Skip to main content

An Analysis of One of the SDMI Candidates

  • Conference paper
  • First Online:
Information Hiding (IH 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2137))

Included in the following conference series:

Abstract

Watermarking technologies have received a considerable attention from both the academic and the industrial worlds lately. The first very large scale deployment of a intellectual property protection system relying on watermarking might be led by the Secure Digital Music Initiative consortium (SDMI). On September 6th 2000, the Executive Director of the SDMI group published an “open letter to the digital community” [otSg], where he invited hackers to try to break the technologies developed by several members of the SDMI group. In this paper, we present the detailed analysis of one of the proposed watermarking schemes, and explain how to defeat it.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. David Aucsmith, editor. Second Workshop on Information Hiding, number 1525 in Lecture Notes in Computer Science. Springer-Verlag, 1998.

    Google Scholar 

  2. I. Cox, J. Kilian, F. T. Leighton, and T. Shamoon. Secure spread spectrum watermarking for images, audio and video. In IEEE Int. Conference on Image Processing, volume 3, pages 243–246, 1996.

    Google Scholar 

  3. S. Craver, P. McGregor, M. Wu, B. Liu, A. Stubblefield, B. Swartlander, D. S. Wallach, D. Dean, and E. W. Felten. http://www.cs.princeton.edu/sip/sdmi/.

  4. Franz Hartung and Bernd Girod. Digital watermarking of raw and compressed video. In SPIE 2952: Digital Compression Technologies and Systems for Video Communication, pages 205–213, 1996.

    Google Scholar 

  5. N. F. Johnson, Z. Duric, and S. Jajodia. Recovery of watermarks from distorted images. In Andreas Pfitzmann, editor, Information Hiding Workshop’ 99, Lecture Notes in Computer Science, pages 318–332. Springer-Verlag, 1999.

    Chapter  Google Scholar 

  6. Leonardo Chiariglione (Executive Director of the SDMI group). An open letter to the digital community. http://www.hacksdmi.org/letter.asp

  7. Fabien A. P. Petitcolas, Ross J. Anderson, and Markus G. Kuhn. Attacks on copyright marking systems. In David Aucsmith, editor, Second Workshop on Information Hiding, number 1525 in Lecture Notes in Computer Science, pages 218–238. Springer-Verlag, 1998.

    Chapter  Google Scholar 

  8. Fabien A. P. Petitcolas, Ross J. Anderson, and Markus G. Kuhn. Information hiding. a survey. In Proceedings of the IEEE, special issue on protection of multimedia content, 1999.

    Google Scholar 

  9. Andreas Pfitzmann, editor. Third Workshop on Information Hiding, number 1768 in Lecture Notes in Computer Science. Springer-Verlag, 1999.

    Google Scholar 

  10. Shelby Perreira and Thierry Pun. Fast robust template matching for affine resistant image watermarks. In Andreas Pfitzmann, editor, Information Hiding Workshop’ 99, Lecture Notes in Computer Science, pages 199–210. Springer-Verlag, 1999.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Boeuf, J., Stern, J.P. (2001). An Analysis of One of the SDMI Candidates. In: Moskowitz, I.S. (eds) Information Hiding. IH 2001. Lecture Notes in Computer Science, vol 2137. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45496-9_29

Download citation

  • DOI: https://doi.org/10.1007/3-540-45496-9_29

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42733-9

  • Online ISBN: 978-3-540-45496-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics