Semi-automated communication protocol security verification for watermarking - pros and cons illustrated on a complex application scenario

  • Authors:
  • Christian Kraetzer;Ronny Merkel;Robert Altschaffel;Eric Clausing;Jana Dittmann

  • Affiliations:
  • Otto-von-Guericke University, Magdeburg, Germany;Otto-von-Guericke University, Magdeburg, Germany;Otto-von-Guericke University, Magdeburg, Germany;Otto-von-Guericke University, Magdeburg, Germany;Otto-von-Guericke University, Magdeburg, Germany

  • Venue:
  • Proceedings of the thirteenth ACM multimedia workshop on Multimedia and security
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

The primary goal in this paper is to adapt and extend a recent concept and prototypical framework for (semi-)automated security verification of watermarking-based communication protocols based on the CASPER protocol modeling language and the FRD model checker. Therefore our paper extends the scope of watermarking research beyond signal processing and information theory investigations to include also protocol verification considerations as known e.g. from the field of cryptographic research. To be able to establish a clear picture of the potential prospects and the current restrictions of such a verification framework for watermarking-based communication protocols, we conceptualize, model, generate and (partially) verify an exemplary protocol for a complex watermarking-based application scenario that combines a multi-level data access structure and the assurance of the security aspects of confidentiality, authenticity and integrity. Our results show that, while the security aspects of communication confidentiality and entity-authenticity can actually be verified with the introduced approach, other security aspects which might be similarly verified are still lacking corresponding support in protocol modeling languages like CASPER.