Skip to main content

Second Generation Benchmarking and Application Oriented Evaluation

  • Conference paper
  • First Online:
Information Hiding (IH 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2137))

Included in the following conference series:

Abstract

Digital image watermarking techniques for copyright protection have become increasingly robust. The best algorithms perform well against the now standard benchmark tests included in the Stirmark package. However the stirmark tests are limited since in general they do not properly model the watermarking process and consequently are limited in their potential to removing the best watermarks. Here we propose a second generation benchmark for image watermarking which includes attacks which take into account powerful prior information about the watermark and the watermarking algorithms. We follow the model of the Stirmark benchmark and propose several new categories of tests including: denoising (ML and MAP), wavelet compression, watermark copy attack, active desynchronization, denoising, geometrical attacks, and de-noising followed by perceptual remodulation. In addition, we take the important step of presenting results as a function of application. This is an important contribution since it is unlikely that one technology will be suitable for all applications.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. M. Barni, F. Bartolini, A. De Rosa, and A. Piva. A new decoder for the optimum recovery of non-additive watermarks. IEEE Transactions on Image Processing, submitted 2000.

    Google Scholar 

  2. Certimark european project, 2000–2002.

    Google Scholar 

  3. Digimarc Corporation. http://www.digirnarc.com/. January 1997.

  4. I. Cox, J. Killian, T. Leighton, and T. Shamoon. Secure spread spectrum watermarking for images, audio and video. In Proceedings of the IEEE Int. Conf. on Image Processing ICIP-96, pages 243–246, Lausanne, Switzerland, 1996.

    Google Scholar 

  5. I. J. Cox and J.-P. M. G. Linnartz. Some general methods for tampering with watermarks. IEEE Journal on Selected Areas in Communications, 16(4):587–593, May 1998.

    Google Scholar 

  6. S. Craver, N. Memon, B. L. Yeo, and M. M. Yeung. Can invisible watermark resolve rightful ownerships? In Fifth Conference on Storage and Retrieval for Image and Video Database, volume 3022, pages 310–321, San Jose, CA, USA, February 1997.

    Google Scholar 

  7. O. Faugeras. Three-Dimensional Computer Vision. The MIT Press, Cambridge Massachusetts, 1993.

    Google Scholar 

  8. M. Kutter. Digital image watermarking: hiding information in images. PhD thesis, EPFL, Lausanne, Switzerland, August 1999.

    Google Scholar 

  9. M. Kutter, S. Voloshynovskiy, and A. Herrigel. Watermark copy attack. In Ping Wah Wong and Edward J. Delp, editors, IS&T/SPIE’s 12th Annual Symposium, Electronic Imaging 2000: Security and Watermarking of Multimedia Content II, volume 3971 of SPIE Proceedings, San Jose, California USA, 23–28 jan 2000.

    Google Scholar 

  10. MediaSec. http://www.mediasec.com/products/download/. March 2000.

  11. J. O Ruanaidh and T. Pun. Rotation, scale and translation invariant spread spectrum digital image watermarking. Signal Processing, 66(3):303–317, 1998.

    Article  MATH  Google Scholar 

  12. S. Pereira, J. J. Ruanaidh, F. Deguillaume, G. Csurka, and T. Pun. Template based recovery of Fourier-based watermarks using Log-polar and Log-log maps. In Int. Conference on Multimedia Computing and Systems, Special Session on Multimedia Data Security and Watermarking, June 1999.

    Google Scholar 

  13. S. Pereira and T. Pun. Fast robust template matching for affine resistant watermarks. In 3rd International Information Hiding Workshop, Dresden, Germany, September 1999.

    Google Scholar 

  14. S. Pereira, S. Voloshynovskiy, and T. Pun. Effective channel coding for DCT watermarks. In International Conference on Image Processing (ICIP’2000), Vancouver, Canada, September 2000.

    Google Scholar 

  15. Shelby Pereira and Thierry Pun. A framework for optimal adaptive DCT watermarks using linear programming. In Tenth European Signal Processing Conference (EUSIPCO’2000), Tampere, Finland, sep 5–8 2000.

    Google Scholar 

  16. A. Perrig. A copyright protection environment for digital images. Diploma dissertation. Ecole Polytechnique Federal de Lausanne, Lausanne, Switzerland, February, 1997.

    Google Scholar 

  17. F. A. P. Petitcolas. http://www.cl.cam.ac.uk/fapp2/watermarking/stirmark/. In Stirmark3.1 (79), 1999.

  18. F. A. P. Petitcolas and R. J. Anderson. Attacks on copyright marking systems. In D. Aucsmith, editor, 2nd International Information Hiding Workshop, pages 219–239, Portland, Oregon, USA, April 1998.

    Google Scholar 

  19. F. A. P. Petitcolas and R. J. Anderson. Evaluation of copyright marking systems. In IEEE Multimedia Systems (ICMCS’99), volume 1, pages 574–579, Florence, Italy, June 1999.

    Google Scholar 

  20. C. I. Podilchuk and W. Zeng. Perceptual watermarking of still images. In Proc. Electronic Imaging, volume 3016, San Jose, CA, USA, February 1996.

    Google Scholar 

  21. Unzign watermark removal software, July 1997.

    Google Scholar 

  22. S. Voloshynovskiy, A. Herrigel, and T. Pun. Blur/deblur attack against document protection systems based on digital watermarking. In Information Hiding Workhop 2001, Pittsburg, USA, April 2001.

    Google Scholar 

  23. S. Voloshynovskiy, S. Pereira, A. Herrigel, N. Baumgärtner, and T. Pun. A generalized watermark attack based on stochastic watermark estimation and perceptual remodulation. In Ping Wah Wong and Edward J. Delp, editors, IS&T/SPIE’s 12th Annual Symposium, Electronic Imaging 2000: Security and Watermarking of Multimedia Content II, volume 3971 of SPIE Proceedings, San Jose, California USA, 23–28 January 2000. (Paper EI 3971-34).

    Google Scholar 

  24. S. Voloshynovskiy, S. Pereira, V. Iquise, and T. Pun. Attack modelling: Towards a second generation watermarking benchmark. Signal Processing, June 2001.

    Google Scholar 

  25. A. B. Watson. DCT quantization matrices visually optimized for individual images. In Proc. SPIE:Human vision, Visual Processing and Digital Display IV, volume 1913, pages 202–216. SPIE, 1993.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Pereira, S., Voloshynovskiy, S., Madueno, M., Marchand-Maillet, S., Pun, T. (2001). Second Generation Benchmarking and Application Oriented Evaluation. In: Moskowitz, I.S. (eds) Information Hiding. IH 2001. Lecture Notes in Computer Science, vol 2137. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45496-9_25

Download citation

  • DOI: https://doi.org/10.1007/3-540-45496-9_25

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42733-9

  • Online ISBN: 978-3-540-45496-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics