Attacks on Copyright Marking Systems

In the last few years, a large number of schemes have been proposed for hiding copyright marks and other information in digital pictures, video, audio and other multimedia objects. We describe some contenders that have appeared in the research literature and in the field; we then present a number of...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Petitcolas, Fabien A. P., Anderson, Ross J., Kuhn, Markus G.
Format: Buchkapitel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 238
container_issue
container_start_page 218
container_title
container_volume 1525
creator Petitcolas, Fabien A. P.
Anderson, Ross J.
Kuhn, Markus G.
description In the last few years, a large number of schemes have been proposed for hiding copyright marks and other information in digital pictures, video, audio and other multimedia objects. We describe some contenders that have appeared in the research literature and in the field; we then present a number of attacks that enable the information hidden by them to be removed or otherwise rendered unusable.
doi_str_mv 10.1007/3-540-49380-8_16
format Book Chapter
fullrecord <record><control><sourceid>proquest_pasca</sourceid><recordid>TN_cdi_pascalfrancis_primary_1573297</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EBC6486354_219_228</sourcerecordid><originalsourceid>FETCH-LOGICAL-c359t-9a3170e7f93a83d86fbb40ca2697cb034a8f2d0cfc917a26eaf27a0da24d6bd33</originalsourceid><addsrcrecordid>eNqNkDtPwzAURs1TRKU7Y4auKbav48dYVbykIgZgthzHaUPbJNhm6L_HfYiZu1zp--65w0HojuApwVjcQ1EyXDAFEhdSE36GxkpISOEhk-coI5yQAoCpi7-OlyC5vEQZBkwLJRhco0xxxRlQKW7QOIQvnAYoKCEyNJnFaOw65H2Xz_th59vlKuavxq_bbpm_70J023CLrhqzCW582iP0-fjwMX8uFm9PL_PZorBQqlgoA0RgJxoFRkIteVNVDFtDuRK2wsCMbGiNbWMVESl1pqHC4NpQVvOqBhihyfHvYII1m8abzrZBD77dGr_TpBRAlUhn0-NZSE23dF5Xfb8OmmC9N6dBJxH6YEnvzSWAnf76_vvHhajdnrCui95s7MoM0fmgOZM8OdSUKE2pTBj8BwMsKHCRsEQJ-AW1H3wr</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>book_chapter</recordtype><pqid>EBC3072367_21_227</pqid></control><display><type>book_chapter</type><title>Attacks on Copyright Marking Systems</title><source>Springer Books</source><creator>Petitcolas, Fabien A. P. ; Anderson, Ross J. ; Kuhn, Markus G.</creator><contributor>Hartmanis, Juris ; van Leeuwen, Jan ; Aucsmith, David ; Aucsmith, David ; Aucsmith, David</contributor><creatorcontrib>Petitcolas, Fabien A. P. ; Anderson, Ross J. ; Kuhn, Markus G. ; Hartmanis, Juris ; van Leeuwen, Jan ; Aucsmith, David ; Aucsmith, David ; Aucsmith, David</creatorcontrib><description>In the last few years, a large number of schemes have been proposed for hiding copyright marks and other information in digital pictures, video, audio and other multimedia objects. We describe some contenders that have appeared in the research literature and in the field; we then present a number of attacks that enable the information hidden by them to be removed or otherwise rendered unusable.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 9783540653868</identifier><identifier>ISBN: 3540653864</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 9783540493808</identifier><identifier>EISBN: 3540493808</identifier><identifier>DOI: 10.1007/3-540-49380-8_16</identifier><identifier>OCLC: 969643287</identifier><identifier>OCLC: 1243549746</identifier><identifier>LCCallNum: QA75.5-76.95</identifier><language>eng</language><publisher>Germany: Springer Berlin / Heidelberg</publisher><subject>Applied sciences ; Artificial intelligence ; Audio Signal ; Computer science; control theory; systems ; Exact sciences and technology ; Image processing ; Information, signal and communications theory ; Pattern recognition. Digital image processing. Computational geometry ; Secret Message ; Signal processing ; Stream Cipher ; Telecommunications and information theory ; Watermark Image ; Watermark Scheme</subject><ispartof>Information Hiding, 1998, Vol.1525, p.218-238</ispartof><rights>Springer-Verlag Berlin Heidelberg 1998</rights><rights>1999 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c359t-9a3170e7f93a83d86fbb40ca2697cb034a8f2d0cfc917a26eaf27a0da24d6bd33</citedby><relation>Lecture Notes in Computer Science</relation></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttps://ebookcentral.proquest.com/covers/3072367-l.jpg</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/3-540-49380-8_16$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/3-540-49380-8_16$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,777,778,782,787,788,791,4038,4039,27908,38238,41425,42494</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=1573297$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Hartmanis, Juris</contributor><contributor>van Leeuwen, Jan</contributor><contributor>Aucsmith, David</contributor><contributor>Aucsmith, David</contributor><contributor>Aucsmith, David</contributor><creatorcontrib>Petitcolas, Fabien A. P.</creatorcontrib><creatorcontrib>Anderson, Ross J.</creatorcontrib><creatorcontrib>Kuhn, Markus G.</creatorcontrib><title>Attacks on Copyright Marking Systems</title><title>Information Hiding</title><description>In the last few years, a large number of schemes have been proposed for hiding copyright marks and other information in digital pictures, video, audio and other multimedia objects. We describe some contenders that have appeared in the research literature and in the field; we then present a number of attacks that enable the information hidden by them to be removed or otherwise rendered unusable.</description><subject>Applied sciences</subject><subject>Artificial intelligence</subject><subject>Audio Signal</subject><subject>Computer science; control theory; systems</subject><subject>Exact sciences and technology</subject><subject>Image processing</subject><subject>Information, signal and communications theory</subject><subject>Pattern recognition. Digital image processing. Computational geometry</subject><subject>Secret Message</subject><subject>Signal processing</subject><subject>Stream Cipher</subject><subject>Telecommunications and information theory</subject><subject>Watermark Image</subject><subject>Watermark Scheme</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>9783540653868</isbn><isbn>3540653864</isbn><isbn>9783540493808</isbn><isbn>3540493808</isbn><fulltext>true</fulltext><rsrctype>book_chapter</rsrctype><creationdate>1998</creationdate><recordtype>book_chapter</recordtype><recordid>eNqNkDtPwzAURs1TRKU7Y4auKbav48dYVbykIgZgthzHaUPbJNhm6L_HfYiZu1zp--65w0HojuApwVjcQ1EyXDAFEhdSE36GxkpISOEhk-coI5yQAoCpi7-OlyC5vEQZBkwLJRhco0xxxRlQKW7QOIQvnAYoKCEyNJnFaOw65H2Xz_th59vlKuavxq_bbpm_70J023CLrhqzCW582iP0-fjwMX8uFm9PL_PZorBQqlgoA0RgJxoFRkIteVNVDFtDuRK2wsCMbGiNbWMVESl1pqHC4NpQVvOqBhihyfHvYII1m8abzrZBD77dGr_TpBRAlUhn0-NZSE23dF5Xfb8OmmC9N6dBJxH6YEnvzSWAnf76_vvHhajdnrCui95s7MoM0fmgOZM8OdSUKE2pTBj8BwMsKHCRsEQJ-AW1H3wr</recordid><startdate>1998</startdate><enddate>1998</enddate><creator>Petitcolas, Fabien A. P.</creator><creator>Anderson, Ross J.</creator><creator>Kuhn, Markus G.</creator><general>Springer Berlin / Heidelberg</general><general>Springer Berlin Heidelberg</general><general>Springer-Verlag</general><scope>FFUUA</scope><scope>IQODW</scope></search><sort><creationdate>1998</creationdate><title>Attacks on Copyright Marking Systems</title><author>Petitcolas, Fabien A. P. ; Anderson, Ross J. ; Kuhn, Markus G.