Two Phase Approach for Copyright Protection and Deduplication of Video Content in Cloud using H.264 and SHA-512

International Journal of Computer Trends and Technology (IJCTT)          
© 2018 by IJCTT Journal
Volume-59 Number-1
Year of Publication : 2018
Authors : Dr.B.Basaveswara Rao , Qutaiba Mumtaz Dawood ,Dr. K. Gangadhara Rao
DOI :  10.14445/22312803/IJCTT-V59P107


Dr.B.Basaveswara Rao , Qutaiba Mumtaz Dawood ,Dr. K. Gangadhara Rao "Two Phase Approach for Copyright Protection and Deduplication of Video Content in Cloud using H.264 and SHA-512". International Journal of Computer Trends and Technology (IJCTT) V59(1):35-43, May 2018. ISSN:2231-2803. Published by Seventh Sense Research Group.

Cloud computing offers a new way of service provision by rearranging various resources over the Internet. The most important and popular cloud service is data storage. In order to preserve the privacy of data holders, data are often stored in cloud in an encrypted form. However, encrypted data introduce new challenges for cloud data deduplication, which becomes crucial for big data storage and processing in the cloud. Traditional deduplication schemes cannot work on encrypted data. Among these data, digital videos are fairly huge in terms of storage cost and size; and techniques that can help the legal aspects of video owner such as copyright protection and reducing the cloud storage cost and size are always desired. This paper focuses on video copyright protection and deduplication. A video copyright and deduplication scheme in cloud storage environments using the H.264 compression algorithm and SHA-512 hashing technique is proposed. This paper proposes a combined copyright production and deduplication based on video content to authenticate and to verify the integrity of the compressed H.264 video. The design of the proposed scheme consists of two modules. First, a H.264 compression algorithm is applied on the given video by the user. Second, a unique signature in different time interval of the compressed video is generated by the user in such a way that the CSP can use it to compare the user’s video against other videos without compromising the security of the user’s video. To avoid any attacker to gain access to the hash signature during uploading to the cloud, the hash signature is encrypted with the user password. Some experimental results are provided, showing the effectiveness of our proposed copyright protection and deduplication system.

[1] Implementation of New Secure Mechanism for Data Deduplication in Hybrid Cloud. K. Gangadhara Rao, B.Basaveswara Rao and Qutaiba Mumtaz Dawood.e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 6, Ver. VI (Nov.-Dec. 2016), PP 12-18
[2] Iain E. G. Richardson. The MPEG-4 and H.264 Standards, pages 85–98. John Wiley Sons, Ltd, 2004.
[3] H.264 baseline codec v2. h-264-baseline-codec-v2. Updated on February 2013.
[4] Baris Coskun, Bulent Sankur, and Nasir Memon. Spatio–temporal transform based video hashing. Multimedia, IEEE Transactions on, 8(6):1190–1208, 2006.
[5] Dropbox hacked. Accessed on November 2014.
[6] G. Qiu, P. Marziliano, A. T. S. Ho, D. J. He and Q. B. Sun, "A hybrid watermarking scheme for H.264/AVC video," in Proc. 17th Int. Conf. Pattern Recogn., U.K., 2004.
[7] J. Zhang and A. T.S. Ho, "Efficient video authentication for H.264," IEEE Proc. of the first International Conference on Innovative Computing, Information and Control (ICICIC`06), 2006.
[8] Nguyen, D.B.H. Tay, and G. Deng, "A Fast Watermarking System for H.264/AVC Video," IEEE Asia Pacific Conference on Circuits and Syst., APCCAS, pp. 81–84, December 2006.
[9] S. Ueda, H. Shigeno and K. I. Okada, "NAL Level Stream Authentication for H.264/AVC," IPSJ Transactions on Database, Vol. 48, No. 2, pp. 635–643, 2007.
[10] N. Ramaswamy and K. R. Rao, "Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm,"NOSSDAV?06, Newport, Rhode Island, USA, May 2006.
[11] K. Ait Saadi, A. Bouridane and A. Guessoum, "Combined Fragile Watermark and Digital Signature for H.264/AVC video Authentication," EUSIPCO 2009, Scotland, Glasgow 2009.
[12] S. Halevi, D. Harnik, B. Pinkas, and A. Shulman-Peleg, “Proofs of ownership in remote storage systems,” in Proceedings of the 18th ACM Conference on Computer and Communications Security. ACM, 2011, pp. 491–500.
[13] T. Wiegand, GJ. Sullivan, G. Bjøntegaard and A. Luthra, "Overview of the H.264/AVC video coding standard," IEEE Trans. Circuits Syst. Video Technol., Vol. 13, No. 7, pp. 560-576, 2003.
[14] A. Giuseppe, B. Randal, C. Reza et al., “Provable dat possession at untrusted stores,” Proceedings of CCS, vol. 10, pp. 598–609, 2007.
[15] A. Juels and B. S. Kaliski, Jr., “Pors: proofs of retrievability for large files,” in Proceedings of the 14th ACM conference on Computer and communications security, ser. CCS ?07. New York, NY, USA: ACM, 2007, pp. 584–597
[16] Richardson, I.E.G.: H.264 and MPEG-4. Video Compression for Next-generation Multimedia.pages NO.:46-50 Wiley, Chichester, England (2004)
[17] Ravi Kumar Vadapalli and P.K. Bora. Perceptual video hashing based on 3d spiht coding of 3d dwt coefficients. In National Conference on Communications (NCC-2008), pages 173–177, 2008.
[18] Cedric D.Roover,Christophe D. Vleeschouwer, F. Lefebvre and Benoit Macq, “Robust video hashing based on radial projection of key frames,” IEEE Transactions On Signal Processing, vol. 53, no. 10, pp. 4020–4037, Oct. 2005.
[19] "Announcing the ADVANCED ENCRYPTION STANDARD (AES)" . Federal Information Processing Standards Publication 197. United States National Institute of Standards and Technology (NIST). November 26, 2001. Retrieved October 2, 2012.
[20] Nithin M Thomas, Damien Lefol, David R Bull, and David Redmill. A novel secure h. 264 transcoder using selective encryption. In Image Processing, 2007. ICIP 2007. IEEE International Conference on, volume 4, pages IV–85. IEEE, 2007.

Video copyright, Video deduplication, H.264 compression.