scispace - formally typeset
Search or ask a question
Author

Jana Dittmann

Bio: Jana Dittmann is an academic researcher from Otto-von-Guericke University Magdeburg. The author has contributed to research in topics: Digital watermarking & Watermark. The author has an hindex of 32, co-authored 298 publications receiving 4426 citations. Previous affiliations of Jana Dittmann include Fraunhofer Society & Technische Universität Darmstadt.


Papers
More filters
Book ChapterDOI
22 Sep 2008
TL;DR: In this article, the authors performed several practical tests on recent automotive technology, focusing on automotive systems based on CAN bus technology, and discussed selected countermeasures to address the basic weaknesses exploited in their tests and also gave a short outlook to requirements, potential and restrictions of future, holistic approaches.
Abstract: The IT security of automotive systems is an evolving area of research. To analyse the current situation we performed several practical tests on recent automotive technology, focusing on automotive systems based on CAN bus technology. With respect to the results of these tests, in this paper we discuss selected countermeasures to address the basic weaknesses exploited in our tests and also give a short outlook to requirements, potential and restrictions of future, holistic approaches.

399 citations

Proceedings ArticleDOI
07 Jun 1999
TL;DR: This work presents a content-based signature technique for image and video authenticity and integrity, introduces a tool for interactive video authentication and proposes content-fragile watermarking, a concept which combines water marking and content- based digital signatures to ensure copyright protection and detection of integrity violation.
Abstract: The development of new multimedia services and environments requires new concepts both to support the new working process and to protect the multimedia data during the production and distribution. We address image/video authentication and copyright protection as major security demands in digital marketplaces. First we present a content-based signature technique for image and video authenticity and integrity. Based on this technique, we introduce a tool for interactive video authentication and propose content-fragile watermarking, a concept which combines watermarking and content-based digital signatures to ensure copyright protection and detection of integrity violation.

212 citations

Proceedings ArticleDOI
20 Sep 2007
TL;DR: The results show, that for the test set, the used classification techniques and selected steganalysis features, microphones can be better classified than environments.
Abstract: In this paper a first approach for digital media forensics is presented to determine the used microphones and the environments of recorded digital audio samples by using known audio steganalysis features. Our first evaluation is based on a limited exemplary test set of 10 different audio reference signals recorded as mono audio data by four microphones in 10 different rooms with 44.1 kHz sampling rate and 16 bit quantisation. Note that, of course, a generalisation of the results cannot be achieved. Motivated by the syntactical and semantical analysis of information and in particular by known audio steganalysis approaches, a first set of specific features are selected for classification to evaluate, whether this first feature set can support correct classifications. The idea was mainly driven by the existing steganalysis features and the question of applicability within a first and limited test set. In the tests presented in this paper, an inter-device analysis with different device characteristics is performed while intra-device evaluations (identical microphone models of the same manufacturer) are not considered. For classification the data mining tool WEKA with K-means as a clustering and Naive Bayes as a classification technique are applied with the goal to evaluate their classification in regard to the classification accuracy on known audio steganalysis features. Our results show, that for our test set, the used classification techniques and selected steganalysis features, microphones can be better classified than environments. These first tests show promising results but of course are based on a limited test and training set as well a specific test set generation. Therefore additional and enhanced features with different test set generation strategies are necessary to generalise the findings.

154 citations

Journal ArticleDOI
TL;DR: This article summarises the results of four selected tests performed on the control systems for the window lift, warning light and airbag control system as well as the central gateway and discusses two selected countermeasures to address basic weaknesses exploited in these tests.

145 citations

Proceedings ArticleDOI
01 Sep 1998
TL;DR: This work presents a trivial scheme that provides similar protection for the content but be used efficiently with multicasting and caching, and introduces receiver-sided introduction of watermarks into the video.
Abstract: 1. ABSTRACT Various on-demand systems require that large numbers of customers are provided with the same multimedia stream content or different but closely related content in short temporary sequence but not at exactly the same time. This includes video on demand and news on demand. A typical approach to increase the performance of such systems is caching. However in current commercial on-demand streaming applications in the Internet caches are used very rarely because a mechanism to protect the content from resale by the cache owners does not exist. A typical solution is to transfer all content via protected unicast transmissions, which is an approach that does not scale. We want to present a trivial scheme that provides similar protection for the content but be used efficiently with multicasting and caching. In this approach, the major part of the video is intentionally corrupted and can be distributed via multicast connections, while the part for reconstruction of the original is delivered to each receiver individually. We propose also means to discourage resale of the multimedia content by customers. One proposal introduces receiver-sided introduction of watermarks into the video, the other uses infrequent corrupt bytes to achieve uniqueness of each copy.

134 citations


Cited by
More filters
Journal Article
TL;DR: AspectJ as mentioned in this paper is a simple and practical aspect-oriented extension to Java with just a few new constructs, AspectJ provides support for modular implementation of a range of crosscutting concerns.
Abstract: Aspect] is a simple and practical aspect-oriented extension to Java With just a few new constructs, AspectJ provides support for modular implementation of a range of crosscutting concerns. In AspectJ's dynamic join point model, join points are well-defined points in the execution of the program; pointcuts are collections of join points; advice are special method-like constructs that can be attached to pointcuts; and aspects are modular units of crosscutting implementation, comprising pointcuts, advice, and ordinary Java member declarations. AspectJ code is compiled into standard Java bytecode. Simple extensions to existing Java development environments make it possible to browse the crosscutting structure of aspects in the same kind of way as one browses the inheritance structure of classes. Several examples show that AspectJ is powerful, and that programs written using it are easy to understand.

2,947 citations

Book
24 Oct 2001
TL;DR: Digital Watermarking covers the crucial research findings in the field and explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied.
Abstract: Digital watermarking is a key ingredient to copyright protection. It provides a solution to illegal copying of digital material and has many other useful applications such as broadcast monitoring and the recording of electronic transactions. Now, for the first time, there is a book that focuses exclusively on this exciting technology. Digital Watermarking covers the crucial research findings in the field: it explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied. As a result, additional groundwork is laid for future developments in this field, helping the reader understand and anticipate new approaches and applications.

2,849 citations

01 Apr 1997
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Abstract: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind. The emphasis is on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity. Topics covered includes an introduction to the concepts in cryptography, attacks against cryptographic systems, key use and handling, random bit generation, encryption modes, and message authentication codes. Recommendations on algorithms and further reading is given in the end of the paper. This paper should make the reader able to build, understand and evaluate system descriptions and designs based on the cryptographic components described in the paper.

2,188 citations