ISBN: 978-981-11-3671-9 DOI: 10.18178/wcse.2017.06.095
Video Authentication Protocol
Abstract— Video watermarking and fingerprinting can be enhanced by combining them with a video
authentication protocol (VAP) that utilizes cryptographic hardware and metadata to indicate ownership,
origin and device identity. While watermarking and fingerprinting provide significant protection against third
party attackers, they neglect standardization, protecting against a malicious user, and device-specific origin
questions that VAP answers.
Each time a video is recorded, VAP automatically creates and sends encrypted metadata to the manufacturer
that created the video recording device. Then, another device may verify the video’s authenticity by sending
a verification request to the manufacturer via a web service. To analyze the viability of this new technology,
three areas are examined: the storage requirements, the relative CPU time performance of its functions, and a
comparative attack analysis.
Index Terms— video authentication, watermarks, video fingerprinting, cryptographic hardware, video security.
Alex X. Galloway, Qingzhong Liu
Department of Computer Science, Sam Houston State University, US
Cite: Alex X. Galloway, Qingzhong Liu, "Video Authentication Protocol," Proceedings of 2017 the 7th International Workshop on Computer Science and Engineering, pp. 553-557, Beijing, 25-27 June, 2017.