Abstract
In the last few years, a large number of schemes have been proposed for hiding copyright marks and other information in digital pictures, video, audio and other multimedia objects. We describe some contenders that have appeared in the research literature and in the field; we then present a number of attacks that enable the information hidden by them to be removed or otherwise rendered unusable.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
The first author is grateful to Intel Corporation for financial support under the grant ‘Robustness of Information Hiding Systems’
The third author is supported by a European Commission Marie-Curie grant
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Ross J. Anderson. Why cryptosystems fail. Communications of the ACM, 37(11):32–40, November 1994.
Ross J. Anderson, editor. Information hiding: first international workshop, volume 1174 of Lecture Notes in Computer Science, Isaac Newton Institute, Cambridge, UK, May 1996. Springer-Verlag, Berlin, Germany. ISBN 3-540-61996-8.
Ross J. Anderson. Stretching the limits of steganography. In IH96 [2], pages 39–48. ISBN 3-540-61996-8.
Ross J. Anderson and Markus G. Kuhn. Tamper resistance-A cautionary note. In Second USENIX Workshop on Electronic Commerce, pages 1–11, Oakland, CA, USA, November 1996. ISBN 1-880446-83-9.
Ross J. Anderson and Charalampos Manifavas. Chameleon-a new kind of stream cipher. Fourth Workshop on Fast Software Encryption, 1267:107–113, 1997.
Ross J. Anderson and Roger M. Needham. Programming satan’s computer. In J. van Leeuwen, editor, Computer Science Today-Commemorative Issue, volume 1000 of Lecture Notes in Computer Science, pages 426–441. Springer-Verlag, Berlin, Germany, 1995. ISBN 3-540-60105-8.
Ross J. Anderson and Fabien A.P. Petitcolas. On The Limits of Steganography. IEEE Journal of Selected Areas in Communications, 16(4):474–481, May 1998. Special Issue on Copyright & Privacy Protection. ISSN 0733-8716.
David Aucsmith. Tamper resistant software: An implementation. In Anderson [2], pages 317–333. ISBN 3-540-61996-8.
David Aucsmith, editor. Information Hiding: Second International Workshop, volume 1525 of Lecture Notes in Computer Science, Portland, Oregon, USA, 1998. Springer-Verlag, Berlin, Germany. This volume.
Walter Bender, Daniel Gruhl, and Norishige Morimoto. Techniques for data hiding. In Niblack and Jain [46], pages 164–173.
Walter Bender, Daniel Gruhl, Norishige Morimoto, and Anthony Lu. Techniques for data hiding. IBM Systems Journal, 35(3&4):313–336, 1996.
Anonymous. Learn cracking IV-another weakness of PictureMarc. news:tw.bbs.comp.hacker mirrored on http://www.cl.cam.ac.uk/ fapp2/watermarking/image watermarking/ digimarcficrack.html, August 1997. Includes instructions to override any Digimarc watermark using PictureMarc.
Bruce P. Bogert, M.J.R. Healy, and John W. Tukey. The quefrency alanysis of time series for echoes: Cepstrum, pseudo-autocovariance, cross-ceptstrum and saphe cracking. In M. Rosenblatt, editor, Symposium on Time Series Analysis, pages 209–243, New York, USA, 1963. John Wiley & Sons, Inc.
Laurence Boney, Ahmed H. Tewfik, and Khaled N. Hamdy. Digital watermarks for audio signals. In European Signal Processing Conference, EUSIPCO’ 96, Trieste, Italy, September 1996.
Laurence Boney, Ahmed H. Tewfik, and Khaled N. Hamdy. Digital watermarks for audio signals. In International Conference on Multimedia Computing and Systems, pages 473–480, Hiroshima, Japan, June 1996. IEEE.
Marc Cooperman and Scott A. Moskowitz. Steganographic method and device. US Patent 5,613,004, March 1995.
Ingemar J. Cox, Joe Kilian, Tom Leighton, and Talal Shamoon. A secure, robust watermark for multimedia. In Anderson [2], pages 183–206. ISBN 3-540-61996-8.
Ingemar J. Cox and Matt L. Miller. A review of watermarking and the importance of perceptual modeling. In Bernice E. Rogowitz and Thrasyvoulos N. Pappas, editors, Human Vision and Electrtonic Imaging II, volume 3016, San Jose, CA, USA, February 1997. IS&T, The Society for Imaging Science and Technology and SPIE, The International Society for Optical Engineering, SPIE.
Ingemar J. Cox and Kazuyoshi Tanaka. NEC data hiding proposal. Technical report, NEC Copy Protection Technical Working Group, July 1997. Response to call for proposal issued by the Data Hiding SubGroup.
Scott Craver, Nasir Memon, Boon-Lock Yeo, and Minerva M. Yeung. Can invisible watermark resolve rightful ownerships? In Sethin and Jain [60], pages 310–321.
Scott Craver, Nasir Memon, Boon-Lock Yeo, and Minerva M. Yeung. Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications. IEEE Journal of Selected Areas in Communications, 16(4):573–586, May 1998. Special Issue on Copyright & Privacy Protection. ISSN 0733-8716.
Digimarc home page. http://www.digimarc.com/, April 1997.
Elke Franz, Anja Jerichow, Stefien Möller, Andreas Pfitzmann, and Ingo Stierand. Computer based steganography: how it works and why therefore any restriction on cryptography are nonsense, at best. In Anderson [2], pages 7–21. ISBN 3-540-61996-8.
Michael A. Gerzon and Peter G. Graven. A high-rate buried-data channel for audio CD. Journal of the Audio Engineering Society, 43(1/2):3–22, January/ February 1995.
Franficois Gofin, Jean-Franficois Delaigle, Christophe De Vleeschouwer, Benoit Macq, and Jean-Jacques Quisquater. A low cost perceptive digital picture watermarking method. In Sethin and Jain [60], pages 264–277.
Daniel Gruhl, Walter Bender, and Anthony Lu. Echo hiding. In Anderson [2], pages 295–315. ISBN 3-540-61996-8.
Khaled N. Hamdy, Ahmed H. Tewfik, Ting Chen, and Satoshi Takagi. Time-scale modification of audio signals with combined harmonic and wavelet representations. In International Conference on Acoustics, Speech and Signal Processing-ICASSP’ 97, volume 1, pages 439–442, Munich, Germany, April 1997. IEEE, IEEE Press. Session on Hearing Aids and Computer Music.
Alexander Herrigel, Adrian Perrig, and Joseph J.K. ó Ruanaidh. A copyright protection environment for digital images. In VerlÄfiliche IT-Systeme’ 97, Albert-Ludwigs UniversitÄt, Freiburg, Germany, October 1997.
Alexander Herrigel, Joseph J.K. ó Ruanaidh, Holger Petersen, Shelby Pereira, and Thierry Pun. Secure copyright protection techniques for digital images. In Aucsmith [9], pages 170–191. This volume.
J.N. Holmes. Speech Synthesis and Recognition, chapter 3.6 Analysis of simple and complex signals, pages 47–48. Aspects of Information Technology. Chapman & Hall, London, UK, 1988.
International Electrotechnical Commission, Geneva, Switzerland. Digital audio interface, IEC 60958, February 1989.
Alastair Kelman. Electronic copyright management-the way ahead. Security Seminars, University of Cambridge, February 1997.
A. Kerckhofis. La Cryptographie Militaire. Journal des Sciences Militaires, 9:5–38, January 1883.
E. Koch and J. Zhao. Towards robust and hidden image copyright labeling. In Workshop on Nonlinear Signal and Image Processing, pages 452–455, Neos Marmaras, Greece, June 1995. IEEE.
Markus G. Kuhn and Fabien A.P. Petitcolas. StirMark. http://www.cl.cam.ac.uk/fapp2/watermarking/stirmark/, November 1997.
