Fraunhofer Institut für Integrierte Publikations-und Informationssysteme IPSI
Now showing 1 - 10 of 63
PublicationSecure production of digital media( 2005)
;Steinebach, M.C.Dittmann, J.Today more and more media data is produced completely in the digital domain without the need of analogue input. This brings an increase of flexibility and efficiency in media handling, as distributed access, duplication and modification are possible without the need to move or touch physical data carriers. But this also reduces the security of the process: Without physical originals to refer to, changes in the material can remain unnoticed, at the end making the manipulated data the new original. Theft and illegal copies in the digital domain can happen without notice and loss of quality. We therefore see the need of setting up secure media production environments, where access control, integrity and copyright protection as well as traceability of individual copies are enabled. Addressing this need, we design a framework for media production environments, where mechanisms like encryption, digital signatures and digital watermarking help to enable a flexible yet secure handling and processing of the content.
PublicationDigital signatures based on invertible watermarks for video authentication( 2005)
;Hauer, E. ;Dittmann, J.Steinebach, M.
PublicationDesign principles for active audio and video fingerprinting( 2005)
;Steinebach, M.Dittmann, J.
PublicationA high-capacity block based video watermark( 2004)
;Thiemert, S. ;Vogel, T. ;Dittmann, J.Steinebach, M.
PublicationPsycho-akustische Modelle für StirMark Benchmark - Modelle zur Transparenzevaluierung( 2003)
;Lang, A. ;Dittmann, J.Steinebach, M.
PublicationWatermarking-based digital audio data authentication( 2003)
;Steinebach, M.Dittmann, J.Digital watermarking has become an accepted technology for enabling multimedia protection schemes. While most efforts concentrate on user authentication, recently interest in data authentication to ensure data integrity has been increasing. Existing concepts address mainly image data. Depending on the necessary security level and the sensitivity to detect changes in the media, we differentiate between fragile, semifragile, and content-fragile watermarking approaches for media authentication. Furthermore, invertible watermarking schemes exist while each bit change can be recognized by the watermark, which can be extracted and the original data can be reproduced for high-security applications. Later approaches can be extended with cryptographic approaches like digital signatures. As we see from the literature, only few audio approaches exist and the audio domain requires additional strategies for time flow protection and resynchronization. To allow different security levels, we have to identify relevant audio features that can be used to determine content manipulations. Furthermore, in the field of invertible schemes, there are a bunch of publications for image and video data but no approaches for digital audio to ensure data authentication for high-security applications. In this paper, we introduce and evaluate two watermarking algorithms for digital audio data, addressing content integrity protection. In our first approach, we discuss possible features for a content-fragile watermarking scheme to allow several postproduction modifications. The second approach is designed for high-security applications to detect each bit change and reconstruct the original audio by introducing an invertible audio watermarking concept. Based on the invertible audio scheme, we combine digital signature schemes and digital watermarking to provide a public verifiable data authentication and a reproduction of the original, protected with a secret key.
PublicationDigitale Audiowasserzeichen im Archivbereich - Das H2O4M Projekt( 2003)
;Steinebach, M. ;Hauer, E.Dittmann, J.
PublicationDigital watermarks enabling e-commerce strategies: conditional and user specific access to services and resources( 2002)
;Dittmann, J. ;Steinebach, M. ;Wohlmacher, P.Ackermann, R.Digital watermarking is well known as enabling technology to prove ownership on copyrighted material, detect originators of illegally made copies, monitor the usage of the copyrighted multimedia data and analyze the spread spectrum of the data over networks and servers. Research has shown that data hiding techniques can be applied successfully to other application areas like manipulation recognition. We show our innovative approach for integrating watermark and cryptography based methods within a framework of new application scenarios spanning a wide range from dedicated and user specific services, "Try&Buy" mechanisms, to general means for long-term customer relationships. The tremendous recent efforts to develop and deploy ubiquitous mobile communication possibilities are changing the demands but also the possibilities for establishing new business and commerce relationships. Especially we motivate annotation watermarks and aspects of M-commerce (mobile commerce) to show important scenarios for access control. Based on a description of the challenges of the application domain and our latest work, we discuss which methods can be used for establishing services in a fast, convenient and secure way for conditional access services based on digital watermarking combined with cryptographic techniques. We introduce an example scenario for digital audio and an overview of steps in order to establish these concepts practically.
PublicationAnforderungen an digitale Transaktionswasserzeichen für den Einsatz im e-Commerce',( 2002)
;Steinebach, M. ;Dittmann, J.Neubauer, C.
PublicationCombined fingerprinting attacks against digital audio watermarking: Methods, results and solutions( 2002)
;Steinebach, M. ;Dittmann, J.Saar, E.The methods for secure customer identification by digital fingerprinting for audio data are discussed. The algorithms by D. Boneh et al. (Proc. CRYPTO'95, p.452-465, 1995) and Joerg Schwenk et al. (Proceedings of SPIE, vol. 3657, p.24-29, Jan. 1999) are discussed and are then combined with an audio watermarking algorithm for practical evaluation of their coalition resistance to detect illegal copies. Test results are provided and the security performance against different types of coalition attacks is evaluated.