Zusammenfassung
Digitale Mediendaten (z. B. Bild-, Ton-, Videodaten oder aber auch symbolische Repräsentationen) haben in den letzten Jahren stark an Bedeutung gewonnen. Sie öffnen neue Märkte und Anwendungsfelder, erfordern aber gleichzeitig auch neue Sicherheitsmechanismen zum Schutz der Mediendaten, zur Identifikation oder Authentisierung in verschiedenen Repräsentationsformen bis hin zum Schutz urheberrechtlicher Ansprüche.
References
Ahsan K, Kundur D (2002) Practical Data Hiding in TCP/IP. Proc Workshop on Multimedia Security at ACM Multimedia ’02, French Riviera, December 2002
Cachin C: An Information-Theoretic Model for Steganography. In: [Aucs_98], pp 306–318
Chen B, Wornell GW (2001) Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE T Inform Theory 47(4):1423–1443
Csurka G, Deguillaume F, Ruanaidh JJKÓ, Pun T (2000) A Bayesian approach to affine transformation resistant image and video watermarking. In: Pfitzmann A (ed) Information Hiding, 3rd International Workshop. Dresden, Germany, September/October 1999, Proc, Springer, LNCS 1768, pp 270–285
Cox IJ, Kilian J, Leighton Z, Shamoon T (1996) Secure Spread Spectrum Watermarking for Images, Audio and Video. In: Proc ICIP’96, pp 243–246
Cox I, Miller M, Bloom J (2002) Digital Watermarking. Academic Press, San Diego, USA
Cox IJ, Miller ML, McKellips AL (1999) Watermarking as communications with side information. P IEEE 87(7):1127–1141
Dittmann J (2000) Digitale Wasserzeichen. Springer Verlag
Dittmann J (2004) Multimedia and Security, Ecrypt – European Network of Excellence in Cryptology. Magdeburger Wissenschaftsjournal Nr. 2, Otto-von-Guericke-Universität, pp 13–19
Dittmann J, Lang A, Steinebach M, Katzenbeisser S (2005) Ecrypt – European Network of Excellence in Cryptology, Aspekte der Sicherheit von Mediendaten. Im Tagungsband von Federrath H (ed) Sicherheit 2006, 5.–8. April 2005, Regensburg, pp 189–196
Dittmann J, Steinebach M, Zmudzinsky S, Lang A (2004) Advanced audio watermarking benchmarking. In: Proc SPIE, vol 5306
Eggers JJ, Bäuml R, Tzschoppe R, Huber J (2001) Applications of Information Hiding and Digital Watermarking. ECDL 2001, Workshop Generalized Documents, Deutschland
Eggers JJ, Bäuml R, Girod R (2002) A communications Approach to Image Steganography. Proc SPIE, Security and Watermarking of Multimedia Contents IV, vol 4675, San Jose, Ca, USA
Eggers J, Girod B (2002) Informed Watermarking. Kluwer Academic Publishers
Farid H (2001) Detecting Steganographic Messages in Digital Images. Technical Report, TR2001-412, Dartmouth College, Computer Science
Franz E (2002) Steganography Preserving Statistical Properties. In: Petitcolas FAP (ed) Information Hiding, 5th International Workshop. Noordwijkerhout, The Netherlands, October 2002, Proc, Springer, LNCS 2578, pp 278–294
Fridrich J, Du R, Long M (2000) Steganalysis of LSB Encoding in Color Images. CME 2000, New York City, USA, July/August, 2000
Fridrich J, Goljan M, Hogea D (2002) Steganalysis of JPEG Images: Breaking the F5 Algorithm. In: Petitcolas FAP (ed) Information Hiding, 5th International Workshop. Noordwijkerhout, The Netherlands, October 2002, Proc, Springer, LNCS 2578, pp 310–323
Fridrich J, Goljan M, Soukal D (2004) Perturbed Quantization Steganography with Wet Paper Codes. Proc Of ACM Multimedia and Security Workshop, Germany, pp 4–15
