8 research outputs found
MULTIMEDIA AND SECURITY ECRYPT: EUROPEAN NETWORK OF EXCELLENCE IN CRYPTOLOGY
Die AbkĂŒrzung ECRYPT /1/ steht fĂŒr âEuropean Network of Excellence in Cryptologyâ. Das Netzwerk ist ein Zusammenschluss von ca. 180 europĂ€ischen Forschern und Entwicklern, an dem auch Informatiker der Otto-von-Guericke-UniversitĂ€t Magdeburg beteiligt sind. Das Projekt, in dessen Mittelpunkt die Forschungen zur Sicherung von Multimediadaten (Digital Rights Management) stehen, wird von der EuropĂ€ischen Union ĂŒber einen Zeitraum von vier Jahren gefördert. Die Forscher wollen Methoden entwickeln, um Musik, Bilder oder Videos mit zusĂ€tzlichen Schutzmechanismen zu versehen, mit dem Ziel Manipulationen zu erkennen oder bspw. Raubkopien zu verhindern oder aufzuspĂŒren. Das Advanced Multimedia and Security Lab (AMSL) der Arbeitsgruppe Multimedia and Security an der Otto-von-Guericke-UniversitĂ€t leitet zusammen mit Stefan Katzenbeisser (TU MĂŒnchen) seit Anfang 2004 das âWatermarking Virtual Labâ (WAVILA), einen Teilbereich des Netzwerkes ECRYPT. In diesem Verbund arbeiten verschiedene Arbeitsgruppen, zum Beispiel aus Italien, Spanien, Frankreich, Deutschland, Belgien, der Schweiz und den Niederlanden, zusammen. Der Fokus der gemeinsamen Arbeit liegt dabei im Bereich der digitalen Wasserzeichen. Ihre Eigenschaften und Einsatzgebiete werden analysiert und es werden theoretische Grundlagen fĂŒr Sicherheitsmodelle und fĂŒr die Definitionen digitaler Wasserzeichen erarbeitet. In diesem Beitrag sollen die Motivation und die neuen Herausforderungen von ECRYPT, sowie die Ziele des Netzwerkes vorgestellt werden. Des Weiteren werden Arbeiten aus dem Bereich Wasserzeichen Benchmarking sowie Algorithmenentwurf prĂ€sentiert, um einen Einblick in das Umfeld zu ermöglichen
Difference-expansion based reversible data hiding and its steganalysis
A novel reversible data embedding method was reported in a recent IEEE journal article. The method was based on difference expansion (DE) technique. It used redundancy in digital images to achieve a high embedding capacity, while keeping visual distortion of the stego-image low. In this thesis, this technique was studied and experimentally evaluated. An effective steganalysis scheme for this DE-based reversible data embedding method was proposed, which used 12-dimensional feature vectors and a Bayes Classifier. The proposed steganalysis scheme steadily achieved a correct classification rate of 99%
Digital rights management techniques for H.264 video
This work aims to present a number of low-complexity digital rights management (DRM) methodologies for the H.264 standard. Initially, requirements to enforce DRM are analyzed and understood. Based on these requirements, a framework is constructed which puts forth different possibilities that can be explored to satisfy the objective. To implement computationally efficient DRM methods, watermarking and content based copy detection are then chosen as the preferred methodologies.
The first approach is based on robust watermarking which modifies the DC residuals of 4Ă4 macroblocks within I-frames. Robust watermarks are appropriate for content protection and proving ownership. Experimental results show that the technique exhibits encouraging rate-distortion (R-D) characteristics while at the same time being computationally efficient.
The problem of content authentication is addressed with the help of two methodologies: irreversible and reversible watermarks. The first approach utilizes the highest frequency coefficient within 4Ă4 blocks of the I-frames after CAVLC en- tropy encoding to embed a watermark. The technique was found to be very effect- ive in detecting tampering. The second approach applies the difference expansion (DE) method on IPCM macroblocks within P-frames to embed a high-capacity reversible watermark. Experiments prove the technique to be not only fragile and reversible but also exhibiting minimal variation in its R-D characteristics.
