Now showing 1 - 3 of 3
No Thumbnail Available
Publication

Watermarking protocols for authentication and ownership protection based on timestamps and holograms

2002 , Dittmann, J. , Steinebach, M. , Ferri, L.C.

Digital watermarking has become an accepted technology for enabling multimedia protection schemes. One problem here is the security of these schemes. Without a suitable framework, watermarks can be replaced and manipulated. We discuss different protocols providing security against rightful ownership attacks and other fraud attempts. We compare the characteristics of existing protocols for different media like direct embedding or seed based and required attributes of the watermarking technology like robustness or payload. We introduce two new media independent protocol schemes for rightful ownership authentication. With the first scheme we ensure security of digital watermarks used for ownership protection with a combination of two watermarks: first watermark of the copyright holder and a second watermark from a Trusted Third Party (TTP). It is based on hologram embedding and the watermark consists of e.g. a company logo. As an example we use digital images and specify the properties of the embedded additional security information. We identify components necessary for the security protocol like timestamp, PKI and cryptographic algorithms. The second scheme is used for authentication. It is designed for invertible watermarking applications which require high data integrity. We combine digital signature schemes and digital watermarking to provide a public verifiable integrity. The original data can only be reproduced with a secret key.

No Thumbnail Available
Publication

Digitale Wasserzeichen - Grundlagen - Anwendungen - Grenzen

2002 , Steinebach, M. , Dittmann, J.

Digital watermarking has become an often-discussed approach for digital rights management (DRM). Owner authentication, identification of pirates and even prevention of illegal copies are addressed. We provide an overview of watermarking technology. Furthermore we identify problems in watermarking-based DRM and show application scenarios: H2O/sub 4/M provides a combined security approach including PKI and biometrics. Transmark is a DRM example for media on demand. We discuss new methods of advertisement and content-protection for digital media.

No Thumbnail Available
Publication

Combined fingerprinting attacks against digital audio watermarking: Methods, results and solutions

2002 , Steinebach, M. , Dittmann, J. , Saar, E.

The methods for secure customer identification by digital fingerprinting for audio data are discussed. The algorithms by D. Boneh et al. (Proc. CRYPTO'95, p.452-465, 1995) and Joerg Schwenk et al. (Proceedings of SPIE, vol. 3657, p.24-29, Jan. 1999) are discussed and are then combined with an audio watermarking algorithm for practical evaluation of their coalition resistance to detect illegal copies. Test results are provided and the security performance against different types of coalition attacks is evaluated.