Now showing 1 - 2 of 2
  • Publication
    Security mechanisms for IP-based broadband video data
    ( 2003)
    Ferri, L.C.
    ;
    Steinebach, M.
    We provide an overview of security issues important for electronic distribution of multimedia content over heterogeneous digital networks in the SAVANT (Synchronised and scalable AV content Across Networks) project. Our main goal is to describe the security problems specific for the simultaneous distribution of interrelated and synchronized multimedia content through heterogeneous broadcast and broadcast networks. Furthermore, we identify suitable solutions for the content protection in this framework and their compatibility with other important system requirements, such as service and content scalability and dynamic content presentation on client devices. After a brief description of the project and an exemplary News scenario, we analyse the scenario specific security requirements. We summarize security mechanisms suited for the implementation of the security tools in this project.
  • Publication
    Watermarking protocols for authentication and ownership protection based on timestamps and holograms
    ( 2002)
    Dittmann, J.
    ;
    Steinebach, M.
    ;
    Ferri, L.C.
    Digital watermarking has become an accepted technology for enabling multimedia protection schemes. One problem here is the security of these schemes. Without a suitable framework, watermarks can be replaced and manipulated. We discuss different protocols providing security against rightful ownership attacks and other fraud attempts. We compare the characteristics of existing protocols for different media like direct embedding or seed based and required attributes of the watermarking technology like robustness or payload. We introduce two new media independent protocol schemes for rightful ownership authentication. With the first scheme we ensure security of digital watermarks used for ownership protection with a combination of two watermarks: first watermark of the copyright holder and a second watermark from a Trusted Third Party (TTP). It is based on hologram embedding and the watermark consists of e.g. a company logo. As an example we use digital images and specify the properties of the embedded additional security information. We identify components necessary for the security protocol like timestamp, PKI and cryptographic algorithms. The second scheme is used for authentication. It is designed for invertible watermarking applications which require high data integrity. We combine digital signature schemes and digital watermarking to provide a public verifiable integrity. The original data can only be reproduced with a secret key.