Abstract
In the last chapter, we discussed watermark attacks with the embedding and detection algorithms known to analysts, which is the case for most attacks studied in the literature. The public challenges organized by the Secure Digital Music Initiative (SDMI) in Fall 2000 provided an opportunities for researchers to study attacks under an emulated competitive environment. We will discuss in this chapter attacks that have appeared to be successful on the watermarking schemes under SDMI’s consideration at that time. We shall point out weaknesses of those watermark schemes and propose some directions of improvements. We will also discuss a few general approaches that could be used by an attacker in a real competitive environment, thus setting a framework for studying the robustness and security of data hiding systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer Science+Business Media New York
About this chapter
Cite this chapter
Wu, M., Liu, B. (2003). Attacks on Unknown Data Hiding Algorithms. In: Multimedia Data Hiding. Springer, New York, NY. https://doi.org/10.1007/978-0-387-21754-3_10
Download citation
DOI: https://doi.org/10.1007/978-0-387-21754-3_10
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4419-2994-5
Online ISBN: 978-0-387-21754-3
eBook Packages: Springer Book Archive