Fraunhofer-Gesellschaft

Publica

Hier finden Sie wissenschaftliche Publikationen aus den Fraunhofer-Instituten.

Multimedia and security

Workshop at ACM Multimedia '98, Bristol, U.K., September 12 - 13, 1998
 
: Dittmann, J.; Wohlmacher, P.; Horster, P.; Steinmetz, R.

:
urn:nbn:de:0011-b-732725 (2.3 MByte PDF)
MD5 Fingerprint: 85ceb22f000f73c6f657a1f2e911687b
Erstellt am: 07.08.2002


Element named row_ProjectData has starweb_type Output Field Repeater but ID not found in STAR Web Designer.
Sankt Augustin: GMD Forschungszentrum Informationstechnik, 1998, 137 S.
GMD Report, 41
Multimedia and Security Workshop at ACM Multimedia <1998, Bristol>
 
Englisch
Tagungsband, Elektronische Publikation
Fraunhofer IPSI; 2007
multimedia; integrity; authenticity; digital signature; authentication protocol

Abstract
In this paper we describe the most important security requirements, which must be fulfilled by today's IT-systems, and the security measures used to satisfy these requirements. These security measures are based on modern cryptographic mechanisms as well as on security infrastructures. Regarding data security and communication security in particular in the field of multimedia, the requirements on security increase. If and in which way the discussed security mechanisms can be applied to multimedia security is difficult to analyse. This is mainly due to the complexity of multimedia data and their applications. This paper introduces the main issues of IT-security and represents the basis for solutions of security problems in the field of multimedia.