Charles Kurak and John McHugh. A cautionary note on image downgrading. In Computer Security Applications Conference, pages 153–159, San Antonio, TX, USA, December 1992.
Gerrit C. Langelaar, Jan C.A van der Lubbe, and J. Biemond. Copy protection for multimedia data based on labeling techniques. In 17th Symposium on Information Theory in the Benelux, Enschede, The Netherlands, May 1996.
Gerrit C. Langelaar, Jan C.A. van derLubbe, and Reginald L. Lagendijk. Robust labeling methods for copy protection of images. In Sethin and Jain [60], pages 298–309.
Jean-Paul M.G. Linnartz and Marten van Dijk. Analysis of the sensitivity attack against electronic watermarks in images. In Aucsmith [9], pages 258–272. This volume.
Mark Lomas, Bruno Crispo, Bruce Christianson, and Mike Roe, editors. Security Protocols: Proceeding of the 5th International Workshop, volume 1361 of Lecture Notes in Computer Science, école Normale Supérieure, Paris, France, April 1997. University of Cambridge, Isaac Newton Institute, Springer-Verlag, Berlin, Germany. ISBN 3-540-64040-1.
Alpha Tec Ltd. Eikonamark. http://www.generation.net/pitas/sign.html, October 1997.
Maurice Maes. Twin peaks: The histogram attack on fixed depth image watermarks. In Aucsmith [9], pages 290–305. This volume.
Kineo Matsui and Kiyoshi Tanaka. Video-steganography: How to secretly embed a signature in a picture. Journal of the Interactive Multimedia Association Intellectual Property Project, 1(1):187–205, January 1994.
Norishige Morimoto and Daniel Sullivan. IBM DataHiding proposal. Technical report, IBM Corporation, September 1997. Response to call for proposal issued by the Data Hiding SubGroup.
Peter Nancarrow. Digital technology-Bane or boon for copyright? Computer Laboratory Seminars, University of Cambridge, November 1997.
Wayne Niblack and Ramesh C. Jain, editors. Storage and Retrieval for Image and Video Database III, volume 2420, San Jose, California, USA, February 1995. IS&T, The Society for Imaging Science and Technology and SPIE, The International Society for Optical Engineering, SPIE.
J.J.K. ó Ruanaidh, W.J. Dowling, and F.M. Boland. Watermarking digital images for copyright protection. IEE Proceedings on Vision, Signal and Image Processing, 143(4):250–256, August 1996.
International Federation of the Phonographic Industry. Request for proposals-Embedded signalling systems issue 1.0. 54 Regent Street, London W1R 5PJ, June 1997.
Alan V. Oppenheim and Ronald W. Schafer. Discrete-Time Signal Processing, chapter 12, pages 768–834. Prentice-Hall International, Inc., Englewood Clifis, NJ, USA, international edition, 1989. ISBN 0-13-216771-9.
Adrian Perrig. A copyright protection environment for digital images. Diploma dissertation, école Polytechnique Ffiedfierale de Lausanne, Lausanne, Switzerland, February 1997.
Fabien A.P. Petitcolas. Weakness of existing watermarking schemes. http://www.cl.cam.ac.uk/fapp2/watermarking/image.watermarking/, October 1997.
Birgit Pfitzmann. Information hiding terminology. In Anderson [2], pages 347–350. Results of an informal plenary meeting and additional proposals.
I. Pitas. A method for signature casting on digital images. In International Conference on Image Processing, volume 3, pages 215–218, September 1996.
Geoffrey B. Rhoads. Steganography methods employing embedded calibration data. US Patent 5,636,292, June 1997.
Joseph J.K. ó Ruanaidh and Shelby Pereira. A secure robust digital image watermark. In International Symposium on Advanced Imaging and Network Technologies-Conference on Electronic Imaging: Processing, Printing and Publishing in Colour, Europto, Zürich, Switzerland, May 1998. International Society for Optical Engineering, European Optical Society, Commission of the European Union, Directorate General XII.
Pamela Samuelson. Copyright and digital libraries. Communications of the ACM, 38(4):15–21, 110, April 1995.
