Advertisement

Attacks on Copyright Marking Systems

  • Fabien A. P. Petitcolas
  • Ross J. Anderson
  • Markus G. Kuhn
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1525)

Abstract

In the last few years, a large number of schemes have been proposed for hiding copyright marks and other information in digital pictures, video, audio and other multimedia objects. We describe some contenders that have appeared in the research literature and in the field; we then present a number of attacks that enable the information hidden by them to be removed or otherwise rendered unusable.

Keywords

Watermark Image Audio Signal Secret Message Watermark Scheme Stream Cipher 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    Ross J. Anderson. Why cryptosystems fail. Communications of the ACM, 37(11):32–40, November 1994.Google Scholar
  2. [2]
    Ross J. Anderson, editor. Information hiding: first international workshop, volume 1174 of Lecture Notes in Computer Science, Isaac Newton Institute, Cambridge, UK, May 1996. Springer-Verlag, Berlin, Germany. ISBN 3-540-61996-8.Google Scholar
  3. [3]
    Ross J. Anderson. Stretching the limits of steganography. In IH96 [2], pages 39–48. ISBN 3-540-61996-8.CrossRefGoogle Scholar
  4. [4]
    Ross J. Anderson and Markus G. Kuhn. Tamper resistance-A cautionary note. In Second USENIX Workshop on Electronic Commerce, pages 1–11, Oakland, CA, USA, November 1996. ISBN 1-880446-83-9.Google Scholar
  5. [5]
    Ross J. Anderson and Charalampos Manifavas. Chameleon-a new kind of stream cipher. Fourth Workshop on Fast Software Encryption, 1267:107–113, 1997.CrossRefGoogle Scholar
  6. [6]
    Ross J. Anderson and Roger M. Needham. Programming satan’s computer. In J. van Leeuwen, editor, Computer Science Today-Commemorative Issue, volume 1000 of Lecture Notes in Computer Science, pages 426–441. Springer-Verlag, Berlin, Germany, 1995. ISBN 3-540-60105-8.CrossRefGoogle Scholar
  7. [7]
    Ross J. Anderson and Fabien A.P. Petitcolas. On The Limits of Steganography. IEEE Journal of Selected Areas in Communications, 16(4):474–481, May 1998. Special Issue on Copyright & Privacy Protection. ISSN 0733-8716.Google Scholar
  8. [8]
    David Aucsmith. Tamper resistant software: An implementation. In Anderson [2], pages 317–333. ISBN 3-540-61996-8.CrossRefGoogle Scholar
  9. [9]
    David Aucsmith, editor. Information Hiding: Second International Workshop, volume 1525 of Lecture Notes in Computer Science, Portland, Oregon, USA, 1998. Springer-Verlag, Berlin, Germany. This volume.Google Scholar
  10. [10]
    Walter Bender, Daniel Gruhl, and Norishige Morimoto. Techniques for data hiding. In Niblack and Jain [46], pages 164–173.Google Scholar
  11. [11]
    Walter Bender, Daniel Gruhl, Norishige Morimoto, and Anthony Lu. Techniques for data hiding. IBM Systems Journal, 35(3&4):313–336, 1996.CrossRefGoogle Scholar
  12. [12]
    Anonymous. Learn cracking IV-another weakness of PictureMarc. news:tw.bbs.comp.hacker mirrored on http://www.cl.cam.ac.uk/ fapp2/watermarking/image watermarking/ digimarcficrack.html, August 1997. Includes instructions to override any Digimarc watermark using PictureMarc.Google Scholar
  13. [13]
    Bruce P. Bogert, M.J.R. Healy, and John W. Tukey. The quefrency alanysis of time series for echoes: Cepstrum, pseudo-autocovariance, cross-ceptstrum and saphe cracking. In M. Rosenblatt, editor, Symposium on Time Series Analysis, pages 209–243, New York, USA, 1963. John Wiley & Sons, Inc.Google Scholar
  14. [14]
    Laurence Boney, Ahmed H. Tewfik, and Khaled N. Hamdy. Digital watermarks for audio signals. In European Signal Processing Conference, EUSIPCO’ 96, Trieste, Italy, September 1996.Google Scholar
  15. [15]
    Laurence Boney, Ahmed H. Tewfik, and Khaled N. Hamdy. Digital watermarks for audio signals. In International Conference on Multimedia Computing and Systems, pages 473–480, Hiroshima, Japan, June 1996. IEEE.Google Scholar
  16. [16]
    Marc Cooperman and Scott A. Moskowitz. Steganographic method and device. US Patent 5,613,004, March 1995.Google Scholar
  17. [17]
    Ingemar J. Cox, Joe Kilian, Tom Leighton, and Talal Shamoon. A secure, robust watermark for multimedia. In Anderson [2], pages 183–206. ISBN 3-540-61996-8.CrossRefGoogle Scholar
  18. [18]
    Ingemar J. Cox and Matt L. Miller. A review of watermarking and the importance of perceptual modeling. In Bernice E. Rogowitz and Thrasyvoulos N. Pappas, editors, Human Vision and Electrtonic Imaging II, volume 3016, San Jose, CA, USA, February 1997. IS&T, The Society for Imaging Science and Technology and SPIE, The International Society for Optical Engineering, SPIE.Google Scholar
  19. [19]
    Ingemar J. Cox and Kazuyoshi Tanaka. NEC data hiding proposal. Technical report, NEC Copy Protection Technical Working Group, July 1997. Response to call for proposal issued by the Data Hiding SubGroup.Google Scholar
  20. [20]
    Scott Craver, Nasir Memon, Boon-Lock Yeo, and Minerva M. Yeung. Can invisible watermark resolve rightful ownerships? In Sethin and Jain [60], pages 310–321.Google Scholar
  21. [21]
    Scott Craver, Nasir Memon, Boon-Lock Yeo, and Minerva M. Yeung. Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications. IEEE Journal of Selected Areas in Communications, 16(4):573–586, May 1998. Special Issue on Copyright & Privacy Protection. ISSN 0733-8716.Google Scholar
  22. [22]
    Digimarc home page. http://www.digimarc.com/, April 1997.
  23. [23]
    Elke Franz, Anja Jerichow, Stefien Möller, Andreas Pfitzmann, and Ingo Stierand. Computer based steganography: how it works and why therefore any restriction on cryptography are nonsense, at best. In Anderson [2], pages 7–21. ISBN 3-540-61996-8.CrossRefGoogle Scholar
  24. [24]
    Michael A. Gerzon and Peter G. Graven. A high-rate buried-data channel for audio CD. Journal of the Audio Engineering Society, 43(1/2):3–22, January/ February 1995.Google Scholar
  25. [25]
    Franficois Gofin, Jean-Franficois Delaigle, Christophe De Vleeschouwer, Benoit Macq, and Jean-Jacques Quisquater. A low cost perceptive digital picture watermarking method. In Sethin and Jain [60], pages 264–277.Google Scholar
  26. [26]
    Daniel Gruhl, Walter Bender, and Anthony Lu. Echo hiding. In Anderson [2], pages 295–315. ISBN 3-540-61996-8.CrossRefGoogle Scholar
  27. [27]
    Khaled N. Hamdy, Ahmed H. Tewfik, Ting Chen, and Satoshi Takagi. Time-scale modification of audio signals with combined harmonic and wavelet representations. In International Conference on Acoustics, Speech and Signal Processing-ICASSP’ 97, volume 1, pages 439–442, Munich, Germany, April 1997. IEEE, IEEE Press. Session on Hearing Aids and Computer Music.Google Scholar
  28. [28]
    Alexander Herrigel, Adrian Perrig, and Joseph J.K. ó Ruanaidh. A copyright protection environment for digital images. In VerlÄfiliche IT-Systeme’ 97, Albert-Ludwigs UniversitÄt, Freiburg, Germany, October 1997.Google Scholar
  29. [29]
    Alexander Herrigel, Joseph J.K. ó Ruanaidh, Holger Petersen, Shelby Pereira, and Thierry Pun. Secure copyright protection techniques for digital images. In Aucsmith [9], pages 170–191. This volume.CrossRefGoogle Scholar
  30. [30]
    J.N. Holmes. Speech Synthesis and Recognition, chapter 3.6 Analysis of simple and complex signals, pages 47–48. Aspects of Information Technology. Chapman & Hall, London, UK, 1988.Google Scholar
  31. [31]
    International Electrotechnical Commission, Geneva, Switzerland. Digital audio interface, IEC 60958, February 1989.Google Scholar
  32. [32]
    Alastair Kelman. Electronic copyright management-the way ahead. Security Seminars, University of Cambridge, February 1997.Google Scholar
  33. [33]
    A. Kerckhofis. La Cryptographie Militaire. Journal des Sciences Militaires, 9:5–38, January 1883.Google Scholar
  34. [34]
    E. Koch and J. Zhao. Towards robust and hidden image copyright labeling. In Workshop on Nonlinear Signal and Image Processing, pages 452–455, Neos Marmaras, Greece, June 1995. IEEE.Google Scholar
  35. [35]
    Markus G. Kuhn and Fabien A.P. Petitcolas. StirMark. http://www.cl.cam.ac.uk/fapp2/watermarking/stirmark/, November 1997.
  36. [36]
    Charles Kurak and John McHugh. A cautionary note on image downgrading. In Computer Security Applications Conference, pages 153–159, San Antonio, TX, USA, December 1992.Google Scholar
