The IHC Evalution Criteria


version 6: [PDF]
version 5: [PDF]
version 4: [PDF]
version 3: [PDF]
version 2: [PDF](image)(in Japanese)
[PDF](movie)(in Japanese)
[PDF](audio)(in Japanese)
version 1: (image, movie)(in Japanese)
[PDF](audio)(in Japanese)




IHC Evaluation Resources

IHC Standard Image:  RGB (160MB)  YUV422 (82.3MB)
 
IHC Standard Movie:  Download
 
Audio Host Signal:  SQAM(SQAM_FLAC.zip; EBU TECHNICAL)
CD Tracks 27, 32, 35, 40, 65, 66, 69, 70

You can also download the dataset from here.




The results of the gFourth Watermark Competitionh were presented at 14th Iternational Workshop on Digital-forensics and Watermarking (IWDW2015).
The details are here.




The results of the gThird Watermark Competitionh were presented at The First International Workshop on Information Hiding and its Criteria for evaluation (IWIHC2014). IWIHC2014 is the workshop in conjunction with the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS2014).
The details are here.




The results of the gSecond Watermark Competitionh were presented at the Forum on Information Technology 2013 (FIT2013). The schemes submitted were evaluated on the basis of the evaluation criteria, and awards were made for best quality and highest tolerance. (Details)



The results of the gFirst Watermark Competitionh were presented at the Forum on Information Technology 2012 (FIT2012). The schemes submitted were evaluated on the basis of the evaluation criteria, and awards were made for best quality and highest tolerance. (Details)






What is information hiding?

Information hiding techniques are used to protect secret information and/or conceal the existence of the communication. Such techniques make it possible to embed information without substantially degrading the quality of the contents, especially digital contents.

Information hiding techniques can be classified into two types on the basis of the application. Steganographic techniques are used to transmit a secret message and prevent attackers from being aware of the communication?. Digital watermarking techniques are used when the protection of digital contents is important. There are two types of digital watermarks. Robust watermarks can tolerate attacks intended to remove the embedded information, and fragile watermarks can detect manipulation of digital contents. The IHC Committee is targeting robust watermarks for the Second Competition.






Current Situation

Information hiding techniques should be evaluated, at a minimum, in terms of quality, robustness, and capacity. The evaluation of quality is particularly challenging because it greatly depends on the content. The evaluator has to consider the technique used for processing the still or moving images and the one used for processing the sound or music. Regretfully, there are no standard criteria for evaluating robust watermarks. One reason for this is that researchers from different fields propose watermarking methods independently. In addition, since there is no theoretical framework for the evaluation of security, standardization and disclosure of watermarking algorithms are difficult.





Our Objective

Given the current situation, we aim to

establish standard evaluation criteria for robust watermarks,

stimulate research on robust watermarks meeting these criteria,

identify schemes that meet these criteria,

and and clarify the practicality of robust watermark.

   Copyright @ 2011-2019 IHC Committee All Rights Reserved.