Skip to main content

Attacks on Copyright Marking Systems

  • Conference paper
  • First Online:
Information Hiding (IH 1998)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1525))

Included in the following conference series:

Abstract

In the last few years, a large number of schemes have been proposed for hiding copyright marks and other information in digital pictures, video, audio and other multimedia objects. We describe some contenders that have appeared in the research literature and in the field; we then present a number of attacks that enable the information hidden by them to be removed or otherwise rendered unusable.

The first author is grateful to Intel Corporation for financial support under the grant ‘Robustness of Information Hiding Systems’

The third author is supported by a European Commission Marie-Curie grant

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ross J. Anderson. Why cryptosystems fail. Communications of the ACM, 37(11):32–40, November 1994.

    Google Scholar 

  2. Ross J. Anderson, editor. Information hiding: first international workshop, volume 1174 of Lecture Notes in Computer Science, Isaac Newton Institute, Cambridge, UK, May 1996. Springer-Verlag, Berlin, Germany. ISBN 3-540-61996-8.

    Google Scholar 

  3. Ross J. Anderson. Stretching the limits of steganography. In IH96 [2], pages 39–48. ISBN 3-540-61996-8.

    Chapter  Google Scholar 

  4. Ross J. Anderson and Markus G. Kuhn. Tamper resistance-A cautionary note. In Second USENIX Workshop on Electronic Commerce, pages 1–11, Oakland, CA, USA, November 1996. ISBN 1-880446-83-9.

    Google Scholar 

  5. Ross J. Anderson and Charalampos Manifavas. Chameleon-a new kind of stream cipher. Fourth Workshop on Fast Software Encryption, 1267:107–113, 1997.

    Article  Google Scholar 

  6. Ross J. Anderson and Roger M. Needham. Programming satan’s computer. In J. van Leeuwen, editor, Computer Science Today-Commemorative Issue, volume 1000 of Lecture Notes in Computer Science, pages 426–441. Springer-Verlag, Berlin, Germany, 1995. ISBN 3-540-60105-8.

    Chapter  Google Scholar 

  7. Ross J. Anderson and Fabien A.P. Petitcolas. On The Limits of Steganography. IEEE Journal of Selected Areas in Communications, 16(4):474–481, May 1998. Special Issue on Copyright & Privacy Protection. ISSN 0733-8716.

    Google Scholar 

  8. David Aucsmith. Tamper resistant software: An implementation. In Anderson [2], pages 317–333. ISBN 3-540-61996-8.

    Chapter  Google Scholar 

  9. David Aucsmith, editor. Information Hiding: Second International Workshop, volume 1525 of Lecture Notes in Computer Science, Portland, Oregon, USA, 1998. Springer-Verlag, Berlin, Germany. This volume.

    Google Scholar 

  10. Walter Bender, Daniel Gruhl, and Norishige Morimoto. Techniques for data hiding. In Niblack and Jain [46], pages 164–173.

    Google Scholar 

  11. Walter Bender, Daniel Gruhl, Norishige Morimoto, and Anthony Lu. Techniques for data hiding. IBM Systems Journal, 35(3&4):313–336, 1996.

    Article  Google Scholar 

  12. Anonymous. Learn cracking IV-another weakness of PictureMarc. news:tw.bbs.comp.hacker mirrored on http://www.cl.cam.ac.uk/ fapp2/watermarking/image watermarking/ digimarcficrack.html, August 1997. Includes instructions to override any Digimarc watermark using PictureMarc.

    Google Scholar 

  13. Bruce P. Bogert, M.J.R. Healy, and John W. Tukey. The quefrency alanysis of time series for echoes: Cepstrum, pseudo-autocovariance, cross-ceptstrum and saphe cracking. In M. Rosenblatt, editor, Symposium on Time Series Analysis, pages 209–243, New York, USA, 1963. John Wiley & Sons, Inc.

    Google Scholar 

  14. Laurence Boney, Ahmed H. Tewfik, and Khaled N. Hamdy. Digital watermarks for audio signals. In European Signal Processing Conference, EUSIPCO’ 96, Trieste, Italy, September 1996.

    Google Scholar 

  15. Laurence Boney, Ahmed H. Tewfik, and Khaled N. Hamdy. Digital watermarks for audio signals. In International Conference on Multimedia Computing and Systems, pages 473–480, Hiroshima, Japan, June 1996. IEEE.

    Google Scholar 

  16. Marc Cooperman and Scott A. Moskowitz. Steganographic method and device. US Patent 5,613,004, March 1995.

    Google Scholar 

  17. Ingemar J. Cox, Joe Kilian, Tom Leighton, and Talal Shamoon. A secure, robust watermark for multimedia. In Anderson [2], pages 183–206. ISBN 3-540-61996-8.