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c359t-9a3170e7f93a83d86fbb40ca2697cb034a8f2d0cfc917a26eaf27a0da24d6bd33</frbrgroupid><rsrctype>book_chapters</rsrctype><prefilter>book_chapters</prefilter><language>eng</language><creationdate>1998</creationdate><topic>Applied sciences</topic><topic>Artificial intelligence</topic><topic>Audio Signal</topic><topic>Computer science; control theory; systems</topic><topic>Exact sciences and technology</topic><topic>Image processing</topic><topic>Information, signal and communications theory</topic><topic>Pattern recognition. Digital image processing. Computational geometry</topic><topic>Secret Message</topic><topic>Signal processing</topic><topic>Stream Cipher</topic><topic>Telecommunications and information theory</topic><topic>Watermark Image</topic><topic>Watermark Scheme</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Petitcolas, Fabien A. P.</creatorcontrib><creatorcontrib>Anderson, Ross J.</creatorcontrib><creatorcontrib>Kuhn, Markus G.</creatorcontrib><collection>ProQuest Ebook Central - Book Chapters - Demo use only</collection><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Petitcolas, Fabien A. P.</au><au>Anderson, Ross J.</au><au>Kuhn, Markus G.</au><au>Hartmanis, Juris</au><au>van Leeuwen, Jan</au><au>Aucsmith, David</au><au>Aucsmith, David</au><au>Aucsmith, David</au><format>book</format><genre>bookitem</genre><ristype>CHAP</ristype><atitle>Attacks on Copyright Marking Systems</atitle><btitle>Information Hiding</btitle><seriestitle>Lecture Notes in Computer Science</seriestitle><date>1998</date><risdate>1998</risdate><volume>1525</volume><spage>218</spage><epage>238</epage><pages>218-238</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>9783540653868</isbn><isbn>3540653864</isbn><eisbn>9783540493808</eisbn><eisbn>3540493808</eisbn><abstract>In the last few years, a large number of schemes have been proposed for hiding copyright marks and other information in digital pictures, video, audio and other multimedia objects. We describe some contenders that have appeared in the research literature and in the field; we then present a number of attacks that enable the information hidden by them to be removed or otherwise rendered unusable.</abstract><cop>Germany</cop><pub>Springer Berlin / Heidelberg</pub><doi>10.1007/3-540-49380-8_16</doi><oclcid>969643287</oclcid><oclcid>1243549746</oclcid><tpages>21</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0302-9743
ispartof Information Hiding, 1998, Vol.1525, p.218-238
issn 0302-9743
1611-3349
language eng
recordid cdi_pascalfrancis_primary_1573297
source Springer Books
subjects Applied sciences
Artificial intelligence
Audio Signal
Computer science
control theory
systems
Exact sciences and technology
Image processing
Information, signal and communications theory
Pattern recognition. Digital image processing. Computational geometry
Secret Message
Signal processing
Stream Cipher
Telecommunications and information theory
Watermark Image
Watermark Scheme
title Attacks on Copyright Marking Systems
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-17T03%3A14%3A48IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_pasca&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=bookitem&rft.atitle=Attacks%20on%20Copyright%20Marking%20Systems&rft.btitle=Information%20Hiding&rft.au=Petitcolas,%20Fabien%20A.%20P.&rft.date=1998&rft.volume=1525&rft.spage=218&rft.epage=238&rft.pages=218-238&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=9783540653868&rft.isbn_list=3540653864&rft_id=info:doi/10.1007/3-540-49380-8_16&rft_dat=%3Cproquest_pasca%3EEBC6486354_219_228%3C/proquest_pasca%3E%3Curl%3E%3C/url%3E&rft.eisbn=9783540493808&rft.eisbn_list=3540493808&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=EBC3072367_21_227&rft_id=info:pmid/&rfr_iscdi=true