Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Joerg Schwenk is active.

Publication


Featured researches published by Joerg Schwenk.


electronic imaging | 1999

Combining digital Watermarks and collusion secure Fingerprints for digital Images

Jana Dittmann; Alexander Behr; Mark Stabenau; Peter Schmitt; Joerg Schwenk; Johannes Ueberberg

Digital watermarking is the enabling technology to prove ownership on copyrighted material, detect originators of illegally made copies, monitor the usage of the copyrighted multimedia data and analyze the spread spectrum of the data over networks and servers. Embedding of unique customer identification as a watermark into data is called fingerprinting to identify illegal copies of documents. Basically, watermarks embedded into multimedia data for enforcing copyrights must uniquely identify the data and must be difficult to remove, even after various media transformation processes. Digital fingerprinting raises the additional problem that we produce different copies for each customer. Attackers can compare several fingerprinted copies to find and destroy the embedded identification string by altering the data in those places where a difference was detected. In our paper we present a technology for combining a collusion-secure fingerprinting scheme based on finite geometries and a watermarking mechanism with special marking points for digital images. The only marking positions the pirates can not detect are those positions which contain the same letter in all the compared documents, called intersection of different fingerprints. The proposed technology for a maximal number d of pirates, puts enough information in the intersection of up to d fingerprints to uniquely identify all the pirates.


Archive | 2001

Method for securing system protected by a key hierarchy

Joerg Schwenk


Archive | 2001

Method for financing multimedia content through advertising

Eva Saar; Joerg Schwenk


Archive | 1995

Method of allotting and withdrawing reception authorisation for chargeable reception

Joerg Schwenk


Archive | 2001

Method for key agreement for a cryptographic secure point - to - multipoint connection

Tobias Martin; Joerg Schwenk


Archive | 1998

Method for identifying betrayers of proprietary data

Joerg Schwenk; Johannes Ueberberg


Archive | 1996

Method for establishing a common code for authorized persons through a central office

Joerg Schwenk


Archive | 2002

Terminal device and method for using different services offered via a telecommunications network

Klaus Dr. Miethe; Jens Johann; Wolfgang Oberndorfer; Joerg Schwenk


Archive | 2001

Billing method using ssl/tls

Tobias Martin; Joerg Schwenk


Archive | 1996

Computerized method for signing a message

Joerg Schwenk

Collaboration


Dive into the Joerg Schwenk's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge