Attacks on Copyright Marking Systems

In the last few years, a large number of schemes have been proposed for hiding copyright marks and other information in digital pictures, video, audio and other multimedia objects. We describe some contenders that have appeared in the research literature and in the field; we then present a number of attacks that enable the information hidden by them to be removed or otherwise rendered unusable.

[1]  Alan V. Oppenheim,et al.  Discrete-Time Signal Pro-cessing , 1989 .

[2]  Awj Werner Oomen,et al.  A Variable-Bit-Rate Buried-Data Channel for Compact Disc , 1995 .

[3]  Ahmed H. Tewfik,et al.  Transparent robust image watermarking , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[4]  Bruce Schneier,et al.  Protocol Interactions and the Chosen Protocol Attack , 1997, Security Protocols Workshop.

[5]  Gerhard C. Langelaar,et al.  Copy Protection for Multimedia Data based on Labeling Techniques , 1998 .

[6]  Maurice Maes,et al.  Twin Peaks: The Histogram Attack to Fixed Depth Image Watermarks , 1998, Information Hiding.

[7]  Ross J. Anderson,et al.  Programming Satan's Computer , 1995, Computer Science Today.

[8]  W. J. Dowling,et al.  Watermarking digital images for copyright protection , 1996 .

[9]  Bin Zhu,et al.  Robust data hiding for images , 1996, 1996 IEEE Digital Signal Processing Workshop Proceedings.

[10]  Wendy J. Holmes,et al.  Speech Synthesis and Recognition , 1988 .

[11]  Jean-Paul M. G. Linnartz,et al.  Analysis of the Sensitivity Attack against Electronic Watermarks in Images , 1998, Information Hiding.

[12]  Birgit Pfitzmann,et al.  Information Hiding Terminology - Results of an Informal Plenary Meeting and Additional Proposals , 1996, Information Hiding.

[13]  Thierry Pun,et al.  Secure Copyright Protection Techniques for Digital Images , 1998, Information Hiding.

[14]  Ross J. Anderson Stretching the Limits of Steganography , 1996, Information Hiding.

[15]  Ioannis Pitas,et al.  A method for signature casting on digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[16]  Ingemar J. Cox,et al.  A Secure, Robust Watermark for Multimedia , 1996, Information Hiding.

[17]  Shelby Pereira,et al.  Secure robust digital image watermark , 1998, Other Conferences.

[18]  Eckhard Koch,et al.  Towards Robust and Hidden Image Copyright Labeling , 1995 .

[19]  Pamela Samuelson,et al.  Copyright and digital libraries , 1995, CACM.

[20]  Markus Schneider,et al.  Spatial Data Types for Database Systems , 1997, Lecture Notes in Computer Science.

[21]  Markus G. Kuhn,et al.  Tamper resistance: a cautionary note , 1996 .

[22]  Ross Anderson,et al.  Information hiding terminology , 1996 .

[23]  Ross J. Anderson Why cryptosystems fail , 1993, CCS '93.

[24]  Ross J. Anderson,et al.  On the limits of steganography , 1998, IEEE J. Sel. Areas Commun..

[25]  Bernice E. Rogowitz,et al.  Human Vision and Electronic Imaging II , 1997 .

[26]  M. Yeung,et al.  Can invisible watermarks resolve rightful ownerships? , 1997, Electronic Imaging.

[27]  Christophe De Vleeschouwer,et al.  Low-cost perceptive digital picture watermarking method , 1997, Electronic Imaging.

[28]  Edward J. Delp,et al.  A watermark for digital images , 1996, Proceedings of 3rd IEEE International Conference on Image Processing.

[29]  Ingo Stierand,et al.  Computer Based Steganography: How It Works and Why Therefore Any Restrictions on Cryptography Are Nonsense, at Best , 1996, Information Hiding.

[30]  Jian Zhao,et al.  Embedding Robust Labels into Images for Copyright Protection , 1995, KnowRight.

[31]  Reginald L. Lagendijk,et al.  Robust labeling methods for copy protection of images , 1997, Electronic Imaging.

[32]  Ahmed H. Tewfik,et al.  Digital watermarks for audio signals , 1996, 1996 8th European Signal Processing Conference (EUSIPCO 1996).

[33]  Ting Chen,et al.  Time-scale modification of audio signals with combined harmonic and wavelet representations , 1997, 1997 IEEE International Conference on Acoustics, Speech, and Signal Processing.

[34]  C. F. Osborne,et al.  A digital watermark , 1994, Proceedings of 1st International Conference on Image Processing.

[35]  Michael A. Gerzon,et al.  A High-Rate Buried-Data Channel for Audio CD , 1995 .

[36]  Ingemar J. Cox,et al.  Review of watermarking and the importance of perceptual modeling , 1997, Electronic Imaging.

[37]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[38]  David Aucsmith,et al.  Tamper Resistant Software: An Implementation , 1996, Information Hiding.

[39]  Adrian Perrig,et al.  A Copyright Protection Environment for Digital Images , 1997, Verläßliche IT-Systeme.

[40]  Walter Bender,et al.  Echo Hiding , 1996, Information Hiding.

[41]  B. P. Bogert,et al.  The quefrency analysis of time series for echoes : cepstrum, pseudo-autocovariance, cross-cepstrum and saphe cracking , 1963 .

[42]  Robert A. Scholtz,et al.  The Origins of Spread-Spectrum Communications , 1982, IEEE Trans. Commun..

[43]  Eli Biham Fast software encryption : 4th International Workshop, FSE '97, Haifa, Israel, January 20-22, 1997 : proceedings , 1997, FSE 1997.

[44]  R. Schafer Echo removal by discrete generalized linear filtering. , 1969 .

[45]  Jian Zhao A WWW SERVICE TO EMBED AND PROVE DIGITAL COPYRIGHT WATERMARKS , 1996 .

[46]  John P. Oakley,et al.  Storage and Retrieval for Image and Video Databases , 1993 .

[47]  John McHugh,et al.  A cautionary note on image downgrading , 1992, [1992] Proceedings Eighth Annual Computer Security Application Conference.

[48]  Laurence Boney,et al.  Tewfik and Khaled N. Hamdy, Digital Watermarks for Audio Signals , 1996 .

[49]  Fabien A. P. Petitcolas,et al.  Weakness of existing watermarking schemes , 1997 .

[50]  Birgit Pfitzmann,et al.  Trials of Traced Traitors , 1996, Information Hiding.

[51]  Charalampos Manifavas,et al.  Chameleon - A New Kind of Stream Cipher , 1997, FSE.