Evaluation of copyright marking systems

Hidden copyright marks have been proposed as a solution for solving the illegal copying and proof of ownership problems in the context of multimedia objects. Many systems have been proposed, but it is still difficult to have even a rough idea of their performance and hence to compare them. So we first describe some general attacks on audio and image marking systems. Then we propose a benchmark to compare image marking software on a fair basis. This benchmark is based on a set of attacks that any system ought to survive.

[1]  Raymond N. J. Veldhuis Restoration of lost samples in digital signals , 1992 .

[2]  Gabriela Csurka,et al.  Template based recovery of Fourier-based watermarks using log-polar and log-log maps , 1999, Proceedings IEEE International Conference on Multimedia Computing and Systems.

[3]  Gordon W. Braudaway,et al.  Results of attacks on a claimed robust digital image watermark , 1998, Electronic Imaging.

[4]  Bernd Girod,et al.  Spread spectrum watermarking: malicious attacks and counterattacks , 1999, Electronic Imaging.

[5]  Reginald L. Lagendijk,et al.  Removing spatial spread spectrum watermarks by non-linear filtering , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).

[6]  Martin Kutter,et al.  Watermarking resistance to translation, rotation, and scaling , 1999, Other Conferences.

[7]  M. Kutter Watermaking resisting to translation, rotation, and scaling , 1998 .

[8]  Ralf Steinmetz,et al.  Multimedia and Security Workshop at ACM Multimedia , 1998 .

[9]  Raymond N. J. Veldhuis,et al.  Adaptive interpolation of discrete-time signals that can be modeled as autoregressive processes , 1986, IEEE Trans. Acoust. Speech Signal Process..

[10]  Jean-Paul M. G. Linnartz,et al.  Analysis of the Sensitivity Attack against Electronic Watermarks in Images , 1998, Information Hiding.

[11]  Thierry Pun,et al.  Rotation, scale and translation invariant spread spectrum digital image watermarking , 1998, Signal Process..

[12]  L Rudolf,et al.  Optical Security and Counterfeit Deterrence Techniques III , 1996 .

[13]  D. E. Pearson,et al.  Frequency mode LR attack operator for digitally watermarked images , 1998 .

[14]  Neil A. Dodgson,et al.  Quadratic interpolation for image resampling , 1997, IEEE Trans. Image Process..

[15]  Markus G. Kuhn,et al.  Attacks on Copyright Marking Systems , 1998, Information Hiding.

[16]  Maurice Maes,et al.  Twin Peaks: The Histogram Attack to Fixed Depth Image Watermarks , 1998, Information Hiding.