For the Triple Play Video Audit and Distribution Trust Mechanism

Article Preview

Abstract:

For the new state of the triple play, video faces security problems and distrust problems between the subjects in the process of audit and distribution, and then we propose a new trust mechanism. The mechanism considering the video encoding, tampering and the human visual system (HVS), designs a method of video key information sampling, constructs a bit commitment (BC) protocol of sampling information group, and uses public key encryption for secure transmission by generating secret communication mark. The recipient verifies the communication mark and BC value to determine whether the video is tampered and locate the tampered area. The experimental results show that the mechanism has high security and credibility, effectively achieving the mutual trust between the subjects in the triple play.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2799-2802

Citation:

Online since:

August 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] C.W. Yuan, J.B. Zhang and J.B. Yao. Present Status and Development of Network Convergence. Journal of Beijing University of Posts and Telecommunications, 33 (2010): 1-8.

Google Scholar

[2] X. Zeng, Z.Y. Chen, W. Fan and Z. Xiong. Invertible Semi-fragile Video Watermarking Algorithm Used for Content Authentication. Journal of Image and Graphics, 15(2010): 1189-1195.

Google Scholar

[3] X.J. Yuan, T.Q. Huang, Z.W. Chen, T.H. Wu and L.C. Su. Digital Video Forgeries Detection based on Textural Features. Computer Systems & Applications, 21(2012): 91-95.

Google Scholar

[4] X.P. Liu and H. Jiang. An Accurate Authentication Scheme of Mpeg-4 Video. Computer Engineering & Science, 31(2009): 37-41.

Google Scholar

[5] M.Z. Tan, X.H. Jiang and T.F. Sun. Research of Video Forgery Blind Detection. China Information Securtiy, 3(2012): 68-69.

Google Scholar

[6] Y.L. Qin, G.L. Sun and X.P. Zhang. Exposing Digital Forgeries in Video via Motion Vectors. Journal of Computer Research and Development, 46(2009): 227-233.

Google Scholar

[7] D. Qiu and C.R. Wang. Keyframe Extraction in MPEG Compression Domain. Computer Security, 01(2011): 14-16.

Google Scholar

[8] J.Y. Gu, T.F. Qin and H.T. Chen. A Video Key-frame Retrieval Method based on Color Features and Block-moving Information for MPEG-7. Journal of Guangxi University (Natural Science Edition), 35 (2010): 310-313.

Google Scholar

[9] Y. Wei, L.S. Huang and Q.Y. Wang. Three-Party Bit Commitment Based on Elliptic Curve. Journal of Electronice & Information Technology, 31(2009): 1049-1053.

Google Scholar