Advertisement

Content-Fragile Watermarking Based on Content-Based Digital Signatures

  • Jana Dittmann
  • Arnd Steinmetz
  • Ralf Steinmetz
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1718)

Abstract

The development of new multimedia services and environments requires new concepts both to support the new working process on distributed computers and to protect the multimedia data during the production and distribution. This article addresses image/video authentication and copyright protection as major security demands in digital marketplaces. First we present a content-based signature technique for image and video authenticity and integrity. Based on this technique, we introduce a tool for interactive video authentication and propose content-fragile watermarking, a concept which combines watermarking and content-based digital signatures to ensure copyright protection and detection of integrity violation.

Keywords

Digital Watermark Edge Characteristic Watermark Technique Feature Code Copyright Holder 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    Bearman, D., and Trant, J. Authenticity of Digital Resources: Towards a Statement of Requirements in the Research Process. D-Lib Magazine, June 1998.Google Scholar
  2. [2]
    Chang, Shih-Fu und Schneider, Marc: A Robust Content Based Digital Signature for Image Authentication, Proceedings of the International Conference on Image Processing, Lausanne, Switzerland, September 1996.Google Scholar
  3. [3]
    Cox, Ingemar J, and Linnartz, Jean-Paul M.G.: Public watermarks and resitence to tampering, Proceedings of IEEE Int. Conf. O Image Processing, 1997, available only on CD-ROMGoogle Scholar
  4. [4]
    Dittmann, Jana, Nack, Frank, Steinmetz, Arnd, Steinmetz, Ralf: Interactive Watermarking Environments, Proceedings of International Conference on Multimedia Computing and Systems, Austin, Texas, USA, 1998, pp. 286–294Google Scholar
  5. [5]
    Dittmann, Jana, Stabenau, Mark, Steinmetz, Ralf: Robust MEG Video Watermarking Technologies, Proceedings of ACM Multimedia’98, The 6th ACM International Multimedia Conference, Bristol, England, pp. 71–80Google Scholar
  6. [6]
    Fischer, Stephan: Indikatorenkombination zur Inhaltsanalyse digitaler Filme, D 180 (Diss. Universität Mannheim), 1997, Shaker Verlag Aachen.Google Scholar
  7. [7]
    Friedman, G.L. The Trustworthy Digital Camera: Restoring Credibility to the Photographic Image. IEEE Trans. on Consumer Electronics, Vol.39, No.4, pp.905–910, Nov. 1993.CrossRefGoogle Scholar
  8. [8]
    Gennaro, R., and Rohatgi, P. How to Sign Digital Streams. CRYPTO’ 97, Santa Barbara, CA, USA, August 1997, pp.180–197.Google Scholar
  9. [9]
    Gennaro, R., Krawczyk, H. and Rabin, T. RSA-based Undeniable Signatures. CRYPTO’ 97, Santa Barbara, CA, USA, August 1997Google Scholar
  10. [10]
    Haberhauer, Maike und Dittmann, Jana: “Das Bild lügt nicht?” — Untersuchung und Entwicklung von Lösungsansätzen zur Sicherstellung von Authentizität und Integrität von digitalen Bilddaten, Technical Paper, GMD, September 1998Google Scholar
  11. [11]
    J. F. Canny, “A computational approach to edge detection”, IEEE Trans. on Pattern analysis and Machine intelligence. vol. PAMI-8, Nov. 1986.Google Scholar
  12. [12]
    Lin, C.-Y. and Chang, S.-F. A Robust Image Authentication Method Surviving JPEG Lossy Compression. SPIE Storage and Retrieval for Image and Video Databases, San Jose, CA, USA, Jan. 1998.Google Scholar
  13. [13]
    Lin, C.-Y. and Chang, S.-F. Issues and Solutions for Authenticating MPEG Video. SPIE Storage and Retrieval for Image and Video Databases, San Jose, CA, USA, Jan. 1999.Google Scholar
  14. [14]
    Quisquater, J.-J., Macq, B., Joye, M., Degand, N. and Bernard, A. Practical Solution to Authentication of Images with a Secure Camera. SPIE Storage and Retrieval for Image and Video Databases, San Jose, CA, USA, Feb. 1997.Google Scholar
  15. [15]
    Schneider, Marc and Chang, Shih-Fu: Digital Watermarking and Image Authentication, 1996, http://www.ctr.columbia.edu/~mars/papers/reports/water/doc.html.
  16. [16]
    Steinmetz, A.: DiVidEd A Distributed Video Production System, work in Progress, Proceedings of Visual96 Information Systems, February 1996Google Scholar
  17. [17]
    Storck, D.: A New Approach to Integrity of Digital Images, Proceedings of IFIP World Conference-Mobile Communication, Canberra, Australia, 1996.Google Scholar
  18. [18]
    Zhong, D. und Chang, Shih-Fu: Video Object Model and Segmentation for Content-Based Video Indexing, IEEE International Conference on Circuits and Systems, Hong Kong, June 1997.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1999

Authors and Affiliations

  • Jana Dittmann
    • 1
  • Arnd Steinmetz
    • 1
  • Ralf Steinmetz
    • 1
  1. 1.GMD - German National Research Center for Information TechnologyInstitute (IPSI)DarmstadtGermany

Personalised recommendations