[
]
P. Wohlmacher:Requirements and Mechanisms of IT-Security Including Aspects of Multimedia Security S.11
- 1 Introduction S.11
- 2 Requirements and Measures S.11
- 3 Cryptographic Mechanisms S.12
- 4 Confidentiality S.12
- 4.1 Session-Key Scheme S.12
- 5 Data Integrity S.12
- 6 Data Origin Authenticity S.13
- 6.1 Message Authentication Code S.13
- 6.2 Digital Signatures S.14
- 7 Entity Authenticity S.15
- 8 Non-Repudiation S.16
- 9 Public-Key Infrastructure S.17
- 10 Security for Multimedia S.17
- 11 References S.18
A. Miedbrodt:The Functions of Digital Signatures from a Legal Point of View S.21
- 1 Introduction S.21
- 2 How are the digital signatures embedded in the German legal system? S.22
- 2.2 Evidence Law S.22
- 3 The German Digital Signature Law S.22
- 2.1 Writing Form S.23
- 3.1 Requirements for the Keys S.23
- 3.2 Requirements for the Procedure of Establishment and Testing the Signatures S.24
- 3.3 Requirements For The Services Performed By The Certification Authorities S.25
- 4 Acknowledgments S.28
- 5 References S.28
U. Kohl: Secure Container Technology as a Basis for Cryptographically Secured Multimedia Communication S.29
- 1 Introduction S.29
- 2 Multimedia Security Requirements S.29
- 3 Internet Security Mechanisms S.30
- 3.1 Building Blocks Of Security Solutions S.30
- 3.2 Securing Connections S.31
- 4 Protection on the Document Level S.33
- 5 Summary S.34
- 6 Acknowledgments S.34
- 7 References S.34
C. Griwodz: Video Protection by Partial Content Corruption S.37
- 1 Protecting the Cache S.37
- 2 Protecting the Delivered Video S.39
- 3 Conclusion S.39
- 4 References S.39
Th. Kunkelmann: Applying Encryption to Video Communication S.41
- 1 Introduction S.41
- 2 Multimedia Data and Encryption S.41
- 2.1 Data Formats For Video Transmission S.41
- 2.2 Performance Aspects For Encrypted Video S.42
- 2.3 Integration Of Security Functionalities In The System S.42
- 3 Partial Video Cryption Methods S.43
- 3.1 SEC-MPEG S.43
- 3.2 Partial Encryption Of Intracoded Frames S.43
- 3.3 Permutation Of DCT Block Information S.43
- 3.4 Reducing The Amount For Strong Encryption S.43
- 4 Evaluation of Results S.44
- 4.1 Possible Reconstruction Of Protected Data S.44
- 4.2 Experimental Results S.44
- 4.3 Comparison Of The Encryption Methods S.44
- 5 Encryption of Scalable Video Streams S.45
- 5.1 Scalable Video Coding With A Spatial Resolution Pyramid S.45
- 5.2 Partial Video Encryption S.45
- 6 Conclusions S.46
- 7 Literature S.47
Ching-Yung Lin and Shih-Fu Chang:Generating Robust Digital Signature for Image/Video Authentication S.49
- 1 Introduction S.49
- Image Authentication System S.50
- 3 Signature Generation S.50
- 4 Authentication Process S.51
- 5 Performance Enhancement S.51
- 5.1 Tolerance Bound For Recompressing Noise S.51
- 6 Robustness S.51
- 7 Experimental Results S.52
- 8 Video Authentication System S.53
- 9 Conclusion S.53
- 10 References S.53
F. Petitcolas, R. J. Anderson: Weaknesses of Copyright Marking Systems S.55
- 1 Introduction S.55
- 2 Copyright marks S.55
- 3 Attacks S.56
- 3.1 The Jitter Attack S.56
- 3.2 Stirmark S.56
- 3.3 The Mosaic Attack S.57
- 3.4 A General Attack On Audio Marking S.57
- 3.5 Attack On Echo Hiding S.58
- 3.6 Protocol Considerations S.59
- 3.7 Implementation Considerations S.59
- 3.8 Robustness Against Insiders S.59
- 4 Conclusion S.60
- 5 Acknowledments S.60
- 6 References S.60
Mitchell D. Swanson, Bin Zhu, and Ahmed H. Tewfik: Audio Watermarking and Data Embedding - Current State of the Art, Challenges and Future Directions - S.63
- 1 Introduction S.63
- 2 Data Embedding Requirements S.64
- 2.1 Perceptual Transparency S.64
- 2.2 Recovery Of Data With Or Without Access To Original Signal S.64
- 2.3 Bit Rate Of Data Embedding Algorithm S.64
- 2.4 Robustness S.64
- 2.5 Security S.65
- 2.6 Copyright Protection And Ownership Deadlock S.65
- 3 Signal Insertion: The Role Of Masking S.65
- 4 The Human Auditory System S.65
- 5 Previous Audio Work S.66
- 6 Current Research S.66
- 7 Future Directions S.68
- 8 References S.68
M.t L. Miller, I. J. Cox, J. A Bloom : Watermarking in the Real World: An Application to DVD S.71
- 1 Introduction S.71
- 2 Application Framework - DVD Copy Protection System S.71
- 3 Challenges S.74
- 4 Conclusion S.76
- 5 References S.76
F. Hartung, J. K. Su , B. Girod: Digital Watermarking for Compressed Video S.77
- 1 Introduction S.77
- 2 Digital watermarking S.78
- 2.1 Requirements S.78
- 3.1 Principle S.78
- 3.2 Properties Of The Proposed Method S.78
- 4 References S.79
T. Abe, H. Fujii, Y. Takashima: Image Distribution with Scrambling and Watermarking S.81
- 1 Introduction S.81
- 2 Image Distribution S.81
- 3 Protocol S.81
- 4 Constituent technique S.82
- 4.1 Scrambling S.82
- 5 Implementation S.82
- 6 Summary S.82
- 7 References S.82
- 4.2 Watermarking S.82
R. Ohbuchi, H. Masuda, M. Aono: Watermarking Multiple Object Types in Three-Dimensional Models S.83
- 1 Introduction S.83
- 1.1 Data Embedding Classifications S.83
- 2 Embedding Target Objects In 3d Models S.84
- 3 Embedding Algorithms For 3D Polygonal Meshes S.85
- 3.1 An Algorithm Based On Geometrical Quantity Modification S.86
- 3.3 An Algorithm Based On Shape Attribute Modification S.88
- 4 Summary And Future Work S.90
- 5 REFERENCES S.90
K. Nahrstedt, L. Qiao: Non-Invertible Watermarking Methods for MPEG Video and Audio S.93
- 1 Introduction S.93
- 2 Rightful Ownership and Non-invertibility Problem S.93
- 3 Non-invertible Scheme for MPEG Video S.94
- 3.1 Watermark Construction S.94
- 3.2 Watermark Embedding Procedure S.95
- 3.3 Verification Process S.96
- 3.4 Discussion S.96
- 4 Non-invertible Scheme for MPEG Audio S.96
- 4.1 Watermark Construction S.96
- 4.2 Watermark Embedding Procedures S.96
- 5 Conclusion S.98
- 6 References S.98
A. Herrigel, S. Voloshynovskiy: Copyright and Content Protection for Digital Images based on Asymmetric Cryptographic Techniques S.99
- 1 Introduction S.99
- 2 Definitions S.100
- 3 Security Requirements S.101
- 4 Security Architecture S.101
- 4.1 Symbols S.102
- 4.2 Registration Based Copyright And Content Protection S.102
- 4.3 Content Protection S.104
- 4.4 Remarks S.104
- 5 Implementation S.105
- 5.1 The Copyright Holder Application Process S.105
- 5.2 The Copyright Certificate Center Application Process S.105
- 5.3 The Buyer Application Process S.105
- 5.4 The Public Key Infrastructure S.105
- 5.5 Example S.106
- 6 Conclusions and Future Work S.106
- 7 Acknowledgments S.107
- 8 References S.107
- 9 Annex S.109
J. Dittmann, M. Stabenau, R. Steinmetz: Robust MPEG Video Watermarking Technologies S.113
- 1 Motivation S.113
- 2 Digital Watermarking S.114
- 2.1 Requirements For MPEG Video Watermarking S.114
- 3 The Zhao Koch Algorithm S.114
- 4 The Fridrich-Algorithm S.115
- 5 Experimental System - MPEG Watermarking S.115
- 5.1 Approach I in the DCT Domain S.115
- 5.2 Approach II In The Spatial Domain S.118
- 5.3 Problems In The Experimental Systems S.121
- 6 Applicability for Object Watermarking S.121
- 7 Conclusions S.121
- 8 References S.122
E. Delp: Watermarking: Who Cares? Does it Work? S.123