%0 Conference Paper %B Mass Storage Systems and Technologies, 2005. Proceedings. 22nd IEEE / 13th NASA Goddard Conference on %D 2005 %T Mitigating risk of data loss in preservation environments %A Moore,R.W. %A JaJa, Joseph F. %A Chadduck,R. %K archives; %K authentication; %K authenticity; %K computing; %K data %K databases; %K digital %K distributed %K environment; %K Grid %K integrity; %K management; %K message %K objects; %K persistent %K preservation %K record %K risk %K storage %X Preservation environments manage digital records for time periods that are much longer than that of a single vendor product. A primary requirement is the preservation of the authenticity and integrity of the digital records while simultaneously minimizing the cost of long-term storage, as the data is migrated onto successive generations of technology. The emergence of low-cost storage hardware has made it possible to implement innovative software systems that minimize risk of data loss and preserve authenticity and integrity. This paper describes software mechanisms in use in current persistent archives and presents an example based upon the NARA research prototype persistent archive. %B Mass Storage Systems and Technologies, 2005. Proceedings. 22nd IEEE / 13th NASA Goddard Conference on %P 39 - 48 %8 2005/04// %G eng %R 10.1109/MSST.2005.20 %0 Journal Article %J Multimedia, IEEE Transactions on %D 2004 %T Data hiding in binary image for authentication and annotation %A M. Wu %A Liu,Bede %K annotation; %K authentication; %K binary %K coding; %K data %K digital %K digitized %K document %K EMBEDDING %K encapsulation; %K extraction; %K feature %K hiding; %K image %K image; %K method; %K signature; %K unauthorized %K user; %K watermarking; %X This paper proposes a new method to embed data in binary images, including scanned text, figures, and signatures. The method manipulates "flippable" pixels to enforce specific block-based relationship in order to embed a significant amount of data without causing noticeable artifacts. Shuffling is applied before embedding to equalize the uneven embedding capacity from region to region. The hidden data can be extracted without using the original image, and can also be accurately extracted after high quality printing and scanning with the help of a few registration marks. The proposed data embedding method can be used to detect unauthorized use of a digitized signature, and annotate or authenticate binary documents. The paper also presents analysis and discussions on robustness and security issues. %B Multimedia, IEEE Transactions on %V 6 %P 528 - 538 %8 2004/08// %@ 1520-9210 %G eng %N 4 %R 10.1109/TMM.2004.830814 %0 Journal Article %J Image Processing, IEEE Transactions on %D 2003 %T Data hiding in image and video .II. Designs and applications %A M. Wu %A Yu,H. %A Liu,Bede %K access %K annotation; %K authentication; %K capacity; %K conditions; %K content-based %K CONTROL %K control; %K copy %K data %K distortions; %K EMBEDDING %K embedding; %K encapsulation; %K extraction; %K frame %K hiding; %K image %K information; %K jitter; %K message %K multilevel %K NOISE %K noise; %K payload %K processing; %K robust %K signal %K uneven %K user %K video %X For pt. I see ibid., vol.12, no.6, p.685-95 (2003). This paper applies the solutions to the fundamental issues addressed in Part I to specific design problems of embedding data in image and video. We apply multilevel embedding to allow the amount of embedded information that can be reliably extracted to be adaptive with respect to the actual noise conditions. When extending the multilevel embedding to video, we propose strategies for handling uneven embedding capacity from region to region within a frame as well as from frame to frame. We also embed control information to facilitate the accurate extraction of the user data payload and to combat such distortions as frame jitter. The proposed algorithm can be used for a variety of applications such as copy control, access control, robust annotation, and content-based authentication. %B Image Processing, IEEE Transactions on %V 12 %P 696 - 705 %8 2003/06// %@ 1057-7149 %G eng %N 6 %R 10.1109/TIP.2003.810589 %0 Journal Article %J Circuits and Systems for Video Technology, IEEE Transactions on %D 2003 %T Joint security and robustness enhancement for quantization based data embedding %A Wu,M. %K (signal); %K authentication; %K binary %K compensation; %K data %K data; %K DETECTION %K digital %K distortion %K distortion; %K embedding; %K encapsulation; %K enhancement; %K error %K features; %K hiding; %K lookup %K lookup; %K LUT; %K message %K multimedia %K nontrivial %K probability; %K quantisation %K quantization %K quantized %K Robustness %K run %K Security %K statistics; %K systems; %K table %K table; %K watermarking; %X The paper studies joint security and robustness enhancement of quantization-based data embedding for multimedia authentication applications. We present an analysis showing that through a nontrivial run lookup table (LUT) that maps quantized multimedia features randomly to binary data, the probability of detection error can be considerably smaller than the traditional quantization embedding. We quantify the security strength of LUT embedding and enhance its robustness through distortion compensation. Introducing a joint security and capacity measure, we show that the proposed distortion-compensated LUT embedding provides joint enhancement of security and robustness over the traditional quantization embedding. %B Circuits and Systems for Video Technology, IEEE Transactions on %V 13 %P 831 - 841 %8 2003/08// %@ 1051-8215 %G eng %N 8 %R 10.1109/TCSVT.2003.815951 %0 Conference Paper %B Image Processing, 2003. ICIP 2003. Proceedings. 2003 International Conference on %D 2003 %T Joint security robustness enhancement for quantization embedding %A Wu,M. %K applications; %K Authentication %K authentication; %K binary %K communication; %K data %K data; %K embedding; %K error %K joint %K lookup %K lookup; %K message %K multimedia %K probability; %K security; %K statistics; %K table %K table; %K watermarking; %X This paper studies joint security and robustness enhancement of quantization based data embedding for multimedia authentication applications. We present analysis showing that through a lookup table (LUT) of nontrivial run that maps quantized multimedia features randomly to binary data, the detection error probability can be considerably smaller than the traditional quantization embedding. We quantify the security strength of LUT embedding and enhance its robustness through distortion compensation. Introducing a joint security and capacity measure, we show that the proposed distortion compensated LUT embedding provides joint enhancement of security and robustness over the traditional quantization embedding. %B Image Processing, 2003. ICIP 2003. Proceedings. 2003 International Conference on %V 2 %P II - 483-6 vol.3 - II - 483-6 vol.3 %8 2003/09// %G eng %R 10.1109/ICIP.2003.1246722 %0 Conference Paper %B Image Processing. 2002. Proceedings. 2002 International Conference on %D 2002 %T Anti-collusion codes: multi-user and multimedia perspectives %A Trappe,W. %A M. Wu %A Liu,K. J.R %K and %K anti-collusion %K authentication; %K binary %K code %K codes; %K coding; %K combinatorial %K computing; %K content; %K data %K designs; %K digital %K embedding; %K encapsulation; %K fingerprinting; %K image %K images; %K logical %K mathematics; %K message %K Modulation %K modulation; %K multimedia %K operation; %K performance; %K watermarking; %X Digital fingerprinting is an effective method to identify users who might try to redistribute multimedia content, such as images and video. These fingerprints are typically embedded into the content using watermarking techniques that are designed to be robust to a variety of attacks. A cheap and effective attack against such digital fingerprints is collusion, where several differently marked copies of the same content are averaged or combined to disrupt the underlying fingerprint. We present a construction of collusion-resistant fingerprints based upon anti-collusion codes (ACC) and binary code modulation. ACC have the property that the composition of any subset of K or fewer codevectors is unique. Using this property, we build fingerprints that allow for the identification of groups of K or less colluders. We present a construction of binary-valued ACC under the logical AND operation using the theory of combinatorial designs. Our code construction requires only Oscr;( radic;n) orthogonal signals to accommodate n users. We demonstrate the performance of our ACC for fingerprinting multimedia by identifying colluders through experiments using real images. %B Image Processing. 2002. Proceedings. 2002 International Conference on %V 2 %P II-149 - II-152 vol.2 - II-149 - II-152 vol.2 %8 2002/// %G eng %R 10.1109/ICIP.2002.1039909 %0 Journal Article %J Selected Areas in Communications, IEEE Journal on %D 2002 %T Scalable secure group communication over IP multicast %A Banerjee,S. %A Bhattacharjee, Bobby %K access %K algorithm; %K authentication; %K Bandwidth %K communication; %K CONTROL %K costs; %K cryptography; %K dynamics; %K group %K group; %K Internet %K Internet-like %K Internet; %K IP %K logarithmic %K map; %K membership; %K message %K Multicast %K multicast; %K network %K overhead; %K PROCESSING %K protocol %K protocols; %K rekeying %K requirements; %K routers; %K routing; %K scalable %K secure %K security; %K server; %K simulation; %K storage %K Telecommunication %K topologies; %K Topology %K topology; %K transport %K usage; %X We introduce and analyze a scalable rekeying scheme for implementing secure group communications Internet protocol multicast. We show that our scheme incurs constant processing, message, and storage overhead for a rekey operation when a single member joins or leaves the group, and logarithmic overhead for bulk simultaneous changes to the group membership. These bounds hold even when group dynamics are not known a priori. Our rekeying algorithm requires a particular clustering of the members of the secure multicast group. We describe a protocol to achieve such clustering and show that it is feasible to efficiently cluster members over realistic Internet-like topologies. We evaluate the overhead of our own rekeying scheme and also of previously published schemes via simulation over an Internet topology map containing over 280 000 routers. Through analysis and detailed simulations, we show that this rekeying scheme performs better than previous schemes for a single change to group membership. Further, for bulk group changes, our algorithm outperforms all previously known schemes by several orders of magnitude in terms of actual bandwidth usage, processing costs, and storage requirements. %B Selected Areas in Communications, IEEE Journal on %V 20 %P 1511 - 1527 %8 2002/10// %@ 0733-8716 %G eng %N 8 %R 10.1109/JSAC.2002.803986