Automatic evaluation of watermarking schemes. Évaluation automatique des méthodes de tatouage

Automatic evaluation of watermarking schemes

Évaluation automatique des méthodes de tatouage

F. Raynal F.A.P Petitcolas  C. Fontaine 

INRIA Rocquencourt

Microsoft Research

USTL-LIFL

Page: 
271-282
|
Received: 
18 April 2001
|
Accepted: 
N/A
|
Published: 
31 August 2001
| Citation

OPEN ACCESS

Abstract: 

Many watermarking schemes are now well defined, but it is still very difficult to compare them and thus find the one which fits our needs. Since both media and attacks used for evaluation are different in each article, it is almost impossible to compare the schemes.In this article, we introduce StirMark Benchmark 4, a new automatic tool to evaluate watermarking schemes.  It is written in C++, according to an object oriented model, which allows us towork on images and audio files.There are many different applications for watermarking, so we use profiles to define tests to apply according to the requested parameters of the method, and its purposes. We also propose different levels of quality on usual criteria (perceptibility, robustness and capacity) to increase the legibility of the performances obtained by the schemes.  We also introduce new tests (audio, key space, falsealarms, multiple watermarking).

Résumé

Les méthodes de tatouage sont de plus en plus nombreuses. Néanmoins, il est difficile de les comparer et de trouver celle adaptée à ses besoins dans la mesure où les tests présentés sont très souvent différents. En effet, tant les média employés que les transformations qu’ils subissent changent d’une étude à l’autre. Dans cet article, nous présentons StirMark Benchmark 4, un outil d’évaluation automatique pour les schémas de tatouage. Il est développé en C++, selon un modèle orienté objets, ce qui nous a permis de l’adapter à la fois aux images et aux fichiers audios. Les algorithmes de tatouage étant tous dissemblables, nous utilisons des profils qui définissent les tests à appliquer aux méthodes, selon les paramètres dont elles se servent et les objectifs poursuivis. Nous proposons également des niveaux d’assurance sur les critères habituels (perceptibilité, robustesse et capacité) afin de faciliter la lisibilité des performances obtenues par les schémas. Nous présentons aussi de nouveaux tests (audio, espace desclés, fausses alarmes, marquage multiple).

Keywords: 

Watermarking, evaluation, experiment protocol.

Mots clés 

Tatouage, évaluation, protocole expérimental.

1. Introduction
2. Pré-requis pour un Outil D’évaluation
3. Architecture de StirMark Benchmark 4
4. Critères d’évaluation
5. Nouveaux Tests
6. Problèmes Ouverts et Conclusion
  References

[BCL+99] J.A. Bloom, I.J. Cox, J.-P.MG. Linnartz, M.L. Miller et C.B.S. Traw, Copy protection for DVD. In : Proceedings IEEE, pp. 1267, juillet 1999. 

[Bra98] G.W. Braudaway, Results of attacks on a claimed robust image watermark. In : Electronic imaging, security and watermarking of multimedia contents. The Society for Imaging Science and Technology (IS&T) and the International Society for Optical Engineering (SPIE), pp. 122-131, San Jose, California, U.S.A, janvier 1998. 

[BS01] J. Bœuf, et J. Stern, An analysis of one of the SDMI candidates. In : Proceeding of the Information Hiding Workshop, LNCS, Pittsburg, PA, U.S.A., avril 2001. 

[BSC01] X. Bo, L. Shen et W. Chang, Évaluation of the image degradation for a typical watermarking algorithm in the block-dct domain. In : Proceeding of the Third International Conference on Information and Communications Security (ICICS01), Xian, China, novembre 2001. 

[Com95] S. Comes, Les traitements perceptifs d’images numérisées, Thèse de doctorat, Université catholique de Louvain, Belgium, 1995. 

[Eur00] European Broadcasting Union and Union Européenne de Radio Télévision, Watermarking-call for systems, mai 2000. 

[HSG00] F. Hartung, J.K. Su et B. Girod, Spread spectrum watermarking : Malicious attacks and counterattack. In : Electronic Imaging, Security and Watermarking of multimedia content II. The Society of Imaging Science and Technology (IS&T) and the International Society for Optical Engineering (SPIE), pp. 147-158, San Jose, California, U.S.A., janvier 2000. ISSN 0277-786X. ISBN 0-8194-3598-9.

[Int97] International Federation of the Photographic Industry, London, Request for proposals-embedded signalling systems, 1997. 

[JJS93] N. Jayant, J. Johnston et  R. Safranek, Signal compression based on models of human perception. Proceedings of the IEEE, vol. 81, n°10, 1993, pp. 1385-1422. 

[Kah96] D. Kahn, The codebrakers, Scribner, 1996. [KP99] M. Kutter et  F.A.P. Petitcolas, A fair benchmark for image watermarking systems. In : Electronic imaging, security and watermarking of multimedia content II, pp. 226-239, San Jose, California, U.S.A., janvier 1999. ISSN 0277-786X. ISBN0-8194-3128-1. 

[KVH00] M. Kutter, S. Voloshynovskiy et  A. Herrigel, Watermark copy attack. In : Electronic Imaging, Security and Watermarking of multimedia content II. Society for Imaging Science and Technology (IS&T) and International Society for Optical Engineering (SPIE), pp. 371-380, San Jose, California, U.S.A., janvier 2000. ISSN 0277-786X. ISBN 0-8194-3598-9. 

[KW97] D. Kirby et  K. Watanbe, Subjective testing image of mpeg-2 nbc multichannel audio coding. In : Proceedings of the International Broadcasting Convention (IBC’97), pp. 482-487, Amsterdam, Netherlands, septembre 1997. 

[LC00] C. Lin et  S. Chang, Semi-fragile watermarking for authenticating jpeg visual content. In : Electronic Imaging, Security and Watermarking of multimedia content II. The Society for Imaging Science and Technology (IS&T) and the International Society for Optical Engineering (SPIRE), pp. 140-151, San Jose, California, U.S.A., janvier 2000. ISSN 0277-786X. ISBN 0-8194-3598-9. 

[LvD98] J.-P.M.G.Linartz, et M. Van Dijk, Analysis of the sensibility attack against electronics watermarks in images. In : Proceedings of Information Hiding Workshop, LNCS. pp. 258-272, Portland, Oregon, U.S.A., 1998. 

[MB99] F. Mintzer et  G.W. Braudaway, If one watermark is good, are more better? In : International Conference on Acoustics, Speech and Signal Proceeding (ICASSP). Institute for Electrical and Electronix Engineers (IEEE), pp. 2067-2070, Phoenix, Arizona, U.S.A., mai 1999. 

[MEC98] A.M. Mayache, T. Eude et H. Cherifi,A comparison of image quality models and metrics based on human visual sensitivity. In : IEEE International Conference on Image Processing, pp. 409-413, octobre 1998. 

[MvOV99] A.J. Menezes, P.C. Van Oorschot et  S.A. Vanstone, Handbook of applied cryptography, CRC Press, juillet 1999. 

[PAK98] F.A.P. Petitcolas, R.J. Anderson et M.G. Khun, Attacks on copyright marking systems. In : Lecture notes in computer science. Workshop on Information Hiding, pp. 218-238, Portland, Oregon, U.S.A., avril 1998. 

[Pet00] F.A.P. Petitcolas, Watermarking schemes evaluation. IEEE Signal Processing, vol. 17 n°5, septembre 2000, pp. 58-64, ISSN 10535888. 

[PSR+01] F.A.P. Petitcolas, M. Steinebach, F. Raynal, J. Dittman, C. Fontaine, et N. Fatès, A public automated web-based evaluation service for watermarking schemes : Stirmark benchmark. In : Electronic imaging, security and watermarking of multimedia contents. Society for Imaging Science and Technology (IS&T) and International Society for Optical Engineering  (SPIE), San Jose, California, U.S.A., janvier 2001, ISSN 0277-786X. 

[PVM+01] S. Pereira, S. Voloshynovskiy, M. Madueño, S. Marchand-Maillet et T.Pun, second generation benchmarking and application oriented evaluation. In : Proceedings of Information Hiding Workshop, LNCS, Pittsburg, PA, U.S.A., avril 2001. 

[RD00] C. Rey et  J.-L. Dugelay, Blind detection of malicious alterations on still images using robust watermarks. In : IEE Secure Images and Image Authentication Colloqium, London, U.K., avril 2000.

[SG00] J.K. Su et  B. Girod, Fundamental performance limits of powerspectrum condition-compliant watermarks. In : Electronic imaging, security and watermarking of multimedia content II. Society for Optical Engineering (SPIE), pp. 314-325, San Jose, California,U.S.A., janvier 2000. ISSBN 0277-786X. ISBN 0-81943598-9.

[SPR+01] M. Steinebach, F.A.P. Petitcolas, F. Raynal, J. Dittman, C. Fontaine, C. Seibel et  N. Fatès, Stirmark benchmark : audio watermarking attacks. In : Multimedia Security. IEEE International Conference on Information Technology : Coding and Computing (ITCC’2001), Las Vegas, Nevada, U.S.A., avril 2001. 

[ST01] J. Stern et  J.-P. Tilich,Automatic detection of a watermarked document using a private key. In : Proceedings of information Hiding Workshop, LNCS, Pittsburg, PA, U.S.A., avril 2001. 

[VPP+01] S. Voloshynovshiy, S. Pereira, T. Pun, J. Eggers et  J. Su, Attacks on digital watermarks : Classification, estimation-based attacks and benchmarks. IEEE Communications Magazine (Special Issue on Watermarking), 2001. – F. Pérez-González, Ed. Invited paper (to appear).

[Wat87] A.B. Watson, Efficiency of an image code based on human vision. Journal of the Optical Society of America A, vol. 4, n°12, 1987, pp. 2401-2417. 

[WL98] M. Wu et B. Liu, Watermarking for image authentication. In : Proceedings of the IEEE International Conference on Image Processing (ICIP’98), Chicago, Illinois, U.S.A., 1998.