    Chapter  Google Scholar 

  18. Ingemar J. Cox and Matt L. Miller. A review of watermarking and the importance of perceptual modeling. In Bernice E. Rogowitz and Thrasyvoulos N. Pappas, editors, Human Vision and Electrtonic Imaging II, volume 3016, San Jose, CA, USA, February 1997. IS&T, The Society for Imaging Science and Technology and SPIE, The International Society for Optical Engineering, SPIE.

    Google Scholar 

  19. Ingemar J. Cox and Kazuyoshi Tanaka. NEC data hiding proposal. Technical report, NEC Copy Protection Technical Working Group, July 1997. Response to call for proposal issued by the Data Hiding SubGroup.

    Google Scholar 

  20. Scott Craver, Nasir Memon, Boon-Lock Yeo, and Minerva M. Yeung. Can invisible watermark resolve rightful ownerships? In Sethin and Jain [60], pages 310–321.

    Google Scholar 

  21. Scott Craver, Nasir Memon, Boon-Lock Yeo, and Minerva M. Yeung. Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications. IEEE Journal of Selected Areas in Communications, 16(4):573–586, May 1998. Special Issue on Copyright & Privacy Protection. ISSN 0733-8716.

    Google Scholar 

  22. Digimarc home page. http://www.digimarc.com/, April 1997.

  23. Elke Franz, Anja Jerichow, Stefien Möller, Andreas Pfitzmann, and Ingo Stierand. Computer based steganography: how it works and why therefore any restriction on cryptography are nonsense, at best. In Anderson [2], pages 7–21. ISBN 3-540-61996-8.

    Chapter  Google Scholar 

  24. Michael A. Gerzon and Peter G. Graven. A high-rate buried-data channel for audio CD. Journal of the Audio Engineering Society, 43(1/2):3–22, January/ February 1995.

    Google Scholar 

  25. Franficois Gofin, Jean-Franficois Delaigle, Christophe De Vleeschouwer, Benoit Macq, and Jean-Jacques Quisquater. A low cost perceptive digital picture watermarking method. In Sethin and Jain [60], pages 264–277.

    Google Scholar 

  26. Daniel Gruhl, Walter Bender, and Anthony Lu. Echo hiding. In Anderson [2], pages 295–315. ISBN 3-540-61996-8.

    Chapter  Google Scholar 

  27. Khaled N. Hamdy, Ahmed H. Tewfik, Ting Chen, and Satoshi Takagi. Time-scale modification of audio signals with combined harmonic and wavelet representations. In International Conference on Acoustics, Speech and Signal Processing-ICASSP’ 97, volume 1, pages 439–442, Munich, Germany, April 1997. IEEE, IEEE Press. Session on Hearing Aids and Computer Music.

    Google Scholar 

  28. Alexander Herrigel, Adrian Perrig, and Joseph J.K. ó Ruanaidh. A copyright protection environment for digital images. In VerlÄfiliche IT-Systeme’ 97, Albert-Ludwigs UniversitÄt, Freiburg, Germany, October 1997.

    Google Scholar 

  29. Alexander Herrigel, Joseph J.K. ó Ruanaidh, Holger Petersen, Shelby Pereira, and Thierry Pun. Secure copyright protection techniques for digital images. In Aucsmith [9], pages 170–191. This volume.

    Chapter  Google Scholar 

  30. J.N. Holmes. Speech Synthesis and Recognition, chapter 3.6 Analysis of simple and complex signals, pages 47–48. Aspects of Information Technology. Chapman & Hall, London, UK, 1988.

    Google Scholar 

  31. International Electrotechnical Commission, Geneva, Switzerland. Digital audio interface, IEC 60958, February 1989.

    Google Scholar 

  32. Alastair Kelman. Electronic copyright management-the way ahead. Security Seminars, University of Cambridge, February 1997.

    Google Scholar 

  33. A. Kerckhofis. La Cryptographie Militaire. Journal des Sciences Militaires, 9:5–38, January 1883.

    Google Scholar 

  34. E. Koch and J. Zhao. Towards robust and hidden image copyright labeling. In Workshop on Nonlinear Signal and Image Processing, pages 452–455, Neos Marmaras, Greece, June 1995. IEEE.

    Google Scholar 

  35. Markus G. Kuhn and Fabien A.P. Petitcolas. StirMark. http://www.cl.cam.ac.uk/fapp2/watermarking/stirmark/, November 1997.

