8 research outputs found

    Watermarking-Based Digital Audio Data Authentication

    Get PDF

    MULTIMEDIA AND SECURITY ECRYPT: EUROPEAN NETWORK OF EXCELLENCE IN CRYPTOLOGY

    Get PDF
    Die AbkĂŒrzung ECRYPT /1/ steht fĂŒr „European Network of Excellence in Cryptology”. Das Netzwerk ist ein Zusammenschluss von ca. 180 europĂ€ischen Forschern und Entwicklern, an dem auch Informatiker der Otto-von-Guericke-UniversitĂ€t Magdeburg beteiligt sind. Das Projekt, in dessen Mittelpunkt die Forschungen zur Sicherung von Multimediadaten (Digital Rights Management) stehen, wird von der EuropĂ€ischen Union ĂŒber einen Zeitraum von vier Jahren gefördert. Die Forscher wollen Methoden entwickeln, um Musik, Bilder oder Videos mit zusĂ€tzlichen Schutzmechanismen zu versehen, mit dem Ziel Manipulationen zu erkennen oder bspw. Raubkopien zu verhindern oder aufzuspĂŒren. Das Advanced Multimedia and Security Lab (AMSL) der Arbeitsgruppe Multimedia and Security an der Otto-von-Guericke-UniversitĂ€t leitet zusammen mit Stefan Katzenbeisser (TU MĂŒnchen) seit Anfang 2004 das „Watermarking Virtual Lab“ (WAVILA), einen Teilbereich des Netzwerkes ECRYPT. In diesem Verbund arbeiten verschiedene Arbeitsgruppen, zum Beispiel aus Italien, Spanien, Frankreich, Deutschland, Belgien, der Schweiz und den Niederlanden, zusammen. Der Fokus der gemeinsamen Arbeit liegt dabei im Bereich der digitalen Wasserzeichen. Ihre Eigenschaften und Einsatzgebiete werden analysiert und es werden theoretische Grundlagen fĂŒr Sicherheitsmodelle und fĂŒr die Definitionen digitaler Wasserzeichen erarbeitet. In diesem Beitrag sollen die Motivation und die neuen Herausforderungen von ECRYPT, sowie die Ziele des Netzwerkes vorgestellt werden. Des Weiteren werden Arbeiten aus dem Bereich Wasserzeichen Benchmarking sowie Algorithmenentwurf prĂ€sentiert, um einen Einblick in das Umfeld zu ermöglichen

    Difference-expansion based reversible data hiding and its steganalysis

    Get PDF
    A novel reversible data embedding method was reported in a recent IEEE journal article. The method was based on difference expansion (DE) technique. It used redundancy in digital images to achieve a high embedding capacity, while keeping visual distortion of the stego-image low. In this thesis, this technique was studied and experimentally evaluated. An effective steganalysis scheme for this DE-based reversible data embedding method was proposed, which used 12-dimensional feature vectors and a Bayes Classifier. The proposed steganalysis scheme steadily achieved a correct classification rate of 99%

    Digital rights management techniques for H.264 video

    Get PDF
    This work aims to present a number of low-complexity digital rights management (DRM) methodologies for the H.264 standard. Initially, requirements to enforce DRM are analyzed and understood. Based on these requirements, a framework is constructed which puts forth different possibilities that can be explored to satisfy the objective. To implement computationally efficient DRM methods, watermarking and content based copy detection are then chosen as the preferred methodologies. The first approach is based on robust watermarking which modifies the DC residuals of 4×4 macroblocks within I-frames. Robust watermarks are appropriate for content protection and proving ownership. Experimental results show that the technique exhibits encouraging rate-distortion (R-D) characteristics while at the same time being computationally efficient. The problem of content authentication is addressed with the help of two methodologies: irreversible and reversible watermarks. The first approach utilizes the highest frequency coefficient within 4×4 blocks of the I-frames after CAVLC en- tropy encoding to embed a watermark. The technique was found to be very effect- ive in detecting tampering. The second approach applies the difference expansion (DE) method on IPCM macroblocks within P-frames to embed a high-capacity reversible watermark. Experiments prove the technique to be not only fragile and reversible but also exhibiting minimal variation in its R-D characteristics. The final methodology adopted to enforce DRM for H.264 video is based on the concept of signature generation and matching. Specific types of macroblocks within each predefined region of an I-, B- and P-frame are counted at regular intervals in a video clip and an ordinal matrix is constructed based on their count. The matrix is considered to be the signature of that video clip and is matched with longer video sequences to detect copies within them. Simulation results show that the matching methodology is capable of not only detecting copies but also its location within a longer video sequence. Performance analysis depict acceptable false positive and false negative rates and encouraging receiver operating charac- teristics. Finally, the time taken to match and locate copies is significantly low which makes it ideal for use in broadcast and streaming applications

    High Capacity Analog Channels for Smart Documents

    Get PDF
    Widely-used valuable hardcopy documents such as passports, visas, driving licenses, educational certificates, entrance-passes for entertainment events etc. are conventionally protected against counterfeiting and data tampering attacks by applying analog security technologies (e.g. KINEGRAMSÂź, holograms, micro-printing, UV/IR inks etc.). How-ever, easy access to high quality, low price modern desktop publishing technology has left most of these technologies ineffective, giving rise to high quality false documents. The higher price and restricted usage are other drawbacks of the analog document pro-tection techniques. Digital watermarking and high capacity storage media such as IC-chips, optical data stripes etc. are the modern technologies being used in new machine-readable identity verification documents to ensure contents integrity; however, these technologies are either expensive or do not satisfy the application needs and demand to look for more efficient document protection technologies. In this research three different high capacity analog channels: high density data stripe (HD-DataStripe), data hiding in printed halftone images (watermarking), and super-posed constant background grayscale image (CBGI) are investigated for hidden com-munication along with their applications in smart documents. On way to develop high capacity analog channels, noise encountered from printing and scanning (PS) process is investigated with the objective to recover the digital information encoded at nearly maximum channel utilization. By utilizing noise behaviour, countermeasures against the noise are taken accordingly in data recovery process. HD-DataStripe is a printed binary image similar to the conventional 2-D barcodes (e.g. PDF417), but it offers much higher data storage capacity and is intended for machine-readable identity verification documents. The capacity offered by the HD-DataStripe is sufficient to store high quality biometric characteristics rather than extracted templates, in addition to the conventional bearer related data contained in a smart ID-card. It also eliminates the need for central database system (except for backup record) and other ex-pensive storage media, currently being used. While developing novel data-reading tech-nique for HD-DataStripe, to count for the unavoidable geometrical distortions, registra-tion marks pattern is chosen in such a way so that it results in accurate sampling points (a necessary condition for reliable data recovery at higher data encoding-rate). For more sophisticated distortions caused by the physical dot gain effects (intersymbol interfer-ence), the countermeasures such as application of sampling theorem, adaptive binariza-tion and post-data processing, each one of these providing only a necessary condition for reliable data recovery, are given. Finally, combining the various filters correspond-ing to these countermeasures, a novel Data-Reading technique for HD-DataStripe is given. The novel data-reading technique results in superior performance than the exist-ing techniques, intended for data recovery from printed media. In another scenario a small-size HD-DataStripe with maximum entropy is used as a copy detection pattern by utilizing information loss encountered at nearly maximum channel capacity. While considering the application of HD-DataStripe in hardcopy documents (contracts, official letters etc.), unlike existing work [Zha04], it allows one-to-one contents matching and does not depend on hash functions and OCR technology, constraints mainly imposed by the low data storage capacity offered by the existing analog media. For printed halftone images carrying hidden information higher capacity is mainly attributed to data-reading technique for HD-DataStripe that allows data recovery at higher printing resolution, a key requirement for a high quality watermarking technique in spatial domain. Digital halftoning and data encoding techniques are the other factors that contribute to data hiding technique given in this research. While considering security aspects, the new technique allows contents integrity and authenticity verification in the present scenario in which certain amount of errors are unavoidable, restricting the usage of existing techniques given for digital contents. Finally, a superposed constant background grayscale image, obtained by the repeated application of a specially designed small binary pattern, is used as channel for hidden communication and it allows up to 33 pages of A-4 size foreground text to be encoded in one CBGI. The higher capacity is contributed from data encoding symbols and data reading technique

    Watermarking protocols for authentication and ownership protection based on timestamps and holograms

    No full text
    Digital watermarking has become an accepted technology for enabling multimedia protection schemes. One problem here is the security of these schemes. Without a suitable framework, watermarks can be replaced and manipulated. We discuss different protocols providing security against rightful ownership attacks and other fraud attempts. We compare the characteristics of existing protocols for different media like direct embedding or seed based and required attributes of the watermarking technology like robustness or payload. We introduce two new media independent protocol schemes for rightful ownership authentication. With the first scheme we ensure security of digital watermarks used for ownership protection with a combination of two watermarks: first watermark of the copyright holder and a second watermark from a Trusted Third Party (TTP). It is based on hologram embedding and the watermark consists of e.g. a company logo. As an example we use digital images and specify the properties of the embedded additional security information. We identify components necessary for the security protocol like timestamp, PKI and cryptographic algorithms. The second scheme is used for authentication. It is designed for invertible watermarking applications which require high data integrity. We combine digital signature schemes and digital watermarking to provide a public verifiable integrity. The original data can only be reproduced with a secret key
    corecore