Abstract
In this paper we propose an architecture which combines watermarking with traditional cryptographic key agreement protocols to establish an authenticated or encrypted channel in teleconferencing systems. Technically the proposed method embeds messages of the key agreement protocol within an audio or video stream and is based on the assumption that the human communication partners can recognize each other easily; the watermark establishes a close coupling between the cryptographic key exchange messages and the media stream. We argue that the security of the scheme is based on a yet unexplored security property of digital watermarks; furthermore we present preliminary research results that suggest that this property holds in standard watermarking schemes.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Ellison, C., Schneier, B.: Ten Risks of PKI: What You’re not Being Told about Public Key Infrastructure. Computer Security Journal XVI(1) (2000)
Ellison, C., Schneier, B.: Risks of PKI: Secure Email. Communications of the ACM 43(1), 160 (2000)
Enayah, M., Samsudin, A.: Securing Telecommunication based on Speaker Voice as the Public Key. IJCSNS International Journal of Computer Science and Network Security 7(3), 201–209 (2007)
Steinebach, M., Zmudzinski, S.: Evaluation of robustness and transparency of multiple audio watermark embedding. In: Proceedings of the SPIE, Security, Steganography, and Watermarking of Multimedia Contents X (2008)
Steinebach, M., Zmudzinski, S., Katzenbeisser, S., Rührmair, U.: Audio watermarking forensics: detecting malicious re-embedding. To appear in Proceedings of SPIE, Media Forensics and Security XII, vol. 7541 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Rührmair, U., Katzenbeisser, S., Steinebach, M., Zmudzinski, S. (2010). Watermark-Based Authentication and Key Exchange in Teleconferencing Systems. In: De Decker, B., Schaumüller-Bichl, I. (eds) Communications and Multimedia Security. CMS 2010. Lecture Notes in Computer Science, vol 6109. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13241-4_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-13241-4_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13240-7
Online ISBN: 978-3-642-13241-4
eBook Packages: Computer ScienceComputer Science (R0)