  36. Charles Kurak and John McHugh. A cautionary note on image downgrading. In Computer Security Applications Conference, pages 153–159, San Antonio, TX, USA, December 1992.

    Google Scholar 

  37. Gerrit C. Langelaar, Jan C.A van der Lubbe, and J. Biemond. Copy protection for multimedia data based on labeling techniques. In 17th Symposium on Information Theory in the Benelux, Enschede, The Netherlands, May 1996.

    Google Scholar 

  38. Gerrit C. Langelaar, Jan C.A. van derLubbe, and Reginald L. Lagendijk. Robust labeling methods for copy protection of images. In Sethin and Jain [60], pages 298–309.

    Google Scholar 

  39. Jean-Paul M.G. Linnartz and Marten van Dijk. Analysis of the sensitivity attack against electronic watermarks in images. In Aucsmith [9], pages 258–272. This volume.

    Chapter  Google Scholar 

  40. Mark Lomas, Bruno Crispo, Bruce Christianson, and Mike Roe, editors. Security Protocols: Proceeding of the 5th International Workshop, volume 1361 of Lecture Notes in Computer Science, école Normale Supérieure, Paris, France, April 1997. University of Cambridge, Isaac Newton Institute, Springer-Verlag, Berlin, Germany. ISBN 3-540-64040-1.

    Google Scholar 

  41. Alpha Tec Ltd. Eikonamark. http://www.generation.net/pitas/sign.html, October 1997.

  42. Maurice Maes. Twin peaks: The histogram attack on fixed depth image watermarks. In Aucsmith [9], pages 290–305. This volume.

    Chapter  Google Scholar 

  43. Kineo Matsui and Kiyoshi Tanaka. Video-steganography: How to secretly embed a signature in a picture. Journal of the Interactive Multimedia Association Intellectual Property Project, 1(1):187–205, January 1994.

    Google Scholar 

  44. Norishige Morimoto and Daniel Sullivan. IBM DataHiding proposal. Technical report, IBM Corporation, September 1997. Response to call for proposal issued by the Data Hiding SubGroup.

    Google Scholar 

  45. Peter Nancarrow. Digital technology-Bane or boon for copyright? Computer Laboratory Seminars, University of Cambridge, November 1997.

    Google Scholar 

  46. Wayne Niblack and Ramesh C. Jain, editors. Storage and Retrieval for Image and Video Database III, volume 2420, San Jose, California, USA, February 1995. IS&T, The Society for Imaging Science and Technology and SPIE, The International Society for Optical Engineering, SPIE.

    Google Scholar 

    Google Scholar 

  47. J.J.K. ó Ruanaidh, W.J. Dowling, and F.M. Boland. Watermarking digital images for copyright protection. IEE Proceedings on Vision, Signal and Image Processing, 143(4):250–256, August 1996.

    Google Scholar 

  48. International Federation of the Phonographic Industry. Request for proposals-Embedded signalling systems issue 1.0. 54 Regent Street, London W1R 5PJ, June 1997.

    Google Scholar 

  49. Alan V. Oppenheim and Ronald W. Schafer. Discrete-Time Signal Processing, chapter 12, pages 768–834. Prentice-Hall International, Inc., Englewood Clifis, NJ, USA, international edition, 1989. ISBN 0-13-216771-9.

    MATH  Google Scholar 

  50. Adrian Perrig. A copyright protection environment for digital images. Diploma dissertation, école Polytechnique Ffiedfierale de Lausanne, Lausanne, Switzerland, February 1997.

    Google Scholar 

  51. Fabien A.P. Petitcolas. Weakness of existing watermarking schemes. http://www.cl.cam.ac.uk/fapp2/watermarking/image.watermarking/, October 1997.

  52. Birgit Pfitzmann. Information hiding terminology. In Anderson [2], pages 347–350. Results of an informal plenary meeting and additional proposals.

    Chapter  Google Scholar 

  53. I. Pitas. A method for signature casting on digital images. In International Conference on Image Processing, volume 3, pages 215–218, September 1996.

    Google Scholar 

  54. Geoffrey B. Rhoads. Steganography methods employing embedded calibration data. US Patent 5,636,292, June 1997.

    Google Scholar 

  55. Joseph J.K. ó Ruanaidh and Shelby Pereira. A secure robust digital image watermark. In International Symposium on Advanced Imaging and Network Technologies-Conference on Electronic Imaging: Processing, Printing and Publishing in Colour, Europto, Zürich, Switzerland, May 1998. International Society for Optical Engineering, European Optical Society, Commission of the European Union, Directorate General XII.