  37. [37]
    Gerrit C. Langelaar, Jan C.A van der Lubbe, and J. Biemond. Copy protection for multimedia data based on labeling techniques. In 17th Symposium on Information Theory in the Benelux, Enschede, The Netherlands, May 1996.Google Scholar
  38. [38]
    Gerrit C. Langelaar, Jan C.A. van derLubbe, and Reginald L. Lagendijk. Robust labeling methods for copy protection of images. In Sethin and Jain [60], pages 298–309.Google Scholar
  39. [39]
    Jean-Paul M.G. Linnartz and Marten van Dijk. Analysis of the sensitivity attack against electronic watermarks in images. In Aucsmith [9], pages 258–272. This volume.CrossRefGoogle Scholar
  40. [40]
    Mark Lomas, Bruno Crispo, Bruce Christianson, and Mike Roe, editors. Security Protocols: Proceeding of the 5th International Workshop, volume 1361 of Lecture Notes in Computer Science, école Normale Supérieure, Paris, France, April 1997. University of Cambridge, Isaac Newton Institute, Springer-Verlag, Berlin, Germany. ISBN 3-540-64040-1.Google Scholar
  41. [41]
    Alpha Tec Ltd. Eikonamark. http://www.generation.net/pitas/sign.html, October 1997.
  42. [42]
    Maurice Maes. Twin peaks: The histogram attack on fixed depth image watermarks. In Aucsmith [9], pages 290–305. This volume.CrossRefGoogle Scholar
  43. [43]
    Kineo Matsui and Kiyoshi Tanaka. Video-steganography: How to secretly embed a signature in a picture. Journal of the Interactive Multimedia Association Intellectual Property Project, 1(1):187–205, January 1994.Google Scholar
  44. [44]
    Norishige Morimoto and Daniel Sullivan. IBM DataHiding proposal. Technical report, IBM Corporation, September 1997. Response to call for proposal issued by the Data Hiding SubGroup.Google Scholar
  45. [45]
    Peter Nancarrow. Digital technology-Bane or boon for copyright? Computer Laboratory Seminars, University of Cambridge, November 1997.Google Scholar
  46. [46]
    Wayne Niblack and Ramesh C. Jain, editors. Storage and Retrieval for Image and Video Database III, volume 2420, San Jose, California, USA, February 1995. IS&T, The Society for Imaging Science and Technology and SPIE, The International Society for Optical Engineering, SPIE.Google Scholar
  47. [47]
    J.J.K. ó Ruanaidh, W.J. Dowling, and F.M. Boland. Watermarking digital images for copyright protection. IEE Proceedings on Vision, Signal and Image Processing, 143(4):250–256, August 1996.Google Scholar
  48. [48]
    International Federation of the Phonographic Industry. Request for proposals-Embedded signalling systems issue 1.0. 54 Regent Street, London W1R 5PJ, June 1997.Google Scholar
  49. [49]
    Alan V. Oppenheim and Ronald W. Schafer. Discrete-Time Signal Processing, chapter 12, pages 768–834. Prentice-Hall International, Inc., Englewood Clifis, NJ, USA, international edition, 1989. ISBN 0-13-216771-9.zbMATHGoogle Scholar
  50. [50]
    Adrian Perrig. A copyright protection environment for digital images. Diploma dissertation, école Polytechnique Ffiedfierale de Lausanne, Lausanne, Switzerland, February 1997.Google Scholar
  51. [51]
    Fabien A.P. Petitcolas. Weakness of existing watermarking schemes. http://www.cl.cam.ac.uk/fapp2/watermarking/image.watermarking/, October 1997.
  52. [52]
    Birgit Pfitzmann. Information hiding terminology. In Anderson [2], pages 347–350. Results of an informal plenary meeting and additional proposals.CrossRefGoogle Scholar
  53. [53]
    I. Pitas. A method for signature casting on digital images. In International Conference on Image Processing, volume 3, pages 215–218, September 1996.Google Scholar
  54. [54]
    Geoffrey B. Rhoads. Steganography methods employing embedded calibration data. US Patent 5,636,292, June 1997.Google Scholar
  55. [55]
    Joseph J.K. ó Ruanaidh and Shelby Pereira. A secure robust digital image watermark. In International Symposium on Advanced Imaging and Network Technologies-Conference on Electronic Imaging: Processing, Printing and Publishing in Colour, Europto, Zürich, Switzerland, May 1998. International Society for Optical Engineering, European Optical Society, Commission of the European Union, Directorate General XII.Google Scholar
  56. [56]