Franz E, Schneidewind A (2005) Pre-processing for Adding Noise Steganography. Accepted for 7th International Workshop on Information Hiding, IHW
Hartung F, Eisert P, Girod B (1998) Digital Watermarking of MPEG-4 facial animation parameters. Comput Graph 22(4):425–435
Haitsma J, Kalker T (2002) A Highly Robust Audio Fingerprinting System. In Proc IS-MIR 2002
Hopper NJ, Langford J, v Ahn L: Provably Secure Steganography
Katzenbeisser S, Petitcolas FAP (eds) (2000) Information Hiding Techniques for Steganography and Digital Watermarking. Artech House
Katzenbeisser S, Petitcolas FAP (2002) Defining Security in Steganographic Systems. Proc SPIE, Security and Watermarking of Multimedia Contents IV, vol 4675, pp 50–56
Klimant H, Piotraschke R (1997) Informationstheoretische Bewertung steganographischer Konzelationssysteme. GI Fachtagung Verlässliche IT-Systeme (VIS’97), DuD Fachbeiträge, Vieweg-Verlag, pp 225–232
Kutter M, Voloshynovskiy S, Herrigel A (2000) Watermark Copy Attack. Proc SPIE, Security and Watermarking of Multimedia Contents II, vol 3971, pp 371–381
Lang A, Holley M, Dittmann J (2004) StirMark for Audio: Unterschiede zwischen Musik und Sprache. In: “Von e-Learning bis e-Payment 2004”; Proceedings LIT’04
Lyu S, Farid H (2002) Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines. In: Petitcolas FAP (ed) Information Hiding, 5th International Workshop. Noordwijkerhout, The Netherlands, October 2002, Proc, Springer, LNCS 2578, pp 340–354
Mittelholzer T (2000) An Information-Theoretic Approach to Steganography and Watermarking. In: Pfitzmann A (ed) Information Hiding, 3rd International Workshop. Dresden, Germany, September/October 1999, Proc, Springer, LNCS 1768, pp 1–16
Pereira S, Voloshinovsky S, Pun T (2001) Optimal Transform Domain Watermark Embedding Via Linear Programming. Signal Process 81(6):1251–1260
Provos N (2001) Defending Against Statistical Steganalysis. 10th USENIX Security Symposium, August, 2001
Su JK, Eggers JJ, Girod B (2000) Illustration of the Duality Between Channel Coding and Rate Distorsion with Side Information. 34th Asilomar Conference Signals, Systems, Computers, Asilomar, CA, USA, October/November 2000
Voloshynovskiy S, Koval O, Deguillaume F, Pun T (2003) Data hiding capacity-security analysis for real images based on stochastic non-stationary geometrical models. Proc SPIE Photonics West, Electronic Imaging 2003, Security and Watermarking of Multimedia Contents V, Santa Clara, CA, USA, January, 2003
Westfeld A (2001) F5 – Ein steganographischer Algorithmus: Hohe Kapazität trotz verbesserter Angriffe. GI Fachtagung Verlässliche IT-Systeme (VIS ‘01), DuD Fachbeiträge, Vieweg Verlag, pp 241–255
Westfeld A, Pfitzmann A (2000) Attacks on Steganographic Systems. In: Pfitzmann A (ed) Information Hiding, 3rd International Workshop. Dresden, Germany, September/October 1999, Proc, Springer, LNCS 1768, pp 61–76
Zöllner J, Federrath H, Klimant H, Pfitzmann A, Piotraschke A, Westfeld A, Wicke G, Wolf G: Modeling the Security of Steganographic Systems. In: [Aucs_98], pp 344–354
Author information
Authors and Affiliations
Corresponding authors
Rights and permissions
About this article
Cite this article
Dittmann, J., Franz, E. & Schneidewind, A. Steganographie und Wasserzeichen – Aktueller Stand und neue Herausforderungen. Informatik Spektrum 28, 453–461 (2005). https://doi.org/10.1007/s00287-005-0043-y
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00287-005-0043-y