    Google Scholar 

  56. Pamela Samuelson. Copyright and digital libraries. Communications of the ACM, 38(4):15–21, 110, April 1995.

    Google Scholar 

  57. Ronald W. Schafer. Echo removal by discrete generalized linear filtering. Technical Report 466, Massachusetts Institute of Technology, February 1969.

    Google Scholar 

  58. Bruce Schneier. Protocol interactions and the chosen protocol attack. In Lomas et al. [40], pages 91–104. ISBN 3-540-64040-1.

    Google Scholar 

  59. Robert A. Scholtz. The origins of spread-spectrum communications. IEEE Transactions on Communications, 30(5):822–853, May 1982.

    Google Scholar 

  60. Ishwar K. Sethin and Ramesh C. Jain, editors. Storage and Retrieval for Image and Video Database V, volume 3022, San Jose, CA, USA, February 1997. IS&T, The Society for Imaging Science and Technology and SPIE, The International Society for Optical Engineering, SPIE.

    Google Scholar 

    Google Scholar 

  61. Signum Technologies SureSign digital fingerprinting. http://www.signumtech.com/, October 1997.

  62. Mitchell D. Swanson, Bin Zhu, and Ahmed H. Tewfik. Robust data hiding for images. In 7th Digital Signal Processing Workshop (DSP 96), pages 37–40, Loen, Norway, September 1996. IEEE.

    Google Scholar 

  63. Mitchell D. Swanson, Bin Zhu, and Ahmed H. Tewfik. Transparent robust image watermarking. In International Conference on Image Processing, volume III, pages 211–214. IEEE, 1996.

    Article  Google Scholar 

  64. A.Z. Tirkel, G.A. Rankin, R.M. van Schyndel, W.J. Ho, N.R.A. Mee, and C.F. Osborne. Electronic watermark. In Digital Image Computing, Technology and Applications-DICTA’ 93, pages 666–673, Macquarie University, Sidney, 1993.

    Google Scholar 

  65. R.G. van Schyndel, A.Z. Tirkel, and C.F. Osborne. A digital watermark. In International Conference on Image Processing, volume 2, pages 86–90, Austin, Texas, USA, 1994. IEEE.

    Article  Google Scholar 

  66. Georges Van Slype. Natural language version of the generic CITED model-ECMS (Electronic Copyright Management System) design for computer based applications. Report 2, European Commission, ESPRIT II Project, Bureau Vam Dijk, Brussel, Belgium, May 1995.

    Google Scholar 

  67. Georges Van Slype. Natural language version of the generic CITED model-Presentation of the generic model. Report 1, European Commission, ESPRIT II Project, Bureau Vam Dijk, Brussel, Belgium, May 1995.

    Google Scholar 

  68. A. Werner, J. Oomen, Marc E. Groenewegen, Robbert G. van der Waal, and Raymond N.J. Veldhuis. A variable-bit-rate buried-data channel for compact disc. Journal of the Audio Engineering Society, 43(1/2):23–28, January/February 1995.

    Google Scholar 

  69. The Working Group on Intellectual Property Rights is part of the US Information Infrastructure Task Force, formed in February 1993.

    Google Scholar 

  70. Raymond B.Wolfgang and Edward J. Delp. A watermark for digital images. In International Conference on Images Processing, pages 219–222, Lausanne, Switzerland, September 1996. IEEE.

    Google Scholar 

  71. Raymond B. Wolfgang and Edward J. Delp. A watermarking technique for digital imagery: further studies. In International Conference on Imaging, Systems, and Technology, pages 279–287, Las Vegas, NV, USA, June 30–July 3 1997. IEEE.

    Google Scholar 

  72. J. Zhao and E. Koch. Embedding robust labels into images for copyright protection. In International Congress on Intellectual Property Rights for Specialised Information, Knowledge and New Technologies, Vienna, Austria, August 1995.

    Google Scholar 

  73. Jian Zhao. A WWW service to embed and prove digital copyright watermarks. In European Conference on Multimedia Applications, Services and Techniques, pages 695–710, Louvain-la-Neuve, Belgium, May 1996.

    Google Scholar 

  74. Jian Zhao. The syscop home page. http://www.syscop.igd.fhg.de/ or or http://www.crcg.edu/syscop/, February 1997.

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G. (1998). Attacks on Copyright Marking Systems. In: Aucsmith, D. (eds) Information Hiding. IH 1998. Lecture Notes in Computer Science, vol 1525. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49380-8_16

Download citation

  • DOI: https://doi.org/10.1007/3-540-49380-8_16

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-65386-8

  • Online ISBN: 978-3-540-49380-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics