The fifth version of evaluation criteria is disclosed at May, 2016.
The evaluation criteria about still image category is modified at Jan, 2017.
Fifth version of the evaluation criteria (PDF)
The information about the next watermark competition will be announced.
The results of the gFourth Watermark Competitionh were presented at 14th Iternational Workshop on Digital-forensics and Watermarking (IWDW2015).
The details are here.
The results of the gThird Watermark Competitionh were presented at The First International Workshop on Information Hiding and its Criteria for evaluation (IWIHC2014).
IWIHC2014 is the workshop in conjunction with the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS2014).
The details are here.
The results of the gSecond Watermark Competitionh were presented at the Forum on Information Technology 2013 (FIT2013).
The schemes submitted were evaluated on the basis of the evaluation criteria, and awards were made for best quality and highest tolerance. (Details)
The results of the gFirst Watermark Competitionh were presented at the Forum on Information Technology 2012 (FIT2012). The schemes submitted were evaluated on the basis of the evaluation criteria, and awards were made for best quality and highest tolerance. (Details)
What is information hiding?
Information hiding techniques are used to protect secret information and/or conceal the existence of the communication. Such techniques make it possible to embed information without substantially degrading the quality of the contents, especially digital contents.
Information hiding techniques can be classified into two types on the basis of the application. Steganographic techniques are used to transmit a secret message and prevent attackers from being aware of the communication?. Digital watermarking techniques are used when the protection of digital contents is important. There are two types of digital watermarks. Robust watermarks can tolerate attacks intended to remove the embedded information, and fragile watermarks can detect manipulation of digital contents. The IHC Committee is targeting robust watermarks for the Second Competition.
Information hiding techniques should be evaluated, at a minimum, in terms of quality, robustness, and capacity. The evaluation of quality is particularly challenging because it greatly depends on the content. The evaluator has to consider the technique used for processing the still or moving images and the one used for processing the sound or music. Regretfully, there are no standard criteria for evaluating robust watermarks. One reason for this is that researchers from different fields propose watermarking methods independently. In addition, since there is no theoretical framework for the evaluation of security, standardization and disclosure of watermarking algorithms are difficult.
Given the current situation, we aim to
establish standard evaluation criteria for robust watermarks,
stimulate research on robust watermarks meeting these criteria,
identify schemes that meet these criteria,
and clarify the practicality of robust watermark.