Approaches to Multimedia and Security : Cryptographic and watermarking algorithms

Regarding security particularly in the field of multimedia, the requirements on security increase. If and in which way security mechanisms can be applied to multimedia data and their applications needs to be analyzed for each purpose separately. This is mainly due to the structure and complexity of multimedia. Based on the main issues of IT-security, this paper introduces the most important security requirements, which must be fulfilled by today's multimedia systems. Our paper describes the security measures used to satisfy these requirements. These measures are based on modern cryptographic mechanisms and digital watermarking techniques as well as on security infrastructures. Furthermore we focus on a survey of revocation methods for digital signatures, a media independent classification scheme and discuss an example for securing RSVP for multimedia applications.

[1]  Jörg Schwenk,et al.  Combining digital watermarks and collusion secure fingerprints for digital images , 2000, J. Electronic Imaging.

[2]  X Itu,et al.  Information technology-open systems interconnection-the directory: Public-key and attribute certific , 2000 .

[3]  Jennifer Seberry,et al.  Public Key Cryptography , 2000, Lecture Notes in Computer Science.

[4]  Ralf Steinmetz,et al.  Content-based digital signature for motion pictures authentication and content-fragile watermarking , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[5]  Ioannis Pitas,et al.  Digital image watermarking: an overview , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[6]  Carlisle M. Adams,et al.  X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP , 1999, RFC.

[7]  He Huang,et al.  Securing QoS threats to RSVP messages and their countermeasures , 1999, 1999 Seventh International Workshop on Quality of Service. IWQoS'99. (Cat. No.98EX354).

[8]  Fabien A. P. Petitcolas,et al.  Fair benchmark for image watermarking systems , 1999, Electronic Imaging.

[9]  Dan Boneh,et al.  Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.

[10]  Klara Nahrstedt,et al.  Comparison of MPEG encryption algorithms , 1998, Comput. Graph..

[11]  Ralf Steinmetz,et al.  Interactive watermarking environments , 1998, Proceedings. IEEE International Conference on Multimedia Computing and Systems (Cat. No.98TB100241).

[12]  Maurice Maes,et al.  Twin Peaks: The Histogram Attack to Fixed Depth Image Watermarks , 1998, Information Hiding.

[13]  Markus G. Kuhn,et al.  Attacks on Copyright Marking Systems , 1998, Information Hiding.

[14]  Paul C. Kocher On Certificate Revocation and Validation , 1998, Financial Cryptography.

[15]  Klara Nahrstedt,et al.  Watermarking methods for MPEG encoded video: towards resolving rightful ownership , 1998, Proceedings. IEEE International Conference on Multimedia Computing and Systems (Cat. No.98TB100241).

[16]  Thomas Kunkelmann Sicherheit für Videodaten , 1998 .

[17]  Chien-Chang Chen,et al.  Robust image authentication method surviving JPEG lossy compression , 1997, Electronic Imaging.

[18]  Jean-Paul M. G. Linnartz,et al.  Public watermarks and resistance to tampering , 1997, Proceedings of International Conference on Image Processing.

[19]  Lixia Zhang,et al.  Resource ReSerVation Protocol (RSVP) - Version 1 Functional Specification , 1997, RFC.

[20]  M. Yeung,et al.  Can invisible watermarks resolve rightful ownerships? , 1997, Electronic Imaging.

[21]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[22]  John P. Oakley,et al.  Storage and Retrieval for Image and Video Databases , 1993 .

[23]  Ralph C. Merkle,et al.  Secrecy, authentication, and public key systems , 1979 .