The final methodology adopted to enforce DRM for H.264 video is based on the concept of signature generation and matching. Specific types of macroblocks within each predefined region of an I-, B- and P-frame are counted at regular intervals in a video clip and an ordinal matrix is constructed based on their count. The matrix is considered to be the signature of that video clip and is matched with longer video sequences to detect copies within them. Simulation results show that the matching methodology is capable of not only detecting copies but also its location within a longer video sequence. Performance analysis depict acceptable false positive and false negative rates and encouraging receiver operating charac- teristics. Finally, the time taken to match and locate copies is significantly low which makes it ideal for use in broadcast and streaming applications
High Capacity Analog Channels for Smart Documents
Widely-used valuable hardcopy documents such as passports, visas, driving licenses, educational certificates, entrance-passes for entertainment events etc. are conventionally protected against counterfeiting and data tampering attacks by applying analog security technologies (e.g. KINEGRAMSÂź, holograms, micro-printing, UV/IR inks etc.). How-ever, easy access to high quality, low price modern desktop publishing technology has left most of these technologies ineffective, giving rise to high quality false documents. The higher price and restricted usage are other drawbacks of the analog document pro-tection techniques. Digital watermarking and high capacity storage media such as IC-chips, optical data stripes etc. are the modern technologies being used in new machine-readable identity verification documents to ensure contents integrity; however, these technologies are either expensive or do not satisfy the application needs and demand to look for more efficient document protection technologies.
In this research three different high capacity analog channels: high density data stripe (HD-DataStripe), data hiding in printed halftone images (watermarking), and super-posed constant background grayscale image (CBGI) are investigated for hidden com-munication along with their applications in smart documents. On way to develop high capacity analog channels, noise encountered from printing and scanning (PS) process is investigated with the objective to recover the digital information encoded at nearly maximum channel utilization. By utilizing noise behaviour, countermeasures against the noise are taken accordingly in data recovery process.
HD-DataStripe is a printed binary image similar to the conventional 2-D barcodes (e.g. PDF417), but it offers much higher data storage capacity and is intended for machine-readable identity verification documents. The capacity offered by the HD-DataStripe is sufficient to store high quality biometric characteristics rather than extracted templates, in addition to the conventional bearer related data contained in a smart ID-card. It also eliminates the need for central database system (except for backup record) and other ex-pensive storage media, currently being used. While developing novel data-reading tech-nique for HD-DataStripe, to count for the unavoidable geometrical distortions, registra-tion marks pattern is chosen in such a way so that it results in accurate sampling points (a necessary condition for reliable data recovery at higher data encoding-rate). For more sophisticated distortions caused by the physical dot gain effects (intersymbol interfer-ence), the countermeasures such as application of sampling theorem, adaptive binariza-tion and post-data processing, each one of these providing only a necessary condition for reliable data recovery, are given. Finally, combining the various filters correspond-ing to these countermeasures, a novel Data-Reading technique for HD-DataStripe is given. The novel data-reading technique results in superior performance than the exist-ing techniques, intended for data recovery from printed media.
In another scenario a small-size HD-DataStripe with maximum entropy is used as a copy detection pattern by utilizing information loss encountered at nearly maximum channel capacity. While considering the application of HD-DataStripe in hardcopy documents (contracts, official letters etc.), unlike existing work [Zha04], it allows one-to-one contents matching and does not depend on hash functions and OCR technology, constraints mainly imposed by the low data storage capacity offered by the existing analog media.
For printed halftone images carrying hidden information higher capacity is mainly attributed to data-reading technique for HD-DataStripe that allows data recovery at higher printing resolution, a key requirement for a high quality watermarking technique in spatial domain. Digital halftoning and data encoding techniques are the other factors that contribute to data hiding technique given in this research. While considering security aspects, the new technique allows contents integrity and authenticity verification in the present scenario in which certain amount of errors are unavoidable, restricting the usage of existing techniques given for digital contents.
Finally, a superposed constant background grayscale image, obtained by the repeated application of a specially designed small binary pattern, is used as channel for hidden communication and it allows up to 33 pages of A-4 size foreground text to be encoded in one CBGI. The higher capacity is contributed from data encoding symbols and data reading technique
Recommended from our members
IN BLOCKCHAIN WE TRUST? The examination of an anti-counterfeiting solution
Product Counterfeiting is deemed a major and pertinent threat to the global luxury sector. The entanglement of luxury and counterfeiting has evolved into a complex problem for the modern milieu. This aim of exploring this topic as social phenomena seeks to expose the shadow economy of counterfeiting, unpack issues of intellectual property and the threat posed through the integration and adoption of blockchain technology as an anticounterfeiting solution and high trust system of exchange.
