Browse > Article
http://dx.doi.org/10.9708/jksci.2022.27.07.017

Hash Based Equality Analysis of Video Files with Steganography of Identifier Information  

Lee, Wan Yeon (Dept. of Computer Science, Dongduk Women's University)
Choi, Yun-Seok (Dept. of Computer Science, Dongduk Women's University)
Abstract
Hash functions are widely used for fast equality analysis of video files because of their fixed small output sizes regardless of their input sizes. However, the hash function has the possibility of a hash collision in which different inputs derive the same output value, so there is a problem that different video files may be mistaken for the same file. In this paper, we propose an equality analysis scheme in which different video files always derive different output values using identifier information and double hash. The scheme first extracts the identifier information of an original video file, and attaches it into the end of the original file with a steganography method. Next the scheme calculates two hash output values of the original file and the extended file with attached identifier information. Finally the scheme utilizes the identifier information, the hash output value of the original file, and the hash output value of the extended file for the equality analysis of video files. For evaluation, we implement the proposed scheme into a practical software tool and show that the proposed scheme performs well the equality analysis of video files without hash collision problem and increases the resistance against the malicious hash collision attack.
Keywords
Steganography; Equality Analysis; Video File; Hash Collision; Double Hash;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Zulfany E. Rasjid, Benfano Soewito, Gunawan Witjaksono, and Edi Abdurachman, "A Review of Collisions in Cryptographic Hash Function Used in Digital Forensic Tools," International Conference on Computer Science and Computational Intelligence, vol. 2, pp. 381-392, Oct. 2017.
2 Ali Maetouq et al., "Comparison of Hash Function Algorithms Against Attacks: A Review" International Journal of Advanced Computer Science and Applications, vol. 9, no. 8, 2018.
3 Robbie Rahim, Iskandar Zulkarnain, and Hendra Jaya, "Double Hashing Technique in Closed Hashing Search Process," IOP Conference Series: Materials Science and Engineering, vol. 237, 2017.
4 Marc Stevens, Elie Bursztein, Pierre Karpman, Ange Albertini, Yarik Markov, Alex Petit Bianco, and Clement Baisse, Announcing the first SHA1 collision, https://security.googleblog.com/2017/02/announcing-first-sha1-collision.html, Feb. 2007.
5 Wan Yeon Lee and Yun-Seok Choi, "Ultra-light Mutual Authentication Scheme based on Text Steganography Communication," Journal of the Korea Society of Computer and Information, vol. 24, no. 4, pp. 11-18, April. 2019.   DOI
6 Sangwook Lee, Ji Eun Song, Wan Yeon Lee, Young Woong Ko, and Heejo Lee, "Integrity Verification Scheme of Video Contents in Surveillance Cameras for Digital Forensic Investigations" IEICE Trans. Information and Systems, vol. E98-D, no. 1, pp. 95-97, Jan. 2015.   DOI
7 Saleh Saraireh, Jaafer Al-Saraiereh, and Mohammad Saraireh, "Integration of Hash-Crypto -Steganography for Efficient Security Technique," International Journal of Circuits, Systems and Signal Processing, vol. 12, 2018.
8 Richa Purohit, Upendra Mishra and Abhay Bansl, "A Survey on Recent Cryptographic Hash Function Design," International Journal of Emerging Trends and Technology in Computer Science, vol. 2, no. 1, pp. 117-122, Jan.-Feb. 2013.
9 Sung-Min Hwang and Seog-Gyu Kim, "Design of System for Avoiding Upload of Identical-file Using SA Hash Algorithm," Journal of the Korea Society of Computer and Information, vol. 19, no. 10, pp. 81-89, Oct. 2014.   DOI
10 Emmanuouel Kellinis and Konstantinos Papapanagiotou, "Using Steganography to Improve Hash Fuctions' Collision Resistance," International Conference on Security and Cryptiography, vol. 2, pp. 337-340, 2007.