Watermarking schemes evaluation

In this article we have used a duality approach to the watermarking evaluation problem by splitting the evaluation criteria into two (independent) groups: functionality and assurance. The first group represents a set of requirements that can be verified using agreed series of tests; the second is a set of levels to which each functionality is evaluated. These levels go from zero or low to very high. We are investigating how evaluation profiles can be defined for different applications and how importance sampling techniques could be used to evaluate the false alarm rate in an automated way.

[1]  Markus G. Kuhn,et al.  Attacks on Copyright Marking Systems , 1998, Information Hiding.

[2]  I.J. Cox,et al.  Watermarking in the real world: an application to DVD , 1999, Conference Record of the Thirty-Third Asilomar Conference on Signals, Systems, and Computers (Cat. No.CH37020).

[3]  Bernd Girod,et al.  Fundamental performance limits of power-spectrum condition-compliant watermarks , 2000, Electronic Imaging.

[4]  Thierry Pun,et al.  Secure Copyright Protection Techniques for Digital Images , 1998, Information Hiding.

[5]  Fabien A. P. Petitcolas,et al.  Fair benchmark for image watermarking systems , 1999, Electronic Imaging.

[6]  Sviatoslav Voloshynovskiy,et al.  Watermark copy attack , 2000, Electronic Imaging.

[7]  Ingemar J. Cox,et al.  Copy protection for DVD video , 1999, Proc. IEEE.

[8]  Dennis G. Abraham,et al.  Transaction Security System , 1991, IBM Syst. J..

[9]  Gordon W. Braudaway,et al.  If one watermark is good, are more better? , 1999, 1999 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings. ICASSP99 (Cat. No.99CH36258).

[10]  Jean-Paul M. G. Linnartz,et al.  Analysis of the Sensitivity Attack against Electronic Watermarks in Images , 1998, Information Hiding.