[]
P. Wohlmacher:Requirements and Mechanisms of IT-Security Including Aspects of Multimedia Security S.11
- 1 Introduction S.11
- 2 Requirements and Measures S.11
- 3 Cryptographic Mechanisms S.12
- 4 Confidentiality S.12
- 4.1 Session-Key Scheme S.12
- 5 Data Integrity S.12
- 6 Data Origin Authenticity S.13
- 6.1 Message Authentication Code S.13
- 6.2 Digital Signatures S.14
- 7 Entity Authenticity S.15
- 8 Non-Repudiation S.16
- 9 Public-Key Infrastructure S.17
- 10 Security for Multimedia S.17
- 11 References S.18
A. Miedbrodt:The Functions of Digital Signatures from a Legal Point of View S.21
- 1 Introduction S.21
- 2 How are the digital signatures embedded in the German legal system? S.22
- 2.2 Evidence Law S.22
- 3 The German Digital Signature Law S.22
- 2.1 Writing Form S.23
- 3.1 Requirements for the Keys S.23
- 3.2 Requirements for the Procedure of Establishment and Testing the Signatures S.24
- 3.3 Requirements For The Services Performed By The Certification Authorities S.25
- 4 Acknowledgments S.28
- 5 References S.28
U. Kohl: Secure Container Technology as a Basis for Cryptographically Secured Multimedia Communication S.29
- 1 Introduction S.29
- 2 Multimedia Security Requirements S.29
- 3 Internet Security Mechanisms S.30
- 3.1 Building Blocks Of Security Solutions S.30
- 3.2 Securing Connections S.31
- 4 Protection on the Document Level S.33
- 5 Summary S.34
- 6 Acknowledgments S.34
- 7 References S.34
C. Griwodz: Video Protection by Partial Content Corruption S.37
- 1 Protecting the Cache S.37
- 2 Protecting the Delivered Video S.39
- 3 Conclusion S.39
- 4 References S.39
Th. Kunkelmann: Applying Encryption to Video Communication S.41
- 1 Introduction S.41
- 2 Multimedia Data and Encryption S.41
- 2.1 Data Formats For Video Transmission S.41
- 2.2 Performance Aspects For Encrypted Video S.42
- 2.3 Integration Of Security Functionalities In The System S.42
- 3 Partial Video Cryption Methods S.43
- 3.1 SEC-MPEG S.43
- 3.2 Partial Encryption Of Intracoded Frames S.43
- 3.3 Permutation Of DCT Block Information S.43
- 3.4 Reducing The Amount For Strong Encryption S.43
- 4 Evaluation of Results S.44
- 4.1 Possible Reconstruction Of Protected Data S.44
- 4.2 Experimental Results S.44
- 4.3 Comparison Of The Encryption Methods S.44
- 5 Encryption of Scalable Video Streams S.45
- 5.1 Scalable Video Coding With A Spatial Resolution Pyramid S.45
- 5.2 Partial Video Encryption S.45
- 6 Conclusions S.46
- 7 Literature S.47
Ching-Yung Lin and Shih-Fu Chang:Generating Robust Digital Signature for Image/Video Authentication S.49
- 1 Introduction S.49
- Image Authentication System S.50
- 3 Signature Generation S.50
- 4 Authentication Process S.51
- 5 Performance Enhancement S.51
- 5.1 Tolerance Bound For Recompressing Noise S.51
- 6 Robustness S.51
- 7 Experimental Results S.52
- 8 Video Authentication System S.53
- 9 Conclusion S.53
- 10 References S.53
F. Petitcolas, R. J. Anderson: Weaknesses of Copyright Marking Systems S.55
- 1 Introduction S.55
- 2 Copyright marks S.55
- 3 Attacks S.56
- 3.1 The Jitter Attack S.56
- 3.2 Stirmark S.56
- 3.3 The Mosaic Attack S.57
- 3.4 A General Attack On Audio Marking S.57
- 3.5 Attack On Echo Hiding S.58
- 3.6 Protocol Considerations S.59
- 3.7 Implementation Considerations S.59
- 3.8 Robustness Against Insiders S.59
- 4 Conclusion S.60
- 5 Acknowledments S.60
- 6 References S.60
Mitchell D. Swanson, Bin Zhu, and Ahmed H. Tewfik: Audio Watermarking and Data Embedding - Current State of the Art, Challenges and Future Directions - S.63
- 1 Introduction S.63
- 2 Data Embedding Requirements S.64
- 2.1 Perceptual Transparency S.64
- 2.2 Recovery Of Data With Or Without Access To Original Signal S.64
- 2.3 Bit Rate Of Data Embedding Algorithm S.64
- 2.4 Robustness S.64
- 2.5 Security S.65
- 2.6 Copyright Protection And Ownership Deadlock S.65
- 3 Signal Insertion: The Role Of Masking S.65
- 4 The Human Auditory System S.65
- 5 Previous Audio Work S.66
- 6 Current Research S.66
- 7 Future Directions S.68
- 8 References S.68
M.t L. Miller, I. J. Cox, J. A Bloom : Watermarking in the Real World: An Application to DVD S.71
- 1 Introduction S.71
- 2 Application Framework - DVD Copy Protection System S.71
- 3 Challenges S.74
- 4 Conclusion S.76
- 5 References S.76
F. Hartung, J. K. Su , B. Girod: Digital Watermarking for Compressed Video S.77
- 1 Introduction S.77
- 2 Digital watermarking S.78
- 2.1 Requirements S.78
- 3.1 Principle S.78
- 3.2 Properties Of The Proposed Method S.78
- 4 References S.79
T. Abe, H. Fujii, Y. Takashima: Image Distribution with Scrambling and Watermarking S.81
- 1 Introduction S.81
- 2 Image Distribution S.81
- 3 Protocol S.81
- 4 Constituent technique S.82
- 4.1 Scrambling S.82
- 5 Implementation S.82
- 6 Summary S.82
- 7 References S.82
- 4.2 Watermarking S.82
R. Ohbuchi, H. Masuda, M. Aono: Watermarking Multiple Object Types in Three-Dimensional Models S.83
- 1 Introduction S.83
- 1.1 Data Embedding Classifications S.83
- 2 Embedding Target Objects In 3d Models S.84
- 3 Embedding Algorithms For 3D Polygonal Meshes S.85
- 3.1 An Algorithm Based On Geometrical Quantity Modification S.86
- 3.3 An Algorithm Based On Shape Attribute Modification S.88
- 4 Summary And Future Work S.90
- 5 REFERENCES S.90
K. Nahrstedt, L. Qiao: Non-Invertible Watermarking Methods for MPEG Video and Audio S.93
- 1 Introduction S.93
- 2 Rightful Ownership and Non-invertibility Problem S.93
- 3 Non-invertible Scheme for MPEG Video S.94
- 3.1 Watermark Construction S.94
- 3.2 Watermark Embedding Procedure S.95
- 3.3 Verification Process S.96
- 3.4 Discussion S.96
- 4 Non-invertible Scheme for MPEG Audio S.96
- 4.1 Watermark Construction S.96
- 4.2 Watermark Embedding Procedures S.96
- 5 Conclusion S.98
- 6 References S.98
A. Herrigel, S. Voloshynovskiy: Copyright and Content Protection for Digital Images based on Asymmetric Cryptographic Techniques S.99
- 1 Introduction S.99
- 2 Definitions S.100
- 3 Security Requirements S.101
- 4 Security Architecture S.101
- 4.1 Symbols S.102
- 4.2 Registration Based Copyright And Content Protection S.102
- 4.3 Content Protection S.104
- 4.4 Remarks S.104
- 5 Implementation S.105
- 5.1 The Copyright Holder Application Process S.105
- 5.2 The Copyright Certificate Center Application Process S.105
- 5.3 The Buyer Application Process S.105
- 5.4 The Public Key Infrastructure S.105
- 5.5 Example S.106
- 6 Conclusions and Future Work S.106
- 7 Acknowledgments S.107
- 8 References S.107
- 9 Annex S.109
J. Dittmann, M. Stabenau, R. Steinmetz: Robust MPEG Video Watermarking Technologies S.113
- 1 Motivation S.113
- 2 Digital Watermarking S.114
- 2.1 Requirements For MPEG Video Watermarking S.114
- 3 The Zhao Koch Algorithm S.114
- 4 The Fridrich-Algorithm S.115
- 5 Experimental System - MPEG Watermarking S.115
- 5.1 Approach I in the DCT Domain S.115
- 5.2 Approach II In The Spatial Domain S.118
- 5.3 Problems In The Experimental Systems S.121
- 6 Applicability for Object Watermarking S.121
- 7 Conclusions S.121
- 8 References S.122
E. Delp: Watermarking: Who Cares? Does it Work? S.123