Advanced multimedia security solutions for data and owner authentication

In this paper we introduce a new content-fragile watermarking concept for multimedia data authentication, especially for a/v data. While previous data authentication watermarking schemes address single media stream only, we discuss the requirements of multimedia protection techniques. Furthermore we introduce our new approach called 3D thumbnail cube. The main idea is based on a 3D hologram over continuing video and audio frames. Beside the data authentication, we face the owner authentication problem as second requirement for manipulation recognition. The watermark for manipulation recognition has to be created by the owner itself. The goal of owner authentication is to ensure that an entity is the one it claims to be. Therefore we introduce a key server and a biometric hash approach. We discuss several strategies and introduce a biometric based framework for owner authentication. With our presented data and owner authentication solutions we can realize an advanced security level.

[1]  Jiri Fridrich,et al.  Image watermarking for tamper detection , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[2]  Klara Nahrstedt,et al.  Approaches to multimedia and security , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).

[3]  Yoshinao Aoki,et al.  Image data embedding system for watermarking using Fresnel transform , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[4]  Seymour Trester,et al.  Computer-simulated Fresnel diffraction using the Fourier transform , 1989, Comput. Sci. Eng..

[5]  O. Bryngdahl,et al.  I Digital Holography – Computer-Generated Holograms , 1990 .

[6]  Robert Perlmutter,et al.  Computer-Generated Holograms in Biology and Medicine , 1983, IEEE Computer Graphics and Applications.

[7]  Y. Aoki,et al.  A watermarking method based on Fresnel diffraction , 1998, ICSP '98. 1998 Fourth International Conference on Signal Processing (Cat. No.98TH8344).

[8]  David Zhang,et al.  Automated Biometrics: Technologies and Systems , 2000 .

[9]  Lucilla Croce Ferri Visualization of 3D information with digital holography using laser printers , 2001, Comput. Graph..

[10]  Ralf Steinmetz,et al.  Approaches to biometric watermarks for owner authentification , 2001, IS&T/SPIE Electronic Imaging.

[11]  Bijan G. Mobasseri,et al.  Content-dependent video authentication by self-watermarking in color space , 2001, IS&T/SPIE Electronic Imaging.

[12]  Mahalingam Ramkumar,et al.  Theoretical capacity measures for data hiding in compressed images , 1999, Other Conferences.

[13]  Jana Dittmann,et al.  Hologram watermarks for document authentications , 2001, Proceedings International Conference on Information Technology: Coding and Computing.

[14]  Shih-Fu Chang,et al.  A robust image authentication method distinguishing JPEG compression from malicious manipulation , 2001, IEEE Trans. Circuits Syst. Video Technol..

[15]  Jiri Fridrich A hybrid watermark for tamper detection in digital images , 1999, ISSPA '99. Proceedings of the Fifth International Symposium on Signal Processing and its Applications (IEEE Cat. No.99EX359).

[16]  Ching-Yung Lin Watermarking and Digital Signature Techniques for Multimedia Authentication and Copyright Protection , 2000 .

[17]  Kannan Ramchandran,et al.  Capacity issues in digital image watermarking , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).

[18]  Ralf Steinmetz,et al.  Combined video and audio watermarking: embedding content information in multimedia data , 2000, Electronic Imaging.