Weaknesses of copyright marking systems

1. ABSTRACT Hidden copyright marks have been pro- posed as a solution for solving the illegal copying and proof of ownership problems in the context of multimedia objects. We show that the first generation of systems does not fulfil the expectation of users through a number of attacks that enable the information hidden by them to be re- moved or otherwise rendered unusable. We also propose a possible benchmark to compare these systems on a fair basis.

[1]  Ingemar J. Cox,et al.  A Secure, Robust Watermark for Multimedia , 1996, Information Hiding.

[2]  Ioannis Pitas,et al.  A method for signature casting on digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[3]  Adrian Perrig,et al.  A Copyright Protection Environment for Digital Images , 1997, Verläßliche IT-Systeme.

[4]  Eckhard Koch,et al.  Towards Robust and Hidden Image Copyright Labeling , 1995 .

[5]  Raymond N. J. Veldhuis Restoration of lost samples in digital signals , 1992 .

[6]  Pamela Samuelson,et al.  Copyright and digital libraries , 1995, CACM.

[7]  Ross J. Anderson Stretching the Limits of Steganography , 1996, Information Hiding.

[8]  Ross J. Anderson Why cryptosystems fail , 1993, CCS '93.

[9]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[10]  Thierry Pun,et al.  Secure Copyright Protection Techniques for Digital Images , 1998, Information Hiding.

[11]  Walter Bender,et al.  Echo Hiding , 1996, Information Hiding.

[12]  B. P. Bogert,et al.  The quefrency analysis of time series for echoes : cepstrum, pseudo-autocovariance, cross-cepstrum and saphe cracking , 1963 .

[13]  Jean-Paul M. G. Linnartz,et al.  Analysis of the Sensitivity Attack against Electronic Watermarks in Images , 1998, Information Hiding.

[14]  Markus G. Kuhn,et al.  Tamper resistance: a cautionary note , 1996 .

[15]  Simon J. Godsill,et al.  Digital audio restoration , 1998 .

[16]  David Aucsmith,et al.  Tamper Resistant Software: An Implementation , 1996, Information Hiding.