Attacks on Copyright Marking Systems
In the last few years, a large number of schemes have been proposed for hiding copyright marks and other information in digital pictures, video, audio and other multimedia objects. We describe some contenders that have appeared in the research literature and in the field; we then present a number of...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buchkapitel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 238 |
---|---|
container_issue | |
container_start_page | 218 |
container_title | |
container_volume | 1525 |
creator | Petitcolas, Fabien A. P. Anderson, Ross J. Kuhn, Markus G. |
description | In the last few years, a large number of schemes have been proposed for hiding copyright marks and other information in digital pictures, video, audio and other multimedia objects. We describe some contenders that have appeared in the research literature and in the field; we then present a number of attacks that enable the information hidden by them to be removed or otherwise rendered unusable. |
doi_str_mv | 10.1007/3-540-49380-8_16 |
format | Book Chapter |
fullrecord | <record><control><sourceid>proquest_pasca</sourceid><recordid>TN_cdi_pascalfrancis_primary_1573297</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EBC6486354_219_228</sourcerecordid><originalsourceid>FETCH-LOGICAL-c359t-9a3170e7f93a83d86fbb40ca2697cb034a8f2d0cfc917a26eaf27a0da24d6bd33</originalsourceid><addsrcrecordid>eNqNkDtPwzAURs1TRKU7Y4auKbav48dYVbykIgZgthzHaUPbJNhm6L_HfYiZu1zp--65w0HojuApwVjcQ1EyXDAFEhdSE36GxkpISOEhk-coI5yQAoCpi7-OlyC5vEQZBkwLJRhco0xxxRlQKW7QOIQvnAYoKCEyNJnFaOw65H2Xz_th59vlKuavxq_bbpm_70J023CLrhqzCW582iP0-fjwMX8uFm9PL_PZorBQqlgoA0RgJxoFRkIteVNVDFtDuRK2wsCMbGiNbWMVESl1pqHC4NpQVvOqBhihyfHvYII1m8abzrZBD77dGr_TpBRAlUhn0-NZSE23dF5Xfb8OmmC9N6dBJxH6YEnvzSWAnf76_vvHhajdnrCui95s7MoM0fmgOZM8OdSUKE2pTBj8BwMsKHCRsEQJ-AW1H3wr</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>book_chapter</recordtype><pqid>EBC3072367_21_227</pqid></control><display><type>book_chapter</type><title>Attacks on Copyright Marking Systems</title><source>Springer Books</source><creator>Petitcolas, Fabien A. P. ; Anderson, Ross J. ; Kuhn, Markus G.</creator><contributor>Hartmanis, Juris ; van Leeuwen, Jan ; Aucsmith, David ; Aucsmith, David ; Aucsmith, David</contributor><creatorcontrib>Petitcolas, Fabien A. P. ; Anderson, Ross J. ; Kuhn, Markus G. ; Hartmanis, Juris ; van Leeuwen, Jan ; Aucsmith, David ; Aucsmith, David ; Aucsmith, David</creatorcontrib><description>In the last few years, a large number of schemes have been proposed for hiding copyright marks and other information in digital pictures, video, audio and other multimedia objects. We describe some contenders that have appeared in the research literature and in the field; we then present a number of attacks that enable the information hidden by them to be removed or otherwise rendered unusable.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 9783540653868</identifier><identifier>ISBN: 3540653864</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 9783540493808</identifier><identifier>EISBN: 3540493808</identifier><identifier>DOI: 10.1007/3-540-49380-8_16</identifier><identifier>OCLC: 969643287</identifier><identifier>OCLC: 1243549746</identifier><identifier>LCCallNum: QA75.5-76.95</identifier><language>eng</language><publisher>Germany: Springer Berlin / Heidelberg</publisher><subject>Applied sciences ; Artificial intelligence ; Audio Signal ; Computer science; control theory; systems ; Exact sciences and technology ; Image processing ; Information, signal and communications theory ; Pattern recognition. Digital image processing. Computational geometry ; Secret Message ; Signal processing ; Stream Cipher ; Telecommunications and information theory ; Watermark Image ; Watermark Scheme</subject><ispartof>Information Hiding, 1998, Vol.1525, p.218-238</ispartof><rights>Springer-Verlag Berlin Heidelberg 1998</rights><rights>1999 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c359t-9a3170e7f93a83d86fbb40ca2697cb034a8f2d0cfc917a26eaf27a0da24d6bd33</citedby><relation>Lecture Notes in Computer Science</relation></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttps://ebookcentral.proquest.com/covers/3072367-l.jpg</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/3-540-49380-8_16$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/3-540-49380-8_16$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,777,778,782,787,788,791,4038,4039,27908,38238,41425,42494</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=1573297$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Hartmanis, Juris</contributor><contributor>van Leeuwen, Jan</contributor><contributor>Aucsmith, David</contributor><contributor>Aucsmith, David</contributor><contributor>Aucsmith, David</contributor><creatorcontrib>Petitcolas, Fabien A. P.</creatorcontrib><creatorcontrib>Anderson, Ross J.</creatorcontrib><creatorcontrib>Kuhn, Markus G.</creatorcontrib><title>Attacks on Copyright Marking Systems</title><title>Information Hiding</title><description>In the last few years, a large number of schemes have been proposed for hiding copyright marks and other information in digital pictures, video, audio and other multimedia objects. We describe some contenders that have appeared in the research literature and in the field; we then present a number of attacks that enable the information hidden by them to be removed or otherwise rendered unusable.</description><subject>Applied sciences</subject><subject>Artificial intelligence</subject><subject>Audio Signal</subject><subject>Computer science; control theory; systems</subject><subject>Exact sciences and technology</subject><subject>Image processing</subject><subject>Information, signal and communications theory</subject><subject>Pattern recognition. Digital image processing. Computational geometry</subject><subject>Secret Message</subject><subject>Signal processing</subject><subject>Stream Cipher</subject><subject>Telecommunications and information theory</subject><subject>Watermark Image</subject><subject>Watermark Scheme</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>9783540653868</isbn><isbn>3540653864</isbn><isbn>9783540493808</isbn><isbn>3540493808</isbn><fulltext>true</fulltext><rsrctype>book_chapter</rsrctype><creationdate>1998</creationdate><recordtype>book_chapter</recordtype><recordid>eNqNkDtPwzAURs1TRKU7Y4auKbav48dYVbykIgZgthzHaUPbJNhm6L_HfYiZu1zp--65w0HojuApwVjcQ1EyXDAFEhdSE36GxkpISOEhk-coI5yQAoCpi7-OlyC5vEQZBkwLJRhco0xxxRlQKW7QOIQvnAYoKCEyNJnFaOw65H2Xz_th59vlKuavxq_bbpm_70J023CLrhqzCW582iP0-fjwMX8uFm9PL_PZorBQqlgoA0RgJxoFRkIteVNVDFtDuRK2wsCMbGiNbWMVESl1pqHC4NpQVvOqBhihyfHvYII1m8abzrZBD77dGr_TpBRAlUhn0-NZSE23dF5Xfb8OmmC9N6dBJxH6YEnvzSWAnf76_vvHhajdnrCui95s7MoM0fmgOZM8OdSUKE2pTBj8BwMsKHCRsEQJ-AW1H3wr</recordid><startdate>1998</startdate><enddate>1998</enddate><creator>Petitcolas, Fabien A. P.</creator><creator>Anderson, Ross J.</creator><creator>Kuhn, Markus G.</creator><general>Springer Berlin / Heidelberg</general><general>Springer Berlin Heidelberg</general><general>Springer-Verlag</general><scope>FFUUA</scope><scope>IQODW</scope></search><sort><creationdate>1998</creationdate><title>Attacks on Copyright Marking Systems</title><author>Petitcolas, Fabien A. P. ; Anderson, Ross J. ; Kuhn, Markus G.