Tamper-resistant storage techniques for multimedia systems
نویسندگان
چکیده
Tamper-resistant storage techniques provide varying degrees of authenticity and integrity for data. This paper surveys five implemented tamper-resistant storage systems that use encryption, cryptographic hashes, digital signatures and error-correction primitives to provide varying levels of data protection. Five key evaluation points for such systems are: (1) authenticity guarantees, (2) integrity guarantees, (3) confidentiality guarantees, (4) performance overhead attributed to security, and (5) scalability concerns. Immutable storage techniques can enhance tamper-resistant techniques. Digital watermarking is not appropriate for tamper-resistance implemented in the storage system rather than at the application level.
منابع مشابه
Secure Your Embedded Devices
High-tech goods counterfeiting, multimedia content copying, and identity theft are all major concerns today. The proven cryptographic protocols implemented in Atmel’s tamper-resistant microcontrollers offer a powerful turnkey solution to fight these threats. This paper presents examples of efficient and cost effective IP protection applications utilizing secure chips in various embedded systems.
متن کاملEmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs
Remote mobile and embedded devices are used to deliver increasingly impactful services, such as medical rehabilitation and assistive technologies. Secure system logging is beneficial in these scenarios to aid audit and forensic investigations particularly if devices bring harm to end-users. Logs should be tamper-resistant in storage, during execution, and when retrieved by a trusted remote veri...
متن کاملA Metric-Based Scheme for Evaluating Tamper Resistant Software Systems
The increase use of software tamper resistance techniques to protect software against undesired attacks comes an increased need to understand more about the strength of these tamper resistance techniques. Currently the understanding is rather general. In this paper we propose a new software tamper resistance evaluation technique. Our main contribution is to identify a set of issues that a tampe...
متن کاملTowards a Telltale Watermarking Technique for Tamper-Proofing - Image Processing, 1998. ICIP 98. Proceedings. 1998 International Conference on
In this paper we present a novel fragile watermarking scheme for the tamper-proofing of multimedia signals. Unlike previously proposed techniques, the novel approach provides spatial and frequency domain information on how the signal is modified. We call such a technique a telltale tamper-proofing method. Our design embeds a fragile watermark in the discrete wavelet domain of the signal by quan...
متن کاملTowards a Telltale Watermarking Technique for Tamper-Proo ng
In this paper we present a novel fragile watermarking scheme for the tamper-proo ng of multimedia signals. Unlike previously proposed techniques, the novel approach provides spatial and frequency domain information on how the signal is modi ed. We call such a technique a telltale tamper-proo ng method. Our design embeds a fragile watermark in the discrete wavelet domain of the signal by quantiz...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005