skip to main content
10.1145/1411328.1411330acmconferencesArticle/Chapter ViewAbstractPublication Pagesih-n-mmsecConference Proceedingsconference-collections
research-article

Watermarking, steganography and content forensics

Published: 22 September 2008 Publication History

Abstract

Electronic watermarking is about 60 years old. However it was not until the beginning of the early 1990's that watermarking received widespread interest, due to concerns about piracy of digital content. In the subsequent decade, very significant progress has been made both in our theoretical understanding of digital watermarking and in its applications. In this talk we highlight some of the progress made and describe a number of current and possible watermarking applications.
Steganography has a much longer history, dating back to at least the time of the ancient Greeks. While Shannon dismissed steganography as "primarily a psychological problem", the last decade has seen the application of information theory to steganography. Terrorist events at the beginning of the 21st century motivated further attention and very interesting results have been described. At first sight, digital watermarking and steganography would appear to share the same goals. However, while both seek to hide information within other information or content, there are very significant differences in the constraints that must be satisfied. For example, in digital watermarking being imperceptible is very important. However, in steganography being imperceptible is less important than being undetectable, since the original cover Work is not available for comparison. The similarities and differences between digital watermarking and steganography are highlighted here.
Steganography spawns steganalysis, the art and science of detecting the presence of a steganographic message hidden in innocuous content. Recent research views steganalysis as a binary classification problem; is a hidden message present or absent? Classification is based on testing for statistical anomalies in features derived from the content. We will describe a variety of steganalysis algorithms, and discuss approaches to evaluating and benchmarking these algorithms.
Content forensics shares similarities with steganalysis. At the simplest level, content forensics is often asked whether, for example, an image is authentic or has been tampered with. This problem can also be viewed as a binary classification problem and similar techniques can be applied. We will review recent work in content forensics and discuss their current limitations.

Cited By

View all
  • (2016)Audio Watermarking Scheme Based on Singular Spectrum Analysis and Psychoacoustic Model with Self-SynchronizationJournal of Electrical and Computer Engineering10.1155/2016/50673132016(7)Online publication date: 1-Nov-2016
  • (2016)SSA-based audio-information-hiding scheme with psychoacoustic model2016 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA)10.1109/APSIPA.2016.7820686(1-10)Online publication date: Dec-2016

Index Terms

  1. Watermarking, steganography and content forensics

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    MM&Sec '08: Proceedings of the 10th ACM workshop on Multimedia and security
    September 2008
    242 pages
    ISBN:9781605580586
    DOI:10.1145/1411328
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 22 September 2008

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. content forensics
    2. data hiding
    3. digital watermarking
    4. steganalysis
    5. steganography

    Qualifiers

    • Research-article

    Conference

    MM&Sec '08
    Sponsor:
    MM&Sec '08: Multimedia and Security Workshop
    September 22 - 23, 2008
    Oxford, United Kingdom

    Acceptance Rates

    Overall Acceptance Rate 128 of 318 submissions, 40%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)7
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 07 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2016)Audio Watermarking Scheme Based on Singular Spectrum Analysis and Psychoacoustic Model with Self-SynchronizationJournal of Electrical and Computer Engineering10.1155/2016/50673132016(7)Online publication date: 1-Nov-2016
    • (2016)SSA-based audio-information-hiding scheme with psychoacoustic model2016 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA)10.1109/APSIPA.2016.7820686(1-10)Online publication date: Dec-2016

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media