Mediensicherheit

  • Roland Schmitz
Part of the X.media.press book series (XMEDIAP)

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Literatur

  1. [Bec]
    E. Becker et al. (Ed.): Digital Rights Management-Technological, Economic, Legal and Political Aspects, Springer-Verlag 2003Google Scholar
  2. [Beu]
    A. Beutelspacher, H. B. Neumann, T. Schwarzpaul: Kryptografie in Theorie und Praxis, Vieweg 2005Google Scholar
  3. [Bl]
    R. Bless et al.: Sichere Netzwerkkommunikation, Springer-Verlag 2005Google Scholar
  4. [BS]
    D. Boneh, J. Shaw: Collision-Secure Fingerprinting for Digital Data. Proc. CRYPTO 95, Vol. 963 of LNCS, pp. 452–465, Springer-Verlag 1995MATHGoogle Scholar
  5. [Cha]
    D. Chaum: Blind Signatures for Untraceable Payments. Proc. CRYPTO 82, pp. 199–203, Plenum Press 1983MathSciNetGoogle Scholar
  6. [CKLS]
    I. J. Cox, J. Kilian, T. Leighton, T. Shamoon: A Secure, Robust Watermark for Multimedia, Proc. First International Workshop on Information Hiding, Vol. 1174 of LNCS, pp. 251–263, Springer-Verlag 1996Google Scholar
  7. [CMB]
    I. J. Cox, M. L. Miller, J. A. Bloom: Digital Watermarking, Academic Press 2002Google Scholar
  8. [DiLa]
    J. Dittmann, A. Lang: StirMark Benchmark for Audio, https://amsl-smb.cs.uni-magdeburg.de/smfa//allgemeines.phpGoogle Scholar
  9. [Dit]
    J. Dittmann: Digitale Wasserzeichen-Grundlagen, Verfahren, Anwendungsgebiete, Springer-Verlag 2000Google Scholar
  10. [DBS]
    J. Dittmann, A. Behr, M. Stabenau et al.: Combining digital watermarks and collision-secure fingerprints for digital images, Proceedings of SPIE Conference on Security and Watermarking of Multimedia Contents, San Jose, USA, 1999.Google Scholar
  11. [DTS]
    Y. Dai, S. Thiemert, M. Steinebach: Feature-based watermarking scheme for MPEG-I/II video authentication. Proceedings of SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents VI, San Jose, USA, 2004Google Scholar
  12. [FK]
    B. Fuhrt, D. Kirovski (Ed.): Multimedia Security Handbook, CRC Press 2004.Google Scholar
  13. [Fri]
    J. Fridrich: Security of fragile authentication watermarks with localization. Proceedings of SPIE Conference on Security and Watermarking of Multimedia Contents IV, San Jose, USA, 2002Google Scholar
  14. [GP]
    R. Grimm, S. Puchta: Datenspuren bei der Nutzung von Digital Rights Mangement Systemen, Datenschutz und Datensicherheit (DuD) 30 (2006), Nr. 2, pp. 74–79.Google Scholar
  15. [GrEb]
    R. Grosbois, T. Ebrahimi: Watermarking in the JPEG 2000 Domain, JPEG 2000 domain, Proc. IEEE Workshop on Multimedia signal processing, pp. 3–5, 2001.Google Scholar
  16. [HW]
    T. Hauser, C. Wenz: DRM Under Attack: Weaknesses in Existing Systems, in: [Bec], pp. 206–223.Google Scholar
  17. [Ian]
    R. Iannella: Open Digital Rights Language (ODRL), Version 1.1, http://www.w3.org/TR/odrl/Google Scholar
  18. [Kim]
    H. J. Kim: Audio Watermarking Techniques, Pacific Rim Workshop on Digital Steganography, Kyushu Institute of Technology, Kitakyushu, Japan, July, 2003.Google Scholar
  19. [KJB]
    M. Kutter, F. Jordan, F. Bossen: Digital Signature of Color Images using Amplitude Modulation, Proceedings of SPIE Conference on Storage and Retrieval for Image and Video Databases, Vol. 3022, pp. 518–526, San Jose, USA, 1997Google Scholar
  20. [Kun]
    T. Kunkelmann: Sicherheit für Videodaten, Vieweg-Verlag 1998Google Scholar
  21. [Min]
    F. C. Mintzer et al., Toward on-line, worldwide access to Vatican Library materials, IBM Journal of Research and Development, Vol. 40, No. 2 (1996)Google Scholar
  22. [MOV]
    A. J. Menezes, P. van Oorschot, S. Vanstone: Handbook of Applied Cryptography, CRC Press 1997Google Scholar
  23. [MS]
    http://www.microsoft.com/windows/windowsmedia/howto/articles/drmarchitecture.aspxGoogle Scholar
  24. [OMA]
    Open Mobile Alliance, DRM Architecture, Candidate Version 2.0, September 2005, http://www.openmobilealliance.org/release_program/drm_v2_0.htmlGoogle Scholar
  25. [OMAR]
    OMA DRM Rights Expression Language, Candidate Version 2.0, September 2005, http://www.openmobilealliance.org/release_program/drm_v2_0.htmlGoogle Scholar
  26. [Pet]
    F. Petitcolas: Digital Watermarking, in: [Bec], pp.81–92.Google Scholar
  27. [Pet2]
    F. Petitcolas: Stirmark Benchmark 4.0, http://www.petitcolas.net/fabien/watermarking/stirmark/Google Scholar
  28. [Pot]
    PotatoSystem Homepage;, http://www.potatosystem.com/info/ger/Google Scholar
  29. [QN]
    L. Qiao, K. Nahrstedt: Comparison of MPEG Encryption Algorithms, IEEE Journal on Computer Graphics and Applications, Special Issue on Data Security in Image Communication and Networks, Vol. 22, No. 4 (1998), pp. 437–448.Google Scholar
  30. [Schn]
    B. Schneier: Applied Cryptography, Wiley 1996Google Scholar
  31. [TZFS]
    S. Thiemert, S. Zmudinski, L. Croce Ferri, M. Steinebach: Digitale Wasserzeichen zum Integritätsschutz von Multimediadaten, in: “Education, Research and New Media-Chances and Challenges for Science”, 10. IuK-Frühjahrstagung, 2004Google Scholar
  32. [UP]
    A. Uhl, A. Pommer: Image and Video Encryption, Springer-Verlag 2005Google Scholar
  33. [XRM]
    eXtensible Rights Markup Language Version 2.0, http://www.xrml.orgGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Roland Schmitz

There are no affiliations available

Personalised recommendations