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c359t-9a3170e7f93a83d86fbb40ca2697cb034a8f2d0cfc917a26eaf27a0da24d6bd33</frbrgroupid><rsrctype>book_chapters</rsrctype><prefilter>book_chapters</prefilter><language>eng</language><creationdate>1998</creationdate><topic>Applied sciences</topic><topic>Artificial intelligence</topic><topic>Audio Signal</topic><topic>Computer science; control theory; systems</topic><topic>Exact sciences and technology</topic><topic>Image processing</topic><topic>Information, signal and communications theory</topic><topic>Pattern recognition. Digital image processing. Computational geometry</topic><topic>Secret Message</topic><topic>Signal processing</topic><topic>Stream Cipher</topic><topic>Telecommunications and information theory</topic><topic>Watermark Image</topic><topic>Watermark Scheme</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Petitcolas, Fabien A. P.</creatorcontrib><creatorcontrib>Anderson, Ross J.</creatorcontrib><creatorcontrib>Kuhn, Markus G.</creatorcontrib><collection>ProQuest Ebook Central - Book Chapters - Demo use only</collection><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Petitcolas, Fabien A. P.</au><au>Anderson, Ross J.</au><au>Kuhn, Markus G.</au><au>Hartmanis, Juris</au><au>van Leeuwen, Jan</au><au>Aucsmith, David</au><au>Aucsmith, David</au><au>Aucsmith, David</au><format>book</format><genre>bookitem</genre><ristype>CHAP</ristype><atitle>Attacks on Copyright Marking Systems</atitle><btitle>Information Hiding</btitle><seriestitle>Lecture Notes in Computer Science</seriestitle><date>1998</date><risdate>1998</risdate><volume>1525</volume><spage>218</spage><epage>238</epage><pages>218-238</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>9783540653868</isbn><isbn>3540653864</isbn><eisbn>9783540493808</eisbn><eisbn>3540493808</eisbn><abstract>In the last few years, a large number of schemes have been proposed for hiding copyright marks and other information in digital pictures, video, audio and other multimedia objects. We describe some contenders that have appeared in the research literature and in the field; we then present a number of attacks that enable the information hidden by them to be removed or otherwise rendered unusable.</abstract><cop>Germany</cop><pub>Springer Berlin / Heidelberg</pub><doi>10.1007/3-540-49380-8_16</doi><oclcid>969643287</oclcid><oclcid>1243549746</oclcid><tpages>21</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0302-9743 |
ispartof | Information Hiding, 1998, Vol.1525, p.218-238 |
issn | 0302-9743 1611-3349 |
language | eng |
recordid | cdi_pascalfrancis_primary_1573297 |
source | Springer Books |
subjects | Applied sciences Artificial intelligence Audio Signal Computer science control theory systems Exact sciences and technology Image processing Information, signal and communications theory Pattern recognition. Digital image processing. Computational geometry Secret Message Signal processing Stream Cipher Telecommunications and information theory Watermark Image Watermark Scheme |
title | Attacks on Copyright Marking Systems |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-17T03%3A14%3A48IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_pasca&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=bookitem&rft.atitle=Attacks%20on%20Copyright%20Marking%20Systems&rft.btitle=Information%20Hiding&rft.au=Petitcolas,%20Fabien%20A.%20P.&rft.date=1998&rft.volume=1525&rft.spage=218&rft.epage=238&rft.pages=218-238&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=9783540653868&rft.isbn_list=3540653864&rft_id=info:doi/10.1007/3-540-49380-8_16&rft_dat=%3Cproquest_pasca%3EEBC6486354_219_228%3C/proquest_pasca%3E%3Curl%3E%3C/url%3E&rft.eisbn=9783540493808&rft.eisbn_list=3540493808&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=EBC3072367_21_227&rft_id=info:pmid/&rfr_iscdi=true |