won Lo
    • 1
    Email author
  • Zhuo Wei
    • 1
  • Robert H. Deng
    • 1
  • Xuhua Ding
    • 1
  1. 1.School of Information SystemsSingapore Management UniversitySingaporeSingapore

Personalised recommendations