Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Literatur
E. Becker et al. (Ed.): Digital Rights Management-Technological, Economic, Legal and Political Aspects, Springer-Verlag 2003
A. Beutelspacher, H. B. Neumann, T. Schwarzpaul: Kryptografie in Theorie und Praxis, Vieweg 2005
R. Bless et al.: Sichere Netzwerkkommunikation, Springer-Verlag 2005
D. Boneh, J. Shaw: Collision-Secure Fingerprinting for Digital Data. Proc. CRYPTO 95, Vol. 963 of LNCS, pp. 452–465, Springer-Verlag 1995
D. Chaum: Blind Signatures for Untraceable Payments. Proc. CRYPTO 82, pp. 199–203, Plenum Press 1983
I. J. Cox, J. Kilian, T. Leighton, T. Shamoon: A Secure, Robust Watermark for Multimedia, Proc. First International Workshop on Information Hiding, Vol. 1174 of LNCS, pp. 251–263, Springer-Verlag 1996
I. J. Cox, M. L. Miller, J. A. Bloom: Digital Watermarking, Academic Press 2002
J. Dittmann, A. Lang: StirMark Benchmark for Audio, https://amsl-smb.cs.uni-magdeburg.de/smfa//allgemeines.php
J. Dittmann: Digitale Wasserzeichen-Grundlagen, Verfahren, Anwendungsgebiete, Springer-Verlag 2000
J. Dittmann, A. Behr, M. Stabenau et al.: Combining digital watermarks and collision-secure fingerprints for digital images, Proceedings of SPIE Conference on Security and Watermarking of Multimedia Contents, San Jose, USA, 1999.
Y. Dai, S. Thiemert, M. Steinebach: Feature-based watermarking scheme for MPEG-I/II video authentication. Proceedings of SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, USA, 2004
B. Fuhrt, D. Kirovski (Ed.): Multimedia Security Handbook, CRC Press 2004.
J. Fridrich: Security of fragile authentication watermarks with localization. Proceedings of SPIE Conference on Security and Watermarking of Multimedia Contents IV, San Jose, USA, 2002
R. Grimm, S. Puchta: Datenspuren bei der Nutzung von Digital Rights Mangement Systemen, Datenschutz und Datensicherheit (DuD) 30 (2006), Nr. 2, pp. 74–79.
R. Grosbois, T. Ebrahimi: Watermarking in the JPEG 2000 Domain, JPEG 2000 domain, Proc. IEEE Workshop on Multimedia signal processing, pp. 3–5, 2001.
T. Hauser, C. Wenz: DRM Under Attack: Weaknesses in Existing Systems, in: [Bec], pp. 206–223.
R. Iannella: Open Digital Rights Language (ODRL), Version 1.1, http://www.w3.org/TR/odrl/
H. J. Kim: Audio Watermarking Techniques, Pacific Rim Workshop on Digital Steganography, Kyushu Institute of Technology, Kitakyushu, Japan, July, 2003.
M. Kutter, F. Jordan, F. Bossen: Digital Signature of Color Images using Amplitude Modulation, Proceedings of SPIE Conference on Storage and Retrieval for Image and Video Databases, Vol. 3022, pp. 518–526, San Jose, USA, 1997
T. Kunkelmann: Sicherheit für Videodaten, Vieweg-Verlag 1998
F. C. Mintzer et al., Toward on-line, worldwide access to Vatican Library materials, IBM Journal of Research and Development, Vol. 40, No. 2 (1996)
A. J. Menezes, P. van Oorschot, S. Vanstone: Handbook of Applied Cryptography, CRC Press 1997
http://www.microsoft.com/windows/windowsmedia/howto/articles/drmarchitecture.aspx
Open Mobile Alliance, DRM Architecture, Candidate Version 2.0, September 2005, http://www.openmobilealliance.org/release_program/drm_v2_0.html
OMA DRM Rights Expression Language, Candidate Version 2.0, September 2005, http://www.openmobilealliance.org/release_program/drm_v2_0.html
F. Petitcolas: Digital Watermarking, in: [Bec], pp.81–92.
F. Petitcolas: Stirmark Benchmark 4.0, http://www.petitcolas.net/fabien/watermarking/stirmark/
PotatoSystem Homepage;, http://www.potatosystem.com/info/ger/
L. Qiao, K. Nahrstedt: Comparison of MPEG Encryption Algorithms, IEEE Journal on Computer Graphics and Applications, Special Issue on Data Security in Image Communication and Networks, Vol. 22, No. 4 (1998), pp. 437–448.
B. Schneier: Applied Cryptography, Wiley 1996
S. Thiemert, S. Zmudinski, L. Croce Ferri, M. Steinebach: Digitale Wasserzeichen zum Integritätsschutz von Multimediadaten, in: “Education, Research and New Media-Chances and Challenges for Science”, 10. IuK-Frühjahrstagung, 2004
A. Uhl, A. Pommer: Image and Video Encryption, Springer-Verlag 2005
eXtensible Rights Markup Language Version 2.0, http://www.xrml.org
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Schmitz, R. (2006). Mediensicherheit. In: Kompendium Medieninformatik. X.media.press. Springer, Berlin, Heidelberg . https://doi.org/10.1007/3-540-30226-3_2
Download citation
DOI: https://doi.org/10.1007/3-540-30226-3_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30224-7
Online ISBN: 978-3-540-30226-1
eBook Packages: Computer Science and Engineering (German Language)