Luxury counterfeited brands offers a perspective which considers the complexities surrounding fashion consumption, the globalisation of brands, brand culture, and the connotations of luxury today, including its place in the criminological sphere. Academics call for studies pertaining to the under explored area of counterfeited luxury goods owing to a rise in the grey and copycat markets further catalysed by recent market demand for second-hand luxury goods (Wall and Large, 2010; Wang et al., 2020). The consumption of such goods not only pilfers innovation and affects industry but is entwined with a mirrored underworld of counterfeit production and consumption which has given rise to more sinister activities with linkages to organized crime, modern slavery, and terrorist activities.
Against this backdrop, this research will seek to achieve the following research aims:
A. Examine product counterfeiting of luxury goods as a social phenomenon
a. Critically examine the socio-economic, historical, and cultural implications of counterfeiting.
b. How are issues of copyright and trademark infringement impacting counterfeiters?
B. Examine Blockchain as an anti-counterfeiting solution and its enhancement of supply chain management.
a. Can Blockchain-based supply chains enable transparency and product traceability?
i. Can the integration of a blockchain solve issues of provenance?
ii. What is the value of blockchain-enabled services?
iii. Identify threats to adoption and regulation of blockchain technologies in the UK.
b. Can Blockchain enable a high-trust ecosystem?
i. Does block-tech ensure accountability and create trust?
ii. Examine the proposition that non-fungible tokens can create unprecedented models of ownership allowing for product circularity.
The study seeks to unveil the shadow industry of counterfeitingâs impact and to assess blockchain technologies merit as an anti-counterfeiting solution via an examination of issues existing in luxury goods supply chains. Thomasâ (2019) description of fractured supply chains and the utilisation of sub-contracting via offshore producers are central to establishing a case for enterprise blockchain-based solutions to combat counterfeiting and to create transparent supply chains. To achieve the above-mentioned aims, this literature review will highlight the impact of product counterfeiting through the provision of an ontological examination of counterfeiting with a particular focus on luxury goods. The penultimate section offers a sociological examination of the luxury goods industry, anticounterfeiting measures and addresses inherent issues overlooked in studies regarding counterfeiting of luxury and their interrelationship. The final section of the literary review will provide a theoretical examination of blockchain technology (block-tech) within an epistemological framework to assess block-tech capability to enhance supply chains to foster transparent and traceable chains, and, in doing so ameliorate the effects and risks of counterfeiting within the global luxury goods industry.
As this research is exploratory in nature, it will undertake a qualitative methodological approach, investigated through elite interviews and ethnographic data collection. The study will address this surge in the demand for counterfeit luxury goods and its accumulation into a trillion-dollar generating industry, as a social and criminological phenomenon. The researcher will examine issues pertaining to, and solutions of traceability, authentication, and supply chain provenance. In fulfilling the research objectives, it is imperative to identify current anti-counterfeiting strategiesâ effectiveness through a critical and comparative examination, with a focus on the distributed ledger technology (DLT) known as Blockchain. Henceforth, blockchain will be referenced throughout as âblock-techâ and otherwise âthe technologyâ or âblockchain technologyâ, or on its own âblockchainâ. Initial findings reveal the emergence of conscious consumers, a rise in re-commerce of luxury goods and a shift toward circularity within a microcosm of the industry
Watermarking protocols for authentication and ownership protection based on timestamps and holograms
Digital watermarking has become an accepted technology for enabling multimedia protection schemes. One problem here is the security of these schemes. Without a suitable framework, watermarks can be replaced and manipulated. We discuss different protocols providing security against rightful ownership attacks and other fraud attempts. We compare the characteristics of existing protocols for different media like direct embedding or seed based and required attributes of the watermarking technology like robustness or payload. We introduce two new media independent protocol schemes for rightful ownership authentication. With the first scheme we ensure security of digital watermarks used for ownership protection with a combination of two watermarks: first watermark of the copyright holder and a second watermark from a Trusted Third Party (TTP). It is based on hologram embedding and the watermark consists of e.g. a company logo. As an example we use digital images and specify the properties of the embedded additional security information. We identify components necessary for the security protocol like timestamp, PKI and cryptographic algorithms. The second scheme is used for authentication. It is designed for invertible watermarking applications which require high data integrity. We combine digital signature schemes and digital watermarking to provide a public verifiable integrity. The original data can only be reproduced with a secret key