Skip to main content
Log in

Steganographie und Wasserzeichen – Aktueller Stand und neue Herausforderungen

  • Regular Paper
  • Published:
Informatik-Spektrum Aims and scope

Zusammenfassung

Digitale Mediendaten (z. B. Bild-, Ton-, Videodaten oder aber auch symbolische Repräsentationen) haben in den letzten Jahren stark an Bedeutung gewonnen. Sie öffnen neue Märkte und Anwendungsfelder, erfordern aber gleichzeitig auch neue Sicherheitsmechanismen zum Schutz der Mediendaten, zur Identifikation oder Authentisierung in verschiedenen Repräsentationsformen bis hin zum Schutz urheberrechtlicher Ansprüche.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

References

  1. Ahsan K, Kundur D (2002) Practical Data Hiding in TCP/IP. Proc Workshop on Multimedia Security at ACM Multimedia ’02, French Riviera, December 2002

  2. Cachin C: An Information-Theoretic Model for Steganography. In: [Aucs_98], pp 306–318

  3. Chen B, Wornell GW (2001) Quantization index modulation: A class of provably good methods for digital watermarking and information embedding. IEEE T Inform Theory 47(4):1423–1443

    Article  MATH  MathSciNet  Google Scholar 

  4. Csurka G, Deguillaume F, Ruanaidh JJKÓ, Pun T (2000) A Bayesian approach to affine transformation resistant image and video watermarking. In: Pfitzmann A (ed) Information Hiding, 3rd International Workshop. Dresden, Germany, September/October 1999, Proc, Springer, LNCS 1768, pp 270–285

  5. Cox IJ, Kilian J, Leighton Z, Shamoon T (1996) Secure Spread Spectrum Watermarking for Images, Audio and Video. In: Proc ICIP’96, pp 243–246

  6. Cox I, Miller M, Bloom J (2002) Digital Watermarking. Academic Press, San Diego, USA

    Google Scholar 

  7. Cox IJ, Miller ML, McKellips AL (1999) Watermarking as communications with side information. P IEEE 87(7):1127–1141

    Article  Google Scholar 

  8. Dittmann J (2000) Digitale Wasserzeichen. Springer Verlag

  9. Dittmann J (2004) Multimedia and Security, Ecrypt – European Network of Excellence in Cryptology. Magdeburger Wissenschaftsjournal Nr. 2, Otto-von-Guericke-Universität, pp 13–19

  10. Dittmann J, Lang A, Steinebach M, Katzenbeisser S (2005) Ecrypt – European Network of Excellence in Cryptology, Aspekte der Sicherheit von Mediendaten. Im Tagungsband von Federrath H (ed) Sicherheit 2006, 5.–8. April 2005, Regensburg, pp 189–196

  11. Dittmann J, Steinebach M, Zmudzinsky S, Lang A (2004) Advanced audio watermarking benchmarking. In: Proc SPIE, vol 5306

  12. Eggers JJ, Bäuml R, Tzschoppe R, Huber J (2001) Applications of Information Hiding and Digital Watermarking. ECDL 2001, Workshop Generalized Documents, Deutschland

  13. Eggers JJ, Bäuml R, Girod R (2002) A communications Approach to Image Steganography. Proc SPIE, Security and Watermarking of Multimedia Contents IV, vol 4675, San Jose, Ca, USA

  14. Eggers J, Girod B (2002) Informed Watermarking. Kluwer Academic Publishers

  15. Farid H (2001) Detecting Steganographic Messages in Digital Images. Technical Report, TR2001-412, Dartmouth College, Computer Science

  16. Franz E (2002) Steganography Preserving Statistical Properties. In: Petitcolas FAP (ed) Information Hiding, 5th International Workshop. Noordwijkerhout, The Netherlands, October 2002, Proc, Springer, LNCS 2578, pp 278–294

  17. Fridrich J, Du R, Long M (2000) Steganalysis of LSB Encoding in Color Images. CME 2000, New York City, USA, July/August, 2000

  18. Fridrich J, Goljan M, Hogea D (2002) Steganalysis of JPEG Images: Breaking the F5 Algorithm. In: Petitcolas FAP (ed) Information Hiding, 5th International Workshop. Noordwijkerhout, The Netherlands, October 2002, Proc, Springer, LNCS 2578, pp 310–323

