Composing Cryptography and Watermarking for Secure Embedding and Detection of Watermarks - A Marriage of Convenience

 
When?
Wednesday 30 April 2008, 14:00 to 15:00
Where?
39BB02
Open to:
Staff, Students

Professor Ahmad-Reza Sadeghi, Horst Görtz Institute for IT Security at Ruhr-University Bochum, Germany

Abstract:

Multimedia applications deploy various cryptographic and watermarking techniques to maintain security. In this talk we give an overview of promising approaches for secure watermark embedding and detection in an untrusted environment, and we point out some associated challenges. We start with Zero-Knowledge Watermark Detection (ZKWMD) that allows a legitimate party to prove to a potentially untrusted verifying party that a watermark is detectable in a certain digital item, without

jeopardizing the security of the watermark. ZKWMD protocols are useful primitives for dispute resolving and direct proofs of authorship (i.e., without online involvement of a trusted third party) in distributed systems. We then shortly consider a Chameleon-like stream cipher that achieves simultaneous decryption and fingerprinting

of broadcast messages (termed as Fingercasting), which can serve as the second line of defence for tracing illegal distribution of broadcast messages.

Notes:

Ahmad-Reza Sadeghi is the head of the Chair for System Security at Horst Görtz Institute for IT Security at Ruhr-University Bochum, Germany. He has received his MSc in Mechanical and in Electrical Engineering, and his PhD in Computer Science with focus on privacy protecting cryptographic fingerprinting systems. Prior to academia he has been working in Research and Development of IT and Telecommunications enterprises, amongst other in R&D Department of Ericson Telecommunication. Currently he is leading several research and development projects on design and implementation of trustworthy computing platforms based on trusted computing technology as well as on design of various cryptographic systems in particular for multimedia. He is actively involved in IT security research and serve as program committee member as well as co-chair of various conferences and workshops in the area of information security. His research interests include security architectures, Trusted Computing, privacy enhancing technologies, cryptographic protocols, and Digital Rights Management.

Date:
Wednesday 30 April 2008
Time:

14:00 to 15:00


Where?
39BB02
Open to:
Staff, Students