Fraunhofer Institut für Integrierte Publikations-und Informationssysteme IPSI
Now showing 1 - 3 of 3
PublicationWatermarking-based digital audio data authentication( 2003)
;Steinebach, M.Dittmann, J.Digital watermarking has become an accepted technology for enabling multimedia protection schemes. While most efforts concentrate on user authentication, recently interest in data authentication to ensure data integrity has been increasing. Existing concepts address mainly image data. Depending on the necessary security level and the sensitivity to detect changes in the media, we differentiate between fragile, semifragile, and content-fragile watermarking approaches for media authentication. Furthermore, invertible watermarking schemes exist while each bit change can be recognized by the watermark, which can be extracted and the original data can be reproduced for high-security applications. Later approaches can be extended with cryptographic approaches like digital signatures. As we see from the literature, only few audio approaches exist and the audio domain requires additional strategies for time flow protection and resynchronization. To allow different security levels, we have to identify relevant audio features that can be used to determine content manipulations. Furthermore, in the field of invertible schemes, there are a bunch of publications for image and video data but no approaches for digital audio to ensure data authentication for high-security applications. In this paper, we introduce and evaluate two watermarking algorithms for digital audio data, addressing content integrity protection. In our first approach, we discuss possible features for a content-fragile watermarking scheme to allow several postproduction modifications. The second approach is designed for high-security applications to detect each bit change and reconstruct the original audio by introducing an invertible audio watermarking concept. Based on the invertible audio scheme, we combine digital signature schemes and digital watermarking to provide a public verifiable data authentication and a reproduction of the original, protected with a secret key.
PublicationRoomware-moving toward ubiquitous computers( 2002)
;Tandler, P. ;Streitz, N.Prante, T.Collaboration between users and environments with multiple interconnected devices will determine, to a large degree, approaches to work and everyday activities. An example of this type of device is roomware, or computer-augmented objects resulting from the integration of room elements, such as walls, doors, and furniture, with computer- based information devices. The roomware components that we have developed at Fraunhofer IPSI support the vision of a future where our surroundings act as an information interface, and the computer as a device disappears from our perception. Three main observations influenced the creation of roomware components: the growing importance of information technology; the need to integrate information technology with the environment in which it is used; and the recognition that new work practices will emerge to cope with the increasing rate of the innovation.