Now showing 1 - 2 of 2
  • Publication
    Combined fingerprinting attacks against digital audio watermarking: Methods, results and solutions
    ( 2002)
    Steinebach, M.
    ;
    Dittmann, J.
    ;
    Saar, E.
    The methods for secure customer identification by digital fingerprinting for audio data are discussed. The algorithms by D. Boneh et al. (Proc. CRYPTO'95, p.452-465, 1995) and Joerg Schwenk et al. (Proceedings of SPIE, vol. 3657, p.24-29, Jan. 1999) are discussed and are then combined with an audio watermarking algorithm for practical evaluation of their coalition resistance to detect illegal copies. Test results are provided and the security performance against different types of coalition attacks is evaluated.
  • Publication
    Digital watermarks enabling e-commerce strategies: conditional and user specific access to services and resources
    ( 2002)
    Dittmann, J.
    ;
    Steinebach, M.
    ;
    Wohlmacher, P.
    ;
    Ackermann, R.
    Digital watermarking is well known as enabling technology to prove ownership on copyrighted material, detect originators of illegally made copies, monitor the usage of the copyrighted multimedia data and analyze the spread spectrum of the data over networks and servers. Research has shown that data hiding techniques can be applied successfully to other application areas like manipulation recognition. We show our innovative approach for integrating watermark and cryptography based methods within a framework of new application scenarios spanning a wide range from dedicated and user specific services, "Try&Buy" mechanisms, to general means for long-term customer relationships. The tremendous recent efforts to develop and deploy ubiquitous mobile communication possibilities are changing the demands but also the possibilities for establishing new business and commerce relationships. Especially we motivate annotation watermarks and aspects of M-commerce (mobile commerce) to show important scenarios for access control. Based on a description of the challenges of the application domain and our latest work, we discuss which methods can be used for establishing services in a fast, convenient and secure way for conditional access services based on digital watermarking combined with cryptographic techniques. We introduce an example scenario for digital audio and an overview of steps in order to establish these concepts practically.