Abstract
This paper explains and analyzes the successful attacks submitted by the authors on four audio watermark proposals during a 3-week SDMI public challenge. Our analysis points out some weaknesses in the watermark techniques currently under SDMI consideration and suggests directions for further improvement. The paper also discusses the framework and strategies for analyzing the robustness and security of watermarking systems as well as the difficulty, uniqueness, and unrealistic expectations of the attack setup.
Original language | English (US) |
---|---|
Pages (from-to) | 1369-1372 |
Number of pages | 4 |
Journal | ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings |
Volume | 3 |
State | Published - 2001 |
Event | 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing - Salt Lake, UT, United States Duration: May 7 2001 → May 11 2001 |
All Science Journal Classification (ASJC) codes
- Software
- Signal Processing
- Electrical and Electronic Engineering
Keywords
- Attack analysis
- Audio watermark
- Data hiding
- SDMI