  19. Fridrich J, Goljan M, Soukal D (2004) Perturbed Quantization Steganography with Wet Paper Codes. Proc Of ACM Multimedia and Security Workshop, Germany, pp 4–15

  20. Franz E, Schneidewind A (2005) Pre-processing for Adding Noise Steganography. Accepted for 7th International Workshop on Information Hiding, IHW

  21. Hartung F, Eisert P, Girod B (1998) Digital Watermarking of MPEG-4 facial animation parameters. Comput Graph 22(4):425–435

    Article  Google Scholar 

  22. Haitsma J, Kalker T (2002) A Highly Robust Audio Fingerprinting System. In Proc IS-MIR 2002

  23. Hopper NJ, Langford J, v Ahn L: Provably Secure Steganography

  24. Katzenbeisser S, Petitcolas FAP (eds) (2000) Information Hiding Techniques for Steganography and Digital Watermarking. Artech House

  25. Katzenbeisser S, Petitcolas FAP (2002) Defining Security in Steganographic Systems. Proc SPIE, Security and Watermarking of Multimedia Contents IV, vol 4675, pp 50–56

  26. Klimant H, Piotraschke R (1997) Informationstheoretische Bewertung steganographischer Konzelationssysteme. GI Fachtagung Verlässliche IT-Systeme (VIS’97), DuD Fachbeiträge, Vieweg-Verlag, pp 225–232

  27. Kutter M, Voloshynovskiy S, Herrigel A (2000) Watermark Copy Attack. Proc SPIE, Security and Watermarking of Multimedia Contents II, vol 3971, pp 371–381

  28. Lang A, Holley M, Dittmann J (2004) StirMark for Audio: Unterschiede zwischen Musik und Sprache. In: “Von e-Learning bis e-Payment 2004”; Proceedings LIT’04

  29. Lyu S, Farid H (2002) Detecting Hidden Messages Using Higher-Order Statistics and Support Vector Machines. In: Petitcolas FAP (ed) Information Hiding, 5th International Workshop. Noordwijkerhout, The Netherlands, October 2002, Proc, Springer, LNCS 2578, pp 340–354

  30. Mittelholzer T (2000) An Information-Theoretic Approach to Steganography and Watermarking. In: Pfitzmann A (ed) Information Hiding, 3rd International Workshop. Dresden, Germany, September/October 1999, Proc, Springer, LNCS 1768, pp 1–16

  31. Pereira S, Voloshinovsky S, Pun T (2001) Optimal Transform Domain Watermark Embedding Via Linear Programming. Signal Process 81(6):1251–1260

    Article  MATH  Google Scholar 

  32. Provos N (2001) Defending Against Statistical Steganalysis. 10th USENIX Security Symposium, August, 2001

  33. Su JK, Eggers JJ, Girod B (2000) Illustration of the Duality Between Channel Coding and Rate Distorsion with Side Information. 34th Asilomar Conference Signals, Systems, Computers, Asilomar, CA, USA, October/November 2000

  34. Voloshynovskiy S, Koval O, Deguillaume F, Pun T (2003) Data hiding capacity-security analysis for real images based on stochastic non-stationary geometrical models. Proc SPIE Photonics West, Electronic Imaging 2003, Security and Watermarking of Multimedia Contents V, Santa Clara, CA, USA, January, 2003

  35. Westfeld A (2001) F5 – Ein steganographischer Algorithmus: Hohe Kapazität trotz verbesserter Angriffe. GI Fachtagung Verlässliche IT-Systeme (VIS ‘01), DuD Fachbeiträge, Vieweg Verlag, pp 241–255

  36. Westfeld A, Pfitzmann A (2000) Attacks on Steganographic Systems. In: Pfitzmann A (ed) Information Hiding, 3rd International Workshop. Dresden, Germany, September/October 1999, Proc, Springer, LNCS 1768, pp 61–76

  37. Zöllner J, Federrath H, Klimant H, Pfitzmann A, Piotraschke A, Westfeld A, Wicke G, Wolf G: Modeling the Security of Steganographic Systems. In: [Aucs_98], pp 344–354

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Jana Dittmann, Elke Franz or Antje Schneidewind.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Dittmann, J., Franz, E. & Schneidewind, A. Steganographie und Wasserzeichen – Aktueller Stand und neue Herausforderungen. Informatik Spektrum 28, 453–461 (2005). https://doi.org/10.1007/s00287-005-0043-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00287-005-0043-y

Navigation