Framework for media data and owner authentication based on cryptography, watermarking, and biometric authentication

Protecting the media of the future - securing the future of the media is an essential task for our new century. Security is defined by security measures, e.g. confidentiality, integrity, authenticity, and non-repudiation. Most of these measures are using watermarking techniques and cryptographic mechanisms like cipher systems, digital signature schemes, and authentication protocols. The security of these mechanisms is mainly based on the authenticity of specific data like keys and attributes - both data must be dedicated to its owner in an authentic manner. Otherwise, the authenticity of data and of owners can not be guaranteed and subsequently, the security can not be assured. Therefore in our paper we want to focus on data and entity (owner) authentication. We introduce a general framework to protect media data by combining different existing techniques: cryptographic, watermarking and biometric approaches. As an example we describe general concepts for a content-fragile watermarking approach for digital images and a generic approach for biometric authentication.

[1]  Bernd Girod,et al.  Asymmetric Watermarking Schemes , 2000 .

[2]  B. Miller,et al.  Vital signs of identity [biometrics] , 1994, IEEE Spectrum.

[3]  Jana Dittmann Content-fragile watermarking for image authentication , 2001, IS&T/SPIE Electronic Imaging.

[4]  Ralf Steinmetz,et al.  Approaches to biometric watermarks for owner authentification , 2001, IS&T/SPIE Electronic Imaging.

[5]  Jessica J. Fridrich,et al.  Invertible authentication , 2001, Security and Watermarking of Multimedia Contents.

[6]  Jana Dittmann,et al.  Hologram watermarks for document authentications , 2001, Proceedings International Conference on Information Technology: Coding and Computing.

[7]  Klara Nahrstedt,et al.  Approaches to multimedia and security , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).

[8]  S. Mallat A wavelet tour of signal processing , 1998 .

[9]  John P. Oakley,et al.  Storage and Retrieval for Image and Video Databases , 1993 .

[10]  Ralf Steinmetz,et al.  Content-based digital signature for motion pictures authentication and content-fragile watermarking , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[11]  Reginald L. Lagendijk,et al.  Robust labeling methods for copy protection of images , 1997, Electronic Imaging.

[12]  Tiago Rosa Maria Paula Queluz Content-based integrity protection of digital images , 1999, Electronic Imaging.

[13]  David Zhang,et al.  Automated Biometrics: Technologies and Systems , 2000 .

[14]  Deepa Kundur,et al.  Towards a telltale watermarking technique for tamper-proofing , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[15]  Jana Dittmann,et al.  Advanced multimedia security solutions for data and owner authentication , 2001, Optics + Photonics.

[16]  Jiri Fridrich,et al.  Image watermarking for tamper detection , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[17]  Ralf Steinmetz,et al.  Combined video and audio watermarking: embedding content information in multimedia data , 2000, Electronic Imaging.

[18]  Benoit M. Macq,et al.  Robust watermarking based on the warping of predefined triangular patterns , 2000, Electronic Imaging.

[19]  Anirban Mukherjee,et al.  Media-independent watermarking classification and the need for combining digital video and audio watermarking for media authentication , 2000, Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540).