    Pamela Samuelson. Copyright and digital libraries. Communications of the ACM, 38(4):15–21, 110, April 1995.Google Scholar
  57. [57]
    Ronald W. Schafer. Echo removal by discrete generalized linear filtering. Technical Report 466, Massachusetts Institute of Technology, February 1969.Google Scholar
  58. [58]
    Bruce Schneier. Protocol interactions and the chosen protocol attack. In Lomas et al. [40], pages 91–104. ISBN 3-540-64040-1.Google Scholar
  59. [59]
    Robert A. Scholtz. The origins of spread-spectrum communications. IEEE Transactions on Communications, 30(5):822–853, May 1982.Google Scholar
  60. [60]
    Ishwar K. Sethin and Ramesh C. Jain, editors. Storage and Retrieval for Image and Video Database V, volume 3022, San Jose, CA, USA, February 1997. IS&T, The Society for Imaging Science and Technology and SPIE, The International Society for Optical Engineering, SPIE.Google Scholar
  61. [61]
    Signum Technologies SureSign digital fingerprinting. http://www.signumtech.com/, October 1997.
  62. [62]
    Mitchell D. Swanson, Bin Zhu, and Ahmed H. Tewfik. Robust data hiding for images. In 7th Digital Signal Processing Workshop (DSP 96), pages 37–40, Loen, Norway, September 1996. IEEE.Google Scholar
  63. [63]
    Mitchell D. Swanson, Bin Zhu, and Ahmed H. Tewfik. Transparent robust image watermarking. In International Conference on Image Processing, volume III, pages 211–214. IEEE, 1996.CrossRefGoogle Scholar
  64. [64]
    A.Z. Tirkel, G.A. Rankin, R.M. van Schyndel, W.J. Ho, N.R.A. Mee, and C.F. Osborne. Electronic watermark. In Digital Image Computing, Technology and Applications-DICTA’ 93, pages 666–673, Macquarie University, Sidney, 1993.Google Scholar
  65. [65]
    R.G. van Schyndel, A.Z. Tirkel, and C.F. Osborne. A digital watermark. In International Conference on Image Processing, volume 2, pages 86–90, Austin, Texas, USA, 1994. IEEE.CrossRefGoogle Scholar
  66. [66]
    Georges Van Slype. Natural language version of the generic CITED model-ECMS (Electronic Copyright Management System) design for computer based applications. Report 2, European Commission, ESPRIT II Project, Bureau Vam Dijk, Brussel, Belgium, May 1995.Google Scholar
  67. [67]
    Georges Van Slype. Natural language version of the generic CITED model-Presentation of the generic model. Report 1, European Commission, ESPRIT II Project, Bureau Vam Dijk, Brussel, Belgium, May 1995.Google Scholar
  68. [68]
    A. Werner, J. Oomen, Marc E. Groenewegen, Robbert G. van der Waal, and Raymond N.J. Veldhuis. A variable-bit-rate buried-data channel for compact disc. Journal of the Audio Engineering Society, 43(1/2):23–28, January/February 1995.Google Scholar
  69. [69]
    The Working Group on Intellectual Property Rights is part of the US Information Infrastructure Task Force, formed in February 1993.Google Scholar
  70. [70]
    Raymond B.Wolfgang and Edward J. Delp. A watermark for digital images. In International Conference on Images Processing, pages 219–222, Lausanne, Switzerland, September 1996. IEEE.Google Scholar
  71. [71]
    Raymond B. Wolfgang and Edward J. Delp. A watermarking technique for digital imagery: further studies. In International Conference on Imaging, Systems, and Technology, pages 279–287, Las Vegas, NV, USA, June 30–July 3 1997. IEEE.Google Scholar
  72. [72]
    J. Zhao and E. Koch. Embedding robust labels into images for copyright protection. In International Congress on Intellectual Property Rights for Specialised Information, Knowledge and New Technologies, Vienna, Austria, August 1995.Google Scholar
  73. [73]
    Jian Zhao. A WWW service to embed and prove digital copyright watermarks. In European Conference on Multimedia Applications, Services and Techniques, pages 695–710, Louvain-la-Neuve, Belgium, May 1996.Google Scholar
  74. [74]
    Jian Zhao. The syscop home page. http://www.syscop.igd.fhg.de/ or or http://www.crcg.edu/syscop/, February 1997.

Copyright information

© Springer-Verlag Berlin Heidelberg 1998

Authors and Affiliations

  • Fabien A. P. Petitcolas
    • 1
  • Ross J. Anderson
    • 1
  • Markus G. Kuhn
    • 1
  1. 1.Computer LaboratoryUniversity of CambridgeCambridgeUK

Personalised recommendations