Watermarking protocols for authentication and ownership protection based on timestamps and holograms

被引:12
作者
Dittmann, J [1 ]
Steinebach, M [1 ]
Ferri, LC [1 ]
机构
[1] Platanista GmbH, Fraunhofer Inst IPSI, Darmstadt, Germany
来源
SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS IV | 2002年 / 4675卷
关键词
watermarking; protocol; security; hologram; invertible watermarks;
D O I
10.1117/12.465281
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Digital watermarking has become an accepted technology for enabling multimedia protection schemes. One problem here is the security of these schemes. Without a suitable framework, watermarks can be replaced and manipulated. We discuss different protocols providing security against rightful ownership attacks and other fraud attempts. We compare the characteristics of existing protocols like direct embedding or seed based protocols for different media and the required attributes of the watermarking technology, like robustness or capacity. We introduce two new media independent protocol schemes for rightful ownership authentication. With the first scheme we ensure security of digital watermarks used for ownership protection with a combination of two watermarks: a first watermark of the copyright holder and a second watermark from a Trusted Third Party (TTP). It is based on hologram embedding and the watermark consists of e.g. a company logo. As an example we use digital images and specify the properties of the embedded additional security information. We identify the components necessary for the security protocol, such as timestamp, PKI and cryptographic algorithms. The second scheme is used for authentication. It is designed for invertible watermarking applications which require high data integrity. We combine digital signature schemes and digital watermarking to provide a public verifiable integrity. The original data can only be reproduced with a secret key. Both approaches provide solutions for copyright and authentication watermarking and are introduced for image data but can be easily adopted for video and audio data as well.
引用
收藏
页码:240 / 251
页数:12
相关论文
共 12 条
  • [1] ADELSBACH A, PROVING OWNERSHIP DI
  • [2] Framework for media data and owner authentication based on cryptography, watermarking and biometric authentication
    Dittmann, J
    Steinebach, M
    Ferri, LC
    Vielhauer, C
    Steinmetz, R
    Wohlmacher, P
    [J]. MULTIMEDIA SYSTEMS AND APPLICATIONS IV, 2001, 4518 : 198 - 209
  • [3] Hologram watermarks for document authentications
    Dittmann, J
    Ferri, LC
    Vielhauer, C
    [J]. INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, PROCEEDINGS, 2001, : 60 - 64
  • [4] DITTMANN J, 2001, SPIE INT S OPT SCI T, V21
  • [5] DITTMANN J, 2001, SPIE P, V4314, P175
  • [6] Dittmann J., 2000, DIGITALE WASSERZEICH
  • [7] FERRI LC, 2002, IN PRESS P SPIE, V4675
  • [8] FRIDRICH J, 2000, P SPIE PHOT W EL IM
  • [9] GOLJAN F, 2001, P SOC PHOTO-OPT INS, V4314, P197
  • [10] HERRIGEL A, 1998, P ACM MULT 98 ACM BR, P99