Browse > Article

Video Integrity Checking Scheme by Using Merkle Tree  

Yun-Hee Kang (백석대학교)
Eun-Young CHANG (국립공주대학교)
Taeun Kwonk ((주)하스퍼)
Publication Information
Journal of Platform Technology / v.10, no.4, 2022 , pp. 39-46 More about this Journal
Abstract
Recently, digital contents including video and sound are created in various fields, transmitted to the cloud through the Internet, and then stored and used. In order to utilize digital content, it is essential to verify data integrity, and it is necessary to ensure network bandwidth efficiency of verified data. This paper describes the design and implementation of a server that maintains, manages, and provides data for verifying the integrity of video data. The server receives and stores image data from Logger, a module that acquires image data, and performs a function of providing data necessary for verification to Verifier, a module that verifies image data. Then, a lightweight Merkle tree is constructed using the hash value. The light-weight Merkle tree can quickly detect integrity violations without comparing individual hash values of the corresponding video frame changes of the video frame indexes of the two versions. A lightweight Merkle tree is constructed by generating a hash value of digital content so as to have network bandwidth efficiency, and the result of performing proof of integrity verification is presented.
Keywords
Digital contents; Data integrity; Authenticity verification; Hash value; Light-weight Merkle tree;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 "Digital Transformation of the Future of Work, 2019," KEPCO Journal on Electric Power and Energy, vol. 6, no. 1, pp. 1-5, Mar. 2020.
2 Alfred Zimmermann, Rainer Schmidt, Lakhmi C. Jain, Architecting the Digital Transformation - Digital Business, Technology, Decision Support, Management. Intelligent Systems Reference Library 188, ISBN 978-3-030-49639-5, Springer, 2021.
3 S. Milani, M. Fontani, P. Bestagini, M. Barni, A. Piva, M. Tagliasacchi, and S. Tubaro, "An overview on video forensics," APSIPA Transactions on Signal and Information Processing, vol. 1, 2012.
4 A. Gironi, M. Fontani, T. Bianchi, A. Piva, and M. Barni, "A video forensic technique for detecting frame deletion and insertion," in IEEE 2014 International Conference on Acoustics, Speech and Signal Processing (ICASSP), IEEE, pp. 6226-6230, 2014.
5 T.Y.Kim, J.I.Hong, M.G.Kang, S.H.Song, J.H.Lee and S.T.Kim, "Integrity Support System for Blockchain-based explainable CCTV Video," The Journal of The Institute of Internet, Broadcasting and Communication, vol. 21, no. 3, pp. 15-21, Jun. 2021.   DOI
6 Toda, M., Tsukada, M., Inoue, A. & Suzuki, T., High dynamic range rendering for YUV images with a constraint on perceptual chroma preservation, IEEE. ICIP., pp. 1817-1820, ISBN: 978-1- 4244-5654-3, 2009.
7 L.V. Cherckesova, O.A. Safaryan, N.G. Lyashenko, D.A. Korochentsev, Developing a New Collision-Resistant Hashing Algorithm. Mathematics 10, 2769, 2022. https://doi.org/10.3390/math10152769.   DOI
8 P. Rogaway, T. Shrimpton, "Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance", 2004.
9 R. C. Merkle, "A digital signature based on a conventional encryption function," in Advances in Cryptology - CRYPTO'87, C. Pomerance, Ed. Berlin, Heidelberg: Springer Berlin Heidelberg, pp. 369-378, 1988.