Ronald W. Schafer. Echo removal by discrete generalized linear filtering. Technical Report 466, Massachusetts Institute of Technology, February 1969.
Bruce Schneier. Protocol interactions and the chosen protocol attack. In Lomas et al. [40], pages 91–104. ISBN 3-540-64040-1.
Robert A. Scholtz. The origins of spread-spectrum communications. IEEE Transactions on Communications, 30(5):822–853, May 1982.
Ishwar K. Sethin and Ramesh C. Jain, editors. Storage and Retrieval for Image and Video Database V, volume 3022, San Jose, CA, USA, February 1997. IS&T, The Society for Imaging Science and Technology and SPIE, The International Society for Optical Engineering, SPIE.
Signum Technologies SureSign digital fingerprinting. http://www.signumtech.com/, October 1997.
Mitchell D. Swanson, Bin Zhu, and Ahmed H. Tewfik. Robust data hiding for images. In 7th Digital Signal Processing Workshop (DSP 96), pages 37–40, Loen, Norway, September 1996. IEEE.
Mitchell D. Swanson, Bin Zhu, and Ahmed H. Tewfik. Transparent robust image watermarking. In International Conference on Image Processing, volume III, pages 211–214. IEEE, 1996.
A.Z. Tirkel, G.A. Rankin, R.M. van Schyndel, W.J. Ho, N.R.A. Mee, and C.F. Osborne. Electronic watermark. In Digital Image Computing, Technology and Applications-DICTA’ 93, pages 666–673, Macquarie University, Sidney, 1993.
R.G. van Schyndel, A.Z. Tirkel, and C.F. Osborne. A digital watermark. In International Conference on Image Processing, volume 2, pages 86–90, Austin, Texas, USA, 1994. IEEE.
Georges Van Slype. Natural language version of the generic CITED model-ECMS (Electronic Copyright Management System) design for computer based applications. Report 2, European Commission, ESPRIT II Project, Bureau Vam Dijk, Brussel, Belgium, May 1995.
Georges Van Slype. Natural language version of the generic CITED model-Presentation of the generic model. Report 1, European Commission, ESPRIT II Project, Bureau Vam Dijk, Brussel, Belgium, May 1995.
A. Werner, J. Oomen, Marc E. Groenewegen, Robbert G. van der Waal, and Raymond N.J. Veldhuis. A variable-bit-rate buried-data channel for compact disc. Journal of the Audio Engineering Society, 43(1/2):23–28, January/February 1995.
The Working Group on Intellectual Property Rights is part of the US Information Infrastructure Task Force, formed in February 1993.
Raymond B.Wolfgang and Edward J. Delp. A watermark for digital images. In International Conference on Images Processing, pages 219–222, Lausanne, Switzerland, September 1996. IEEE.
Raymond B. Wolfgang and Edward J. Delp. A watermarking technique for digital imagery: further studies. In International Conference on Imaging, Systems, and Technology, pages 279–287, Las Vegas, NV, USA, June 30–July 3 1997. IEEE.
J. Zhao and E. Koch. Embedding robust labels into images for copyright protection. In International Congress on Intellectual Property Rights for Specialised Information, Knowledge and New Technologies, Vienna, Austria, August 1995.
Jian Zhao. A WWW service to embed and prove digital copyright watermarks. In European Conference on Multimedia Applications, Services and Techniques, pages 695–710, Louvain-la-Neuve, Belgium, May 1996.
Jian Zhao. The syscop home page. http://www.syscop.igd.fhg.de/ or or http://www.crcg.edu/syscop/, February 1997.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G. (1998). Attacks on Copyright Marking Systems. In: Aucsmith, D. (eds) Information Hiding. IH 1998. Lecture Notes in Computer Science, vol 1525. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49380-8_16
Download citation
DOI: https://doi.org/10.1007/3-540-49380-8_16
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65386-8
Online ISBN: 978-3-540-49380-8
eBook Packages: Springer Book Archive