Advertisement

Informatik-Spektrum

, Volume 28, Issue 6, pp 453–461 | Cite as

Steganographie und Wasserzeichen – Aktueller Stand und neue Herausforderungen

  • Jana Dittmann
  • Elke Franz
  • Antje Schneidewind
Regular Paper
  • 206 Downloads

Zusammenfassung

Digitale Mediendaten (z. B. Bild-, Ton-, Videodaten oder aber auch symbolische Repräsentationen) haben in den letzten Jahren stark an Bedeutung gewonnen. Sie öffnen neue Märkte und Anwendungsfelder, erfordern aber gleichzeitig auch neue Sicherheitsmechanismen zum Schutz der Mediendaten, zur Identifikation oder Authentisierung in verschiedenen Repräsentationsformen bis hin zum Schutz urheberrechtlicher Ansprüche.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Ahsan K, Kundur D (2002) Practical Data Hiding in TCP/IP. Proc Workshop on Multimedia Security at ACM Multimedia ’02, French Riviera, December 2002Google Scholar
  2. 2.
    Cachin C: An Information-Theoretic Model for Steganography. In: [Aucs_98], pp 306–318Google Scholar
  3. 3.
    Chen B, Wornell GW (2001) Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE T Inform Theory 47(4):1423–1443CrossRefzbMATHMathSciNetGoogle Scholar
  4. 4.
    Csurka G, Deguillaume F, Ruanaidh JJKÓ, Pun T (2000) A Bayesian approach to affine transformation resistant image and video watermarking. In: Pfitzmann A (ed) Information Hiding, 3rd International Workshop. Dresden, Germany, September/October 1999, Proc, Springer, LNCS 1768, pp 270–285Google Scholar
  5. 5.
    Cox IJ, Kilian J, Leighton Z, Shamoon T (1996) Secure Spread Spectrum Watermarking for Images, Audio and Video. In: Proc ICIP’96, pp 243–246Google Scholar
  6. 6.
    Cox I, Miller M, Bloom J (2002) Digital Watermarking. Academic Press, San Diego, USAGoogle Scholar
  7. 7.
    Cox IJ, Miller ML, McKellips AL (1999) Watermarking as communications with side information. P IEEE 87(7):1127–1141CrossRefGoogle Scholar
  8. 8.
    Dittmann J (2000) Digitale Wasserzeichen. Springer VerlagGoogle Scholar
  9. 9.
    Dittmann J (2004) Multimedia and Security, Ecrypt – European Network of Excellence in Cryptology. Magdeburger Wissenschaftsjournal Nr. 2, Otto-von-Guericke-Universität, pp 13–19Google Scholar
  10. 10.
    Dittmann J, Lang A, Steinebach M, Katzenbeisser S (2005) Ecrypt – European Network of Excellence in Cryptology, Aspekte der Sicherheit von Mediendaten. Im Tagungsband von Federrath H (ed) Sicherheit 2006, 5.–8. April 2005, Regensburg, pp 189–196Google Scholar
  11. 11.
    Dittmann J, Steinebach M, Zmudzinsky S, Lang A (2004) Advanced audio watermarking benchmarking. In: Proc SPIE, vol 5306Google Scholar
  12. 12.
    Eggers JJ, Bäuml R, Tzschoppe R, Huber J (2001) Applications of Information Hiding and Digital Watermarking. ECDL 2001, Workshop Generalized Documents, DeutschlandGoogle Scholar
  13. 13.
    Eggers JJ, Bäuml R, Girod R (2002) A communications Approach to Image Steganography. Proc SPIE, Security and Watermarking of Multimedia Contents IV, vol 4675, San Jose, Ca, USAGoogle Scholar
  14. 14.
    Eggers J, Girod B (2002) Informed Watermarking. Kluwer Academic PublishersGoogle Scholar
  15. 15.
    Farid H (2001) Detecting Steganographic Messages in Digital Images. Technical Report, TR2001-412, Dartmouth College, Computer ScienceGoogle Scholar
  16. 16.
    Franz E (2002) Steganography Preserving Statistical Properties. In: Petitcolas FAP (ed) Information Hiding, 5th International Workshop. Noordwijkerhout, The Netherlands, October 2002, Proc, Springer, LNCS 2578, pp 278–294Google Scholar
  17. 17.
    Fridrich J, Du R, Long M (2000) Steganalysis of LSB Encoding in Color Images. CME 2000, New York City, USA, July/August, 2000Google Scholar
  18. 18.
    Fridrich J, Goljan M, Hogea D (2002) Steganalysis of JPEG Images: Breaking the F5 Algorithm. In: Petitcolas FAP (ed) Information Hiding, 5th International Workshop. Noordwijkerhout, The Netherlands, October 2002, Proc, Springer, LNCS 2578, pp 310–323Google Scholar
  19. 19.
    Fridrich J, Goljan M, Soukal D (2004) Perturbed Quantization Steganography with Wet Paper Codes. Proc Of ACM Multimedia and Security Workshop, Germany, pp 4–15Google Scholar
  20. 20.
    Franz E, Schneidewind A (2005) Pre-processing for Adding Noise Steganography. Accepted for 7th International Workshop on Information Hiding, IHWGoogle Scholar
  21. 21.
    Hartung F, Eisert P, Girod B (1998) Digital Watermarking of MPEG-4 facial animation parameters. Comput Graph 22(4):425–435CrossRefGoogle Scholar
  22. 22.
    Haitsma J, Kalker T (2002) A Highly Robust Audio Fingerprinting System. In Proc IS-MIR 2002Google Scholar
  23. 23.
    Hopper NJ, Langford J, v Ahn L: Provably Secure SteganographyGoogle Scholar
  24. 24.
    Katzenbeisser S, Petitcolas FAP (eds) (2000) Information Hiding Techniques for Steganography and Digital Watermarking. Artech HouseGoogle Scholar
  25. 25.
    Katzenbeisser S, Petitcolas FAP (2002) Defining Security in Steganographic Systems. Proc SPIE, Security and Watermarking of Multimedia Contents IV, vol 4675, pp 50–56Google Scholar
  26. 26.
    Klimant H, Piotraschke R (1997) Informationstheoretische Bewertung steganographischer Konzelationssysteme. GI Fachtagung Verlässliche IT-Systeme (VIS’97), DuD Fachbeiträge, Vieweg-Verlag, pp 225–232Google Scholar
  27. 27.
    Kutter M, Voloshynovskiy S, Herrigel A (2000) Watermark Copy Attack. Proc SPIE, Security and Watermarking of Multimedia Contents II, vol 3971, pp 371–381Google Scholar
  28. 28.
    Lang A, Holley M, Dittmann J (2004) StirMark for Audio: Unterschiede zwischen Musik und Sprache. In: “Von e-Learning bis e-Payment 2004”; Proceedings LIT’04Google Scholar
  29. 29.
    Lyu S, Farid H (2002) Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines. In: Petitcolas FAP (ed) Information Hiding, 5th International Workshop. Noordwijkerhout, The Netherlands, October 2002, Proc, Springer, LNCS 2578, pp 340–354Google Scholar
  30. 30.
    Mittelholzer T (2000) An Information-Theoretic Approach to Steganography and Watermarking. In: Pfitzmann A (ed) Information Hiding, 3rd International Workshop. Dresden, Germany, September/October 1999, Proc, Springer, LNCS 1768, pp 1–16Google Scholar
  31. 31.
    Pereira S, Voloshinovsky S, Pun T (2001) Optimal Transform Domain Watermark Embedding Via Linear Programming. Signal Process 81(6):1251–1260CrossRefzbMATHGoogle Scholar
  32. 32.
    Provos N (2001) Defending Against Statistical Steganalysis. 10th USENIX Security Symposium, August, 2001Google Scholar
  33. 33.
    Su JK, Eggers JJ, Girod B (2000) Illustration of the Duality Between Channel Coding and Rate Distorsion with Side Information. 34th Asilomar Conference Signals, Systems, Computers, Asilomar, CA, USA, October/November 2000Google Scholar
  34. 34.
    Voloshynovskiy S, Koval O, Deguillaume F, Pun T (2003) Data hiding capacity-security analysis for real images based on stochastic non-stationary geometrical models. Proc SPIE Photonics West, Electronic Imaging 2003, Security and Watermarking of Multimedia Contents V, Santa Clara, CA, USA, January, 2003Google Scholar
  35. 35.
    Westfeld A (2001) F5 – Ein steganographischer Algorithmus: Hohe Kapazität trotz verbesserter Angriffe. GI Fachtagung Verlässliche IT-Systeme (VIS ‘01), DuD Fachbeiträge, Vieweg Verlag, pp 241–255Google Scholar
  36. 36.
    Westfeld A, Pfitzmann A (2000) Attacks on Steganographic Systems. In: Pfitzmann A (ed) Information Hiding, 3rd International Workshop. Dresden, Germany, September/October 1999, Proc, Springer, LNCS 1768, pp 61–76Google Scholar
  37. 37.
    Zöllner J, Federrath H, Klimant H, Pfitzmann A, Piotraschke A, Westfeld A, Wicke G, Wolf G: Modeling the Security of Steganographic Systems. In: [Aucs_98], pp 344–354Google Scholar

Copyright information

© Springer-Verlag 2005

Authors and Affiliations

  1. 1.Institut für Technische und Betriebliche InformationssystemeOtto-von-Guericke Universität MagdeburgMagdeburgDeutschland
  2. 2.Institut für SystemarchitekturTU DresdenDresdenDeutschland

Personalised recommendations