skip to main content
10.1145/3335203.3335729acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

Proving Multimedia Integrity using Sanitizable Signatures Recorded on Blockchain

Published: 02 July 2019 Publication History

Abstract

While significant advancements have been made in the field of multimedia forensics to detect altered content, existing techniques mostly focus on enabling the content recipient to verify the content integrity without any inputs from the content creator. In many application scenarios, the creator has a strong incentive to establish the provenance and integrity of the multimedia data created and released by him. Hence, there is a strong need for mechanisms that allow the content creator to prove the authenticity of the released content. Since blockchain technology provides an immutable distributed database, it is an ideal solution for reliably time-stamping content with its creation time and storing an irrefutable signature of the content at the time of its creation. However, a simple digital signature scheme does not allow modification of the content after the initial commitment. Authorized multimedia content alteration by its creator is often necessary (e.g., redaction of faces to protect the privacy of individuals in a video, redaction of sensitive fields in a text document) before the content is distributed. The main contributions of this paper are: (i) a novel sanitizable signature scheme that enables the content creator to prove the integrity of the redacted content, while preventing the recipients from reconstructing the redacted segments based on the published commitment, and (ii) a blockchain-based solution for securely managing the sanitizable signature. The proposed solution employs a robust hashing scheme using chameleon hash function and Merkle tree to generate the initial signature, which is stored on the blockchain. The auxiliary data required for the integrity verification step is retained by the content creator and only a signature of this auxiliary data is stored on the blockchain. Any modifications to the multimedia content requires only updating the signature of the auxiliary data, which is securely recorded on the blockchain. We demonstrate that the proposed approach enables verification of integrity of redacted multimedia content without compromising the content privacy requirements.

References

[1]
Giuseppe Ateniese and Breno de Medeiros. 2004. On the key exposure problem in chameleon hashes. In International Conference on Security in Communication Networks. 165--179.
[2]
J. Brown and D. M. Blough. 2012. Verifiable and redactable medical documents. In AMIA Annual Symposium Proceedings . 1148--1157.
[3]
C. Brzuska, H. C. Poehls, and K. Samelin. 2012. Non-interactive public accountability for sanitizable signatures. In Proc. of Eur. Wksp. on Public Key Infrastructures, Services and Apps. 178--193.
[4]
Fatih Cakir, Kun He, Sarah Adel Bargal, and Stan Sclaroff. 2017. MIHash: Online hashing with mutual information. In Proceedings of the IEEE International Conference on Computer Vision. 437--445.
[5]
Xiaofeng Chen, Fangguo Zhang, and Kwangjo Kim. 2004. Chameleon Hashing Without Key Exposure. In International Conference on Information Security . 87--98.
[6]
Vincent Christlein, Christian Riess, Johannes Jordan, Corinna Riess, and Elli Angelopoulou. 2012. An Evaluation of Popular Copy-Move Forgery Detection Approaches. IEEE Transactions on Information Forensics and Security, Vol. 7, 6 (2012), 1841--1854.
[7]
A. Das, N. Borisov, and M. Caesar. 2014. Do You Hear What I Hear?: Fingerprinting Smart Devices Through Embedded Acoustic Components. In Proc. of ACM SIGSAC Conference on Computer and Communications Security. 441--452.
[8]
A. Erwig, M. Fischlin, M. Hald, D. Helm, R. Kiel, F. Kübler, M. Kümmerlin, J. Laenge, and F. Rohrbach. 2017. Redactable Graph Hashing, Revisited. In Proc. of Australasian Conference on Information Security and Privacy. 398--405.
[9]
J. Fisher and M. H. Sanchez. 2016. Authentication and verification of digital data utilizing blockchain technology. U.S. Patent Application 20160283920A1.
[10]
G. L. Friedman. 1993. The trustworthy digital camera: Restoring credibility to the photographic image. IEEE Transactions on Consumer Electronics, Vol. 39, 4 (1993 1993), 905--910.
[11]
B. Gipp, K. Jagrut, and C. Breitinger. 2016. Securing Video Integrity Using Decentralized Trusted Timestamping on the Blockchain. In Proc. of Mediterranean Conference on Information Systems .
[12]
P. J-P. Golle, J. N. Staddon, and R. Chow. 2012. Method and apparatus for verifying integrity of redacted documents. U.S. Patent 8,245,038.
[13]
A. K. Jain, A. Ross, and S. Pankanti. 2006. Biometrics: A Tool for Information Security. IEEE Trans. on IFS, Vol. 1, 2 (June 2006), 125--143.
[14]
R. Johnson, D. Molnar, D. Song, and D. Wagner. 2002. Homomorphic Signature Schemes. In Topics in Cryptology. 244--262.
[15]
A. Juels and M. Wattenberg. 1999. A Fuzzy Commitment Scheme. In Proceedings of Sixth ACM Conference on Computer and Communications Security. Singapore, 28--36.
[16]
P. Korshunov and T. Ebrahimi. 2013. PEViD: privacy evaluation video dataset. In Proc. of SPIE Applications of Dig. Img. Proc. XXXVI, Vol. 8856.
[17]
H. Krawczyk and T. Rabin. 2000. Chameleon Signatures. In Proc. of NDSS .
[18]
J. Lukas, J. Fridrich, and M. Goljan. 2006. Digital Camera Identification from Sensor Pattern Noise. IEEE Transactions on Information Forensics and Security, Vol. 1, 2 (June 2006), 205--214.
[19]
R. McPherson, R. Shokri, and V. Shmatikov. 2016. Defeating image obfuscation with deep learning. arXiv preprint arXiv:1609.00408 (2016).
[20]
R. C. Merkle. 1987. A Digital Signature Based on a Conventional Encryption Function. In Advances in Cryptology . 369--378.
[21]
S. Nakamoto. 2009. Bitcoin: A Peer-to-Peer Electronic Cash System.
[22]
A. Naveh and E. Tromer. 2016. PhotoProof: Cryptographic Image Authentication for Any Set of Permissible Transformations. In Proc. of IEEE Symposium on Security and Privacy. 255--271.
[23]
M. Rahman, M. Azimpourkivi, U. Topkara, and B. Carbunar. 2017. Video Liveness for Citizen Journalism: Attacks and Defenses. IEEE Trans, on Mobile Computing, Vol. 16, 11 (Nov. 2017), 3250--3263.
[24]
J. A. Redi, W. Taktak, and J.-L. Dugelay. 2011. Digital image forensics: a booklet for beginners. Multimedia Tools and Applications, Vol. 51, 1 (January 2011), 133--162.
[25]
C. Rey and J.-L. Dugelay. 2002. A survey of watermarking algorithms for image authentication. EURASIP Journal on Advances in Signal Processing, Vol. 2002, 6 (2002), 218932.
[26]
O. Solon. 2017. The future of fake news: don't believe everything you read, see or hear. The Guardian.
[27]
M. Swan. 2015. Blockchain: Blueprint for a new economy .O'Reilly .
[28]
N. Szabo. 1997. Formalizing and securing relationships on public networks. First Monday, Vol. 2, 9 (1997).
[29]
L. L. Thomson. 2013. Mobile Devices: New Challenges for Admissibility of Electronic Evidence. The SciTech Lawyer, Vol. 9, 3 (2013).
[30]
A. Unitt. 2017. System and methods for tamper proof interaction recording and timestamping. U.S. Patent 9,553,982.
[31]
B. B. Zhu, M. D. Swanson, and A. H. Tewfik. 2004. When seeing isn't believing {multimedia authentication technologies}. IEEE Signal Processing Magazine, Vol. 21, 2 (March 2004), 40--49.

Cited By

View all
  • (2024)Blockchain-based distributed application for multimedia system using Hyperledger FabricMultimedia Tools and Applications10.1007/s11042-023-15690-683:1(2473-2499)Online publication date: 1-Jan-2024
  • (2023)VCTP: A Verifiable Credential-Based Trust Propagation Protocol for Personal Issuers in Self-Sovereign Identity Platforms2023 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS)10.1109/DAPPS57946.2023.00023(109-118)Online publication date: Jul-2023
  • (2022)Advanced digital signatures for preserving privacy and trust management in hierarchical heterogeneous IoT: Taxonomy, capabilities, and objectivesInternet of Things10.1016/j.iot.2021.10049218(100492)Online publication date: May-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
IH&MMSec'19: Proceedings of the ACM Workshop on Information Hiding and Multimedia Security
July 2019
249 pages
ISBN:9781450368216
DOI:10.1145/3335203
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 July 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. authenticity
  2. blockchain
  3. chameleon hash
  4. merkle tree
  5. multimedia integrity
  6. redaction
  7. robust hashing

Qualifiers

  • Research-article

Conference

IH&MMSec '19
Sponsor:

Acceptance Rates

Overall Acceptance Rate 128 of 318 submissions, 40%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)27
  • Downloads (Last 6 weeks)5
Reflects downloads up to 01 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Blockchain-based distributed application for multimedia system using Hyperledger FabricMultimedia Tools and Applications10.1007/s11042-023-15690-683:1(2473-2499)Online publication date: 1-Jan-2024
  • (2023)VCTP: A Verifiable Credential-Based Trust Propagation Protocol for Personal Issuers in Self-Sovereign Identity Platforms2023 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS)10.1109/DAPPS57946.2023.00023(109-118)Online publication date: Jul-2023
  • (2022)Advanced digital signatures for preserving privacy and trust management in hierarchical heterogeneous IoT: Taxonomy, capabilities, and objectivesInternet of Things10.1016/j.iot.2021.10049218(100492)Online publication date: May-2022
  • (2022)A blockchain‐based privacy‐preserving authentication system for ensuring multimedia content integrityInternational Journal of Intelligent Systems10.1002/int.2283037:5(3050-3071)Online publication date: 28-Jan-2022
  • (2021)Enabling Decentralized and Dynamic Data Integrity Verification for Secure Cloud Storage via T-Merkle Hash Tree Based BlockchainMobile Information Systems10.1155/2021/99777442021Online publication date: 1-Jan-2021
  • (2021)A Survey of Privacy Solutions using Blockchain for Recommender Systems: Current Status, Classification and Open IssuesThe Computer Journal10.1093/comjnl/bxab065Online publication date: 31-May-2021
  • (2020)Blockchain‐based video forensics and integrity verification framework for wireless Internet‐of‐Things devicesSECURITY AND PRIVACY10.1002/spy2.1434:2Online publication date: 28-Dec-2020

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media